Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijisp/ijisp17.bht:"
@article{DBLP:journals/ijisp/AlibeigiBA23, author = {Ali Alibeigi and Munir Abu Bakar and Adeleh Asemi}, title = {Legal Compliance Assessment of the Malaysian Health Sector Through the Lens of Privacy Policies}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--25}, year = {2023}, url = {https://doi.org/10.4018/ijisp.315818}, doi = {10.4018/IJISP.315818}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/AlibeigiBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/BiradarM23, author = {Mallanagouda Biradar and Basavaraj Mathapathi}, title = {Energy, Reliability, and Trust-Based Security Framework for Clustering-Based Routing Model in {WSN}}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--18}, year = {2023}, url = {https://doi.org/10.4018/ijisp.315817}, doi = {10.4018/IJISP.315817}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/BiradarM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/EnnajiAH23, author = {Sabrine Ennaji and Nabil El Akkad and Khalid Haddouch}, title = {i-2NIDS Novel Intelligent Intrusion Detection Approach for a Strong Network Security}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--17}, year = {2023}, url = {https://doi.org/10.4018/ijisp.317113}, doi = {10.4018/IJISP.317113}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/EnnajiAH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/GuZ23, author = {Zhen Gu and Guoyin Zhang}, title = {Trajectory Data Publication Based on Differential Privacy}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--15}, year = {2023}, url = {https://doi.org/10.4018/ijisp.315593}, doi = {10.4018/IJISP.315593}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/GuZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/RawatCVASB23, author = {Romil Rawat and Rajesh Kumar Chakrawarti and Piyush Vyas and Jos{\'{e}} Luis Arias{-}Gonz{\'{a}}les and Ranjana Sikarwar and Ramakant Bhardwaj}, title = {Intelligent Fog Computing Surveillance System for Crime and Vulnerability Identification and Tracing}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--25}, year = {2023}, url = {https://doi.org/10.4018/ijisp.317371}, doi = {10.4018/IJISP.317371}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisp/RawatCVASB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisp/ThapaliyaS23, author = {Suman Thapaliya and Pawan Kumar Sharma}, title = {Optimized Deep Neuro Fuzzy Network for Cyber Forensic Investigation in Big Data-Based IoT Infrastructures}, journal = {Int. J. Inf. Secur. Priv.}, volume = {17}, number = {1}, pages = {1--22}, year = {2023}, url = {https://doi.org/10.4018/ijisp.315819}, doi = {10.4018/IJISP.315819}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijisp/ThapaliyaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.