Search dblp for Publications

export results for "toc:db/journals/jisis/jisis5.bht:"

 download as .bib file

@article{DBLP:journals/jisis/BoothA15,
  author       = {Todd Booth and
                  Karl Andersson},
  title        = {Network Security of Internet Services: Eliminate DDoS Reflection Amplification
                  Attacks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {58--79},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.058},
  doi          = {10.22667/JISIS.2015.08.31.058},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/BoothA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/BravettiLMM15,
  author       = {Mario Bravetti and
                  Alberto Lluch{-}Lafuente and
                  Manuel Mazzara and
                  Fabrizio Montesi},
  title        = {Guest Editorial: Special Issue on Service-Oriented Architectures and
                  Programming},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {1--2},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.02.31.001},
  doi          = {10.22667/JISIS.2015.02.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/BravettiLMM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/DevipriyaNM15,
  author       = {M. Devipriya and
                  Nithya Balasubramanian and
                  C. Mala},
  title        = {Hashing Based Distributed Backoff {(HBDB)} Mechanism for {IEEE} 802.11
                  Wireless Networks},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.001},
  doi          = {10.22667/JISIS.2015.08.31.001},
  timestamp    = {Wed, 13 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jisis/DevipriyaNM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/FungC15,
  author       = {Carol J. Fung and
                  Weverton Cordeiro},
  title        = {Guest Editorial: Special issue on Next Generation Networks and Systems
                  Security},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {1--3},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.001},
  doi          = {10.22667/JISIS.2015.05.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/FungC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/JacksonZGY15,
  author       = {David S. Jackson and
                  Wanyu Zang and
                  Qijun Gu and
                  Meng Yu},
  title        = {Robust Detection of Rogue Signals in Cooperative Spectrum Sensing},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {4--23},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.004},
  doi          = {10.22667/JISIS.2015.05.31.004},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/JacksonZGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KaghazgaranT15,
  author       = {Parisa Kaghazgaran and
                  Hassan Takabi},
  title        = {Toward an Insider Threat Detection Framework Using Honey Permissions},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {19--36},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.019},
  doi          = {10.22667/JISIS.2015.08.31.019},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KaghazgaranT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KarumanchiS15,
  author       = {Sushama Karumanchi and
                  Anna Cinzia Squicciarini},
  title        = {A Large Scale Study of Web Service Vulnerabilities},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {53--69},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.02.31.053},
  doi          = {10.22667/JISIS.2015.02.31.053},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KarumanchiS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KolomeecCK15,
  author       = {Maxim Kolomeec and
                  Andrey Chechulin and
                  Igor V. Kotenko},
  title        = {Methodological Primitives for Phased Construction of Data Visualization
                  Models},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {60--84},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.060},
  doi          = {10.22667/JISIS.2015.11.31.060},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KolomeecCK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LeeACL15,
  author       = {Yong{-}Hwan Lee and
                  Hyochang Ahn and
                  Han{-}Jin Cho and
                  June{-}Hwan Lee},
  title        = {Object Recognition and Tracking based on Object Feature Extracting},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {48--57},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.048},
  doi          = {10.22667/JISIS.2015.08.31.048},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LeeACL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/LeuCC15,
  author       = {Fang{-}Yie Leu and
                  Hsin{-}Liang Chen and
                  Chih{-}Chung Cheng},
  title        = {Improving Multi-path Congestion Control for Event-driven Wireless
                  Sensor Networks by using {TDMA}},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.001},
  doi          = {10.22667/JISIS.2015.11.31.001},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/LeuCC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/NinglekhuKJP15,
  author       = {Jiwan Ninglekhu and
                  Ram Krishnan and
                  Eugene John and
                  Manoj Panday},
  title        = {Securing Implantable Cardioverter Defibrillators Using Smartphones},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {47--64},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.047},
  doi          = {10.22667/JISIS.2015.05.31.047},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/NinglekhuKJP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/NojoumianS15,
  author       = {Mehrdad Nojoumian and
                  Douglas R. Stinson},
  title        = {Sequential Secret Sharing as a New Hierarchical Access Structure},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {24--32},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.024},
  doi          = {10.22667/JISIS.2015.05.31.024},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/NojoumianS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/NurseEGC15,
  author       = {Jason R. C. Nurse and
                  Arnau Erola and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {Investigating the leakage of sensitive personal and organisational
                  information in email headers},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {70--84},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.02.31.070},
  doi          = {10.22667/JISIS.2015.02.31.070},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/NurseEGC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/OliveiraSB15,
  author       = {Nuno Oliveira and
                  Alexandra Silva and
                  Lu{\'{\i}}s Soares Barbosa},
  title        = {IMC\({}_{\mbox{Reo}}\): interactive Markov chains for Stochastic Reo},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {3--28},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.02.31.003},
  doi          = {10.22667/JISIS.2015.02.31.003},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/OliveiraSB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ParraJ15,
  author       = {Carlos Parra and
                  Diego Joya},
  title        = {{SPLIT:} An Automated Approach for Enterprise Product Line Adoption
                  Through {SOA}},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {1},
  pages        = {29--52},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.02.31.029},
  doi          = {10.22667/JISIS.2015.02.31.029},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ParraJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/RashidiF15,
  author       = {Bahman Rashidi and
                  Carol J. Fung},
  title        = {Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {2},
  pages        = {33--46},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.05.31.033},
  doi          = {10.22667/JISIS.2015.05.31.033},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/RashidiF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/SatamAAH15,
  author       = {Pratik Satam and
                  Hamid Reza Alipour and
                  Youssif B. Al{-}Nashif and
                  Salim Hariri},
  title        = {Anomaly Behavior Analysis of {DNS} Protocol},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {85--97},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.085},
  doi          = {10.22667/JISIS.2015.11.31.085},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/SatamAAH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/ShinK15,
  author       = {Sooyeon Shin and
                  Taekyoung Kwon},
  title        = {A Survey of Public Provable Data Possession Schemes with Batch Verification
                  in Cloud Storage},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {3},
  pages        = {37--47},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.08.31.037},
  doi          = {10.22667/JISIS.2015.08.31.037},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/ShinK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TakahagiISSUS15,
  author       = {Kazuhiro Takahagi and
                  Tomoyuki Ishida and
                  Akira Sakuraba and
                  Kaoru Sugita and
                  Noriki Uchida and
                  Yoshitaka Shibata},
  title        = {Construction of a Mega Disaster Crisis Management System},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {20--40},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.020},
  doi          = {10.22667/JISIS.2015.11.31.020},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/TakahagiISSUS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/TuncH15,
  author       = {Cihan Tunc and
                  Salim Hariri},
  title        = {CLaaS: Cybersecurity Lab as a Service},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {5},
  number       = {4},
  pages        = {41--59},
  year         = {2015},
  url          = {https://doi.org/10.22667/JISIS.2015.11.31.041},
  doi          = {10.22667/JISIS.2015.11.31.041},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/TuncH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics