Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/jcsm/jcsm4.bht:"
@article{DBLP:journals/jcsm/0001BM15, author = {Shweta Jain and Christian Barona and Nicholas Madamopoulos}, title = {Modelling Wireless Propagation for Indoor Localization}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {279--304}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.443}, doi = {10.13052/JCSM2245-1439.443}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/0001BM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/AbomharaK15, author = {Mohamed Abomhara and Geir M. K{\o}ien}, title = {Cyber Security and the Internet of Things: Vulnerabilities, Threats, Intruders and Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {65--88}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.414}, doi = {10.13052/JCSM2245-1439.414}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/AbomharaK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/DongWXELR15, author = {Ziqian Dong and Zheng Wang and Wen Xie and Obinna Emelumadu and Chuan{-}Bi Lin and Roberto Rojas{-}Cessa}, title = {An Experimental Study of SmallWorld Network Models for Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {259--278}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.442}, doi = {10.13052/JCSM2245-1439.442}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/DongWXELR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/HerlandHK15, author = {Kristian Herland and Heikki H{\"{a}}mm{\"{a}}inen and Pekka Kekolahti}, title = {Information Security Risk Assessment of Smartphones using Bayesian Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {65--86}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.424}, doi = {10.13052/JCSM2245-1439.424}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/HerlandHK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/JoshiDD15, author = {Harshvardhan P. Joshi and Aravindhan Dhanasekaran and Rudra Dutta}, title = {Trading Off a Vulnerability: Does Software Obfuscation Increase the Risk of {ROP} Attacks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {305--324}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.444}, doi = {10.13052/JCSM2245-1439.444}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/JoshiDD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/KaurM15, author = {Goldendeep Kaur and Jyoteesh Malhotra}, title = {Comparative Investigation of {ARP} Poisoning mitigation techniques using Standard Testbed for Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {53--64}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.423}, doi = {10.13052/JCSM2245-1439.423}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/KaurM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/ManousakisESNKR15, author = {Kyriakos Manousakis and Sharanya Eswaran and David Shur and Gaurav Naik and Pavan Kantharaju and William C. Regli and Brian Adamson}, title = {Torrent-Based Dissemination in Infrastructure-Less Wireless Networks}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {1--22}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.411}, doi = {10.13052/JCSM2245-1439.411}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/ManousakisESNKR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/MeskanenNN15, author = {Tommi Meskanen and Valtteri Niemi and Noora Nieminen}, title = {How to Use Garbling for Privacy Preserving Electronic Surveillance Services}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {41--64}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.413}, doi = {10.13052/JCSM2245-1439.413}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/MeskanenNN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/OforiLFGY15, author = {Kwame Simpe Ofori and Otu Larbi{-}Siaw and Eli Fianu and Richard Eddie Gladjah and Ezer Osei Yeboah{-}Boateng}, title = {Factors Influencing the Continuance Use of Mobile Social Media: The effect of Privacy Concerns}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {105--124}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.426}, doi = {10.13052/JCSM2245-1439.426}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/OforiLFGY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/PaulI15, author = {Greig Paul and James Irvine}, title = {Practical Attacks on Security and Privacy Through a Low-Cost Android Device}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {33--52}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.422}, doi = {10.13052/JCSM2245-1439.422}, timestamp = {Fri, 03 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/PaulI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/RohokaleP15, author = {Vandana Milind Rohokale and Ramjee Prasad}, title = {Cyber Security for IntelligentWorld with Internet of Things and Machine to Machine Communication}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {1}, pages = {23--40}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.412}, doi = {10.13052/JCSM2245-1439.412}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/RohokaleP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/SayeedMS15, author = {Rayyan Sayeed and Ray Miller and Zulfiquar Sayeed}, title = {Throughput Prediction Across Heterogeneous Boundaries in Wireless Communications}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {4}, pages = {233--258}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.441}, doi = {10.13052/JCSM2245-1439.441}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/SayeedMS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/StevanovicP15, author = {Matija Stevanovic and Jens Myrup Pedersen}, title = {On the use of machine learning for identifying botnet network traffic}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {1--32}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.421}, doi = {10.13052/JCSM2245-1439.421}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/StevanovicP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/TakalkarM15, author = {Vedashree Takalkar and Parikshit N. Mahalle}, title = {Confidentiality in Online Social Networks; ATrust-based Approach}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {125--144}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.427}, doi = {10.13052/JCSM2245-1439.427}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsm/TakalkarM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsm/Yeboah-BoatengA15, author = {Ezer Osei Yeboah{-}Boateng and Elvis Akwa{-}Bonsu}, title = {Digital Forensic Investigations: Issues of Intangibility, Complications and Inconsistencies in Cyber-crimes}, journal = {J. Cyber Secur. Mobil.}, volume = {4}, number = {2-3}, pages = {87--104}, year = {2015}, url = {https://doi.org/10.13052/jcsm2245-1439.425}, doi = {10.13052/JCSM2245-1439.425}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcsm/Yeboah-BoatengA15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.