Search dblp for Publications

export results for "toc:db/journals/isci/isci231.bht:"

 download as .bib file

@article{DBLP:journals/isci/ChenFMDW13,
  author       = {Rui Chen and
                  Benjamin C. M. Fung and
                  Noman Mohammed and
                  Bipin C. Desai and
                  Ke Wang},
  title        = {Privacy-preserving trajectory data publishing by local suppression},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {83--97},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.07.035},
  doi          = {10.1016/J.INS.2011.07.035},
  timestamp    = {Tue, 04 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ChenFMDW13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ChunHJL13,
  author       = {Ji Young Chun and
                  Dowon Hong and
                  Ik Rae Jeong and
                  Dong Hoon Lee},
  title        = {Privacy-preserving disjunctive normal form operations on distributed
                  sets},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {113--122},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.07.003},
  doi          = {10.1016/J.INS.2011.07.003},
  timestamp    = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/ChunHJL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/EloviciRA13,
  author       = {Yuval Elovici and
                  Lior Rokach and
                  Sahin Albayrak},
  title        = {Guest editorial: Special issue on data mining for information security},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {1--3},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2013.01.027},
  doi          = {10.1016/J.INS.2013.01.027},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/EloviciRA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HuangLCC13,
  author       = {Jen{-}Yan Huang and
                  I{-}En Liao and
                  Yu{-}Fang Chung and
                  Kuen{-}Tzung Chen},
  title        = {Shielding wireless sensor network using Markovian intrusion detection
                  system with attack pattern mining},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {32--44},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.03.014},
  doi          = {10.1016/J.INS.2011.03.014},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/HuangLCC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/IqbalBFD13,
  author       = {Farkhund Iqbal and
                  Hamad Binsalleeh and
                  Benjamin C. M. Fung and
                  Mourad Debbabi},
  title        = {A unified data mining solution for authorship analysis in anonymous
                  textual communications},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {98--112},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.03.006},
  doi          = {10.1016/J.INS.2011.03.006},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/IqbalBFD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/PinzonPHCBC13,
  author       = {Cristian Pinz{\'{o}}n and
                  Juan Francisco de Paz and
                  {\'{A}}lvaro Herrero and
                  Emilio Corchado and
                  Javier Bajo and
                  Juan M. Corchado},
  title        = {idMAS-SQL: Intrusion Detection Based on {MAS} to Detect and Block
                  {SQL} injection through data mining},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {15--31},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.06.020},
  doi          = {10.1016/J.INS.2011.06.020},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/PinzonPHCBC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/QiaoSL13,
  author       = {Mengyu Qiao and
                  Andrew H. Sung and
                  Qingzhong Liu},
  title        = {{MP3} audio steganalysis},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {123--134},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2012.10.013},
  doi          = {10.1016/J.INS.2012.10.013},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/QiaoSL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SantosBUB13,
  author       = {Igor Santos and
                  Felix Brezo and
                  Xabier Ugarte{-}Pedrero and
                  Pablo Garc{\'{\i}}a Bringas},
  title        = {Opcode sequences as representation of executables for data-mining-based
                  unknown malware detection},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {64--82},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.08.020},
  doi          = {10.1016/J.INS.2011.08.020},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/SantosBUB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ShahzadSF13,
  author       = {Farrukh Shahzad and
                  Muhammad Shahzad and
                  Muddassar Farooq},
  title        = {In-execution dynamic malware analysis and detection by mining information
                  in process control blocks of Linux {OS}},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {45--63},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.09.016},
  doi          = {10.1016/J.INS.2011.09.016},
  timestamp    = {Fri, 16 Jun 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ShahzadSF13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/SongTON13,
  author       = {Jungsuk Song and
                  Hiroki Takakura and
                  Yasuo Okabe and
                  Koji Nakao},
  title        = {Toward a more practical unsupervised anomaly detection system},
  journal      = {Inf. Sci.},
  volume       = {231},
  pages        = {4--14},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.ins.2011.08.011},
  doi          = {10.1016/J.INS.2011.08.011},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/SongTON13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics