Search dblp for Publications

export results for "toc:db/journals/jcsm/jcsm4.bht:"

 download as .bib file

@article{DBLP:journals/jcsm/0001BM15,
  author       = {Shweta Jain and
                  Christian Barona and
                  Nicholas Madamopoulos},
  title        = {Modelling Wireless Propagation for Indoor Localization},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {279--304},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.443},
  doi          = {10.13052/JCSM2245-1439.443},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/0001BM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/AbomharaK15,
  author       = {Mohamed Abomhara and
                  Geir M. K{\o}ien},
  title        = {Cyber Security and the Internet of Things: Vulnerabilities, Threats,
                  Intruders and Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {65--88},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.414},
  doi          = {10.13052/JCSM2245-1439.414},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/DongWXELR15,
  author       = {Ziqian Dong and
                  Zheng Wang and
                  Wen Xie and
                  Obinna Emelumadu and
                  Chuan{-}Bi Lin and
                  Roberto Rojas{-}Cessa},
  title        = {An Experimental Study of SmallWorld Network Models for Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {259--278},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.442},
  doi          = {10.13052/JCSM2245-1439.442},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/DongWXELR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/HerlandHK15,
  author       = {Kristian Herland and
                  Heikki H{\"{a}}mm{\"{a}}inen and
                  Pekka Kekolahti},
  title        = {Information Security Risk Assessment of Smartphones using Bayesian
                  Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {65--86},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.424},
  doi          = {10.13052/JCSM2245-1439.424},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/HerlandHK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/JoshiDD15,
  author       = {Harshvardhan P. Joshi and
                  Aravindhan Dhanasekaran and
                  Rudra Dutta},
  title        = {Trading Off a Vulnerability: Does Software Obfuscation Increase the
                  Risk of {ROP} Attacks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {305--324},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.444},
  doi          = {10.13052/JCSM2245-1439.444},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/JoshiDD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/KaurM15,
  author       = {Goldendeep Kaur and
                  Jyoteesh Malhotra},
  title        = {Comparative Investigation of {ARP} Poisoning mitigation techniques
                  using Standard Testbed for Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {53--64},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.423},
  doi          = {10.13052/JCSM2245-1439.423},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/KaurM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/ManousakisESNKR15,
  author       = {Kyriakos Manousakis and
                  Sharanya Eswaran and
                  David Shur and
                  Gaurav Naik and
                  Pavan Kantharaju and
                  William C. Regli and
                  Brian Adamson},
  title        = {Torrent-Based Dissemination in Infrastructure-Less Wireless Networks},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {1--22},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.411},
  doi          = {10.13052/JCSM2245-1439.411},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/ManousakisESNKR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/MeskanenNN15,
  author       = {Tommi Meskanen and
                  Valtteri Niemi and
                  Noora Nieminen},
  title        = {How to Use Garbling for Privacy Preserving Electronic Surveillance
                  Services},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {41--64},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.413},
  doi          = {10.13052/JCSM2245-1439.413},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/MeskanenNN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/OforiLFGY15,
  author       = {Kwame Simpe Ofori and
                  Otu Larbi{-}Siaw and
                  Eli Fianu and
                  Richard Eddie Gladjah and
                  Ezer Osei Yeboah{-}Boateng},
  title        = {Factors Influencing the Continuance Use of Mobile Social Media: The
                  effect of Privacy Concerns},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {105--124},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.426},
  doi          = {10.13052/JCSM2245-1439.426},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/OforiLFGY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/PaulI15,
  author       = {Greig Paul and
                  James Irvine},
  title        = {Practical Attacks on Security and Privacy Through a Low-Cost Android
                  Device},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {33--52},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.422},
  doi          = {10.13052/JCSM2245-1439.422},
  timestamp    = {Fri, 03 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/PaulI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/RohokaleP15,
  author       = {Vandana Milind Rohokale and
                  Ramjee Prasad},
  title        = {Cyber Security for IntelligentWorld with Internet of Things and Machine
                  to Machine Communication},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {1},
  pages        = {23--40},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.412},
  doi          = {10.13052/JCSM2245-1439.412},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/RohokaleP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/SayeedMS15,
  author       = {Rayyan Sayeed and
                  Ray Miller and
                  Zulfiquar Sayeed},
  title        = {Throughput Prediction Across Heterogeneous Boundaries in Wireless
                  Communications},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {4},
  pages        = {233--258},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.441},
  doi          = {10.13052/JCSM2245-1439.441},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/SayeedMS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/StevanovicP15,
  author       = {Matija Stevanovic and
                  Jens Myrup Pedersen},
  title        = {On the use of machine learning for identifying botnet network traffic},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {1--32},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.421},
  doi          = {10.13052/JCSM2245-1439.421},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/StevanovicP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/TakalkarM15,
  author       = {Vedashree Takalkar and
                  Parikshit N. Mahalle},
  title        = {Confidentiality in Online Social Networks; ATrust-based Approach},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {125--144},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.427},
  doi          = {10.13052/JCSM2245-1439.427},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsm/Yeboah-BoatengA15,
  author       = {Ezer Osei Yeboah{-}Boateng and
                  Elvis Akwa{-}Bonsu},
  title        = {Digital Forensic Investigations: Issues of Intangibility, Complications
                  and Inconsistencies in Cyber-crimes},
  journal      = {J. Cyber Secur. Mobil.},
  volume       = {4},
  number       = {2-3},
  pages        = {87--104},
  year         = {2015},
  url          = {https://doi.org/10.13052/jcsm2245-1439.425},
  doi          = {10.13052/JCSM2245-1439.425},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jcsm/Yeboah-BoatengA15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics