Search dblp for Publications

export results for "toc:db/journals/cybersecapplications/cybersecapplications2.bht:"

 download as .bib file

@article{DBLP:journals/cybersecapplications/AdmassMD24,
  author       = {Wasyihun Sema Admass and
                  Yirga Yayeh Munaye and
                  Abebe Abeshu Diro},
  title        = {Cyber security: State of the art, challenges and future directions},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100031},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100031},
  doi          = {10.1016/J.CSA.2023.100031},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AdmassMD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/AhmadM24,
  author       = {Shahnawaz Ahmad and
                  Shabana Mehfuz},
  title        = {Efficient time-oriented latency-based secure data encryption for cloud
                  storage},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100027},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100027},
  doi          = {10.1016/J.CSA.2023.100027},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/AhmadM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/BinnarBK24,
  author       = {Pranita Binnar and
                  Sunil Bhirud and
                  Faruk Kazi},
  title        = {Security analysis of cyber physical system using digital forensic
                  incident response},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100034},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100034},
  doi          = {10.1016/J.CSA.2023.100034},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/BinnarBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/FarA24,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Asaar},
  title        = {A blockchain-based anonymous reporting system with no central authority:
                  Architecture and protocol},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100032},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100032},
  doi          = {10.1016/J.CSA.2023.100032},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/FarA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/NabiZ24,
  author       = {Faisal Nabi and
                  Xujuan Zhou},
  title        = {Enhancing intrusion detection systems through dimensionality reduction:
                  {A} comparative study of machine learning techniques for cyber security},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100033},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100033},
  doi          = {10.1016/J.CSA.2023.100033},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/NabiZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/NairDM24,
  author       = {Aditi Nair and
                  Diti Dalal and
                  Ramchandra S. Mangrulkar},
  title        = {Colour image encryption algorithm using Rubik's cube scrambling with
                  bitmap shuffling and frame rotation},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100030},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100030},
  doi          = {10.1016/J.CSA.2023.100030},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/NairDM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SetiaCSKSAGW24,
  author       = {Himanshu Setia and
                  Amit Chhabra and
                  Sunil K. Singh and
                  Sudhakar Kumar and
                  Sarita Sharma and
                  Varsha Arya and
                  Brij B. Gupta and
                  Jinsong Wu},
  title        = {Securing the road ahead: Machine learning-driven DDoS attack detection
                  in {VANET} cloud environments},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100037},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100037},
  doi          = {10.1016/J.CSA.2024.100037},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SetiaCSKSAGW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ShombotDBA24,
  author       = {Emmanuel Song Shombot and
                  Gilles Dusserre and
                  Robert Bestak and
                  Nasir Baba Ahmed},
  title        = {An application for predicting phishing attacks: {A} case of implementing
                  a support vector machine learning model},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100036},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2024.100036},
  doi          = {10.1016/J.CSA.2024.100036},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ShombotDBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/SultanaKAA24,
  author       = {Habiba Sultana and
                  A. H. M. Kamal and
                  Tasnim Sakib Apon and
                  Md. Golam Rabiul Alam},
  title        = {Increasing embedding capacity of stego images by exploiting edge pixels
                  in prediction error space},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100028},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100028},
  doi          = {10.1016/J.CSA.2023.100028},
  timestamp    = {Mon, 12 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/SultanaKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersecapplications/ThotadiDREPMOR24,
  author       = {Chaitanyateja Thotadi and
                  Monith Debbala and
                  Subba Rao and
                  Ajay Eeralla and
                  Basker Palaniswamy and
                  Srijanee Mookherji and
                  Vanga Odelu and
                  Alavalapati Goutham Reddy},
  title        = {E-Brightpass: {A} Secure way to access social networks on smartphones},
  journal      = {Cyber Secur. Appl.},
  volume       = {2},
  pages        = {100021},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.csa.2023.100021},
  doi          = {10.1016/J.CSA.2023.100021},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersecapplications/ThotadiDREPMOR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics