Search dblp for Publications

export results for "toc:db/journals/scn/scn2019.bht:"

 download as .bib file

@article{DBLP:journals/scn/AbbasiXAL19,
  author       = {Rashid Abbasi and
                  Lixiang Xu and
                  Farhan Amin and
                  Bin Luo},
  title        = {Efficient Lossless Compression Based Reversible Data Hiding Using
                  Multilayered n-Bit Localization},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8981240:1--8981240:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8981240},
  doi          = {10.1155/2019/8981240},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AbbasiXAL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AbideenSE19,
  author       = {Muhammad Zain ul Abideen and
                  Shahzad Saleem and
                  Madiha Ejaz},
  title        = {{VPN} Traffic Detection in SSL-Protected Channel},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7924690:1--7924690:17},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7924690},
  doi          = {10.1155/2019/7924690},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/AbideenSE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Abu-ZantY19,
  author       = {Mahmoud Abu{-}Zant and
                  Adwan Yasin},
  title        = {Avoiding and Isolating Flooding Attack by Enhancing {AODV} {MANET}
                  Protocol (AIF{\_}AODV)},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8249108:1--8249108:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8249108},
  doi          = {10.1155/2019/8249108},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Abu-ZantY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AcaraliRKZ19,
  author       = {Dilara Acarali and
                  Muttukrishnan Rajarajan and
                  Nikos Komninos and
                  Bruno Bogaz Zarpel{\~{a}}o},
  title        = {Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor
                  Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3745619:1--3745619:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3745619},
  doi          = {10.1155/2019/3745619},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AcaraliRKZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AdebayoA19,
  author       = {Olawale Surajudeen Adebayo and
                  Normaziah Abdul Aziz},
  title        = {Improved Malware Detection Model with Apriori Association Rule and
                  Particle Swarm Optimization},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2850932:1--2850932:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2850932},
  doi          = {10.1155/2019/2850932},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AdebayoA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AkpinarO19,
  author       = {Kevser Ovaz Akpinar and
                  Ibrahim {\"{O}}z{\c{c}}elik},
  title        = {Corrigendum to "Development of the {ECAT} Preprocessor with the Trust
                  Communication Approach"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7457154:1},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7457154},
  doi          = {10.1155/2019/7457154},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AkpinarO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-DailamiRBZ19,
  author       = {Abdulrahman Al{-}Dailami and
                  Chang Ruan and
                  Zhihong Bao and
                  Tao Zhang},
  title        = {QoS3: Secure Caching in {HTTPS} Based on Fine-Grained Trust Delegation},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3107543:1--3107543:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3107543},
  doi          = {10.1155/2019/3107543},
  timestamp    = {Tue, 30 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/Al-DailamiRBZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Al-ZubaidieZZ19,
  author       = {Mishall Al{-}Zubaidie and
                  Zhongwei Zhang and
                  Ji Zhang},
  title        = {{RAMHU:} {A} New Robust Lightweight Scheme for Mutual Users Authentication
                  in Healthcare Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3263902:1--3263902:26},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3263902},
  doi          = {10.1155/2019/3263902},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Al-ZubaidieZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Albahar19,
  author       = {Marwan Ali Albahar},
  title        = {Recurrent Neural Network Model Based on a New Regularization Technique
                  for Real-Time Intrusion Detection in {SDN} Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8939041:1--8939041:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8939041},
  doi          = {10.1155/2019/8939041},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Albahar19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AlbakriHS19,
  author       = {Ashwag Albakri and
                  Lein Harn and
                  Sejun Song},
  title        = {Hierarchical Key Management Scheme with Probabilistic Security in
                  a Wireless Sensor Network {(WSN)}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3950129:1--3950129:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3950129},
  doi          = {10.1155/2019/3950129},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AlbakriHS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AnginBR19,
  author       = {Pelin Angin and
                  Bharat K. Bhargava and
                  Rohit Ranchal},
  title        = {Big Data Analytics for Cyber Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4109836:1--4109836:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4109836},
  doi          = {10.1155/2019/4109836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AnginBR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/AsifB19,
  author       = {Rameez Asif and
                  William J. Buchanan},
  title        = {Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key
                  Rates via Commercial Off-the-Shelf Telecommunication Equipment"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2637028:1},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2637028},
  doi          = {10.1155/2019/2637028},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/AsifB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaiPGC19,
  author       = {Wei Bai and
                  Zhisong Pan and
                  Shize Guo and
                  Zhe Chen},
  title        = {{RMMDI:} {A} Novel Framework for Role Mining Based on the Multi-Domain
                  Information},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8085303:1--8085303:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8085303},
  doi          = {10.1155/2019/8085303},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaiPGC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BaiSM19,
  author       = {Jinrong Bai and
                  Qibin Shi and
                  Shiguang Mu},
  title        = {A Malware and Variant Detection Method Using Function Call Graph Isomorphism},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1043794:1--1043794:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1043794},
  doi          = {10.1155/2019/1043794},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BaiSM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BangY19,
  author       = {Woorim Bang and
                  Ji Won Yoon},
  title        = {Power Grid Estimation Using Electric Network Frequency Signals},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1982168:1--1982168:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1982168},
  doi          = {10.1155/2019/1982168},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BangY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BartlettDMSSW19,
  author       = {Harry Bartlett and
                  Ed Dawson and
                  Hassan Qahur Al Mahri and
                  Md. Iftekhar Salam and
                  Leonie Simpson and
                  Kenneth Koon{-}Ho Wong},
  title        = {Random Fault Attacks on a Class of Stream Ciphers},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1680263:1--1680263:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1680263},
  doi          = {10.1155/2019/1680263},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/BartlettDMSSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/BenishaR19,
  author       = {R. B. Benisha and
                  S. Raja Ratna},
  title        = {Design of Intrusion Detection and Prevention in {SCADA} System for
                  the Detection of Bias Injection Attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1082485:1--1082485:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1082485},
  doi          = {10.1155/2019/1082485},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/BenishaR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Byun19,
  author       = {Jin Wook Byun},
  title        = {A Generic Multifactor Authenticated Key Exchange with Physical Unclonable
                  Function},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5935292:1--5935292:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5935292},
  doi          = {10.1155/2019/5935292},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Byun19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CabajGMNZ19,
  author       = {Krzysztof Cabaj and
                  Marcin Gregorczyk and
                  Wojciech Mazurczyk and
                  Piotr Nowakowski and
                  Piotr Z{\'{o}}rawski},
  title        = {Network Threats Mitigation Using Software-Defined Networking for the
                  5G Internet of Radio Light System},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4930908:1--4930908:22},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4930908},
  doi          = {10.1155/2019/4930908},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CabajGMNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaiJZZWLX19,
  author       = {Jie Cai and
                  Han Jiang and
                  Pingyuan Zhang and
                  Zhihua Zheng and
                  Hao Wang and
                  Guangshi L{\"{u}} and
                  Qiuliang Xu},
  title        = {ID-Based Strong Designated Verifier Signature over {\(\mathscr{R}\)}-SIS
                  Assumption},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9678095:1--9678095:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9678095},
  doi          = {10.1155/2019/9678095},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaiJZZWLX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CaproluRP19,
  author       = {Maurantonio Caprolu and
                  Simone Raponi and
                  Roberto Di Pietro},
  title        = {{FORTRESS:} An Efficient and Distributed Firewall for Stateful Data
                  Plane {SDN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6874592:1--6874592:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6874592},
  doi          = {10.1155/2019/6874592},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/CaproluRP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/CeponisG19,
  author       = {Dainius Ceponis and
                  Nikolaj Goranin},
  title        = {Evaluation of Deep Learning Methods Efficiency for Malicious and Benign
                  System Calls Classification on the {AWSCTD}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2317976:1--2317976:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2317976},
  doi          = {10.1155/2019/2317976},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/CeponisG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenC19,
  author       = {Hefeng Chen and
                  Chin{-}Chen Chang},
  title        = {A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2387358:1--2387358:7},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2387358},
  doi          = {10.1155/2019/2387358},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenSY19,
  author       = {Jiageng Chen and
                  Chunhua Su and
                  Zheng Yan},
  title        = {AI-Driven Cyber Security Analytics and Privacy Protection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1859143:1--1859143:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1859143},
  doi          = {10.1155/2019/1859143},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChenWCC19,
  author       = {Hefeng Chen and
                  Hsiao{-}Ling Wu and
                  Chin{-}Chen Chang and
                  Long{-}Sheng Chen},
  title        = {Light Repository Blockchain System with Multisecret Sharing for Industrial
                  Big Data},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9060756:1--9060756:7},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9060756},
  doi          = {10.1155/2019/9060756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChenWCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChengLTSLG19,
  author       = {Jieren Cheng and
                  Mengyang Li and
                  Xiangyan Tang and
                  Victor S. Sheng and
                  Yifu Liu and
                  Wei Guo},
  title        = {Corrigendum to "Flow Correlation Degree Optimization Driven Random
                  Forest for Detecting DDoS Attacks in Cloud Computing"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6809054:1},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6809054},
