Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm12.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/AbdulKareemA23,
  author       = {Ali Akram Abdul{-}Kareem and
                  Waleed Ameen Mahmoud Al{-}Jawher},
  title        = {A Hybrid Domain Medical Image Encryption Scheme Using {URUK} and {WAM}
                  Chaotic Maps with Wavelet - Fourier Transforms},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {435--464},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1241},
  doi          = {10.13052/JCSM2245-1439.1241},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbdulKareemA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AlbahraniLG23,
  author       = {Ekhlas Abbas Albahrani and
                  Sadeq H. Lafta and
                  Naeem Howrie Ghayad},
  title        = {A Chaos-Based Encryption Algorithm for Database System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {25--54},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1212},
  doi          = {10.13052/JCSM2245-1439.1212},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AlbahraniLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Alouneh23,
  author       = {Sahel Alouneh},
  title        = {A Multi-Path Approach to Protect {DNS} Against DDoS Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {569--588},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1246},
  doi          = {10.13052/JCSM2245-1439.1246},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Alouneh23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AmroSM23,
  author       = {Belal M. Amro and
                  Saeed Salah and
                  Mohammed Moreb},
  title        = {A Comprehensive Architectural Framework of Moving Target Defenses
                  Against DDoS Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {605--628},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1248},
  doi          = {10.13052/JCSM2245-1439.1248},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AmroSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Chen23,
  author       = {Min Chen},
  title        = {Camera Network Topology Mapping Based on the Integration of Network
                  Information and Physical Distribution Under the Background of Communication
                  Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {733--756},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1256},
  doi          = {10.13052/JCSM2245-1439.1256},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Chen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Du23,
  author       = {Gaili Du},
  title        = {Security of Encrypted Images in Network Transmission Based on an Improved
                  Chaos Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {675--696},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1253},
  doi          = {10.13052/JCSM2245-1439.1253},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Du23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23,
  author       = {Julija Gavenaite{-}Sirvydiene and
                  Algita Miecinskiene},
  title        = {The Assessment of Cyber Security's Significance in the Financial Sector
                  of Lithuania},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {497--518},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1243},
  doi          = {10.13052/JCSM2245-1439.1243},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/GorevGKS23,
  author       = {Vyacheslav Gorev and
                  Alexander Gusev and
                  Valerii Korniienko and
                  Yana I. Shedlovska},
  title        = {On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process
                  Prediction},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {315--338},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.4},
  doi          = {10.13052/JCSM2245-1439.123.4},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/GorevGKS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HassanMN23,
  author       = {Khaled Mohammed Ali Hassan and
                  Mohamed Ashraf Madkour and
                  Sayed Abd El Hady Nouh},
  title        = {A Realtime Adaptive Trust Model Based on Artificial Neural Networks
                  for Wireless Sensor Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {519--546},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1244},
  doi          = {10.13052/JCSM2245-1439.1244},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HassanMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HilgurtDMP23,
  author       = {Serhii Ya. Hilgurt and
                  Anatolii Davydenko and
                  Tetyana V. Matovka and
                  Mykhailo P. Prygara},
  title        = {Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security
                  Systems},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {339--366},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.5},
  doi          = {10.13052/JCSM2245-1439.123.5},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/HilgurtDMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HovorushchenkoHOKB23,
  author       = {Tetiana Hovorushchenko and
                  Yelyzaveta Hnatchuk and
                  Vitaliy Osyadlyi and
                  Mariia Kapustian and
                  Artem Boyarchuk},
  title        = {Blockchain-Based Medical Decision Support System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {253--274},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.1},
  doi          = {10.13052/JCSM2245-1439.123.1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HovorushchenkoHOKB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HovorushchenkoPK23,
  author       = {Tetiana Hovorushchenko and
                  Olga Pavlova and
                  Mariia Kostiuk},
  title        = {Method of Increasing the Security of Smart Parking System},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {297--314},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.3},
  doi          = {10.13052/JCSM2245-1439.123.3},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HovorushchenkoPK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/IzoninHP23,
  author       = {Ivan Izonin and
                  Tetiana Hovorushchenko and
                  Peter T. Popov},
  title        = {Editorial},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {v--x},
  year         = {2023},
  url          = {https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22717},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/IzoninHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JiangHP23,
  author       = {Xin Jiang and
                  Huawei Huang and
                  Geyang Pan},
  title        = {Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {205--220},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1224},
  doi          = {10.13052/JCSM2245-1439.1224},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/JiangHP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KanZYZ23,
  author       = {Xiaopeng Kan and
                  Zhihong Zhou and
                  Lihong Yao and
                  Yuxin Zuo},
  title        = {Research on Anomaly Detection in Vehicular {CAN} Based on Bi-LSTM},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {629--652},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1251},
  doi          = {10.13052/JCSM2245-1439.1251},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KanZYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KolliparaKCRMK23,
  author       = {V. N. Hemanth Kollipara and
                  Sai Koushik Kalakota and
                  Sujith Chamarthi and
                  S. Ramani and
                  Preeti Malik and
                  Marimuthu Karuppiah},
  title        = {Timestamp Based {OTP} and Enhanced {RSA} Key Exchange Scheme with
                  {SIT} Encryption to Secure IoT Devices},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {77--102},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1214},
  doi          = {10.13052/JCSM2245-1439.1214},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/KolliparaKCRMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Li23,
  author       = {Xingfeng Li},
  title        = {An Evaluation Model for Network Security Based on an Optimized Circular
                  Algorithm},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {711--732},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1255},
  doi          = {10.13052/JCSM2245-1439.1255},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Lu23,
  author       = {Yujing Lu},
  title        = {Security and Privacy of Internet of Things: {A} Review of Challenges
                  and Solutions},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {813--844},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1261},
  doi          = {10.13052/JCSM2245-1439.1261},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Lu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OrlovskyiKSUI23,
  author       = {Ruslan Orlovskyi and
                  Sergiy Kharytonov and
                  Igor Samoshchenko and
                  Olha Us and
                  Volodymyr Iemelianenko},
  title        = {Countering Cybercrime Under Martial Law},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {893--910},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1264},
  doi          = {10.13052/JCSM2245-1439.1264},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/OrlovskyiKSUI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PlatzerL23,
  author       = {Florian Platzer and
                  Alexandra Lux},
  title        = {Inconsistencies in Darknet Researches},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {187--204},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1223},
  doi          = {10.13052/JCSM2245-1439.1223},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/PlatzerL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Pravorska23,
  author       = {Nataliia I. Pravorska},
  title        = {Additional Detection of Clones Using Locally Sensitive Hashing},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {367--388},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.6},
  doi          = {10.13052/JCSM2245-1439.123.6},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Pravorska23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RaufMW23,
  author       = {Usman Rauf and
                  Fadi Mohsen and
                  Zhiyuan Wei},
  title        = {A Taxonomic Classification of Insider Threats: Existing Techniques,
                  Future Directions {\&} Recommendations},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {221--252},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1225},
  doi          = {10.13052/JCSM2245-1439.1225},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RaufMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SalmanMJ23,
  author       = {Fadhil Mohammed Salman and
                  Ahssan Ahmmed Mohammed and
                  Fanar Ali Joda},
  title        = {Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless
                  Mesh Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {785--812},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1258},
  doi          = {10.13052/JCSM2245-1439.1258},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SalmanMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SalmanMM23,
  author       = {Fadhil Mohammed Salman and
                  Ahssan Ahmmed Mohammed and
                  Ahmed Fakhir Mutar},
  title        = {Optimization of {LEACH} Protocol for WSNs in Terms of Energy Efficient
                  and Network Lifetime},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {275--296},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.2},
  doi          = {10.13052/JCSM2245-1439.123.2},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SalmanMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShepitaTS23,
  author       = {Petro Shepita and
                  Lyubov Tupychak and
                  Julia Shepita},
  title        = {Analysis of Cyber Security Threats of the Printing Enterprise},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {415--434},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.8},
  doi          = {10.13052/JCSM2245-1439.123.8},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShepitaTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ShettyMPD23,
  author       = {Nisha P. Shetty and
                  Balachandra Muniyal and
                  Aman Priyanshu and
                  Vedant Rishi Das},
  title        = {FedBully: {A} Cross-Device Federated Approach for Privacy Enabled
                  Cyber Bullying Detection using Sentence Encoders},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {465--496},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1242},
  doi          = {10.13052/JCSM2245-1439.1242},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ShettyMPD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SikoraLTF23,
  author       = {Liubomyr S. Sikora and
                  Nataliia Lysa and
                  Yevhen I. Tsikalo and
                  Olga Fedevych},
  title        = {System-Information and Cognitive Technologies of Man-Made Infrastructure
                  Cyber Security},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {3},
  pages        = {389--414},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.123.7},
  doi          = {10.13052/JCSM2245-1439.123.7},
  timestamp    = {Sun, 04 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SikoraLTF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SteinebachBL23,
  author       = {Martin Steinebach and
                  Tiberius Berwanger and
                  Huajian Liu},
  title        = {Image Hashing Robust Against Cropping and Rotation},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {129--160},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1221},
  doi          = {10.13052/JCSM2245-1439.1221},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/SteinebachBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/UllaS23,
  author       = {Mohammed Mujeer Ulla and
                  Deepak S. Sakkari},
  title        = {Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1,
                  NIST256p, NIST521p and {LLL}},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {103--128},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1215},
  doi          = {10.13052/JCSM2245-1439.1215},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/UllaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Xue23,
  author       = {Ying Xue},
  title        = {Machine Learning: Research on Detection of Network Security Vulnerabilities
                  by Extracting and Matching Features},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {697--710},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1254},
  doi          = {10.13052/JCSM2245-1439.1254},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/Xue23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/XueZL23,
  author       = {Xiao Xue and
                  Yangbing Zheng and
                  Chao Lu},
  title        = {Wireless Network Safety Status Prediction Based on Fuzzy Logic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {589--604},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1247},
  doi          = {10.13052/JCSM2245-1439.1247},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/XueZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/YannikosHS23,
  author       = {York Yannikos and
                  Julian Heeger and
                  Martin Steinebach},
  title        = {Scraping and Analyzing Data of a Large Darknet Marketplace},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {2},
  pages        = {161--186},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1222},
  doi          = {10.13052/JCSM2245-1439.1222},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/YannikosHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23,
  author       = {Zhihong Zhang},
  title        = {Analysis of Network Security Countermeasures From the Perspective
                  of Improved {FS} Algorithm and {ICT} Convergence},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {1--24},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1211},
  doi          = {10.13052/JCSM2245-1439.1211},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Zhang23a,
  author       = {Junlin Zhang},
  title        = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation
                  Score},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {1},
  pages        = {55--76},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1213},
  doi          = {10.13052/JCSM2245-1439.1213},
  timestamp    = {Sat, 25 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangL23,
  author       = {Liu Zhang and
                  Yanyu Liu},
  title        = {Network Security Prediction and Situational Assessment Using Neural
                  Network-based Method},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {4},
  pages        = {547--568},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1245},
  doi          = {10.13052/JCSM2245-1439.1245},
  timestamp    = {Tue, 08 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhangL23a,
  author       = {Hong Zhang and
                  Pei Li},
  title        = {Research on Location Privacy Protection Technology in Wireless Sensor
                  Networks Based on Big Data},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {6},
  pages        = {845--868},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1262},
  doi          = {10.13052/JCSM2245-1439.1262},
  timestamp    = {Mon, 11 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhangL23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ZhouH23,
  author       = {Xv Zhou and
                  Jinwen He},
  title        = {Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation
                  and Real Ket Model},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {12},
  number       = {5},
  pages        = {757--784},
  year         = {2023},
  url          = {https://doi.org/10.13052/jcsm2245-1439.1257},
  doi          = {10.13052/JCSM2245-1439.1257},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/ZhouH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics