Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr42.bht:"
@article{DBLP:journals/istr/BhandariPNLZG18, author = {Shweta Bhandari and Rekha Panihar and Smita Naval and Vijay Laxmi and Akka Zemmari and Manoj Singh Gaur}, title = {{SWORD:} Semantic aWare andrOid malwaRe Detector}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {46--56}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.003}, doi = {10.1016/J.JISA.2018.07.003}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/BhandariPNLZG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/CainES18, author = {Ashley A. Cain and Morgan E. Edwards and Jeremiah D. Still}, title = {An exploratory study of cyber hygiene behaviors and knowledge}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {36--45}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.08.002}, doi = {10.1016/J.JISA.2018.08.002}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/CainES18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DattaDM18, author = {Pratish Datta and Ratna Dutta and Sourav Mukhopadhyay}, title = {Functional Signcryption}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {118--134}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.08.004}, doi = {10.1016/J.JISA.2018.08.004}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/DattaDM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Horsman18, author = {Graeme Horsman}, title = {A forensic examination of the technical and legal challenges surrounding the investigation of child abuse on live streaming platforms: {A} case study on Periscope}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {107--117}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.009}, doi = {10.1016/J.JISA.2018.07.009}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Horsman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KhalunezhadMG18, author = {Adele Khalunezhad and Neda Moghim and Behrouz Shahgholi Ghahfarokhi}, title = {Trust-based multi-hop cooperative spectrum sensing in cognitive radio networks}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {29--35}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.007}, doi = {10.1016/J.JISA.2018.07.007}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/KhalunezhadMG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MahmoodR18, author = {Ali Shakir Mahmood and Mohd Shafry Mohd Rahim}, title = {Novel method for image security system based on improved {SCAN} method and pixel rotation technique}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {57--70}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.08.001}, doi = {10.1016/J.JISA.2018.08.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MahmoodR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MandadiMO18, author = {Manjukeshwar Reddy Mandadi and Varuneshwar Reddy Mandadi and Kazuhiro Ogata}, title = {Formal analysis of a security protocol for e-passports based on rewrite theory specifications}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {71--86}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.08.005}, doi = {10.1016/J.JISA.2018.08.005}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MandadiMO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PichanLS18, author = {Ameer Pichan and Mihai M. Lazarescu and Sieteng Soh}, title = {Towards a practical cloud forensics logging framework}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {18--28}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.008}, doi = {10.1016/J.JISA.2018.07.008}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PichanLS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RadAF18, author = {Azadeh Imani Rad and Mahdi R. Alagheband and Saeed Banaeian Far}, title = {Performing and mitigating force and terrorist fraud attacks against two {RFID} distance-bounding protocols}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {87--94}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.010}, doi = {10.1016/J.JISA.2018.07.010}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RadAF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SharmaK18, author = {Geeta Sharma and Sheetal Kalra}, title = {A lightweight multi-factor secure smart card based remote user authentication scheme for cloud-IoT applications}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {95--106}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.08.003}, doi = {10.1016/J.JISA.2018.08.003}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/SharmaK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VarshneyMA18, author = {Gaurav Varshney and Manoj Misra and Pradeep K. Atrey}, title = {Secure authentication scheme to thwart {RT} MITM, {CR} {MITM} and malicious browser extension based phishing attacks}, journal = {J. Inf. Secur. Appl.}, volume = {42}, pages = {1--17}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.07.001}, doi = {10.1016/J.JISA.2018.07.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/VarshneyMA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.