Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm12.bht:"
@article{DBLP:journals/jcsm/AbdulKareemA23, author = {Ali Akram Abdul{-}Kareem and Waleed Ameen Mahmoud Al{-}Jawher}, title = {A Hybrid Domain Medical Image Encryption Scheme Using {URUK} and {WAM} Chaotic Maps with Wavelet - Fourier Transforms}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {435--464}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1241}, doi = {10.13052/JCSM2245-1439.1241}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbdulKareemA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AlbahraniLG23, author = {Ekhlas Abbas Albahrani and Sadeq H. Lafta and Naeem Howrie Ghayad}, title = {A Chaos-Based Encryption Algorithm for Database System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {25--54}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1212}, doi = {10.13052/JCSM2245-1439.1212}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AlbahraniLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Alouneh23, author = {Sahel Alouneh}, title = {A Multi-Path Approach to Protect {DNS} Against DDoS Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {569--588}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1246}, doi = {10.13052/JCSM2245-1439.1246}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Alouneh23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AmroSM23, author = {Belal M. Amro and Saeed Salah and Mohammed Moreb}, title = {A Comprehensive Architectural Framework of Moving Target Defenses Against DDoS Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {605--628}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1248}, doi = {10.13052/JCSM2245-1439.1248}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AmroSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Chen23, author = {Min Chen}, title = {Camera Network Topology Mapping Based on the Integration of Network Information and Physical Distribution Under the Background of Communication Security}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {733--756}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1256}, doi = {10.13052/JCSM2245-1439.1256}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Chen23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Du23, author = {Gaili Du}, title = {Security of Encrypted Images in Network Transmission Based on an Improved Chaos Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {675--696}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1253}, doi = {10.13052/JCSM2245-1439.1253}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Du23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GavenaiteSirvydieneM23, author = {Julija Gavenaite{-}Sirvydiene and Algita Miecinskiene}, title = {The Assessment of Cyber Security's Significance in the Financial Sector of Lithuania}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {497--518}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1243}, doi = {10.13052/JCSM2245-1439.1243}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GavenaiteSirvydieneM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/GorevGKS23, author = {Vyacheslav Gorev and Alexander Gusev and Valerii Korniienko and Yana I. Shedlovska}, title = {On the Use of the Kolmogorov-Wiener Filter for Heavy-tail Process Prediction}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {315--338}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.4}, doi = {10.13052/JCSM2245-1439.123.4}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/GorevGKS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HassanMN23, author = {Khaled Mohammed Ali Hassan and Mohamed Ashraf Madkour and Sayed Abd El Hady Nouh}, title = {A Realtime Adaptive Trust Model Based on Artificial Neural Networks for Wireless Sensor Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {519--546}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1244}, doi = {10.13052/JCSM2245-1439.1244}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HassanMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HilgurtDMP23, author = {Serhii Ya. Hilgurt and Anatolii Davydenko and Tetyana V. Matovka and Mykhailo P. Prygara}, title = {Tools for Analyzing Signature-Based Hardware Solutions for Cyber Security Systems}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {339--366}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.5}, doi = {10.13052/JCSM2245-1439.123.5}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/HilgurtDMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HovorushchenkoHOKB23, author = {Tetiana Hovorushchenko and Yelyzaveta Hnatchuk and Vitaliy Osyadlyi and Mariia Kapustian and Artem Boyarchuk}, title = {Blockchain-Based Medical Decision Support System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {253--274}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.1}, doi = {10.13052/JCSM2245-1439.123.1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HovorushchenkoHOKB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HovorushchenkoPK23, author = {Tetiana Hovorushchenko and Olga Pavlova and Mariia Kostiuk}, title = {Method of Increasing the Security of Smart Parking System}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {297--314}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.3}, doi = {10.13052/JCSM2245-1439.123.3}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HovorushchenkoPK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/IzoninHP23, author = {Ivan Izonin and Tetiana Hovorushchenko and Peter T. Popov}, title = {Editorial}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {v--x}, year = {2023}, url = {https://journals.riverpublishers.com/index.php/JCSANDM/article/view/22717}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/IzoninHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JiangHP23, author = {Xin Jiang and Huawei Huang and Geyang Pan}, title = {Cryptanalysis of Tropical Encryption Scheme Based on Double Key Exchange}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {205--220}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1224}, doi = {10.13052/JCSM2245-1439.1224}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/JiangHP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KanZYZ23, author = {Xiaopeng Kan and Zhihong Zhou and Lihong Yao and Yuxin Zuo}, title = {Research on Anomaly Detection in Vehicular {CAN} Based on Bi-LSTM}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {629--652}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1251}, doi = {10.13052/JCSM2245-1439.1251}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KanZYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KolliparaKCRMK23, author = {V. N. Hemanth Kollipara and Sai Koushik Kalakota and Sujith Chamarthi and S. Ramani and Preeti Malik and Marimuthu Karuppiah}, title = {Timestamp Based {OTP} and Enhanced {RSA} Key Exchange Scheme with {SIT} Encryption to Secure IoT Devices}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {77--102}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1214}, doi = {10.13052/JCSM2245-1439.1214}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/KolliparaKCRMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Li23, author = {Xingfeng Li}, title = {An Evaluation Model for Network Security Based on an Optimized Circular Algorithm}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {711--732}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1255}, doi = {10.13052/JCSM2245-1439.1255}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Li23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Lu23, author = {Yujing Lu}, title = {Security and Privacy of Internet of Things: {A} Review of Challenges and Solutions}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {813--844}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1261}, doi = {10.13052/JCSM2245-1439.1261}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Lu23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OrlovskyiKSUI23, author = {Ruslan Orlovskyi and Sergiy Kharytonov and Igor Samoshchenko and Olha Us and Volodymyr Iemelianenko}, title = {Countering Cybercrime Under Martial Law}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {893--910}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1264}, doi = {10.13052/JCSM2245-1439.1264}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/OrlovskyiKSUI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PlatzerL23, author = {Florian Platzer and Alexandra Lux}, title = {Inconsistencies in Darknet Researches}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {187--204}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1223}, doi = {10.13052/JCSM2245-1439.1223}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/PlatzerL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Pravorska23, author = {Nataliia I. Pravorska}, title = {Additional Detection of Clones Using Locally Sensitive Hashing}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {367--388}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.6}, doi = {10.13052/JCSM2245-1439.123.6}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Pravorska23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RaufMW23, author = {Usman Rauf and Fadi Mohsen and Zhiyuan Wei}, title = {A Taxonomic Classification of Insider Threats: Existing Techniques, Future Directions {\&} Recommendations}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {221--252}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1225}, doi = {10.13052/JCSM2245-1439.1225}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RaufMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SalmanMJ23, author = {Fadhil Mohammed Salman and Ahssan Ahmmed Mohammed and Fanar Ali Joda}, title = {Adaptation of the Ant Colony Algorithm to Avoid Congestion in Wireless Mesh Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {785--812}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1258}, doi = {10.13052/JCSM2245-1439.1258}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SalmanMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SalmanMM23, author = {Fadhil Mohammed Salman and Ahssan Ahmmed Mohammed and Ahmed Fakhir Mutar}, title = {Optimization of {LEACH} Protocol for WSNs in Terms of Energy Efficient and Network Lifetime}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {275--296}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.2}, doi = {10.13052/JCSM2245-1439.123.2}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SalmanMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShepitaTS23, author = {Petro Shepita and Lyubov Tupychak and Julia Shepita}, title = {Analysis of Cyber Security Threats of the Printing Enterprise}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {415--434}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.8}, doi = {10.13052/JCSM2245-1439.123.8}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShepitaTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ShettyMPD23, author = {Nisha P. Shetty and Balachandra Muniyal and Aman Priyanshu and Vedant Rishi Das}, title = {FedBully: {A} Cross-Device Federated Approach for Privacy Enabled Cyber Bullying Detection using Sentence Encoders}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {465--496}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1242}, doi = {10.13052/JCSM2245-1439.1242}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ShettyMPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SikoraLTF23, author = {Liubomyr S. Sikora and Nataliia Lysa and Yevhen I. Tsikalo and Olga Fedevych}, title = {System-Information and Cognitive Technologies of Man-Made Infrastructure Cyber Security}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {3}, pages = {389--414}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.123.7}, doi = {10.13052/JCSM2245-1439.123.7}, timestamp = {Sun, 04 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SikoraLTF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SteinebachBL23, author = {Martin Steinebach and Tiberius Berwanger and Huajian Liu}, title = {Image Hashing Robust Against Cropping and Rotation}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {129--160}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1221}, doi = {10.13052/JCSM2245-1439.1221}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/SteinebachBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/UllaS23, author = {Mohammed Mujeer Ulla and Deepak S. Sakkari}, title = {Research on Elliptic Curve Crypto System with Bitcoin Curves - SECP256k1, NIST256p, NIST521p and {LLL}}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {103--128}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1215}, doi = {10.13052/JCSM2245-1439.1215}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/UllaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Xue23, author = {Ying Xue}, title = {Machine Learning: Research on Detection of Network Security Vulnerabilities by Extracting and Matching Features}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {697--710}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1254}, doi = {10.13052/JCSM2245-1439.1254}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/Xue23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/XueZL23, author = {Xiao Xue and Yangbing Zheng and Chao Lu}, title = {Wireless Network Safety Status Prediction Based on Fuzzy Logic}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {589--604}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1247}, doi = {10.13052/JCSM2245-1439.1247}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/XueZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/YannikosHS23, author = {York Yannikos and Julian Heeger and Martin Steinebach}, title = {Scraping and Analyzing Data of a Large Darknet Marketplace}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {2}, pages = {161--186}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1222}, doi = {10.13052/JCSM2245-1439.1222}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/YannikosHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23, author = {Zhihong Zhang}, title = {Analysis of Network Security Countermeasures From the Perspective of Improved {FS} Algorithm and {ICT} Convergence}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {1--24}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1211}, doi = {10.13052/JCSM2245-1439.1211}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Zhang23a, author = {Junlin Zhang}, title = {{WSN} Network Node Malicious Intrusion Detection Method Based on Reputation Score}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {1}, pages = {55--76}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1213}, doi = {10.13052/JCSM2245-1439.1213}, timestamp = {Sat, 25 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Zhang23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangL23, author = {Liu Zhang and Yanyu Liu}, title = {Network Security Prediction and Situational Assessment Using Neural Network-based Method}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {4}, pages = {547--568}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1245}, doi = {10.13052/JCSM2245-1439.1245}, timestamp = {Tue, 08 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhangL23a, author = {Hong Zhang and Pei Li}, title = {Research on Location Privacy Protection Technology in Wireless Sensor Networks Based on Big Data}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {6}, pages = {845--868}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1262}, doi = {10.13052/JCSM2245-1439.1262}, timestamp = {Mon, 11 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ZhangL23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ZhouH23, author = {Xv Zhou and Jinwen He}, title = {Quantum Image Encryption Algorithm Incorporating Bit-plane Color Representation and Real Ket Model}, journal = {J. Cyber Secur. Mobil.}, volume = {12}, number = {5}, pages = {757--784}, year = {2023}, url = {https://doi.org/10.13052/jcsm2245-1439.1257}, doi = {10.13052/JCSM2245-1439.1257}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/ZhouH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.