Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp33.bht:"
@article{DBLP:journals/isjgp/AljahdaliBA24, author = {Asia Othman Aljahdali and Shoroq Banafee and Thana Aljohani}, title = {{URL} filtering using machine learning algorithms}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {193--203}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2193350}, doi = {10.1080/19393555.2023.2193350}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/AljahdaliBA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BinguJS24, author = {Rajesh Bingu and S. Jothilakshmi and N. Srinivasu}, title = {Security and privacy preservation using constructive hierarchical data-sharing approach in cloud environment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {1--15}, year = {2024}, url = {https://doi.org/10.1080/19393555.2022.2128942}, doi = {10.1080/19393555.2022.2128942}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/BinguJS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/FowdurH24, author = {Tulsi Pawan Fowdur and Shua{\"{\i}}b Hosenally}, title = {A real-time machine learning application for browser extension security monitoring}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {16--41}, year = {2024}, url = {https://doi.org/10.1080/19393555.2022.2128944}, doi = {10.1080/19393555.2022.2128944}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/FowdurH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GoodarziEP24, author = {Mojtaba Goodarzi and Ziba Eslami and Nasrollah Pakniat}, title = {Certificateless directed signature scheme without bilinear pairing}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {268--284}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2260800}, doi = {10.1080/19393555.2023.2260800}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GoodarziEP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/JavaniS24, author = {Farid Javani and Alan T. Sherman}, title = {{BVOT:} self-tallying boardroom voting with oblivious transfer}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {42--53}, year = {2024}, url = {https://doi.org/10.1080/19393555.2022.2138798}, doi = {10.1080/19393555.2022.2138798}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/JavaniS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KavrestadFN24, author = {Joakim K{\"{a}}vrestad and Steven Furnell and Marcus Nohlberg}, title = {User perception of Context-Based Micro-Training - a method for cybersecurity training}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {2}, pages = {121--137}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2222713}, doi = {10.1080/19393555.2023.2222713}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/KavrestadFN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/LAM24, author = {Divya V. L. and Job P. A. and K. Preetha Mathew}, title = {Secure query processing and optimization in cloud environment: a review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {2}, pages = {172--191}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2270976}, doi = {10.1080/19393555.2023.2270976}, timestamp = {Fri, 15 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/LAM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MI24, author = {Savitha M. M and Basarkod P. I}, title = {Securing AMI-IoT networks against multiple {RPL} attacks using ensemble learning {IDS} and light-chain based prediction detection and mitigation mechanisms}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {73--95}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2218852}, doi = {10.1080/19393555.2023.2218852}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MI24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MadnickHM24, author = {Benjamin F. Madnick and Keman Huang and Stuart E. Madnick}, title = {The evolution of global cybersecurity norms in the digital age: {A} longitudinal study of the cybersecurity norm development process}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {204--225}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2201482}, doi = {10.1080/19393555.2023.2201482}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MadnickHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MefenzaV24, author = {Thierry Mefenza and Damien Vergnaud}, title = {Lattice attacks on pairing-based signatures}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {2}, pages = {138--157}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2251476}, doi = {10.1080/19393555.2023.2251476}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/MefenzaV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/PankajD24, author = {Shubha Pankaj and Mohit Dua}, title = {Chaos based Medical Image Encryption Techniques: {A} Comprehensive Review and Analysis}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {332--358}, year = {2024}, url = {https://doi.org/10.1080/19393555.2024.2312975}, doi = {10.1080/19393555.2024.2312975}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/PankajD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RahulKS24, author = {B. Rahul and K. Kuppusamy and A. Senthilrajan}, title = {Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical Systems and {SHA-256} Hash Algorithm}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {226--250}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2230205}, doi = {10.1080/19393555.2023.2230205}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/RahulKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RussoRSM24, author = {Nelson Russo and Leonilde Reis and Maria Clara Silveira and Henrique S. Mamede}, title = {Towards a Comprehensive Framework for the Multidisciplinary Evaluation of Organizational Maturity on Business Continuity Program Management: {A} Systematic Literature Review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {1}, pages = {54--72}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2195577}, doi = {10.1080/19393555.2023.2195577}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/RussoRSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SharmaP24, author = {Payal Sharma and B. R. Purushothama}, title = {A lightweight group key management scheme with constant rekeying cost and public bulletin size}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {2}, pages = {97--120}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2198737}, doi = {10.1080/19393555.2023.2198737}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SharmaP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SultanaAC24, author = {Kazi Zakia Sultana and Vaibhav K. Anu and Tai{-}Yin Chong}, title = {Using software metrics for predicting vulnerable classes in java and python based systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {251--267}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2240343}, doi = {10.1080/19393555.2023.2240343}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SultanaAC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SuorsaH24, author = {Mikko Suorsa and Petri T. Helo}, title = {Information security failures identified and measured - {ISO/IEC} 27001:2013 controls ranked based on {GDPR} penalty case analysis}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {285--306}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2270984}, doi = {10.1080/19393555.2023.2270984}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SuorsaH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/WellsU24, author = {Alec Wells and Aminu Bello Usman}, title = {Privacy and biometrics for smart healthcare systems: attacks, and techniques}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {3}, pages = {307--331}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2260818}, doi = {10.1080/19393555.2023.2260818}, timestamp = {Tue, 30 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/WellsU24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/YusifHA24, author = {Salifu Yusif and Abdul Hafeez{-}Baig and Charles Anachanser}, title = {Internet governance and cyber-security: a systematic literature review}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {33}, number = {2}, pages = {158--171}, year = {2024}, url = {https://doi.org/10.1080/19393555.2023.2268608}, doi = {10.1080/19393555.2023.2268608}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/YusifHA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.