Search dblp for Publications

export results for "toc:db/journals/isecure/isecure11.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AbdulsattarA19,
  author       = {Oula L. Abdulsattar and
                  Emad H. Al{-}Hemiary},
  title        = {Virtualized Network Management Laboratory for Educational Purposes},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {181--186},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.3.24},
  doi          = {10.22042/ISECURE.2019.11.3.24},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AbdulsattarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmadiA19,
  author       = {Siavash Ahmadi and
                  Mohammad Reza Aref},
  title        = {New Fixed Point Attacks on {GOST2} Block Cipher},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {145--158},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.140663.424},
  doi          = {10.22042/ISECURE.2019.140663.424},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AhmadiA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmadiAMA19,
  author       = {Siavash Ahmadi and
                  Zahra Ahmadian and
                  Javad Mohajeri and
                  Mohammad Reza Aref},
  title        = {Biclique Cryptanalysis of Block Ciphers LBlock and {TWINE-80} with
                  Practical Data Complexity},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {57--74},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2018.138036.420},
  doi          = {10.22042/ISECURE.2018.138036.420},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AhmadiAMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AhmedLXA19,
  author       = {Omed Hassan Ahmed and
                  Joan Lu and
                  Qiang Xu and
                  Muzhir Shaban Al{-}Ani},
  title        = {Face Recognition Based Rank Reduction {SVD} Approach},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {39--50},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.6},
  doi          = {10.22042/ISECURE.2019.11.0.6},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AhmedLXA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Al-JobouryA19,
  author       = {Istabraq M. Al{-}Joboury and
                  Emad H. Al{-}Hemiary},
  title        = {IoT Protocols Based Fog/Cloud over High Traffic},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {173--180},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.3.23},
  doi          = {10.22042/ISECURE.2019.11.3.23},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Al-JobouryA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Alahmari19,
  author       = {Saad Ali Alahmari},
  title        = {Using Machine Learning {ARIMA} to Predict the Price of Cryptocurrencies},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {139--144},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.18},
  doi          = {10.22042/ISECURE.2019.11.0.18},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Alahmari19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Alenazi19,
  author       = {Mohammed J. F. Alenazi},
  title        = {Evaluating Multipath {TCP} Resilience against Link Failures},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {113--122},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.15},
  doi          = {10.22042/ISECURE.2019.11.0.15},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Alenazi19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AlyasASAFK19,
  author       = {Tahir Alyas and
                  Gulzar Ahmad and
                  Yousaf Saeed and
                  Muhammad Asif and
                  Umer Farooq and
                  Asma Kanwal},
  title        = {Cloud and IoT based Smart Car Parking System by using Mamdani Fuzzy
                  Inference System {(MFIS)}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {153--160},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.20},
  doi          = {10.22042/ISECURE.2019.11.0.20},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AlyasASAFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19,
  author       = {Mohammad Reza Aref},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {1--2},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.1.7},
  doi          = {10.22042/ISECURE.2019.11.1.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Aref19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19a,
  author       = {Mohammad Reza Aref},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {93--94},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.0.0.7},
  doi          = {10.22042/ISECURE.2019.0.0.7},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Aref19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Aref19b,
  author       = {Mohammad Reza Aref},
  title        = {Editorial},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.3.22},
  doi          = {10.22042/ISECURE.2019.11.3.22},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Aref19b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtaniAK19,
  author       = {Reza Ebrahimi Atani and
                  Shahabaddin Ebrahimi Atani and
                  Amir Hassani Karbasi},
  title        = {A New Ring-Based {SPHF} and {PAKE} Protocol On Ideal Lattices},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {75--86},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2018.109810.398},
  doi          = {10.22042/ISECURE.2018.109810.398},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AtaniAK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AtiaS19,
  author       = {Ayman Atia and
                  Nada Shorim},
  title        = {Hand Gestures Classification with Multi-Core {DTW}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {91--96},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.12},
  doi          = {10.22042/ISECURE.2019.11.0.12},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AtiaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BaniMustafa19,
  author       = {Ahmed BaniMustafa},
  title        = {Enhancing Learning from Imbalanced Classes via Data Preprocessing:
                  {A} Data-Driven Application in Metabolomics Data Mining},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {79--89},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.11},
  doi          = {10.22042/ISECURE.2019.11.0.11},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/BaniMustafa19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/BayatJDSKA19,
  author       = {Majid Bayat and
                  Zahra Zare Jousheghani and
                  Ashok Kumar Das and
                  Pitam Singh and
                  Saru Kumari and
                  Mohammad Reza Aref},
  title        = {A Lightweight Privacy-preserving Authenticated Key Exchange Scheme
