Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp33.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/AljahdaliBA24,
  author       = {Asia Othman Aljahdali and
                  Shoroq Banafee and
                  Thana Aljohani},
  title        = {{URL} filtering using machine learning algorithms},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {193--203},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2193350},
  doi          = {10.1080/19393555.2023.2193350},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/AljahdaliBA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BinguJS24,
  author       = {Rajesh Bingu and
                  S. Jothilakshmi and
                  N. Srinivasu},
  title        = {Security and privacy preservation using constructive hierarchical
                  data-sharing approach in cloud environment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {1--15},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2022.2128942},
  doi          = {10.1080/19393555.2022.2128942},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/BinguJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/FowdurH24,
  author       = {Tulsi Pawan Fowdur and
                  Shua{\"{\i}}b Hosenally},
  title        = {A real-time machine learning application for browser extension security
                  monitoring},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {16--41},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2022.2128944},
  doi          = {10.1080/19393555.2022.2128944},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/FowdurH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GoodarziEP24,
  author       = {Mojtaba Goodarzi and
                  Ziba Eslami and
                  Nasrollah Pakniat},
  title        = {Certificateless directed signature scheme without bilinear pairing},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {268--284},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2260800},
  doi          = {10.1080/19393555.2023.2260800},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GoodarziEP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/JavaniS24,
  author       = {Farid Javani and
                  Alan T. Sherman},
  title        = {{BVOT:} self-tallying boardroom voting with oblivious transfer},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {42--53},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2022.2138798},
  doi          = {10.1080/19393555.2022.2138798},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/JavaniS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KavrestadFN24,
  author       = {Joakim K{\"{a}}vrestad and
                  Steven Furnell and
                  Marcus Nohlberg},
  title        = {User perception of Context-Based Micro-Training - a method for cybersecurity
                  training},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {2},
  pages        = {121--137},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2222713},
  doi          = {10.1080/19393555.2023.2222713},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/KavrestadFN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/LAM24,
  author       = {Divya V. L. and
                  Job P. A. and
                  K. Preetha Mathew},
  title        = {Secure query processing and optimization in cloud environment: a review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {2},
  pages        = {172--191},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2270976},
  doi          = {10.1080/19393555.2023.2270976},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/LAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MI24,
  author       = {Savitha M. M and
                  Basarkod P. I},
  title        = {Securing AMI-IoT networks against multiple {RPL} attacks using ensemble
                  learning {IDS} and light-chain based prediction detection and mitigation
                  mechanisms},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {73--95},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2218852},
  doi          = {10.1080/19393555.2023.2218852},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MI24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MadnickHM24,
  author       = {Benjamin F. Madnick and
                  Keman Huang and
                  Stuart E. Madnick},
  title        = {The evolution of global cybersecurity norms in the digital age: {A}
                  longitudinal study of the cybersecurity norm development process},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {204--225},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2201482},
  doi          = {10.1080/19393555.2023.2201482},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MadnickHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MefenzaV24,
  author       = {Thierry Mefenza and
                  Damien Vergnaud},
  title        = {Lattice attacks on pairing-based signatures},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {2},
  pages        = {138--157},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2251476},
  doi          = {10.1080/19393555.2023.2251476},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/MefenzaV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/PankajD24,
  author       = {Shubha Pankaj and
                  Mohit Dua},
  title        = {Chaos based Medical Image Encryption Techniques: {A} Comprehensive
                  Review and Analysis},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {332--358},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2024.2312975},
  doi          = {10.1080/19393555.2024.2312975},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/PankajD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RahulKS24,
  author       = {B. Rahul and
                  K. Kuppusamy and
                  A. Senthilrajan},
  title        = {Bio-Metric Based Colour-Image-Encryption using Multi-Chaotic Dynamical
                  Systems and {SHA-256} Hash Algorithm},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {226--250},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2230205},
  doi          = {10.1080/19393555.2023.2230205},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/RahulKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RussoRSM24,
  author       = {Nelson Russo and
                  Leonilde Reis and
                  Maria Clara Silveira and
                  Henrique S. Mamede},
  title        = {Towards a Comprehensive Framework for the Multidisciplinary Evaluation
                  of Organizational Maturity on Business Continuity Program Management:
                  {A} Systematic Literature Review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {1},
  pages        = {54--72},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2195577},
  doi          = {10.1080/19393555.2023.2195577},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/RussoRSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SharmaP24,
  author       = {Payal Sharma and
                  B. R. Purushothama},
  title        = {A lightweight group key management scheme with constant rekeying cost
                  and public bulletin size},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {2},
  pages        = {97--120},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2198737},
  doi          = {10.1080/19393555.2023.2198737},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SharmaP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SultanaAC24,
  author       = {Kazi Zakia Sultana and
                  Vaibhav K. Anu and
                  Tai{-}Yin Chong},
  title        = {Using software metrics for predicting vulnerable classes in java and
                  python based systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {251--267},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2240343},
  doi          = {10.1080/19393555.2023.2240343},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SultanaAC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SuorsaH24,
  author       = {Mikko Suorsa and
                  Petri T. Helo},
  title        = {Information security failures identified and measured - {ISO/IEC}
                  27001:2013 controls ranked based on {GDPR} penalty case analysis},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {285--306},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2270984},
  doi          = {10.1080/19393555.2023.2270984},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SuorsaH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/WellsU24,
  author       = {Alec Wells and
                  Aminu Bello Usman},
  title        = {Privacy and biometrics for smart healthcare systems: attacks, and
                  techniques},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {3},
  pages        = {307--331},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2260818},
  doi          = {10.1080/19393555.2023.2260818},
  timestamp    = {Tue, 30 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/WellsU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/YusifHA24,
  author       = {Salifu Yusif and
                  Abdul Hafeez{-}Baig and
                  Charles Anachanser},
  title        = {Internet governance and cyber-security: a systematic literature review},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {33},
  number       = {2},
  pages        = {158--171},
  year         = {2024},
  url          = {https://doi.org/10.1080/19393555.2023.2268608},
  doi          = {10.1080/19393555.2023.2268608},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/YusifHA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics