Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/cybersecapplications/cybersecapplications2.bht:"
@article{DBLP:journals/cybersecapplications/AdmassMD24, author = {Wasyihun Sema Admass and Yirga Yayeh Munaye and Abebe Abeshu Diro}, title = {Cyber security: State of the art, challenges and future directions}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100031}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100031}, doi = {10.1016/J.CSA.2023.100031}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AdmassMD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/AhmadM24, author = {Shahnawaz Ahmad and Shabana Mehfuz}, title = {Efficient time-oriented latency-based secure data encryption for cloud storage}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100027}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100027}, doi = {10.1016/J.CSA.2023.100027}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/AhmadM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/BinnarBK24, author = {Pranita Binnar and Sunil Bhirud and Faruk Kazi}, title = {Security analysis of cyber physical system using digital forensic incident response}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100034}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100034}, doi = {10.1016/J.CSA.2023.100034}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/BinnarBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/FarA24, author = {Saeed Banaeian Far and Maryam Rajabzadeh Asaar}, title = {A blockchain-based anonymous reporting system with no central authority: Architecture and protocol}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100032}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100032}, doi = {10.1016/J.CSA.2023.100032}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/FarA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/NabiZ24, author = {Faisal Nabi and Xujuan Zhou}, title = {Enhancing intrusion detection systems through dimensionality reduction: {A} comparative study of machine learning techniques for cyber security}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100033}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100033}, doi = {10.1016/J.CSA.2023.100033}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/NabiZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/NairDM24, author = {Aditi Nair and Diti Dalal and Ramchandra S. Mangrulkar}, title = {Colour image encryption algorithm using Rubik's cube scrambling with bitmap shuffling and frame rotation}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100030}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100030}, doi = {10.1016/J.CSA.2023.100030}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/NairDM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SetiaCSKSAGW24, author = {Himanshu Setia and Amit Chhabra and Sunil K. Singh and Sudhakar Kumar and Sarita Sharma and Varsha Arya and Brij B. Gupta and Jinsong Wu}, title = {Securing the road ahead: Machine learning-driven DDoS attack detection in {VANET} cloud environments}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100037}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100037}, doi = {10.1016/J.CSA.2024.100037}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SetiaCSKSAGW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ShombotDBA24, author = {Emmanuel Song Shombot and Gilles Dusserre and Robert Bestak and Nasir Baba Ahmed}, title = {An application for predicting phishing attacks: {A} case of implementing a support vector machine learning model}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100036}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2024.100036}, doi = {10.1016/J.CSA.2024.100036}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ShombotDBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/SultanaKAA24, author = {Habiba Sultana and A. H. M. Kamal and Tasnim Sakib Apon and Md. Golam Rabiul Alam}, title = {Increasing embedding capacity of stego images by exploiting edge pixels in prediction error space}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100028}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100028}, doi = {10.1016/J.CSA.2023.100028}, timestamp = {Mon, 12 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/SultanaKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersecapplications/ThotadiDREPMOR24, author = {Chaitanyateja Thotadi and Monith Debbala and Subba Rao and Ajay Eeralla and Basker Palaniswamy and Srijanee Mookherji and Vanga Odelu and Alavalapati Goutham Reddy}, title = {E-Brightpass: {A} Secure way to access social networks on smartphones}, journal = {Cyber Secur. Appl.}, volume = {2}, pages = {100021}, year = {2024}, url = {https://doi.org/10.1016/j.csa.2023.100021}, doi = {10.1016/J.CSA.2023.100021}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersecapplications/ThotadiDREPMOR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.