Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr70.bht:"
@article{DBLP:journals/istr/AhalawatBTP22a, author = {Anchal Ahalawat and Korra Sathya Babu and Ashok Kumar Turuk and Sanjeev Patel}, title = {Corrigendum to "A low-rate DDoS detection and mitigation for {SDN} using Renyi Entropy with Packet Drop" [Journal of Information Security and Applications 68 {(2022)} 103212]}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103344}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103344}, doi = {10.1016/J.JISA.2022.103344}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AhalawatBTP22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlorainiJRB22, author = {Fatimah Aloraini and Amir Javed and Omer F. Rana and Pete Burnap}, title = {Adversarial machine learning in IoT from an insider point of view}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103341}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103341}, doi = {10.1016/J.JISA.2022.103341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/AlorainiJRB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlsuhibanyP22, author = {Suliman A. Alsuhibany and Mohammad Tanvir Parvez}, title = {Attack-filtered interactive arabic CAPTCHAs}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103318}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103318}, doi = {10.1016/J.JISA.2022.103318}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlsuhibanyP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChefranovO22, author = {Alexander G. Chefranov and G{\"{u}}rc{\"{u}} {\"{O}}z}, title = {Adaptive to pixel value and pixel value difference irreversible spatial data hiding method using modified {LSB} for grayscale images}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103314}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103314}, doi = {10.1016/J.JISA.2022.103314}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChefranovO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenGTD22, author = {Jinhai Chen and Zheng Gong and Yufeng Tang and Xinfeng Dong}, title = {A comprehensive analysis of lightweight 8-bit sboxes from iterative structures}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103302}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103302}, doi = {10.1016/J.JISA.2022.103302}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ChenGTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ContiVV22, author = {Mauro Conti and P. Vinod and Alessio Vitella}, title = {Obfuscation detection in Android applications using deep learning}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103311}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103311}, doi = {10.1016/J.JISA.2022.103311}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ContiVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/FarzadniaSN22, author = {Ehsan Farzadnia and Hossein Shirazi and Alireza Nowroozi}, title = {Corrigendum to 'A novel sophisticated hybrid method for intrusion detection using the artificial immune system': Journal of Information Security and Applications Volume 58, May 2021, 102721}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103349}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103349}, doi = {10.1016/J.JISA.2022.103349}, timestamp = {Mon, 14 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/FarzadniaSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HussainIB22, author = {Muhammad Hussain and Nadeem Iqbal and Zia Bashir}, title = {A chaotic image encryption scheme based on multi-directional confusion and diffusion operations}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103347}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103347}, doi = {10.1016/J.JISA.2022.103347}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/HussainIB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KernBGFP22, author = {Sascha Kern and Thomas Baumer and Sebastian Groll and Ludwig Fuchs and G{\"{u}}nther Pernul}, title = {Optimization of Access Control Policies}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103301}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103301}, doi = {10.1016/J.JISA.2022.103301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KernBGFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuHXSN22, author = {Tian Liu and Xueyang Hu and Hairuo Xu and Tao Shu and Diep N. Nguyen}, title = {High-accuracy low-cost privacy-preserving federated learning in IoT systems via adaptive perturbation}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103309}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103309}, doi = {10.1016/J.JISA.2022.103309}, timestamp = {Tue, 06 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuHXSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LuengoCGHC22, author = {Elena Almaraz Luengo and Marcos Brian Leiva Cerna and Luis Javier Garc{\'{\i}}a{-}Villalba and Darren Hurley{-}Smith and Julio C{\'{e}}sar Hern{\'{a}}ndez Castro}, title = {Sensitivity and uniformity in statistical randomness tests}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103322}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103322}, doi = {10.1016/J.JISA.2022.103322}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LuengoCGHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MurtazaTTARH22, author = {Malik Hamza Murtaza and Hasan Tahir and Shahzaib Tahir and Zahoor Ahmed Alizai and Qaiser Riaz and Mehdi Hussain}, title = {A portable hardware security module and cryptographic key generator}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103332}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103332}, doi = {10.1016/J.JISA.2022.103332}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MurtazaTTARH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/Padayachee22, author = {Keshnee Padayachee}, title = {Understanding the effects of situational crime prevention and personality factors on insider compliance}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103338}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103338}, doi = {10.1016/J.JISA.2022.103338}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Padayachee22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/RezaeiAFA22, author = {Aref Rezaei and Yasaman Ahmadiadli and Leili Farzinvash and Mohammad Asadpour}, title = {Low distortion and adaptive image steganography by enhancing DBSCAN, Sobel operator, and {XOR} coding}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103343}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103343}, doi = {10.1016/J.JISA.2022.103343}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/RezaeiAFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SardarU22, author = {Alamgir Sardar and Saiyed Umer}, title = {Implementation of face recognition system using BioCryptosystem as template protection scheme}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103317}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103317}, doi = {10.1016/J.JISA.2022.103317}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SardarU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ShiYMZ22, author = {Ming Shi and Yang Yang and Jian Meng and Weiming Zhang}, title = {Reversible data hiding with enhancing contrast and preserving brightness in medical image}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103324}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103324}, doi = {10.1016/J.JISA.2022.103324}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ShiYMZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TehB22, author = {Je Sen Teh and Alex Biryukov}, title = {Differential cryptanalysis of {WARP}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103316}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103316}, doi = {10.1016/J.JISA.2022.103316}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/TehB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/TsengFL22, author = {Yi{-}Fan Tseng and Chun{-}I Fan and Zi{-}Cheng Liu}, title = {Fast keyword search over encrypted data with short ciphertext in clouds}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103320}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103320}, doi = {10.1016/J.JISA.2022.103320}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/TsengFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/UllahJHDUF22, author = {Shamsher Ullah and Jiangbin Zheng and Muhammad Tanveer Hussain and Nizamud Din and Farhan Ullah and Muhammad Umar Farooq}, title = {A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103346}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103346}, doi = {10.1016/J.JISA.2022.103346}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/UllahJHDUF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/UlusoyKE22, author = {Sirri Erdem Ulusoy and Orhun Kara and Mehmet {\"{O}}nder Efe}, title = {Plaintext recovery and tag guessing attacks on authenticated encryption algorithm {COLM}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103342}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103342}, doi = {10.1016/J.JISA.2022.103342}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/UlusoyKE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/VallabhadasS22, author = {Dilip Kumar Vallabhadas and Mulagala Sandhya}, title = {Securing multimodal biometric template using local random projection and homomorphic encryption}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103339}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103339}, doi = {10.1016/J.JISA.2022.103339}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/VallabhadasS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangJXKH22, author = {Yifan Wang and Xiaoying Jia and Yongbo Xia and Muhammad Khurram Khan and Debiao He}, title = {A blockchain-based conditional privacy-preserving authentication scheme for edge computing services}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103334}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103334}, doi = {10.1016/J.JISA.2022.103334}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangJXKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/WangZZ22, author = {Quanyv Wang and Xiaoqiang Zhang and Xiaohu Zhao}, title = {Image encryption algorithm based on improved Zigzag transformation and quaternary {DNA} coding}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103340}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103340}, doi = {10.1016/J.JISA.2022.103340}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/WangZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/XuXLZHZ22, author = {Runqing Xu and Zejun Xiang and Da Lin and Shasha Zhang and Debiao He and Xiangyong Zeng}, title = {High-throughput block cipher implementations with {SIMD}}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103333}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103333}, doi = {10.1016/J.JISA.2022.103333}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/XuXLZHZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YangWY22, author = {Cheng{-}Hsing Yang and Chi{-}Yao Weng and Yu{-}Zhen Yang}, title = {{TPEIP:} Thumbnail preserving encryption based on sum preserving for image privacy}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103352}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103352}, doi = {10.1016/J.JISA.2022.103352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YangWY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YiTY22, author = {Yufeng Yi and Wuzheng Tan and Yaxi Yang}, title = {Efficient Privacy-preserving Non-exhaustive Nearest Neighbor Search of large-scale databases}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103335}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103335}, doi = {10.1016/J.JISA.2022.103335}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YiTY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuW22, author = {Huifang Yu and Han Wang}, title = {Elliptic curve threshold signature scheme for blockchain}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103345}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103345}, doi = {10.1016/J.JISA.2022.103345}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/YuW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ZouCTW22, author = {Binghui Zou and Chunjie Cao and Fangjian Tao and Longjuan Wang}, title = {IMCLNet: {A} lightweight deep neural network for Image-based Malware Classification}, journal = {J. Inf. Secur. Appl.}, volume = {70}, pages = {103313}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2022.103313}, doi = {10.1016/J.JISA.2022.103313}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ZouCTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.