Search dblp for Publications

export results for "toc:db/journals/secinf/secinf4.bht:"

 download as .bib file

@article{DBLP:journals/secinf/AdrichemBLWWFK15,
  author       = {Niels L. M. van Adrichem and
                  Norbert Blenn and
                  Antonio Reyes Lua and
                  Xin Wang and
                  Muhammad Wasif and
                  Ficky Fatturrahman and
                  Fernando A. Kuipers},
  title        = {A measurement study of {DNSSEC} misconfigurations},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {8},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0023-y},
  doi          = {10.1186/S13388-015-0023-Y},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/AdrichemBLWWFK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/CowleyGW15,
  author       = {Jennifer Cowley and
                  Frank L. Greitzer and
                  Bronwyn Woods},
  title        = {Factors influencing network risk judgments: a conceptual inquiry and
                  exploratory analysis},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {1},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0016-x},
  doi          = {10.1186/S13388-015-0016-X},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/CowleyGW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/CowleyGW15a,
  author       = {Jennifer Cowley and
                  Frank L. Greitzer and
                  Bronwyn Woods},
  title        = {Erratum to: Factors influencing network risk judgments: a conceptual
                  inquiry and exploratory analysis},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {5},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0020-1},
  doi          = {10.1186/S13388-015-0020-1},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/CowleyGW15a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/DatcuLLC15,
  author       = {Dragos Datcu and
                  Stephan G. Lukosch and
                  Heide K. Lukosch and
                  Marina Cidot{\~{a}}},
  title        = {Using augmented reality for supporting information exchange in teams
                  from the security domain},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {10},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0025-9},
  doi          = {10.1186/S13388-015-0025-9},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/DatcuLLC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/HaasF15,
  author       = {Timothy C. Haas and
                  Sam M. Ferreira},
  title        = {Federated databases and actionable intelligence: using social network
                  analysis to disrupt transnational wildlife trafficking criminal networks},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {2},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0018-8},
  doi          = {10.1186/S13388-015-0018-8},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/HaasF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/HarangM15,
  author       = {Richard E. Harang and
                  Peter Mell},
  title        = {Evasion-resistant network scan detection},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {4},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0019-7},
  doi          = {10.1186/S13388-015-0019-7},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/HarangM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/JohanssonKS15,
  author       = {Fredrik Johansson and
                  Lisa Kaati and
                  Amendra Shrestha},
  title        = {Timeprints for identifying social media users with multiple aliases},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {7},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0022-z},
  doi          = {10.1186/S13388-015-0022-Z},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/JohanssonKS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/JurekMB15,
  author       = {Anna Jurek and
                  Maurice D. Mulvenna and
                  Yaxin Bi},
  title        = {Improved lexicon-based sentiment analysis for social media analytics},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {9},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0024-x},
  doi          = {10.1186/S13388-015-0024-X},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/JurekMB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/LiW15,
  author       = {Jiexun Li and
                  G. Alan Wang},
  title        = {A framework of identity resolution: evaluating identity attributes
                  and matching algorithms},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {6},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0021-0},
  doi          = {10.1186/S13388-015-0021-0},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/LiW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/secinf/YuanRU15,
  author       = {Shuai Yuan and
                  H. Raghav Rao and
                  Shambhu J. Upadhyaya},
  title        = {Emerging issues for education in E-discovery for electronic health
                  records},
  journal      = {Secur. Informatics},
  volume       = {4},
  number       = {1},
  pages        = {3},
  year         = {2015},
  url          = {https://doi.org/10.1186/s13388-015-0017-9},
  doi          = {10.1186/S13388-015-0017-9},
  timestamp    = {Fri, 16 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/secinf/YuanRU15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics