Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure11.bht:"
@article{DBLP:journals/isecure/AbdulsattarA19, author = {Oula L. Abdulsattar and Emad H. Al{-}Hemiary}, title = {Virtualized Network Management Laboratory for Educational Purposes}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {181--186}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.3.24}, doi = {10.22042/ISECURE.2019.11.3.24}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AbdulsattarA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AhmadiA19, author = {Siavash Ahmadi and Mohammad Reza Aref}, title = {New Fixed Point Attacks on {GOST2} Block Cipher}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {145--158}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.140663.424}, doi = {10.22042/ISECURE.2019.140663.424}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AhmadiA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AhmadiAMA19, author = {Siavash Ahmadi and Zahra Ahmadian and Javad Mohajeri and Mohammad Reza Aref}, title = {Biclique Cryptanalysis of Block Ciphers LBlock and {TWINE-80} with Practical Data Complexity}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {57--74}, year = {2019}, url = {https://doi.org/10.22042/isecure.2018.138036.420}, doi = {10.22042/ISECURE.2018.138036.420}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AhmadiAMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AhmedLXA19, author = {Omed Hassan Ahmed and Joan Lu and Qiang Xu and Muzhir Shaban Al{-}Ani}, title = {Face Recognition Based Rank Reduction {SVD} Approach}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {39--50}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.6}, doi = {10.22042/ISECURE.2019.11.0.6}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AhmedLXA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Al-JobouryA19, author = {Istabraq M. Al{-}Joboury and Emad H. Al{-}Hemiary}, title = {IoT Protocols Based Fog/Cloud over High Traffic}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {173--180}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.3.23}, doi = {10.22042/ISECURE.2019.11.3.23}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Al-JobouryA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Alahmari19, author = {Saad Ali Alahmari}, title = {Using Machine Learning {ARIMA} to Predict the Price of Cryptocurrencies}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {139--144}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.18}, doi = {10.22042/ISECURE.2019.11.0.18}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Alahmari19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Alenazi19, author = {Mohammed J. F. Alenazi}, title = {Evaluating Multipath {TCP} Resilience against Link Failures}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {113--122}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.15}, doi = {10.22042/ISECURE.2019.11.0.15}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Alenazi19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AlyasASAFK19, author = {Tahir Alyas and Gulzar Ahmad and Yousaf Saeed and Muhammad Asif and Umer Farooq and Asma Kanwal}, title = {Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy Inference System {(MFIS)}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {153--160}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.20}, doi = {10.22042/ISECURE.2019.11.0.20}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AlyasASAFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Aref19, author = {Mohammad Reza Aref}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {1--2}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.1.7}, doi = {10.22042/ISECURE.2019.11.1.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Aref19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Aref19a, author = {Mohammad Reza Aref}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {93--94}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.0.0.7}, doi = {10.22042/ISECURE.2019.0.0.7}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Aref19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Aref19b, author = {Mohammad Reza Aref}, title = {Editorial}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.3.22}, doi = {10.22042/ISECURE.2019.11.3.22}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Aref19b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AtaniAK19, author = {Reza Ebrahimi Atani and Shahabaddin Ebrahimi Atani and Amir Hassani Karbasi}, title = {A New Ring-Based {SPHF} and {PAKE} Protocol On Ideal Lattices}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {75--86}, year = {2019}, url = {https://doi.org/10.22042/isecure.2018.109810.398}, doi = {10.22042/ISECURE.2018.109810.398}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AtaniAK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AtiaS19, author = {Ayman Atia and Nada Shorim}, title = {Hand Gestures Classification with Multi-Core {DTW}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {91--96}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.12}, doi = {10.22042/ISECURE.2019.11.0.12}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AtiaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/BaniMustafa19, author = {Ahmed BaniMustafa}, title = {Enhancing Learning from Imbalanced Classes via Data Preprocessing: {A} Data-Driven Application in Metabolomics Data Mining}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {79--89}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.11}, doi = {10.22042/ISECURE.2019.11.0.11}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/BaniMustafa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/BayatJDSKA19, author = {Majid Bayat and Zahra Zare Jousheghani and Ashok Kumar Das and Pitam Singh and Saru Kumari and Mohammad Reza Aref}, title = {A Lightweight Privacy-preserving Authenticated Key Exchange Scheme for Smart Grid Communications}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {113--128}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.161366.445}, doi = {10.22042/ISECURE.2019.161366.445}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/BayatJDSKA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ChamaniDJP19, author = {Javad Ghareh Chamani and Mohammad Sadeq Dousti and Rasool Jalili and Dimitrios Papadopoulos}, title = {{SESOS:} {A} Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {15--34}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.148637.430}, doi = {10.22042/ISECURE.2019.148637.430}, timestamp = {Mon, 07 Feb 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/ChamaniDJP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/CordovaDP19, author = {Felisa M. C{\'{o}}rdova and Claudia A. Dur{\'{a}}n and Fredi Edgardo Palominos}, title = {Cognitive Strategic Model applied to a Port System}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {73--78}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.10}, doi = {10.22042/ISECURE.2019.11.0.10}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/CordovaDP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/FatimaKAWAA19, author = {Areej Fatima and Muhammad Adnan Khan and Sagheer Abbas and Muhammad Waqas and Leena Anum and Muhammad Asif}, title = {Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy Logic {(MFL)}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {51--58}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.7}, doi = {10.22042/ISECURE.2019.11.0.7}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/FatimaKAWAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/Flifel19, author = {Rawan Flifel}, title = {The Role of Packet Tracer in Learning Wireless Networks and Managing IoT Devices}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {35--38}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.5}, doi = {10.22042/ISECURE.2019.11.0.5}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/Flifel19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GhasemiHN19, author = {Simin Ghasemi and Mohammad Ali Hadavi and Mina Niknafs}, title = {A Trust Based Probabilistic Method for Efficient Correctness Verification in Database Outsourcing}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {3--14}, year = {2019}, url = {https://doi.org/10.22042/isecure.2018.141655.426}, doi = {10.22042/ISECURE.2018.141655.426}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GhasemiHN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GottliebSFBK19, author = {Matthias Gottlieb and Marwin Shraideh and Isabel Fuhrmann and Markus B{\"{o}}hm and Helmut Krcmar}, title = {Critical Success Factors for Data Virtualization: {A} Literature Review}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {131--137}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.17}, doi = {10.22042/ISECURE.2019.11.0.17}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GottliebSFBK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/HasheminasabLA19, author = {Seyed Alireza Hasheminasab and Behrouz Tork Ladani and Tansu Alpcan}, title = {Interdependent Security Game Design over Constrained Linear Influence Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {95--111}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.186923.467}, doi = {10.22042/ISECURE.2019.186923.467}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/HasheminasabLA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/JedaibiK19, author = {Wajdi Al Jedaibi and Sufian Khamis}, title = {Towards Measuring the Project Management Process During Large Scale Software System Implementation Phase}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {161--172}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.21}, doi = {10.22042/ISECURE.2019.11.0.21}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/JedaibiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/JuniorAFA19, author = {Joel E. Cordeiro Junior and Marcelo S. Alencar and Jos{\'{e}} Valentim Dos Santos Filho and Karcius D. R. Assis}, title = {A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {123--130}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.16}, doi = {10.22042/ISECURE.2019.11.0.16}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/JuniorAFA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KhatterI19, author = {Ehab Khatter and Dina M. Ibrahim}, title = {Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision Avoidance}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {67--72}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.9}, doi = {10.22042/ISECURE.2019.11.0.9}, timestamp = {Wed, 24 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KhatterI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/LabbafniyaS19, author = {Mansoureh Labbafniya and Roghayeh Saeidi}, title = {Secure {FPGA} Design by Filling Unused Spaces}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {47--56}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.143657.427}, doi = {10.22042/ISECURE.2019.143657.427}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/LabbafniyaS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/LetychevskyiHYP19, author = {Oleksandr A. Letychevskyi and Yaroslav Hryniuk and Viktor Yakovlev and Volodymyr Peschanenko and Viktor Radchenko}, title = {Algebraic Matching of Vulnerabilities in a Low-Level Code}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {1--7}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.1}, doi = {10.22042/ISECURE.2019.11.0.1}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/LetychevskyiHYP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MemonHDSN19, author = {Muhammad Ali Memon and Zaira Hassan and Kamran Dahri and Asadullah Shaikh and Muhammad Ali Nizamani}, title = {Aspect Oriented {UML} to {ECORE} Model Transformation}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {97--103}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.13}, doi = {10.22042/ISECURE.2019.11.0.13}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MemonHDSN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MohammadrezaeiS19, author = {Mohammadreza Mohammadrezaei and Mohammad Ebrahim Shiri and Amir Masoud Rahmani}, title = {Detection of Fake Accounts in Social Networks Based on One Class Classification}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {173--183}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.165312.450}, doi = {10.22042/ISECURE.2019.165312.450}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MohammadrezaeiS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/NezhadSB19, author = {S. Ehsan Hosiny Nezhad and Masoumeh Safkhani and Nasour Bagheri}, title = {Relaxed Differential Fault Analysis of {SHA-3}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {129--143}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.184302.464}, doi = {10.22042/ISECURE.2019.184302.464}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/NezhadSB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/PenchevaAA19, author = {Evelina Pencheva and Ivaylo Atanasov and Ivaylo Asenov}, title = {Access and Mobility Policy Control at the Network Edge}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {105--111}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.14}, doi = {10.22042/ISECURE.2019.11.0.14}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/PenchevaAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/RishakaniSDAMB19, author = {Akbar Mahmoodi Rishakani and Mohammad Reza Mirzaee Shamsabad and Seyed Mojtaba Dehnavi and Mohammad Amin Amiri and Hamidreza Maimani and Nasour Bagheri}, title = {Lightweight 4x4 {MDS} Matrices for Hardware-Oriented Cryptographic Primitives}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {35--46}, year = {2019}, url = {https://doi.org/10.22042/isecure.2018.138301.421}, doi = {10.22042/ISECURE.2018.138301.421}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/RishakaniSDAMB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SaadiYT19, author = {Hadjer Saadi and Mustapha C. E. Yagoub and Rachida Touhami}, title = {Role and Application of {RFID} Technology in Internet of Things: Communication, Authentication, Risk, and Security Concerns}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {9--17}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.2}, doi = {10.22042/ISECURE.2019.11.0.2}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SaadiYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SaeedYFAKAA19, author = {Anwar Saeed and Muhammad Yousif and Areej Fatima and Sagheer Abbas and Muhammad Adnan Khan and Leena Anum and Ali Akram}, title = {An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {145--151}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.19}, doi = {10.22042/ISECURE.2019.11.0.19}, timestamp = {Thu, 16 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/SaeedYFAKAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SerkaniGM19, author = {Elham Serkani and Hossein Gharaee Garakani and Naser Mohammadzadeh}, title = {Anomaly Detection Using {SVM} as Classifier and Decision Tree for Optimizing Feature Vectors}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {159--171}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.164980.448}, doi = {10.22042/ISECURE.2019.164980.448}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SerkaniGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ShaabanSME19, author = {Dalia A. Shaaban and Mohamed H. Saad and Ahmed H. Madian and Hesham N. Elmahdy}, title = {Medical Image Compression Based on Region of Interest}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {29--34}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.4}, doi = {10.22042/ISECURE.2019.11.0.4}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ShaabanSME19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/SoranT19, author = {Ibrahim Soran and Qing Tan}, title = {A Sudy on Information Privacy Issue on Social Networks}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {19--27}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.3}, doi = {10.22042/ISECURE.2019.11.0.3}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/SoranT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/X19, title = {Persian Abstract}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {1}, pages = {87--92}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.1.8}, doi = {10.22042/ISECURE.2019.11.1.8}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/X19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/X19a, title = {Persian Abstract}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {2}, pages = {185--190}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.0.0.8}, doi = {10.22042/ISECURE.2019.0.0.8}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/X19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ZendaouiH19, author = {Fairouz Zendaoui and Walid{-}Khaled Hidouci}, title = {Considering Uncertainty in Modeling Historical Knowledge}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {11}, number = {3}, pages = {59--65}, year = {2019}, url = {https://doi.org/10.22042/isecure.2019.11.0.8}, doi = {10.22042/ISECURE.2019.11.0.8}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ZendaouiH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.