  doi          = {10.1155/2019/6809054},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChengLTSLG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChoiB19,
  author       = {Joseph I. Choi and
                  Kevin R. B. Butler},
  title        = {Secure Multiparty Computation and Trusted Hardware: Examining Adoption
                  Challenges and Opportunities},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1368905:1--1368905:28},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1368905},
  doi          = {10.1155/2019/1368905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChoiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChoiBKKM19,
  author       = {Mi{-}Jung Choi and
                  Jiwon Bang and
                  Jongwook Kim and
                  Hajin Kim and
                  Yang{-}Sae Moon},
  title        = {All-in-One Framework for Detection, Unpacking, and Verification for
                  Malware Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5278137:1--5278137:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5278137},
  doi          = {10.1155/2019/5278137},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChoiBKKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChoiSC19,
  author       = {SeokHwan Choi and
                  Jin{-}Myeong Shin and
                  Yoon{-}Ho Choi},
  title        = {Dynamic Nonparametric Random Forest Using Covariance},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3984031:1--3984031:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3984031},
  doi          = {10.1155/2019/3984031},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChoiSC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ChuLL19,
  author       = {Ankang Chu and
                  Yingxu Lai and
                  Jing Liu},
  title        = {Industrial Control Intrusion Detection Approach Based on Multiclassification
                  GoogLeNet-LSTM Model},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6757685:1--6757685:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6757685},
  doi          = {10.1155/2019/6757685},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ChuLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DangT19,
  author       = {Tran Khanh Dang and
                  Khanh T. K. Tran},
  title        = {The Meeting of Acquaintances: {A} Cost-Efficient Authentication Scheme
                  for Light-Weight Objects with Transient Trust Level and Plurality
                  Approach},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8123259:1--8123259:18},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8123259},
  doi          = {10.1155/2019/8123259},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DangT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DhailahTA19,
  author       = {Hala Abu Dhailah and
                  Eyad Taqieddin and
                  Abdallah Y. Alma'aitah},
  title        = {An Enhanced and Resource-Aware {RFID} Multitag Grouping Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6862052:1--6862052:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6862052},
  doi          = {10.1155/2019/6862052},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DhailahTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DingWGJG19,
  author       = {Lin Ding and
                  Lei Wang and
                  Dawu Gu and
                  Chenhui Jin and
                  Jie Guan},
  title        = {Algebraic Degree Estimation of {ACORN} v3 Using Numeric Mapping},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7429320:1--7429320:5},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7429320},
  doi          = {10.1155/2019/7429320},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DingWGJG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DorokhinFL19,
  author       = {{\'{E}}dgar Salguero Dorokhin and
                  Walter Fuertes and
                  Edison Lascano},
  title        = {On the Development of an Optimal Structure of Tree Parity Machine
                  for the Establishment of a Cryptographic Key},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8214681:1--8214681:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8214681},
  doi          = {10.1155/2019/8214681},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/DorokhinFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/DwiardhikaT19,
  author       = {Dhanu Dwiardhika and
                  Takuji Tachibana},
  title        = {Virtual Network Embedding Based on Security Level with {VNF} Placement},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5640134:1--5640134:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5640134},
  doi          = {10.1155/2019/5640134},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/DwiardhikaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ElhadyEE19,
  author       = {Abd Elghaffar M. Elhady and
                  Hazem M. El{-}Bakry and
                  Ahmed Abou Elfetouh},
  title        = {Comprehensive Risk Identification Model for {SCADA} Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3914283:1--3914283:24},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3914283},
  doi          = {10.1155/2019/3914283},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ElhadyEE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EllinidouSRVMD19,
  author       = {Soultana Ellinidou and
                  Gaurav Sharma and
                  Th{\'{e}}o Rigas and
                  Tristan Vanspouwen and
                  Olivier Markowitch and
                  Jean{-}Michel Dricot},
  title        = {SSPSoC: {A} Secure SDN-Based Protocol over MPSoC},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4869167:1--4869167:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4869167},
  doi          = {10.1155/2019/4869167},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EllinidouSRVMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/EmuraHKMOOS19,
  author       = {Keita Emura and
                  Goichiro Hanaoka and
                  Yutaka Kawai and
                  Takahiro Matsuda and
                  Kazuma Ohara and
                  Kazumasa Omote and
                  Yusuke Sakai},
  title        = {Group Signatures with Message-Dependent Opening: Formal Definitions
                  and Constructions},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4872403:1--4872403:36},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4872403},
  doi          = {10.1155/2019/4872403},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/EmuraHKMOOS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FaisalARKR19,
  author       = {Mohammad Faisal and
                  Sohail Abbas and
                  Haseeb Ur Rahman and
                  Muhammad Zahid Khan and
                  Arif Ur Rahman},
  title        = {An Analysis of DDoS Attacks on the Instant Messengers},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1751285:1--1751285:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1751285},
  doi          = {10.1155/2019/1751285},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/FaisalARKR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FanZ19,
  author       = {Sijie Fan and
                  Yaqun Zhao},
  title        = {Analysis of {DES} Plaintext Recovery Based on {BP} Neural Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9580862:1--9580862:5},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9580862},
  doi          = {10.1155/2019/9580862},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FanZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FengLJGM19,
  author       = {Bo Feng and
                  Qiang Li and
                  Yuede Ji and
                  Dong Guo and
                  Xiangyu Meng},
  title        = {Stopping the Cyberattack in the Early Stage: Assessing the Security
                  Risks of Social Network Users},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3053418:1--3053418:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3053418},
  doi          = {10.1155/2019/3053418},
  timestamp    = {Mon, 02 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FengLJGM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FerragMD19,
  author       = {Mohamed Amine Ferrag and
                  Leandros A. Maglaras and
                  Abdelouahid Derhab},
  title        = {Authentication and Authorization for Mobile IoT Devices Using Biofeatures:
                  Recent Advances and Future Trends},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5452870:1--5452870:20},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5452870},
  doi          = {10.1155/2019/5452870},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/FerragMD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/FilhoSBVS19,
  author       = {Francisco Sales de Lima Filho and
                  Frederico Augusto Fernandes Silveira and
                  Agostinho de Medeiros Brito J{\'{u}}nior and
                  Genoveva Vargas{-}Solar and
                  Luiz Felipe Q. Silveira},
  title        = {Smart Detection: An Online Approach for DoS/DDoS Attack Detection
                  Using Machine Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1574749:1--1574749:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1574749},
  doi          = {10.1155/2019/1574749},
  timestamp    = {Sun, 28 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/FilhoSBVS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GaoCZ19,
  author       = {Hui Gao and
                  Yunfang Chen and
                  Wei Zhang},
  title        = {Detection of Trojaning Attack on Neural Networks via Cost of Sample
                  Classification},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1953839:1--1953839:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1953839},
  doi          = {10.1155/2019/1953839},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GaoCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GaoZ19,
  author       = {Yunpeng Gao and
                  Nan Zhang},
  title        = {Social Security and Privacy for Social IoT Polymorphic Value Set:
                  {A} Solution to Inference Attacks on Social Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5498375:1--5498375:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5498375},
  doi          = {10.1155/2019/5498375},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GaoZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GinkelGMP19,
  author       = {Neline van Ginkel and
                  Willem De Groef and
                  Fabio Massacci and
                  Frank Piessens},
  title        = {A Server-Side JavaScript Security Architecture for Secure Integration
                  of Third-Party Libraries},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9629034:1--9629034:21},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9629034},
  doi          = {10.1155/2019/9629034},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/GinkelGMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/GurbuzUU19,
  author       = {Emre G{\"{u}}rb{\"{u}}z and
                  G{\"{u}}zin Ulutas and
                  Mustafa Ulutas},
  title        = {Detection of Free-Form Copy-Move Forgery on Digital Images},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8124521:1--8124521:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8124521},
  doi          = {10.1155/2019/8124521},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/GurbuzUU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HajjajiGAM19,
  author       = {Mohamed Ali Hajjaji and
                  Mohamed Gafsi and
                  Abdessalem Ben Abdelali and
                  Abdellatif Mtibaa},
  title        = {{FPGA} Implementation of Digital Images Watermarking System Based
                  on Discrete Haar Wavelet Transform},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1294267:1--1294267:17},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1294267},
  doi          = {10.1155/2019/1294267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HajjajiGAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanKK19,
  author       = {Mee Lan Han and
                  Byung Il Kwak and
                  Huy Kang Kim},
  title        = {CBR-Based Decision Support Methodology for Cybercrime Investigation:
                  Focused on the Data-Driven Website Defacement Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1901548:1--1901548:21},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1901548},
  doi          = {10.1155/2019/1901548},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanKK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HanZZ19,
  author       = {Bo Han and
                  Yinliang Zhao and
                  Changpeng Zhu},
  title        = {An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2798571:1--2798571:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2798571},
  doi          = {10.1155/2019/2798571},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HanZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HaoZWZC19,
  author       = {Yaojun Hao and
                  Fuzhi Zhang and
                  Jian Wang and
                  Qingshan Zhao and
                  Jianfang Cao},
  title        = {Detecting Shilling Attacks with Automatic Features from Multiple Views},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6523183:1--6523183:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6523183},
  doi          = {10.1155/2019/6523183},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HaoZWZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeMMW19,
  author       = {Lei He and
                  Jianfeng Ma and
                  Ruo Mo and
                  Dawei Wei},
  title        = {Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial
                  Vehicle Network Based on Mobile Edge Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8583130:1--8583130:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8583130},
  doi          = {10.1155/2019/8583130},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/HeMMW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HeinrichVAKSBFK19,
  author       = {Markus Heinrich and
                  Tsvetoslava Vateva{-}Gurova and
                  Tolga Arul and
                  Stefan Katzenbeisser and
                  Neeraj Suri and
                  Henk Birkholz and
                  Andreas Fuchs and
                  Christoph Krau{\ss} and
                  Maria Zhdanova and
                  Don Kuzhiyelil and
                  Sergey Tverdyshev and
                  Christian Schlehuber},
  title        = {Security Requirements Engineering in Safety-Critical Railway Signalling
                  Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8348925:1--8348925:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8348925},
  doi          = {10.1155/2019/8348925},
  timestamp    = {Wed, 01 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HeinrichVAKSBFK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuNZLLL19,
  author       = {Teng Hu and
                  Weina Niu and
                  Xiaosong Zhang and
                  Xiaolei Liu and
                  Jiazhong Lu and
                  Yuan Liu},
  title        = {An Insider Threat Detection Approach Based on Mouse Dynamics and Deep
                  Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3898951:1--3898951:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3898951},
  doi          = {10.1155/2019/3898951},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/HuNZLLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuZC19,
  author       = {Langtao Hu and
                  Xin Zheng and
                  Chunsheng Chen},
  title        = {Physical Layer Security in Nonorthogonal Multiple Access Wireless
                  Network with Jammer Selection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7869317:1--7869317:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7869317},
  doi          = {10.1155/2019/7869317},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangHZL19,
  author       = {Cheng Huang and
                  Jiaxuan Han and
                  Xing Zhang and
                  Jiayong Liu},
  title        = {Automatic Identification of Honeypot Server Using Machine Learning
                  Techniques},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2627608:1--2627608:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2627608},
  doi          = {10.1155/2019/2627608},
  timestamp    = {Wed, 19 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/HuangHZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangKMWWW19,
  author       = {Darong Huang and
                  Lanyan Ke and
                  Bo Mi and
                  Guosheng Wei and
                  Jian Wang and
                  Shaohua Wan},
  title        = {A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment
                  Function for Security of Stacker in Industrial Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4049765:1--4049765:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4049765},
  doi          = {10.1155/2019/4049765},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangKMWWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangLYYT19,
  author       = {Kaifan Huang and
                  Pengdeng Li and
                  Lu{-}Xing Yang and
                  Xiaofan Yang and
                  Yuan Yan Tang},
  title        = {Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control
                  Approach},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2315627:1--2315627:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2315627},
  doi          = {10.1155/2019/2315627},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangLYYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/HuangWXXH19,
  author       = {Guoyan Huang and
                  Qian Wang and
                  Xinqian Liu and
                  Xiaobing Hao and
                  Huaizhi Yan},
  title        = {Mining the Key Nodes from Software Network Based on Fault Accumulation
                  and Propagation},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7140480:1--7140480:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7140480},
  doi          = {10.1155/2019/7140480},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/HuangWXXH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/IraqiB19,
  author       = {Omar Iraqi and
                  Hanan El Bakkali},
  title        = {Application-Level Unsupervised Outlier-Based Intrusion Detection and
                  Prevention},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8368473:1--8368473:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8368473},
  doi          = {10.1155/2019/8368473},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/IraqiB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JafarySSR19,
  author       = {Peyman Jafary and
                  Antti Supponen and
                  Mikko Salmenper{\"{a}} and
                  Sami Repo},
  title        = {Analyzing Reliability of the Communication for Secure and Highly Available
                  GOOSE-Based Logic Selectivity},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9682189:1--9682189:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9682189},
  doi          = {10.1155/2019/9682189},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JafarySSR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JeongJ19,
  author       = {Jaeyeol Jeong and
                  Ik Rae Jeong},
  title        = {Efficient Cancelable Iris Template Generation for Wearable Sensors},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7473591:1--7473591:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7473591},
  doi          = {10.1155/2019/7473591},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JeongJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JeongWK19,
  author       = {Young{-}Seob Jeong and
                  Jiyoung Woo and
                  Ah Reum Kang},
  title        = {Malware Detection on Byte Streams of {PDF} Files Using Convolutional
                  Neural Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8485365:1--8485365:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8485365},
  doi          = {10.1155/2019/8485365},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JeongWK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JuGYLM19,
  author       = {Ankang Ju and
                  Yuanbo Guo and
                  Ziwei Ye and
                  Tao Li and
                  Jing Ma},
  title        = {HeteMSD: {A} Big Data Analytics Framework for Targeted Cyber-Attacks
                  Detection Using Heterogeneous Multisource Data},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5483918:1--5483918:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5483918},
  doi          = {10.1155/2019/5483918},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JuGYLM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Kamola19,
  author       = {Mariusz Kamola},
  title        = {Sensitivity of Importance Metrics for Critical Digital Services Graph
                  to Service Operators' Self-Assessment Errors},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7510809:1--7510809:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7510809},
  doi          = {10.1155/2019/7510809},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Kamola19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KawanishiNSYH19,
  author       = {Yasuyuki Kawanishi and
                  Hideaki Nishihara and
                  Daisuke Souma and
                  Hirotaka Yoshida and
                  Yoichi Hata},
  title        = {A Comparative Study of {JASO} TP15002-Based Security Risk Assessment
                  Methods for Connected Vehicle System Design},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4614721:1--4614721:35},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4614721},
  doi          = {10.1155/2019/4614721},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KawanishiNSYH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhalidKN19,
  author       = {Madiha Khalid and
                  Umar Mujahid Khokhar and
                  Muhammad Najam{-}ul{-}Islam},
  title        = {Ultralightweight {RFID} Authentication Protocols for Low-Cost Passive
                  {RFID} Tags},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3295616:1--3295616:25},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3295616},
  doi          = {10.1155/2019/3295616},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhalidKN19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhanH19,
  author       = {Zeeshan Ali Khan and
                  Peter Herrmann},
  title        = {Recent Advancements in Intrusion Detection Systems for the Internet
                  of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4301409:1--4301409:19},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4301409},
  doi          = {10.1155/2019/4301409},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhanH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KhatibzadehBB19,
  author       = {Leila Khatibzadeh and
                  Zarrintaj Bornaee and
                  Abbas Ghaemi Bafghi},
  title        = {Applying Catastrophe Theory for Network Anomaly Detection in Cloud
                  Computing Traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5306395:1--5306395:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5306395},
  doi          = {10.1155/2019/5306395},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KhatibzadehBB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KholidyE19,
  author       = {Hisham A. Kholidy and
                  Abdelkarim Erradi},
  title        = {{VHDRA:} {A} Vertical and Horizontal Intelligent Dataset Reduction
                  Approach for Cyber-Physical Power Aware Intrusion Detection Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6816943:1--6816943:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6816943},
  doi          = {10.1155/2019/6816943},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KholidyE19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimCCPS19,
  author       = {Bohun Kim and
                  Junghoon Cho and
                  Byungjun Choi and
                  Jongsun Park and
                  Hwajeong Seo},
  title        = {Compact Implementations of {HIGHT} Block Cipher on IoT Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5323578:1--5323578:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5323578},
  doi          = {10.1155/2019/5323578},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimCCPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimK19,
  author       = {Daegeon Kim and
                  Huy Kang Kim},
  title        = {Automated Dataset Generation System for Collaborative Research of
                  Cyber Threat Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6268476:1--6268476:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6268476},
  doi          = {10.1155/2019/6268476},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KimYRJ19,
  author       = {Pyung{-}Han Kim and
                  Eun{-}Jun Yoon and
                  Kwan{-}Woo Ryu and
                  Ki{-}Hyun Jung},
  title        = {Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing
                  on Colour Images},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9038650:1--9038650:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9038650},
  doi          = {10.1155/2019/9038650},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KimYRJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KomanoOSIV19,
  author       = {Yuichi Komano and
                  Kazuo Ohta and
                  Kazuo Sakiyama and
                  Mitsugu Iwamoto and
                  Ingrid Verbauwhede},
  title        = {Single-Round Pattern Matching Key Generation Using Physically Unclonable
                  Function},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1719585:1--1719585:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1719585},
  doi          = {10.1155/2019/1719585},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KosmanosAM19,
  author       = {Dimitrios Kosmanos and
                  Antonios Argyriou and
                  Leandros A. Maglaras},
  title        = {Estimating the Relative Speed of {RF} Jammers in VANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2064348:1--2064348:18},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2064348},
  doi          = {10.1155/2019/2064348},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KosmanosAM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LagoPB19,
  author       = {Federica Lago and
                  Quoc{-}Tin Phan and
                  Giulia Boato},
  title        = {Visual and Textual Analysis for Image Trustworthiness Assessment within
                  Online News},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9236910:1--9236910:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9236910},
  doi          = {10.1155/2019/9236910},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LagoPB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LaiZL19,
  author       = {Yingxu Lai and
                  Jingwen Zhang and
                  Zenghui Liu},
  title        = {Industrial Anomaly Detection and Attack Classification Method Based
                  on Convolutional Neural Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8124254:1--8124254:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8124254},
  doi          = {10.1155/2019/8124254},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LaiZL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeJ19,
  author       = {Sanghoon Lee and
                  Ik Rae Jeong},
  title        = {A Cancelable Template for the Low-Quality Fingerprints from Wearable
                  Devices},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4202671:1--4202671:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4202671},
  doi          = {10.1155/2019/4202671},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LeeSK19,
  author       = {Yong{-}Seok Lee and
                  Young{-}Ho Seo and
                  Dong{-}Wook Kim},
  title        = {Blind Image Watermarking Based on Adaptive Data Spreading in\emph{
                  n}-Level {DWT} Subbands},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8357251:1--8357251:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8357251},
  doi          = {10.1155/2019/8357251},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LeeSK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiCC19,
  author       = {Lin Li and
                  Chin{-}Chen Chang and
                  Hefeng Chen},
  title        = {An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme
                  Using Double-Way Prediction Strategy},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3031506:1--3031506:17},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3031506},
  doi          = {10.1155/2019/3031506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiHCH19,
  author       = {Quanrun Li and
                  Ching{-}Fang Hsu and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He},
  title        = {A Provably Secure and Lightweight Identity-Based Two-Party Authenticated
                  Key Agreement Protocol for Vehicular Ad Hoc Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7871067:1--7871067:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7871067},
  doi          = {10.1155/2019/7871067},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LiHCH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiYSZ19,
  author       = {Xiaoye Li and
                  Jing Yang and
                  Zhenlong Sun and
                  Jianpei Zhang},
  title        = {Differentially Private Release of the Distribution of Clustering Coefficients
                  across Communities},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2518714:1--2518714:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2518714},
  doi          = {10.1155/2019/2518714},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiYSZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiZLLZ19,
  author       = {Chenghai Li and
                  Fangzheng Zhao and
                  Chen Liu and
                  Lei Lei and
                  Jie Zhang},
  title        = {A Hyperchaotic Color Image Encryption Algorithm and Security Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8132547:1--8132547:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8132547},
  doi          = {10.1155/2019/8132547},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiZLLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiangW19,
  author       = {Huicong Liang and
                  Meiqin Wang},
  title        = {Cryptanalysis of the Lightweight Block Cipher {BORON}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7862738:1--7862738:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7862738},
  doi          = {10.1155/2019/7862738},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiangW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LinXYS19,
  author       = {Guofeng Lin and
                  Yunhao Xia and
                  Chun Ying and
                  Zhixin Sun},
  title        = {{F2P-ABS:} {A} Fast and Secure Attribute-Based Signature for Mobile
                  Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5380710:1--5380710:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5380710},
  doi          = {10.1155/2019/5380710},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LinXYS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuGLCZ19,
  author       = {Wenjie Liu and
                  Peipei Gao and
                  Zhihao Liu and
                  Hanwu Chen and
                  Maojun Zhang},
  title        = {A Quantum-Based Database Query Scheme for Privacy Preservation in
                  Cloud Environment},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4923590:1--4923590:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4923590},
  doi          = {10.1155/2019/4923590},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuGLCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuLZ19,
  author       = {Yu Liu and
                  Xiaolei Liu and
                  Yanmin Zhao},
  title        = {Security Cryptanalysis of {NUX} for the Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2062697:1--2062697:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2062697},
  doi          = {10.1155/2019/2062697},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuWYL19,
  author       = {Jingang Liu and
                  Yongge Wang and
                  Zongxiang Yi and
                  Zhiqiang Lin},
  title        = {polarRLCE: {A} New Code-Based Cryptosystem Using Polar Codes},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3086975:1--3086975:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3086975},
  doi          = {10.1155/2019/3086975},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZW19,
  author       = {Muhua Liu and
                  Ping Zhang and
                  Qingtao Wu},
  title        = {A Novel Construction of Constrained Verifiable Random Functions},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4187892:1--4187892:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4187892},
  doi          = {10.1155/2019/4187892},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZZSH19,
  author       = {Xiaohu Liu and
                  Hengwei Zhang and
                  Yuchen Zhang and
                  Lulu Shao and
                  Jihong Han},
  title        = {Active Defense Strategy Selection Method Based on Two-Way Signaling
                  Game},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1362964:1--1362964:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1362964},
  doi          = {10.1155/2019/1362964},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZZSH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuHZZG19,
  author       = {Dan Lu and
                  Qilong Han and
                  Kejia Zhang and
                  Haitao Zhang and
                  Bisma Gull},
  title        = {A Novel Method for Location Privacy Protection in {LBS} Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1914038:1--1914038:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1914038},
  doi          = {10.1155/2019/1914038},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuHZZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuLZZLHD19,
  author       = {Jiazhong Lu and
                  Fengmao Lv and
                  Zhongliu Zhuo and
                  Xiaosong Zhang and
                  Xiaolei Liu and
                  Teng Hu and
                  Wei Deng},
  title        = {Integrating Traffics with Network Device Logs for Anomaly Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5695021:1--5695021:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5695021},
  doi          = {10.1155/2019/5695021},
  timestamp    = {Thu, 22 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/LuLZZLHD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuMLDLZZ19,
  author       = {Tianbo Lu and
                  Ting Meng and
                  Chao Li and
                  Guozhen Dong and
                  Huiyang Li and
                  Jiao Zhang and
                  Xiaoyan Zhang},
  title        = {{MSFA:} Multiple System Fingerprint Attack Scheme for IoT Anonymous
                  Communication},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9078176:1--9078176:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9078176},
  doi          = {10.1155/2019/9078176},
  timestamp    = {Tue, 11 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuMLDLZZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LuQOZ19,
  author       = {Qian Lu and
                  Haipeng Qu and
                  Yuzhan Ouyang and
                  Jiahui Zhang},
  title        = {\emph{SLFAT}: Client-Side Evil Twin Detection Approach Based on Arrival
                  Time of Special Length Frames},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2718741:1--2718741:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2718741},
  doi          = {10.1155/2019/2718741},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LuQOZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Luckner19,
  author       = {Marcin Luckner},
  title        = {Practical Web Spam Lifelong Machine Learning System with Automatic
                  Adjustment to Current Lifecycle Phase},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6587020:1--6587020:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6587020},
  doi          = {10.1155/2019/6587020},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Luckner19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaGBCXP19,
  author       = {Xin Ma and
                  Shize Guo and
                  Wei Bai and
                  Jun Chen and
                  Shiming Xia and
                  Zhisong Pan},
  title        = {An {API} Semantics-Aware Malware Detection Method Based on Deep Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1315047:1--1315047:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1315047},
  doi          = {10.1155/2019/1315047},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaGBCXP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaHHL19,
  author       = {Liran Ma and
                  Yan Huo and
                  Chunqiang Hu and
                  Wei Li},
  title        = {Security and Privacy for Smart Cyber-Physical Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7045862:1--7045862:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7045862},
  doi          = {10.1155/2019/7045862},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaHHL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaLWWLS19,
  author       = {Bin Ma and
                  Bing Li and
                  Xiao{-}Yu Wang and
                  Chunpeng Wang and
                  Jian Li and
                  Yun{-}Qing Shi},
  title        = {Code Division Multiplexing and Machine Learning Based Reversible Data
                  Hiding Scheme for Medical Image},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4732632:1--4732632:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4732632},
  doi          = {10.1155/2019/4732632},
  timestamp    = {Fri, 15 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/MaLWWLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MaWG19,
  author       = {Haiying Ma and
                  Zhanjun Wang and
                  Zhijin Guan},
  title        = {Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption
                  with User Revocation},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8093578:1--8093578:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8093578},
  doi          = {10.1155/2019/8093578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MaWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MoC19,
  author       = {Jiaqing Mo and
                  Hang Chen},
  title        = {A Lightweight Secure User Authentication and Key Agreement Protocol
                  for Wireless Sensor Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2136506:1--2136506:17},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2136506},
  doi          = {10.1155/2019/2136506},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MoC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/MunivelK19,
  author       = {E. Munivel and
                  Kannammal Annadurai},
  title        = {New Authentication Scheme to Secure against the Phishing Attack in