                  for Smart Grid Communications},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {113--128},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.161366.445},
  doi          = {10.22042/ISECURE.2019.161366.445},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/BayatJDSKA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ChamaniDJP19,
  author       = {Javad Ghareh Chamani and
                  Mohammad Sadeq Dousti and
                  Rasool Jalili and
                  Dimitrios Papadopoulos},
  title        = {{SESOS:} {A} Verifiable Searchable Outsourcing Scheme for Ordered
                  Structured Data in Cloud Computing},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {15--34},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.148637.430},
  doi          = {10.22042/ISECURE.2019.148637.430},
  timestamp    = {Mon, 07 Feb 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/ChamaniDJP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/CordovaDP19,
  author       = {Felisa M. C{\'{o}}rdova and
                  Claudia A. Dur{\'{a}}n and
                  Fredi Edgardo Palominos},
  title        = {Cognitive Strategic Model applied to a Port System},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {73--78},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.10},
  doi          = {10.22042/ISECURE.2019.11.0.10},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/CordovaDP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/FatimaKAWAA19,
  author       = {Areej Fatima and
                  Muhammad Adnan Khan and
                  Sagheer Abbas and
                  Muhammad Waqas and
                  Leena Anum and
                  Muhammad Asif},
  title        = {Evaluation of Planet Factors of Smart City through Multi-layer Fuzzy
                  Logic {(MFL)}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {51--58},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.7},
  doi          = {10.22042/ISECURE.2019.11.0.7},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/FatimaKAWAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/Flifel19,
  author       = {Rawan Flifel},
  title        = {The Role of Packet Tracer in Learning Wireless Networks and Managing
                  IoT Devices},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {35--38},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.5},
  doi          = {10.22042/ISECURE.2019.11.0.5},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/Flifel19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GhasemiHN19,
  author       = {Simin Ghasemi and
                  Mohammad Ali Hadavi and
                  Mina Niknafs},
  title        = {A Trust Based Probabilistic Method for Efficient Correctness Verification
                  in Database Outsourcing},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {3--14},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2018.141655.426},
  doi          = {10.22042/ISECURE.2018.141655.426},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GhasemiHN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GottliebSFBK19,
  author       = {Matthias Gottlieb and
                  Marwin Shraideh and
                  Isabel Fuhrmann and
                  Markus B{\"{o}}hm and
                  Helmut Krcmar},
  title        = {Critical Success Factors for Data Virtualization: {A} Literature Review},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {131--137},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.17},
  doi          = {10.22042/ISECURE.2019.11.0.17},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GottliebSFBK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/HasheminasabLA19,
  author       = {Seyed Alireza Hasheminasab and
                  Behrouz Tork Ladani and
                  Tansu Alpcan},
  title        = {Interdependent Security Game Design over Constrained Linear Influence
                  Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {95--111},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.186923.467},
  doi          = {10.22042/ISECURE.2019.186923.467},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/HasheminasabLA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JedaibiK19,
  author       = {Wajdi Al Jedaibi and
                  Sufian Khamis},
  title        = {Towards Measuring the Project Management Process During Large Scale
                  Software System Implementation Phase},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {161--172},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.21},
  doi          = {10.22042/ISECURE.2019.11.0.21},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/JedaibiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JuniorAFA19,
  author       = {Joel E. Cordeiro Junior and
                  Marcelo S. Alencar and
                  Jos{\'{e}} Valentim Dos Santos Filho and
                  Karcius D. R. Assis},
  title        = {A Fair Power Allocation for Non-Orthogonal Multiple Access in the
                  Power Domain},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {123--130},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.16},
  doi          = {10.22042/ISECURE.2019.11.0.16},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/JuniorAFA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KhatterI19,
  author       = {Ehab Khatter and
                  Dina M. Ibrahim},
  title        = {Proposed ST-Slotted-CS-ALOHA Protocol for Time Saving and Collision
                  Avoidance},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {67--72},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.9},
  doi          = {10.22042/ISECURE.2019.11.0.9},
  timestamp    = {Wed, 24 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KhatterI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/LabbafniyaS19,
  author       = {Mansoureh Labbafniya and
                  Roghayeh Saeidi},
  title        = {Secure {FPGA} Design by Filling Unused Spaces},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {47--56},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.143657.427},
  doi          = {10.22042/ISECURE.2019.143657.427},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/LabbafniyaS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/LetychevskyiHYP19,
  author       = {Oleksandr A. Letychevskyi and
                  Yaroslav Hryniuk and
                  Viktor Yakovlev and
                  Volodymyr Peschanenko and
                  Viktor Radchenko},
  title        = {Algebraic Matching of Vulnerabilities in a Low-Level Code},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {1--7},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.1},
  doi          = {10.22042/ISECURE.2019.11.0.1},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/LetychevskyiHYP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MemonHDSN19,
  author       = {Muhammad Ali Memon and
                  Zaira Hassan and
                  Kamran Dahri and
                  Asadullah Shaikh and
                  Muhammad Ali Nizamani},
  title        = {Aspect Oriented {UML} to {ECORE} Model Transformation},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {97--103},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.13},
  doi          = {10.22042/ISECURE.2019.11.0.13},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MemonHDSN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MohammadrezaeiS19,
  author       = {Mohammadreza Mohammadrezaei and
                  Mohammad Ebrahim Shiri and
                  Amir Masoud Rahmani},
  title        = {Detection of Fake Accounts in Social Networks Based on One Class Classification},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {173--183},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.165312.450},
  doi          = {10.22042/ISECURE.2019.165312.450},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MohammadrezaeiS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/NezhadSB19,
  author       = {S. Ehsan Hosiny Nezhad and
                  Masoumeh Safkhani and
                  Nasour Bagheri},
  title        = {Relaxed Differential Fault Analysis of {SHA-3}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {129--143},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.184302.464},
  doi          = {10.22042/ISECURE.2019.184302.464},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/NezhadSB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PenchevaAA19,
  author       = {Evelina Pencheva and
                  Ivaylo Atanasov and
                  Ivaylo Asenov},
  title        = {Access and Mobility Policy Control at the Network Edge},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {105--111},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.14},
  doi          = {10.22042/ISECURE.2019.11.0.14},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/PenchevaAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/RishakaniSDAMB19,
  author       = {Akbar Mahmoodi Rishakani and
                  Mohammad Reza Mirzaee Shamsabad and
                  Seyed Mojtaba Dehnavi and
                  Mohammad Amin Amiri and
                  Hamidreza Maimani and
                  Nasour Bagheri},
  title        = {Lightweight 4x4 {MDS} Matrices for Hardware-Oriented Cryptographic
                  Primitives},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {35--46},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2018.138301.421},
  doi          = {10.22042/ISECURE.2018.138301.421},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/RishakaniSDAMB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SaadiYT19,
  author       = {Hadjer Saadi and
                  Mustapha C. E. Yagoub and
                  Rachida Touhami},
  title        = {Role and Application of {RFID} Technology in Internet of Things: Communication,
                  Authentication, Risk, and Security Concerns},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {9--17},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.2},
  doi          = {10.22042/ISECURE.2019.11.0.2},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SaadiYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SaeedYFAKAA19,
  author       = {Anwar Saeed and
                  Muhammad Yousif and
                  Areej Fatima and
                  Sagheer Abbas and
                  Muhammad Adnan Khan and
                  Leena Anum and
                  Ali Akram},
  title        = {An Optimal Utilization of Cloud Resources using Adaptive Back Propagation
                  Neural Network and Multi-Level Priority Queue Scheduling},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {145--151},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.19},
  doi          = {10.22042/ISECURE.2019.11.0.19},
  timestamp    = {Thu, 16 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/SaeedYFAKAA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SerkaniGM19,
  author       = {Elham Serkani and
                  Hossein Gharaee Garakani and
                  Naser Mohammadzadeh},
  title        = {Anomaly Detection Using {SVM} as Classifier and Decision Tree for
                  Optimizing Feature Vectors},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {159--171},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.164980.448},
  doi          = {10.22042/ISECURE.2019.164980.448},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SerkaniGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ShaabanSME19,
  author       = {Dalia A. Shaaban and
                  Mohamed H. Saad and
                  Ahmed H. Madian and
                  Hesham N. Elmahdy},
  title        = {Medical Image Compression Based on Region of Interest},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {29--34},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.4},
  doi          = {10.22042/ISECURE.2019.11.0.4},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ShaabanSME19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/SoranT19,
  author       = {Ibrahim Soran and
                  Qing Tan},
  title        = {A Sudy on Information Privacy Issue on Social Networks},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {19--27},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.3},
  doi          = {10.22042/ISECURE.2019.11.0.3},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/SoranT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X19,
  title        = {Persian Abstract},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {1},
  pages        = {87--92},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.1.8},
  doi          = {10.22042/ISECURE.2019.11.1.8},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/X19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/X19a,
  title        = {Persian Abstract},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {2},
  pages        = {185--190},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.0.0.8},
  doi          = {10.22042/ISECURE.2019.0.0.8},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/X19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ZendaouiH19,
  author       = {Fairouz Zendaoui and
                  Walid{-}Khaled Hidouci},
  title        = {Considering Uncertainty in Modeling Historical Knowledge},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {11},
  number       = {3},
  pages        = {59--65},
  year         = {2019},
  url          = {https://doi.org/10.22042/isecure.2019.11.0.8},
  doi          = {10.22042/ISECURE.2019.11.0.8},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ZendaouiH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics