Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm9.bht:"
@article{DBLP:journals/jcsm/AbaneDBBM20, author = {Amar Abane and Mehammed Daoui and Samia Bouzefrane and Soumya Banerjee and Paul M{\"{u}}hlethaler}, title = {A Realistic Deployment of Named Data Networking in the Internet of Things}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {1--46}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.911}, doi = {10.13052/JCSM2245-1439.911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbaneDBBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbdelwahabEZ20, author = {Zakaria Hassan Abdelwahab and Talaat A. Elgarf and Abdelhalim Zekry}, title = {Analyzing {SNOW} and {ZUC} Security Algorithms Using {NIST} {SP} 800-22 and Enhancing their Randomness}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {535--576}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.943}, doi = {10.13052/JCSM2245-1439.943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbdelwahabEZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlwazzehKS20, author = {Muneer Alwazzeh and Sameer Karaman and Mohammad Nur Shamma}, title = {Man in The Middle Attacks Against {SSL/TLS:} Mitigation and Defeat}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {449--468}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.933}, doi = {10.13052/JCSM2245-1439.933}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AlwazzehKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Aseeri20, author = {Ahmad O. Aseeri}, title = {Noise-Resilient Neural Network-Based Adversarial Attack Modeling for {XOR} Physical Unclonable Functions}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {331--354}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.926}, doi = {10.13052/JCSM2245-1439.926}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Aseeri20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/BejoyJ20, author = {B. J. Bejoy and S. Janakiraman}, title = {Enhanced {AIS} Based Intrusion Detection System Using Natural Killer Cells}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {515--534}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.942}, doi = {10.13052/JCSM2245-1439.942}, timestamp = {Sun, 12 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/BejoyJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ChoSZ20, author = {Joo Yeon Cho and Andrew Sergeev and Jim Zou}, title = {Securing Ethernet-based Optical Fronthaul for 5G Network}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {91--110}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.913}, doi = {10.13052/JCSM2245-1439.913}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ChoSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DamKS20, author = {Tobias Dam and Lukas Daniel Klausner and Sebastian Schrittwieser}, title = {Typosquatting for Fun and Profit: Cross-Country Analysis of Pop-Up Scam}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {265--300}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.924}, doi = {10.13052/JCSM2245-1439.924}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DamKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DariBE20, author = {El Yazid Dari and Ahmed Bendahmane and Mohamed Essaaidi}, title = {Optimal Method for Detecting Collusive Saboteur Smart Meters in Smart Grid}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {237--264}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.923}, doi = {10.13052/JCSM2245-1439.923}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/DariBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DoynikovaFK20, author = {Elena Doynikova and Andrey Fedorchenko and Igor V. Kotenko}, title = {A Semantic Model for Security Evaluation of Information Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {301--330}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.925}, doi = {10.13052/JCSM2245-1439.925}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DoynikovaFK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KourTK20, author = {Ravdeep Kour and Adithya Thaduri and Ramin Karim}, title = {Railway Defender Kill Chain to Predict and Detect Cyber-Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {47--90}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.912}, doi = {10.13052/JCSM2245-1439.912}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KourTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/NagaRajuR20, author = {Pamarthi NagaRaju and Nallamothu Nagamalleswara Rao}, title = {{OB-MECC:} An Efficient Confidentiality and Security Enhancement for Cloud Storage System}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {577--600}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.944}, doi = {10.13052/JCSM2245-1439.944}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/NagaRajuR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OdumuyiwaC20, author = {Victor Odumuyiwa and Analogbei Chibueze}, title = {Automatic Detection of {HTTP} Injection Attacks using Convolutional Neural Network and Deep Neural Network}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {489--514}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.941}, doi = {10.13052/JCSM2245-1439.941}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OdumuyiwaC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PorwalM20, author = {Shardha Porwal and Sangeeta Mittal}, title = {A Privacy Preserving and Efficient Multi Authority - {CP-ABE} Scheme for Secure Cloud Communication}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {4}, pages = {601--626}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.945}, doi = {10.13052/JCSM2245-1439.945}, timestamp = {Mon, 20 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PorwalM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SaadehSSA20, author = {Maha Saadeh and Azzam Sleit and Khair Eddin Sabri and Wesam Almobaideen}, title = {Object Authentication in the Context of the Internet of Things: {A} Survey}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {385--448}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.932}, doi = {10.13052/JCSM2245-1439.932}, timestamp = {Wed, 12 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SaadehSSA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachLG20, author = {Martin Steinebach and Huajian Liu and Karol Gotkowski}, title = {Fake News Detection by Image Montage Recognition}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {175--202}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.921}, doi = {10.13052/JCSM2245-1439.921}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachLL20, author = {Martin Steinebach and Sebastian Lutz and Huajian Liu}, title = {Privacy and Robust Hashes Privacy-Preserving Forensics for Image Re-Identification}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {111--140}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.914}, doi = {10.13052/JCSM2245-1439.914}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachSKB20, author = {Martin Steinebach and Marcel Sch{\"{a}}fer and Alexander Karakuz and Katharina Brandl}, title = {Detection and Analysis of Tor Onion Services}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {1}, pages = {141--174}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.915}, doi = {10.13052/JCSM2245-1439.915}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachSKB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TundisBSM20, author = {Andrea Tundis and Leon B{\"{o}}ck and Victoria Stanilescu and Max M{\"{u}}hlh{\"{a}}user}, title = {Experiencing the Detection of Radicalized Criminals on Facebook Social Network and Data-related Issues}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {2}, pages = {203--236}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.922}, doi = {10.13052/JCSM2245-1439.922}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TundisBSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Tweneboah-Koduah20, author = {Samuel Tweneboah{-}Koduah and Francis Atsu and Ramjee Prasad}, title = {Reaction of Stock Volatility to Data Breach: an Event Study}, journal = {J. Cyber Secur. Mobil.}, volume = {9}, number = {3}, pages = {355--384}, year = {2020}, url = {https://doi.org/10.13052/jcsm2245-1439.931}, doi = {10.13052/JCSM2245-1439.931}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Tweneboah-Koduah20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.