                  the Mobile Cloud Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5141395:1--5141395:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5141395},
  doi          = {10.1155/2019/5141395},
  timestamp    = {Mon, 08 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/MunivelK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NiakanlahijiJ19,
  author       = {Amirreza Niakanlahiji and
                  Jafar Haadi Jafarian},
  title        = {WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target
                  Defense},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2156906:1--2156906:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2156906},
  doi          = {10.1155/2019/2156906},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NiakanlahijiJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/NiuLZHJW19,
  author       = {Weina Niu and
                  Ting Li and
                  Xiaosong Zhang and
                  Teng Hu and
                  Tianyu Jiang and
                  Heng Wu},
  title        = {Using XGBoost to Discover Infected Hosts Based on {HTTP} Traffic},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2182615:1--2182615:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2182615},
  doi          = {10.1155/2019/2182615},
  timestamp    = {Thu, 11 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/NiuLZHJW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OchiengMA19,
  author       = {Nelson Ochieng and
                  Waweru Mwangi and
                  Ismail Ateya},
  title        = {Optimizing Computer Worm Detection Using Ensembles},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4656480:1--4656480:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4656480},
  doi          = {10.1155/2019/4656480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OchiengMA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/OhLL19,
  author       = {Junhyoung Oh and
                  Ukjin Lee and
                  Kyungho Lee},
  title        = {Usability Evaluation Model for Biometric System considering Privacy
                  Concern Based on {MCDM} Model},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8715264:1--8715264:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8715264},
  doi          = {10.1155/2019/8715264},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/OhLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanLZ19,
  author       = {Jiaji Pan and
                  Yi{-}Ning Liu and
                  Weiming Zhang},
  title        = {Detection of Dummy Trajectories Using Convolutional Neural Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8431074:1--8431074:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8431074},
  doi          = {10.1155/2019/8431074},
  timestamp    = {Thu, 29 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanYHZ19,
  author       = {Chen Pan and
                  Guodong Ye and
                  Xiaoling Huang and
                  Junwei Zhou},
  title        = {Novel Meaningful Image Encryption Based on Block Compressive Sensing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6572105:1--6572105:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6572105},
  doi          = {10.1155/2019/6572105},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanYHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanYSXM19,
  author       = {Zhaoqing Pan and
                  Ching{-}Nung Yang and
                  Victor S. Sheng and
                  Naixue Xiong and
                  Weizhi Meng},
  title        = {Machine Learning for Wireless Multimedia Data Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7682306:1--7682306:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7682306},
  doi          = {10.1155/2019/7682306},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanYSXM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PanZS19,
  author       = {Jiaye Pan and
                  Yi Zhuang and
                  Binglin Sun},
  title        = {Efficient and Transparent Method for Large-Scale {TLS} Traffic Analysis
                  of Browsers and Analogous Programs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8467081:1--8467081:22},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8467081},
  doi          = {10.1155/2019/8467081},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PanZS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Park19,
  author       = {Hyun{-}A. Park},
  title        = {Secure Information Sharing System for Online Patient Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7541269:1--7541269:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7541269},
  doi          = {10.1155/2019/7541269},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Park19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ParkYK19,
  author       = {Hojoong Park and
                  Yongjin Yeom and
                  Ju{-}Sung Kang},
  title        = {A Lightweight {BCH} Code Corrector of {TRNG} with Measurable Dependence},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9684239:1--9684239:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9684239},
  doi          = {10.1155/2019/9684239},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ParkYK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PedoneLV19,
  author       = {Ignazio Pedone and
                  Antonio Lioy and
                  Fulvio Valenza},
  title        = {Towards an Efficient Management and Orchestration Framework for Virtual
                  Network Security Functions},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2425983:1--2425983:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2425983},
  doi          = {10.1155/2019/2425983},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PedoneLV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Pham-NguyenT19,
  author       = {Hoang{-}Nam Pham{-}Nguyen and
                  Quang Tran Minh},
  title        = {Dynamic Resource Provisioning on Fog Landscapes},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1798391:1--1798391:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1798391},
  doi          = {10.1155/2019/1798391},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Pham-NguyenT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PhiriK19,
  author       = {Kenan Kingsley Phiri and
                  Hyunsung Kim},
  title        = {Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5134534:1--5134534:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5134534},
  doi          = {10.1155/2019/5134534},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PhiriK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/PhuDQTB19,
  author       = {Tran Nghi Phu and
                  Kien Hoang Dang and
                  Dung Ngo Quoc and
                  Nguyen Dai Tho and
                  Nguyen Ngoc Binh},
  title        = {A Novel Framework to Classify Malware in {MIPS} Architecture-Based
                  IoT Devices},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4073940:1--4073940:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4073940},
  doi          = {10.1155/2019/4073940},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/PhuDQTB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QiWH19,
  author       = {Ping Qi and
                  Fucheng Wang and
                  Shu Hong},
  title        = {A Novel Trust Model Based on Node Recovery Technique for {WSN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2545129:1--2545129:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2545129},
  doi          = {10.1155/2019/2545129},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QiWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Qin19,
  author       = {Baodong Qin},
  title        = {Tightly Secure Lossy Trapdoor Functions: Constructions and Applications},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3636759:1--3636759:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3636759},
  doi          = {10.1155/2019/3636759},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Qin19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QuD19,
  author       = {Zhen Qu and
                  Ivan B. Djordjevic},
  title        = {Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates
                  via Commercial Off-the-Shelf Telecommunication Equipment"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1484593:1},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1484593},
  doi          = {10.1155/2019/1484593},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QuD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/QuWPZ19,
  author       = {Quanbo Qu and
                  Baocang Wang and
                  Yuan Ping and
                  Zhili Zhang},
  title        = {Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption
                  Scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8319508:1--8319508:6},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8319508},
  doi          = {10.1155/2019/8319508},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/QuWPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RantosDKIPF19,
  author       = {Konstantinos Rantos and
                  George Drosatos and
                  Antonios Kritsas and
                  Christos Ilioudis and
                  Alexandros Papanikolaou and
                  Adam P. Filippidis},
  title        = {A Blockchain-Based Platform for Consent Management of Personal Data
                  Processing in the IoT Ecosystem},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1431578:1--1431578:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1431578},
  doi          = {10.1155/2019/1431578},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RantosDKIPF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenGWYXJ19,
  author       = {Jiadong Ren and
                  Jiawei Guo and
                  Qian Wang and
                  Huang Yuan and
                  Hao Xiaobing and
                  Hu Jingjing},
  title        = {Building an Effective Intrusion Detection System by Using Hybrid Data
                  Optimization Based on Machine Learning Algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7130868:1--7130868:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7130868},
  doi          = {10.1155/2019/7130868},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/RenGWYXJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RenZLWY19,
  author       = {Jiadong Ren and
                  Zhangqi Zheng and
                  Qian Liu and
                  Zhiyao Wei and
                  Huaizhi Yan},
  title        = {A Buffer Overflow Prediction Approach Based on Software Metrics and
                  Machine Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8391425:1--8391425:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8391425},
  doi          = {10.1155/2019/8391425},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/RenZLWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ReyYK19,
  author       = {{\'{A}}ngel Mart{\'{\i}}n del Rey and
                  Lu{-}Xing Yang and
                  Vasileios Karyotis},
  title        = {Mathematical Models for Malware Propagation},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6046353:1--6046353:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6046353},
  doi          = {10.1155/2019/6046353},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ReyYK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/RiziDb19,
  author       = {A. Karimi Rizi and
                  Mohammad Naderi Dehkordi and
                  N. Nemat bakhsh},
  title        = {{SNI:} Supervised Anonymization Technique to Publish Social Networks
                  Having Multiple Sensitive Labels},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8171263:1--8171263:23},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8171263},
  doi          = {10.1155/2019/8171263},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/RiziDb19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SantiniGBC19,
  author       = {Paolo Santini and
                  Giuseppe Gottardi and
                  Marco Baldi and
                  Franco Chiaraluce},
  title        = {A Data-Driven Approach to Cyber Risk Assessment},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6716918:1--6716918:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6716918},
  doi          = {10.1155/2019/6716918},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SantiniGBC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SchneiderBSUK19,
  author       = {Daniel Schneider and
                  Jens Braband and
                  Erwin Schoitsch and
                  Sascha Uhrig and
                  Stefan Katzenbeisser},
  title        = {Safety and Security Coengineering in Embedded Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5381856:1--5381856:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5381856},
  doi          = {10.1155/2019/5381856},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SchneiderBSUK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShabbirSRA19,
  author       = {Aysha Shabbir and
                  Maryam Shabbir and
                  Muhammad Rizwan and
                  Fahad Ahmad},
  title        = {Ensuring the Confidentiality of Nuclear Information at Cloud Using
