default search action
Search dblp for Publications
export results for "toc:db/journals/secinf/secinf4.bht:"
@article{DBLP:journals/secinf/AdrichemBLWWFK15, author = {Niels L. M. van Adrichem and Norbert Blenn and Antonio Reyes Lua and Xin Wang and Muhammad Wasif and Ficky Fatturrahman and Fernando A. Kuipers}, title = {A measurement study of {DNSSEC} misconfigurations}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {8}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0023-y}, doi = {10.1186/S13388-015-0023-Y}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/AdrichemBLWWFK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/CowleyGW15, author = {Jennifer Cowley and Frank L. Greitzer and Bronwyn Woods}, title = {Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {1}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0016-x}, doi = {10.1186/S13388-015-0016-X}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/CowleyGW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/CowleyGW15a, author = {Jennifer Cowley and Frank L. Greitzer and Bronwyn Woods}, title = {Erratum to: Factors influencing network risk judgments: a conceptual inquiry and exploratory analysis}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {5}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0020-1}, doi = {10.1186/S13388-015-0020-1}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/CowleyGW15a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/DatcuLLC15, author = {Dragos Datcu and Stephan G. Lukosch and Heide K. Lukosch and Marina Cidot{\~{a}}}, title = {Using augmented reality for supporting information exchange in teams from the security domain}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {10}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0025-9}, doi = {10.1186/S13388-015-0025-9}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/DatcuLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/HaasF15, author = {Timothy C. Haas and Sam M. Ferreira}, title = {Federated databases and actionable intelligence: using social network analysis to disrupt transnational wildlife trafficking criminal networks}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {2}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0018-8}, doi = {10.1186/S13388-015-0018-8}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/HaasF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/HarangM15, author = {Richard E. Harang and Peter Mell}, title = {Evasion-resistant network scan detection}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {4}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0019-7}, doi = {10.1186/S13388-015-0019-7}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/HarangM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/JohanssonKS15, author = {Fredrik Johansson and Lisa Kaati and Amendra Shrestha}, title = {Timeprints for identifying social media users with multiple aliases}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {7}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0022-z}, doi = {10.1186/S13388-015-0022-Z}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/JohanssonKS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/JurekMB15, author = {Anna Jurek and Maurice D. Mulvenna and Yaxin Bi}, title = {Improved lexicon-based sentiment analysis for social media analytics}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {9}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0024-x}, doi = {10.1186/S13388-015-0024-X}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/JurekMB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/LiW15, author = {Jiexun Li and G. Alan Wang}, title = {A framework of identity resolution: evaluating identity attributes and matching algorithms}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {6}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0021-0}, doi = {10.1186/S13388-015-0021-0}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/LiW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/secinf/YuanRU15, author = {Shuai Yuan and H. Raghav Rao and Shambhu J. Upadhyaya}, title = {Emerging issues for education in E-discovery for electronic health records}, journal = {Secur. Informatics}, volume = {4}, number = {1}, pages = {3}, year = {2015}, url = {https://doi.org/10.1186/s13388-015-0017-9}, doi = {10.1186/S13388-015-0017-9}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/secinf/YuanRU15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.