Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isci/isci231.bht:"
@article{DBLP:journals/isci/ChenFMDW13, author = {Rui Chen and Benjamin C. M. Fung and Noman Mohammed and Bipin C. Desai and Ke Wang}, title = {Privacy-preserving trajectory data publishing by local suppression}, journal = {Inf. Sci.}, volume = {231}, pages = {83--97}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.07.035}, doi = {10.1016/J.INS.2011.07.035}, timestamp = {Tue, 04 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ChenFMDW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ChunHJL13, author = {Ji Young Chun and Dowon Hong and Ik Rae Jeong and Dong Hoon Lee}, title = {Privacy-preserving disjunctive normal form operations on distributed sets}, journal = {Inf. Sci.}, volume = {231}, pages = {113--122}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.07.003}, doi = {10.1016/J.INS.2011.07.003}, timestamp = {Mon, 06 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/ChunHJL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/EloviciRA13, author = {Yuval Elovici and Lior Rokach and Sahin Albayrak}, title = {Guest editorial: Special issue on data mining for information security}, journal = {Inf. Sci.}, volume = {231}, pages = {1--3}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2013.01.027}, doi = {10.1016/J.INS.2013.01.027}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/EloviciRA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HuangLCC13, author = {Jen{-}Yan Huang and I{-}En Liao and Yu{-}Fang Chung and Kuen{-}Tzung Chen}, title = {Shielding wireless sensor network using Markovian intrusion detection system with attack pattern mining}, journal = {Inf. Sci.}, volume = {231}, pages = {32--44}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.03.014}, doi = {10.1016/J.INS.2011.03.014}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/HuangLCC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/IqbalBFD13, author = {Farkhund Iqbal and Hamad Binsalleeh and Benjamin C. M. Fung and Mourad Debbabi}, title = {A unified data mining solution for authorship analysis in anonymous textual communications}, journal = {Inf. Sci.}, volume = {231}, pages = {98--112}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.03.006}, doi = {10.1016/J.INS.2011.03.006}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/IqbalBFD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/PinzonPHCBC13, author = {Cristian Pinz{\'{o}}n and Juan Francisco de Paz and {\'{A}}lvaro Herrero and Emilio Corchado and Javier Bajo and Juan M. Corchado}, title = {idMAS-SQL: Intrusion Detection Based on {MAS} to Detect and Block {SQL} injection through data mining}, journal = {Inf. Sci.}, volume = {231}, pages = {15--31}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.06.020}, doi = {10.1016/J.INS.2011.06.020}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/PinzonPHCBC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/QiaoSL13, author = {Mengyu Qiao and Andrew H. Sung and Qingzhong Liu}, title = {{MP3} audio steganalysis}, journal = {Inf. Sci.}, volume = {231}, pages = {123--134}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2012.10.013}, doi = {10.1016/J.INS.2012.10.013}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/QiaoSL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SantosBUB13, author = {Igor Santos and Felix Brezo and Xabier Ugarte{-}Pedrero and Pablo Garc{\'{\i}}a Bringas}, title = {Opcode sequences as representation of executables for data-mining-based unknown malware detection}, journal = {Inf. Sci.}, volume = {231}, pages = {64--82}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.08.020}, doi = {10.1016/J.INS.2011.08.020}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/SantosBUB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ShahzadSF13, author = {Farrukh Shahzad and Muhammad Shahzad and Muddassar Farooq}, title = {In-execution dynamic malware analysis and detection by mining information in process control blocks of Linux {OS}}, journal = {Inf. Sci.}, volume = {231}, pages = {45--63}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.09.016}, doi = {10.1016/J.INS.2011.09.016}, timestamp = {Fri, 16 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ShahzadSF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/SongTON13, author = {Jungsuk Song and Hiroki Takakura and Yasuo Okabe and Koji Nakao}, title = {Toward a more practical unsupervised anomaly detection system}, journal = {Inf. Sci.}, volume = {231}, pages = {4--14}, year = {2013}, url = {https://doi.org/10.1016/j.ins.2011.08.011}, doi = {10.1016/J.INS.2011.08.011}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/SongTON13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.