                  Modular Encryption Standard},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2509898:1--2509898:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2509898},
  doi          = {10.1155/2019/2509898},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShahzadMR19,
  author       = {Imran Shahzad and
                  Qaiser Mushtaq and
                  Abdul Razaq},
  title        = {Construction of New S-Box Using Action of Quotient of the Modular
                  Group for Multimedia Security},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2847801:1--2847801:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2847801},
  doi          = {10.1155/2019/2847801},
  timestamp    = {Thu, 03 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ShahzadMR19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShangGCHZ19,
  author       = {Wenli Shang and
                  Tianyu Gong and
                  Chunyu Chen and
                  Jing Hou and
                  Peng Zeng},
  title        = {Information Security Risk Assessment Method for Ship Control System
                  Based on Fuzzy Sets and Attack Trees},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3574675:1--3574675:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3574675},
  doi          = {10.1155/2019/3574675},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShangGCHZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShangWYL19,
  author       = {Fute Shang and
                  Buhong Wang and
                  Fuhu Yan and
                  Tengyao Li},
  title        = {Multidevice False Data Injection Attack Models of {ADS-B} Multilateration
                  Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8936784:1--8936784:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8936784},
  doi          = {10.1155/2019/8936784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShangWYL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenQM19,
  author       = {Wenting Shen and
                  Jing Qin and
                  Jixin Ma},
  title        = {A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy
                  Update and Workload-Based Payment},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8275074:1--8275074:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8275074},
  doi          = {10.1155/2019/8275074},
  timestamp    = {Mon, 12 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenQM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenZC19,
  author       = {Zhidong Shen and
                  Yuhao Zhang and
                  Weiying Chen},
  title        = {A Bayesian Classification Intrusion Detection Method Based on the
                  Fusion of {PCA} and {LDA}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6346708:1--6346708:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6346708},
  doi          = {10.1155/2019/6346708},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShenZWY19,
  author       = {Yanping Shen and
                  Kangfeng Zheng and
                  Chunhua Wu and
                  Yixian Yang},
  title        = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion
                  Detection},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1283495:1--1283495:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1283495},
  doi          = {10.1155/2019/1283495},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShenZWY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ShuaiLYX19,
  author       = {Mengxia Shuai and
                  Bin Liu and
                  Nenghai Yu and
                  Ling Xiong},
  title        = {Lightweight and Secure Three-Factor Authentication Scheme for Remote
                  Patient Monitoring Using On-Body Wireless Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8145087:1--8145087:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8145087},
  doi          = {10.1155/2019/8145087},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ShuaiLYX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SongTSG19,
  author       = {Haitao Song and
                  Guangming Tang and
                  Yifeng Sun and
                  Zhanzhan Gao},
  title        = {Security Measure for Image Steganography Based on High Dimensional
                  {KL} Divergence},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3546367:1--3546367:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3546367},
  doi          = {10.1155/2019/3546367},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SongTSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SongWWW19,
  author       = {Yujiao Song and
                  Hao Wang and
                  Xiaochao Wei and
                  Lei Wu},
  title        = {Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation
                  and Its Application in Industrial Cloud},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3249726:1--3249726:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3249726},
  doi          = {10.1155/2019/3249726},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SongWWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SongYHY19,
  author       = {Baek Kyung Song and
                  Joon Soo Yoo and
                  Miyeon Hong and
                  Ji Won Yoon},
  title        = {A Bitwise Design and Implementation for Privacy-Preserving Data Mining:
                  From Atomic Operations to Advanced Algorithms},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3648671:1--3648671:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3648671},
  doi          = {10.1155/2019/3648671},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SongYHY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SourekZ19,
  author       = {Gustav Sourek and
                  Filip Zelezn{\'{y}}},
  title        = {Efficient Extraction of Network Event Types from NetFlows},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8954914:1--8954914:18},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8954914},
  doi          = {10.1155/2019/8954914},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/SourekZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunHSZD19,
  author       = {Jian Sun and
                  Guanhua Huang and
                  Arun Kumar Sangaiah and
                  Guangyang Zhu and
                  Xiaojiang Du},
  title        = {Towards Supporting Security and Privacy for Social IoT Applications:
                  {A} Network Virtualization Perspective},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4074272:1--4074272:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4074272},
  doi          = {10.1155/2019/4074272},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunHSZD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SunZCYSJ19,
  author       = {Wei Sun and
                  Hao Zhang and
                  Li{-}jun Cai and
                  Ai{-}min Yu and
                  Jinqiao Shi and
                  Jian{-}Guo Jiang},
  title        = {A Novel Device Identification Method Based on Passive Measurement},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6045251:1--6045251:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6045251},
  doi          = {10.1155/2019/6045251},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SunZCYSJ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TangLLHGX19,
  author       = {Junwei Tang and
                  Jingjing Li and
                  Ruixuan Li and
                  Hongmu Han and
                  Xiwu Gu and
                  Zhiyong Xu},
  title        = {SSLDetecter: Detecting {SSL} Security Vulnerabilities of Android Applications
                  Based on a Novel Automatic Traversal Method},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7193684:1--7193684:20},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7193684},
  doi          = {10.1155/2019/7193684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TangLLHGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TangYXYZ19,
  author       = {Zhenjun Tang and
                  Ye Yang and
                  Shijie Xu and
                  Chunqiang Yu and
                  Xianquan Zhang},
  title        = {Image Encryption with Double Spiral Scans and Chaotic Maps},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8694678:1--8694678:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8694678},
  doi          = {10.1155/2019/8694678},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TangYXYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ThwinV19,
  author       = {Thein Than Thwin and
                  Sangsuree Vasupongayya},
  title        = {Blockchain-Based Access Control Model to Preserve Privacy for Personal
                  Health Record Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8315614:1--8315614:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8315614},
  doi          = {10.1155/2019/8315614},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ThwinV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Trinh19,
  author       = {Viet Cuong Trinh},
  title        = {A Short Server-Aided Certificateless Aggregate Multisignature Scheme
                  in the Standard Model},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3424890:1--3424890:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3424890},
  doi          = {10.1155/2019/3424890},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Trinh19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TruongTD19,
  author       = {Toan{-}Thinh Truong and
                  Minh{-}Triet Tran and
                  Anh Duc Duong},
  title        = {Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server
                  Environment},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4250743:1--4250743:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4250743},
  doi          = {10.1155/2019/4250743},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/TruongTD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UrreaM19,
  author       = {Claudio Urrea and
                  Claudio Morales},
  title        = {Enhancing Modbus-RTU Communications for Smart Metering in Building
                  Energy Management Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7010717:1--7010717:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7010717},
  doi          = {10.1155/2019/7010717},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/UrreaM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UstimenkoRWPZ19,
  author       = {Vasyl Ustimenko and
                  Urszula Romanczuk{-}Polubiec and
                  Aneta Wr{\'{o}}blewska and
                  Monika Katarzyna Polak and
                  Eustrat Zhupa},
  title        = {On the Constructions of New Symmetric Ciphers Based on Nonbijective
                  Multivariate Maps of Prescribed Degree},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2137561:1--2137561:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2137561},
  doi          = {10.1155/2019/2137561},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/UstimenkoRWPZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Wang19,
  author       = {Jizhi Wang},
  title        = {The Prediction of Serial Number in OpenSSL's {X.509} Certificate},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6013846:1--6013846:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6013846},
  doi          = {10.1155/2019/6013846},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Wang19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangHYZC19,
  author       = {JingJing Wang and
                  Yiliang Han and
                  Xiaoyuan Yang and
                  Tanping Zhou and
                  Jiayong Chen},
  title        = {A New Group Location Privacy-Preserving Method Based on Distributed
                  Architecture in {LBS}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2414687:1--2414687:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2414687},
  doi          = {10.1155/2019/2414687},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangHYZC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLSSW19,
  author       = {Ping Wang and
                  Bin Li and
                  Hongjin Shi and
                  Yaosheng Shen and
                  Ding Wang},
  title        = {Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled
                  Devices in Cloud Computing Environments},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2516963:1--2516963:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2516963},
  doi          = {10.1155/2019/2516963},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLSSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangLZLW19,
  author       = {Jun Wang and
                  Feixiang Luo and
                  Zequan Zhou and
                  Xiling Luo and
                  Zhen Wang},
  title        = {Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5175076:1--5175076:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5175076},
  doi          = {10.1155/2019/5175076},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangLZLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangSNLGNZ19,
  author       = {Xu Wang and
                  Bo Song and
                  Wei Ni and
                  Ren Ping Liu and
                  Y. Jay Guo and
                  Xinxin Niu and
                  Kangfeng Zheng},
  title        = {Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale
                  Directed Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1657164:1--1657164:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1657164},
  doi          = {10.1155/2019/1657164},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangSNLGNZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWC19,
  author       = {Baosheng Wang and
                  Yi Wang and
                  Rongmao Chen},
  title        = {A Practical Authentication Framework for VANETs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4752612:1--4752612:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4752612},
  doi          = {10.1155/2019/4752612},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWWG19,
  author       = {Qihua Wang and
                  Huaqun Wang and
                  Yufeng Wang and
                  Rui Guo},
  title        = {A Distributed Access Control with Outsourced Computation in Fog Computing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6782753:1--6782753:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6782753},
  doi          = {10.1155/2019/6782753},
  timestamp    = {Thu, 29 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WangWWG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangWWTZ19,
  author       = {Yubiao Wang and
                  Junhao Wen and
                  Xibin Wang and
                  Bamei Tao and
                  Wei Zhou},
  title        = {A Cloud Service Trust Evaluation Model Based on Combining Weights
                  and Gray Correlation Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2437062:1--2437062:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2437062},
  doi          = {10.1155/2019/2437062},
  timestamp    = {Fri, 09 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangWWTZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangXG19,
  author       = {Feifei Wang and
                  Guoai Xu and
                  Lize Gu},
  title        = {A Secure and Efficient ECC-Based Anonymous Authentication Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4656281:1--4656281:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4656281},
  doi          = {10.1155/2019/4656281},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangXG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangXWP19,
  author       = {Feifei Wang and
                  Guoai Xu and
                  Chenyu Wang and
                  Junhao Peng},
  title        = {A Provably Secure Biometrics-Based Authentication Scheme for Multiserver
                  Environment},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2838615:1--2838615:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2838615},
  doi          = {10.1155/2019/2838615},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangXWP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangYQZYZG19,
  author       = {Tao Wang and
                  Bo Yang and
                  Guoyong Qiu and
                  Lina Zhang and
                  Yong Yu and
                  Yanwei Zhou and
                  Juncai Guo},
  title        = {An Approach Enabling Various Queries on Encrypted Industrial Data
                  Stream},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6293970:1--6293970:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6293970},
  doi          = {10.1155/2019/6293970},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangYQZYZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZCL19,
  author       = {Dong Wang and
                  Xiaosong Zhang and
                  Ting Chen and
                  Jingwei Li},
  title        = {Discovering Vulnerabilities in {COTS} IoT Devices through Blackbox
                  Fuzzing Web Management Interface},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5076324:1--5076324:19},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5076324},
  doi          = {10.1155/2019/5076324},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WangZLZ19,
  author       = {Weiping Wang and
                  Feng Zhang and
                  Xi Luo and
                  Shigeng Zhang},
  title        = {{PDRCNN:} Precise Phishing Detection with Recurrent Convolutional
                  Neural Networks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2595794:1--2595794:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2595794},
  doi          = {10.1155/2019/2595794},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WangZLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuSHJL19,
  author       = {Yixin Wu and
                  Yuqiang Sun and
                  Cheng Huang and
                  Peng Jia and
                  Luping Liu},
  title        = {Session-Based Webshell Detection Using Machine Learning in Web Logs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3093809:1--3093809:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3093809},
  doi          = {10.1155/2019/3093809},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/WuSHJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WuWZH19,
  author       = {Libing Wu and
                  Jing Wang and
                  Sherali Zeadally and
                  Debiao He},
  title        = {Anonymous and Efficient Message Authentication Scheme for Smart Grid},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4836016:1--4836016:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4836016},
  doi          = {10.1155/2019/4836016},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WuWZH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiaFZWS19,
  author       = {Zhuoqun Xia and
                  Zhenwei Fang and
                  Fengfei Zou and
                  Jin Wang and
                  Arun Kumar Sangaiah},
  title        = {Research on Defensive Strategy of Real-Time Price Attack Based on
                  Multiperson Zero-Determinant},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6956072:1--6956072:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6956072},
  doi          = {10.1155/2019/6956072},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiaFZWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XieZLLC19,
  author       = {Yong Xie and
                  Songsong Zhang and
                  Xiang Li and
                  Yanggui Li and
                  Yuan Chai},
  title        = {\emph{CasCP}: Efficient and Secure Certificateless Authentication
                  Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5860286:1--5860286:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5860286},
  doi          = {10.1155/2019/5860286},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XieZLLC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XiongZLYD19,
  author       = {Yinqiao Xiong and
                  Peidong Zhu and
                  Zhizhu Liu and
                  Hui Yin and
                  Tiantian Deng},
  title        = {{EPLC:} An Efficient Privacy-Preserving Line-Loss Calculation Scheme
                  for Residential Areas of Smart Grid},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9637578:1--9637578:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9637578},
  doi          = {10.1155/2019/9637578},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XiongZLYD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuH19,
  author       = {Ming Xu and
                  Weili Han},
  title        = {An Explainable Password Strength Meter Addon via Textual Pattern Recognition},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5184643:1--5184643:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5184643},
  doi          = {10.1155/2019/5184643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuH19a,
  author       = {Yibin Xu and
                  Yangyu Huang},
  title        = {MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation
                  Strengthened Fast-Confirm Blockchain Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3674274:1--3674274:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3674274},
  doi          = {10.1155/2019/3674274},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuH19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuS19,
  author       = {Dawen Xu and
                  Shubing Su},
  title        = {Separable Reversible Data Hiding in Encrypted Images Based on Difference
                  Histogram Modification},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7480147:1--7480147:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7480147},
  doi          = {10.1155/2019/7480147},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuYB19,
  author       = {Yahong Xu and
                  Geng Yang and
                  Shuangjie Bai},
  title        = {Laplace Input and Output Perturbation for Differentially Private Principal
                  Components Analysis},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9169802:1--9169802:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9169802},
  doi          = {10.1155/2019/9169802},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XuYB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XuZYM19,
  author       = {Haiyan Xu and
                  Zhaoxin Zhang and
                  Jianen Yan and
                  Xin Ma},
  title        = {Evaluating the Impact of Name Resolution Dependence on the {DNS}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8565397:1--8565397:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8565397},
  doi          = {10.1155/2019/8565397},
  timestamp    = {Thu, 16 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/XuZYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/XueYLW19,
  author       = {Mingfu Xue and
                  Chengxiang Yuan and
                  Zhe Liu and
                  Jian Wang},
  title        = {{SSL:} {A} Novel Image Hashing Technique Using {SIFT} Keypoints with
                  Saliency Detection and {LBP} Feature Extraction against Combinatorial
                  Manipulations},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9795621:1--9795621:18},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9795621},
  doi          = {10.1155/2019/9795621},
  timestamp    = {Tue, 11 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/XueYLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YamamotoO19,
  author       = {Dan Yamamoto and
                  Wakaha Ogata},
  title        = {Multidivisible Online/Offline Cryptography and Its Application to
                  Signcryptions},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1042649:1--1042649:21},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1042649},
  doi          = {10.1155/2019/1042649},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YamamotoO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YanWXWL19,
  author       = {Yunxue Yan and
                  Lei Wu and
                  Wenyu Xu and
                  Hao Wang and
                  Zhaoman Liu},
  title        = {Integrity Audit of Shared Cloud Data with Identity Tracking},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1354346:1--1354346:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1354346},
  doi          = {10.1155/2019/1354346},
  timestamp    = {Tue, 05 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YanWXWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangWPS19,
  author       = {Laurence T. Yang and
                  Wei Wang and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Willy Susilo},
  title        = {Security, Privacy, and Trust for Cyberphysical-Social Systems},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2964673:1--2964673:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2964673},
  doi          = {10.1155/2019/2964673},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangWPS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YangZGZYM19,
  author       = {Chao Yang and
                  Junwei Zhang and
                  Jingjing Guo and
                  Yu Zheng and
                  Li Yang and
                  Jianfeng Ma},
  title        = {Fingerprint Protected Password Authentication Protocol},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1694702:1--1694702:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1694702},
  doi          = {10.1155/2019/1694702},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YangZGZYM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YinCWWW19,
  author       = {Mingyong Yin and
                  Xingshu Chen and
                  Qixu Wang and
                  Wei Wang and
                  Yulong Wang},
  title        = {Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of
                  Medical IoT},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6803801:1--6803801:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6803801},
  doi          = {10.1155/2019/6803801},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YinCWWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuCC19,
  author       = {Chuan Yu and
                  Shuhui Chen and
                  Zhiping Cai},
  title        = {{LTE} Phone Number Catcher: {A} Practical Attack against Mobile Privacy},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7425235:1--7425235:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7425235},
  doi          = {10.1155/2019/7425235},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuCC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuFL19,
  author       = {Bin Yu and
                  Zhengxin Fu and
                  Sijia Liu},
  title        = {A Novel Three-Layer {QR} Code Based on Secret Sharing Scheme and Liner
                  Code},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {7937816:1--7937816:13},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/7937816},
  doi          = {10.1155/2019/7937816},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuFL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuLQ19,
  author       = {Haisheng Yu and
                  Keqiu Li and
                  Heng Qi},
  title        = {An Active Controller Selection Scheme for Minimizing Packet-In Processing
                  Latency in {SDN}},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1949343:1--1949343:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1949343},
  doi          = {10.1155/2019/1949343},
  timestamp    = {Fri, 11 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuLQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanWYZ19,
  author       = {Ye Yuan and
                  Liji Wu and
                  Yijun Yang and
                  Xiangmin Zhang},
  title        = {Erratum to "A Novel Multiple-Bits Collision Attack Based on Double
                  Detection with Error-Tolerant Mechanism"},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5742308:1--5742308:2},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5742308},
  doi          = {10.1155/2019/5742308},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YuanWYZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZengWCZW19,
  author       = {Jianping Zeng and
                  Shuang Wu and
                  Yanyu Chen and
                  Rui Zeng and
                  Chengrong Wu},
  title        = {Survey of Attack Graph Analysis Methods from the Perspective of Data
                  and Knowledge Processing},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2031063:1--2031063:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2031063},
  doi          = {10.1155/2019/2031063},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZengWCZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhanW19,
  author       = {Yu Zhan and
                  Baocang Wang},
  title        = {Cryptanalysis of a Certificateless Aggregate Signature Scheme for
                  Healthcare Wireless Sensor Network},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6059834:1--6059834:5},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6059834},
  doi          = {10.1155/2019/6059834},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhanW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangFDLL19,
  author       = {Zhuo Zhang and
                  Guangyuan Fu and
                  Fuqiang Di and
                  Changlong Li and
                  Jia Liu},
  title        = {Generative Reversible Data Hiding by Image-to-Image Translation via
                  GANs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4932782:1--4932782:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4932782},
  doi          = {10.1155/2019/4932782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangFDLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangGL19,
  author       = {Han Zhang and
                  Yuanbo Guo and
                  Tao Li},
  title        = {Multifeature Named Entity Recognition in Information Security Based
                  on Adversarial Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6417407:1--6417407:9},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6417407},
  doi          = {10.1155/2019/6417407},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangGL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangL19,
  author       = {Yuchen Zhang and
                  Jing Liu},
  title        = {Optimal Decision-Making Approach for Cyber Security Defense Using
                  Game Theory and Intelligent Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {3038586:1--3038586:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/3038586},
  doi          = {10.1155/2019/3038586},
  timestamp    = {Fri, 23 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLL19,
  author       = {Ping Zhang and
                  Yamin Li and
                  Muhua Liu},
  title        = {An Indistinguishably Secure Function Encryption Scheme},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8567534:1--8567534:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8567534},
  doi          = {10.1155/2019/8567534},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLLLXJL19,
  author       = {Daode Zhang and
                  Jie Li and
                  Bao Li and
                  Xianhui Lu and
                  Haiyang Xue and
                  Dingding Jia and
                  Yamin Liu},
  title        = {Deterministic Identity-Based Encryption from Lattice-Based Programmable
                  Hash Functions with High Min-Entropy},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1816393:1--1816393:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1816393},
  doi          = {10.1155/2019/1816393},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLLLXJL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLMHFW19,
  author       = {Lin Zhang and
                  Li Li and
                  Eric Medwedeff and
                  Haiping Huang and
                  Xiong Fu and
                  Ruchuan Wang},
  title        = {Privacy Protection of Social Networks Based on Classified Attribute
                  Encryption},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9108759:1--9108759:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9108759},
  doi          = {10.1155/2019/9108759},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLMHFW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangLW19,
  author       = {Yu Zhang and
                  Yin Li and
                  Yifan Wang},
  title        = {Secure and Efficient Searchable Public Key Encryption for Resource
                  Constrained Environment Based on Pairings under Prime Order Group},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {5280806:1--5280806:14},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/5280806},
  doi          = {10.1155/2019/5280806},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYCZ19,
  author       = {Shuaiwei Zhang and
                  Xiaoyuan Yang and
                  Lin Chen and
                  Weidong Zhong},
  title        = {A Highly Effective Data Preprocessing in Side-Channel Attack Using
                  Empirical Mode Decomposition},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6124165:1--6124165:10},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6124165},
  doi          = {10.1155/2019/6124165},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYCZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYZLQP19,
  author       = {Xuyun Zhang and
                  Yuan Yuan and
                  Zhili Zhou and
                  Shancang Li and
                  Lianyong Qi and
                  Deepak Puthal},
  title        = {Intrusion Detection and Prevention in Cloud, Fog, and Internet of
                  Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4529757:1--4529757:4},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4529757},
  doi          = {10.1155/2019/4529757},
  timestamp    = {Thu, 23 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYZLQP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZLCL19,
  author       = {En Zhang and
                  Jun{-}Zhe Zhu and
                  Gong{-}Li Li and
                  Jian Chang and
                  Yu Li},
  title        = {Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on
                  Reputation},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {6989383:1--6989383:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/6989383},
  doi          = {10.1155/2019/6989383},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZLCL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangZZSG19,
  author       = {Meiyu Zhang and
                  Qianying Zhang and
                  Shijun Zhao and
                  Zhiping Shi and
                  Yong Guan},
  title        = {SoftME: {A} Software-Based Memory Protection Approach for {TEE} System
                  to Resist Physical Attacks},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8690853:1--8690853:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8690853},
  doi          = {10.1155/2019/8690853},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangZZSG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoBFXY19,
  author       = {Yuntao Zhao and
                  Bo Bo and
                  Yongxin Feng and
                  ChunYu Xu and
                  Bo Yu},
  title        = {A Feature Extraction Method of Hybrid Gram for Malicious Behavior
                  Based on Machine Learning},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {2674684:1--2674684:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/2674684},
  doi          = {10.1155/2019/2674684},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoBFXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoCSCS19,
  author       = {Shuang Zhao and
                  Shuhui Chen and
                  Yipin Sun and
                  Zhiping Cai and
                  Jinshu Su},
  title        = {Identifying Known and Unknown Mobile Application Traffic Using a Multilevel
                  Classifier},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9595081:1--9595081:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9595081},
  doi          = {10.1155/2019/9595081},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoCSCS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoLYC19,
  author       = {Yi Zhao and
                  Kaitai Liang and
                  Bo Yang and
                  Liqun Chen},
  title        = {{CCA} Secure Public Key Encryption against After-the-Fact Leakage
                  without {NIZK} Proofs},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8357241:1--8357241:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8357241},
  doi          = {10.1155/2019/8357241},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoLYC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoXBF19,
  author       = {Yuntao Zhao and
                  ChunYu Xu and
                  Bo Bo and
                  Yongxin Feng},
  title        = {MalDeep: {A} Deep Learning Classification Framework against Malware
                  Variants Based on Texture Visualization},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4895984:1--4895984:11},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4895984},
  doi          = {10.1155/2019/4895984},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoXBF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhaoYZQ19,
  author       = {Qinglan Zhao and
                  Shuntong Yang and
                  Dong Zheng and
                  Baodong Qin},
  title        = {A {QR} Code Secret Hiding Scheme against Contrast Analysis Attack
                  for the Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {8105787:1--8105787:8},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/8105787},
  doi          = {10.1155/2019/8105787},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhaoYZQ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhouWZ19,
  author       = {Yu Zhou and
                  Yongzhuang Wei and
                  Fengrong Zhang},
  title        = {Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption
                  Algorithm for Internet of Things},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {1348639:1--1348639:15},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/1348639},
  doi          = {10.1155/2019/1348639},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhouWZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuSQM19,
  author       = {Binrui Zhu and
                  Jiameng Sun and
                  Jing Qin and
                  Jixin Ma},
  title        = {A Secure Data Sharing Scheme with Designated Server},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {4268731:1--4268731:16},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/4268731},
  doi          = {10.1155/2019/4268731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuSQM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhuXZY19,
  author       = {Rui Zhu and
                  Li Xu and
                  Yali Zeng and
                  Xun Yi},
  title        = {Lightweight Privacy Preservation for Securing Large-Scale Database-Driven
                  Cognitive Radio Networks with Location Verification},
  journal      = {Secur. Commun. Networks},
  volume       = {2019},
  pages        = {9126376:1--9126376:12},
  year         = {2019},
  url          = {https://doi.org/10.1155/2019/9126376},
  doi          = {10.1155/2019/9126376},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhuXZY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics