Search dblp for Publications

export results for "toc:db/journals/istr/istr42.bht:"

 download as .bib file

@article{DBLP:journals/istr/BhandariPNLZG18,
  author       = {Shweta Bhandari and
                  Rekha Panihar and
                  Smita Naval and
                  Vijay Laxmi and
                  Akka Zemmari and
                  Manoj Singh Gaur},
  title        = {{SWORD:} Semantic aWare andrOid malwaRe Detector},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {46--56},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.003},
  doi          = {10.1016/J.JISA.2018.07.003},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/BhandariPNLZG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CainES18,
  author       = {Ashley A. Cain and
                  Morgan E. Edwards and
                  Jeremiah D. Still},
  title        = {An exploratory study of cyber hygiene behaviors and knowledge},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {36--45},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.08.002},
  doi          = {10.1016/J.JISA.2018.08.002},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/CainES18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/DattaDM18,
  author       = {Pratish Datta and
                  Ratna Dutta and
                  Sourav Mukhopadhyay},
  title        = {Functional Signcryption},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {118--134},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.08.004},
  doi          = {10.1016/J.JISA.2018.08.004},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/DattaDM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/Horsman18,
  author       = {Graeme Horsman},
  title        = {A forensic examination of the technical and legal challenges surrounding
                  the investigation of child abuse on live streaming platforms: {A}
                  case study on Periscope},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {107--117},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.009},
  doi          = {10.1016/J.JISA.2018.07.009},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/Horsman18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/KhalunezhadMG18,
  author       = {Adele Khalunezhad and
                  Neda Moghim and
                  Behrouz Shahgholi Ghahfarokhi},
  title        = {Trust-based multi-hop cooperative spectrum sensing in cognitive radio
                  networks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {29--35},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.007},
  doi          = {10.1016/J.JISA.2018.07.007},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/KhalunezhadMG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MahmoodR18,
  author       = {Ali Shakir Mahmood and
                  Mohd Shafry Mohd Rahim},
  title        = {Novel method for image security system based on improved {SCAN} method
                  and pixel rotation technique},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {57--70},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.08.001},
  doi          = {10.1016/J.JISA.2018.08.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MahmoodR18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/MandadiMO18,
  author       = {Manjukeshwar Reddy Mandadi and
                  Varuneshwar Reddy Mandadi and
                  Kazuhiro Ogata},
  title        = {Formal analysis of a security protocol for e-passports based on rewrite
                  theory specifications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {71--86},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.08.005},
  doi          = {10.1016/J.JISA.2018.08.005},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/MandadiMO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/PichanLS18,
  author       = {Ameer Pichan and
                  Mihai M. Lazarescu and
                  Sieteng Soh},
  title        = {Towards a practical cloud forensics logging framework},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {18--28},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.008},
  doi          = {10.1016/J.JISA.2018.07.008},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/PichanLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/RadAF18,
  author       = {Azadeh Imani Rad and
                  Mahdi R. Alagheband and
                  Saeed Banaeian Far},
  title        = {Performing and mitigating force and terrorist fraud attacks against
                  two {RFID} distance-bounding protocols},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {87--94},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.010},
  doi          = {10.1016/J.JISA.2018.07.010},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/RadAF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/SharmaK18,
  author       = {Geeta Sharma and
                  Sheetal Kalra},
  title        = {A lightweight multi-factor secure smart card based remote user authentication
                  scheme for cloud-IoT applications},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {95--106},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.08.003},
  doi          = {10.1016/J.JISA.2018.08.003},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/istr/SharmaK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/VarshneyMA18,
  author       = {Gaurav Varshney and
                  Manoj Misra and
                  Pradeep K. Atrey},
  title        = {Secure authentication scheme to thwart {RT} MITM, {CR} {MITM} and
                  malicious browser extension based phishing attacks},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {42},
  pages        = {1--17},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jisa.2018.07.001},
  doi          = {10.1016/J.JISA.2018.07.001},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/VarshneyMA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics