Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jisis/jisis5.bht:"
@article{DBLP:journals/jisis/BoothA15, author = {Todd Booth and Karl Andersson}, title = {Network Security of Internet Services: Eliminate DDoS Reflection Amplification Attacks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {58--79}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.058}, doi = {10.22667/JISIS.2015.08.31.058}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/BoothA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/BravettiLMM15, author = {Mario Bravetti and Alberto Lluch{-}Lafuente and Manuel Mazzara and Fabrizio Montesi}, title = {Guest Editorial: Special Issue on Service-Oriented Architectures and Programming}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {1}, pages = {1--2}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.02.31.001}, doi = {10.22667/JISIS.2015.02.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/BravettiLMM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/DevipriyaNM15, author = {M. Devipriya and Nithya Balasubramanian and C. Mala}, title = {Hashing Based Distributed Backoff {(HBDB)} Mechanism for {IEEE} 802.11 Wireless Networks}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.001}, doi = {10.22667/JISIS.2015.08.31.001}, timestamp = {Wed, 13 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jisis/DevipriyaNM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/FungC15, author = {Carol J. Fung and Weverton Cordeiro}, title = {Guest Editorial: Special issue on Next Generation Networks and Systems Security}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {1--3}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.001}, doi = {10.22667/JISIS.2015.05.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/FungC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/JacksonZGY15, author = {David S. Jackson and Wanyu Zang and Qijun Gu and Meng Yu}, title = {Robust Detection of Rogue Signals in Cooperative Spectrum Sensing}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {4--23}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.004}, doi = {10.22667/JISIS.2015.05.31.004}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/JacksonZGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KaghazgaranT15, author = {Parisa Kaghazgaran and Hassan Takabi}, title = {Toward an Insider Threat Detection Framework Using Honey Permissions}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {19--36}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.019}, doi = {10.22667/JISIS.2015.08.31.019}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KaghazgaranT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KarumanchiS15, author = {Sushama Karumanchi and Anna Cinzia Squicciarini}, title = {A Large Scale Study of Web Service Vulnerabilities}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {1}, pages = {53--69}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.02.31.053}, doi = {10.22667/JISIS.2015.02.31.053}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KarumanchiS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KolomeecCK15, author = {Maxim Kolomeec and Andrey Chechulin and Igor V. Kotenko}, title = {Methodological Primitives for Phased Construction of Data Visualization Models}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {60--84}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.060}, doi = {10.22667/JISIS.2015.11.31.060}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KolomeecCK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LeeACL15, author = {Yong{-}Hwan Lee and Hyochang Ahn and Han{-}Jin Cho and June{-}Hwan Lee}, title = {Object Recognition and Tracking based on Object Feature Extracting}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {48--57}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.048}, doi = {10.22667/JISIS.2015.08.31.048}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LeeACL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/LeuCC15, author = {Fang{-}Yie Leu and Hsin{-}Liang Chen and Chih{-}Chung Cheng}, title = {Improving Multi-path Congestion Control for Event-driven Wireless Sensor Networks by using {TDMA}}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.001}, doi = {10.22667/JISIS.2015.11.31.001}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/LeuCC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/NinglekhuKJP15, author = {Jiwan Ninglekhu and Ram Krishnan and Eugene John and Manoj Panday}, title = {Securing Implantable Cardioverter Defibrillators Using Smartphones}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {47--64}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.047}, doi = {10.22667/JISIS.2015.05.31.047}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/NinglekhuKJP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/NojoumianS15, author = {Mehrdad Nojoumian and Douglas R. Stinson}, title = {Sequential Secret Sharing as a New Hierarchical Access Structure}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {24--32}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.024}, doi = {10.22667/JISIS.2015.05.31.024}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/NojoumianS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/NurseEGC15, author = {Jason R. C. Nurse and Arnau Erola and Michael Goldsmith and Sadie Creese}, title = {Investigating the leakage of sensitive personal and organisational information in email headers}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {1}, pages = {70--84}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.02.31.070}, doi = {10.22667/JISIS.2015.02.31.070}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/NurseEGC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/OliveiraSB15, author = {Nuno Oliveira and Alexandra Silva and Lu{\'{\i}}s Soares Barbosa}, title = {IMC\({}_{\mbox{Reo}}\): interactive Markov chains for Stochastic Reo}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {1}, pages = {3--28}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.02.31.003}, doi = {10.22667/JISIS.2015.02.31.003}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/OliveiraSB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ParraJ15, author = {Carlos Parra and Diego Joya}, title = {{SPLIT:} An Automated Approach for Enterprise Product Line Adoption Through {SOA}}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {1}, pages = {29--52}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.02.31.029}, doi = {10.22667/JISIS.2015.02.31.029}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ParraJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/RashidiF15, author = {Bahman Rashidi and Carol J. Fung}, title = {Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {2}, pages = {33--46}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.05.31.033}, doi = {10.22667/JISIS.2015.05.31.033}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/RashidiF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/SatamAAH15, author = {Pratik Satam and Hamid Reza Alipour and Youssif B. Al{-}Nashif and Salim Hariri}, title = {Anomaly Behavior Analysis of {DNS} Protocol}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {85--97}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.085}, doi = {10.22667/JISIS.2015.11.31.085}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/SatamAAH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/ShinK15, author = {Sooyeon Shin and Taekyoung Kwon}, title = {A Survey of Public Provable Data Possession Schemes with Batch Verification in Cloud Storage}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {3}, pages = {37--47}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.08.31.037}, doi = {10.22667/JISIS.2015.08.31.037}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/ShinK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TakahagiISSUS15, author = {Kazuhiro Takahagi and Tomoyuki Ishida and Akira Sakuraba and Kaoru Sugita and Noriki Uchida and Yoshitaka Shibata}, title = {Construction of a Mega Disaster Crisis Management System}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {20--40}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.020}, doi = {10.22667/JISIS.2015.11.31.020}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/TakahagiISSUS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/TuncH15, author = {Cihan Tunc and Salim Hariri}, title = {CLaaS: Cybersecurity Lab as a Service}, journal = {J. Internet Serv. Inf. Secur.}, volume = {5}, number = {4}, pages = {41--59}, year = {2015}, url = {https://doi.org/10.22667/JISIS.2015.11.31.041}, doi = {10.22667/JISIS.2015.11.31.041}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/TuncH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.