Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/istr/istr40.bht:"
@article{DBLP:journals/istr/Abbasinezhad-Mood18, author = {Dariush Abbasinezhad{-}Mood and Morteza Nikooghadam}, title = {Design of an enhanced message authentication scheme for smart grid and its performance analysis on an {ARM} Cortex-M3 microcontroller}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {9--19}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.007}, doi = {10.1016/J.JISA.2018.02.007}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/Abbasinezhad-Mood18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AlmasalhaNTK18, author = {Fadi Almasalha and Farid Na{\"{\i}}t{-}Abdesselam and Goce Trajcevski and Ashfaq A. Khokhar}, title = {Secure transmission of multimedia contents over low-power mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {183--192}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.004}, doi = {10.1016/J.JISA.2018.04.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AlmasalhaNTK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/AndriotisSS18, author = {Panagiotis Andriotis and Gianluca Stringhini and Martina Angela Sasse}, title = {Studying users' adaptation to Android's run-time fine-grained access control system}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {31--43}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.004}, doi = {10.1016/J.JISA.2018.02.004}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/AndriotisSS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/BunderNST18, author = {Martin W. Bunder and Abderrahmane Nitaj and Willy Susilo and Joseph Tonien}, title = {Cryptanalysis of RSA-type cryptosystems based on Lucas sequences, Gaussian integers and elliptic curves}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {193--198}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.006}, doi = {10.1016/J.JISA.2018.04.006}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/BunderNST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/DeypirH18, author = {Mahmood Deypir and Abbas Horri}, title = {Instance based security risk value estimation for Android applications}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {20--30}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.002}, doi = {10.1016/J.JISA.2018.02.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/DeypirH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HamptonBZ18, author = {Nikolai Hampton and Zubair A. Baig and Sherali Zeadally}, title = {Ransomware behavioural analysis on windows platforms}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {44--51}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.008}, doi = {10.1016/J.JISA.2018.02.008}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HamptonBZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/JanaG18, author = {Dipak Kumar Jana and Ramkrishna Ghosh}, title = {Novel interval type-2 fuzzy logic controller for improving risk assessment model of cyber security}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {173--182}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.002}, doi = {10.1016/J.JISA.2018.04.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/JanaG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KarampidisKP18, author = {Konstantinos Karampidis and Ergina Kavallieratou and Giorgos Papadourakis}, title = {A review of image steganalysis techniques for digital forensics}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {217--235}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.005}, doi = {10.1016/J.JISA.2018.04.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KarampidisKP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/KumarKDBS18, author = {Manish Kumar and Sunil Kumar and Mrinal Kanti Das and Rajat Budhiraja and Sanjeev Singh}, title = {Securing images with a diffusion mechanism based on Fractional Brownian Motion}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {134--144}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.007}, doi = {10.1016/J.JISA.2018.03.007}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/KumarKDBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LangWC18, author = {Bo Lang and Jinmiao Wang and Zhenhai Cao}, title = {Multidimensional data tight aggregation and fine-grained access control in smart grid}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {156--165}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.008}, doi = {10.1016/J.JISA.2018.03.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/LangWC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/LiuW18, author = {Yi{-}Ning Liu and Zhen Wu}, title = {An improved threshold multi-level image recovery scheme}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {166--172}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.009}, doi = {10.1016/J.JISA.2018.03.009}, timestamp = {Thu, 19 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/LiuW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/McWhirterKSA18, author = {Paul R. McWhirter and Kashif Kifayat and Qi Shi and Bob Askwith}, title = {{SQL} Injection Attack classification through the feature extraction of {SQL} query strings using a Gap-Weighted String Subsequence Kernel}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {199--216}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.001}, doi = {10.1016/J.JISA.2018.04.001}, timestamp = {Mon, 09 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/McWhirterKSA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MondalB18, author = {Soumik Mondal and Patrick Bours}, title = {A continuous combination of security {\&} forensics for mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {63--77}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.001}, doi = {10.1016/J.JISA.2018.03.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/MondalB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/MoodB18, author = {Benjamin Mood and Kevin R. B. Butler}, title = {{PAL:} {A} pseudo assembly language for optimizing secure function evaluation in mobile devices}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {78--91}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.005}, doi = {10.1016/J.JISA.2018.02.005}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/MoodB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ParkinsonK18, author = {Simon Parkinson and Saad Khan}, title = {Identifying irregularities in security event logs through an object-based Chi-squared test of independence}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {52--62}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.003}, doi = {10.1016/J.JISA.2018.03.003}, timestamp = {Wed, 13 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ParkinsonK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PatroA18, author = {K. Abhimanyu Kumar Patro and Bibhudendra Acharya}, title = {Secure multi-level permutation operation based multiple colour image encryption}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {111--133}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.006}, doi = {10.1016/J.JISA.2018.03.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/PatroA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PengNFY18, author = {Yinyin Peng and Xuejing Niu and Lei Fu and Zhao{-}Xia Yin}, title = {Image authentication scheme based on reversible fragile watermarking with two images}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {236--246}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.04.007}, doi = {10.1016/J.JISA.2018.04.007}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PengNFY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/PlateauxLVCR18, author = {Aude Plateaux and Patrick Lacharme and Sylvain Vernois and Vincent Coquet and Christophe Rosenberger}, title = {A comparative study of card-not-present e-commerce architectures with card schemes: What about privacy?}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {103--110}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.01.007}, doi = {10.1016/J.JISA.2018.01.007}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/PlateauxLVCR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SafaMWS18, author = {Nader Sohrabi Safa and Carsten Maple and Tim Watson and Rossouw von Solms}, title = {Motivation and opportunity based model to reduce information security insider threats in organisations}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {247--257}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2017.11.001}, doi = {10.1016/J.JISA.2017.11.001}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SafaMWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/StillB18, author = {Jeremiah D. Still and Jarad Bell}, title = {Incognito: Shoulder-surfing resistant selection method}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {1--8}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.02.006}, doi = {10.1016/J.JISA.2018.02.006}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/StillB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/SunXZ18, author = {Lixue Sun and Chunxiang Xu and Yuan Zhang}, title = {A dynamic and non-interactive boolean searchable symmetric encryption in multi-client setting}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {145--155}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.002}, doi = {10.1016/J.JISA.2018.03.002}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/SunXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ThankiB18, author = {Rohit M. Thanki and Surekha Borra}, title = {A color image steganography in hybrid {FRT-DWT} domain}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {92--102}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.03.004}, doi = {10.1016/J.JISA.2018.03.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/ThankiB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/hammePJ18, author = {Tim Van hamme and Davy Preuveneers and Wouter Joosen}, title = {Managing distributed trust relationships for multi-modal authentication}, journal = {J. Inf. Secur. Appl.}, volume = {40}, pages = {258--270}, year = {2018}, url = {https://doi.org/10.1016/j.jisa.2018.01.003}, doi = {10.1016/J.JISA.2018.01.003}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/hammePJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.