Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/scn/scn2019.bht:"
@article{DBLP:journals/scn/AbbasiXAL19, author = {Rashid Abbasi and Lixiang Xu and Farhan Amin and Bin Luo}, title = {Efficient Lossless Compression Based Reversible Data Hiding Using Multilayered n-Bit Localization}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8981240:1--8981240:13}, year = {2019}, url = {https://doi.org/10.1155/2019/8981240}, doi = {10.1155/2019/8981240}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AbbasiXAL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AbideenSE19, author = {Muhammad Zain ul Abideen and Shahzad Saleem and Madiha Ejaz}, title = {{VPN} Traffic Detection in SSL-Protected Channel}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7924690:1--7924690:17}, year = {2019}, url = {https://doi.org/10.1155/2019/7924690}, doi = {10.1155/2019/7924690}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/AbideenSE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Abu-ZantY19, author = {Mahmoud Abu{-}Zant and Adwan Yasin}, title = {Avoiding and Isolating Flooding Attack by Enhancing {AODV} {MANET} Protocol (AIF{\_}AODV)}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8249108:1--8249108:12}, year = {2019}, url = {https://doi.org/10.1155/2019/8249108}, doi = {10.1155/2019/8249108}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Abu-ZantY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AcaraliRKZ19, author = {Dilara Acarali and Muttukrishnan Rajarajan and Nikos Komninos and Bruno Bogaz Zarpel{\~{a}}o}, title = {Modelling the Spread of Botnet Malware in IoT-Based Wireless Sensor Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3745619:1--3745619:13}, year = {2019}, url = {https://doi.org/10.1155/2019/3745619}, doi = {10.1155/2019/3745619}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AcaraliRKZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AdebayoA19, author = {Olawale Surajudeen Adebayo and Normaziah Abdul Aziz}, title = {Improved Malware Detection Model with Apriori Association Rule and Particle Swarm Optimization}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2850932:1--2850932:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2850932}, doi = {10.1155/2019/2850932}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AdebayoA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AkpinarO19, author = {Kevser Ovaz Akpinar and Ibrahim {\"{O}}z{\c{c}}elik}, title = {Corrigendum to "Development of the {ECAT} Preprocessor with the Trust Communication Approach"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7457154:1}, year = {2019}, url = {https://doi.org/10.1155/2019/7457154}, doi = {10.1155/2019/7457154}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AkpinarO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-DailamiRBZ19, author = {Abdulrahman Al{-}Dailami and Chang Ruan and Zhihong Bao and Tao Zhang}, title = {QoS3: Secure Caching in {HTTPS} Based on Fine-Grained Trust Delegation}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3107543:1--3107543:16}, year = {2019}, url = {https://doi.org/10.1155/2019/3107543}, doi = {10.1155/2019/3107543}, timestamp = {Tue, 30 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/Al-DailamiRBZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Al-ZubaidieZZ19, author = {Mishall Al{-}Zubaidie and Zhongwei Zhang and Ji Zhang}, title = {{RAMHU:} {A} New Robust Lightweight Scheme for Mutual Users Authentication in Healthcare Applications}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3263902:1--3263902:26}, year = {2019}, url = {https://doi.org/10.1155/2019/3263902}, doi = {10.1155/2019/3263902}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Al-ZubaidieZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Albahar19, author = {Marwan Ali Albahar}, title = {Recurrent Neural Network Model Based on a New Regularization Technique for Real-Time Intrusion Detection in {SDN} Environments}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8939041:1--8939041:9}, year = {2019}, url = {https://doi.org/10.1155/2019/8939041}, doi = {10.1155/2019/8939041}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Albahar19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AlbakriHS19, author = {Ashwag Albakri and Lein Harn and Sejun Song}, title = {Hierarchical Key Management Scheme with Probabilistic Security in a Wireless Sensor Network {(WSN)}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3950129:1--3950129:11}, year = {2019}, url = {https://doi.org/10.1155/2019/3950129}, doi = {10.1155/2019/3950129}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AlbakriHS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AnginBR19, author = {Pelin Angin and Bharat K. Bhargava and Rohit Ranchal}, title = {Big Data Analytics for Cyber Security}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4109836:1--4109836:2}, year = {2019}, url = {https://doi.org/10.1155/2019/4109836}, doi = {10.1155/2019/4109836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AnginBR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/AsifB19, author = {Rameez Asif and William J. Buchanan}, title = {Corrigendum to "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2637028:1}, year = {2019}, url = {https://doi.org/10.1155/2019/2637028}, doi = {10.1155/2019/2637028}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/AsifB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaiPGC19, author = {Wei Bai and Zhisong Pan and Shize Guo and Zhe Chen}, title = {{RMMDI:} {A} Novel Framework for Role Mining Based on the Multi-Domain Information}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8085303:1--8085303:15}, year = {2019}, url = {https://doi.org/10.1155/2019/8085303}, doi = {10.1155/2019/8085303}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaiPGC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BaiSM19, author = {Jinrong Bai and Qibin Shi and Shiguang Mu}, title = {A Malware and Variant Detection Method Using Function Call Graph Isomorphism}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1043794:1--1043794:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1043794}, doi = {10.1155/2019/1043794}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BaiSM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BangY19, author = {Woorim Bang and Ji Won Yoon}, title = {Power Grid Estimation Using Electric Network Frequency Signals}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1982168:1--1982168:11}, year = {2019}, url = {https://doi.org/10.1155/2019/1982168}, doi = {10.1155/2019/1982168}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BangY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BartlettDMSSW19, author = {Harry Bartlett and Ed Dawson and Hassan Qahur Al Mahri and Md. Iftekhar Salam and Leonie Simpson and Kenneth Koon{-}Ho Wong}, title = {Random Fault Attacks on a Class of Stream Ciphers}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1680263:1--1680263:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1680263}, doi = {10.1155/2019/1680263}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/BartlettDMSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/BenishaR19, author = {R. B. Benisha and S. Raja Ratna}, title = {Design of Intrusion Detection and Prevention in {SCADA} System for the Detection of Bias Injection Attacks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1082485:1--1082485:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1082485}, doi = {10.1155/2019/1082485}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/BenishaR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Byun19, author = {Jin Wook Byun}, title = {A Generic Multifactor Authenticated Key Exchange with Physical Unclonable Function}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5935292:1--5935292:15}, year = {2019}, url = {https://doi.org/10.1155/2019/5935292}, doi = {10.1155/2019/5935292}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Byun19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CabajGMNZ19, author = {Krzysztof Cabaj and Marcin Gregorczyk and Wojciech Mazurczyk and Piotr Nowakowski and Piotr Z{\'{o}}rawski}, title = {Network Threats Mitigation Using Software-Defined Networking for the 5G Internet of Radio Light System}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4930908:1--4930908:22}, year = {2019}, url = {https://doi.org/10.1155/2019/4930908}, doi = {10.1155/2019/4930908}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CabajGMNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaiJZZWLX19, author = {Jie Cai and Han Jiang and Pingyuan Zhang and Zhihua Zheng and Hao Wang and Guangshi L{\"{u}} and Qiuliang Xu}, title = {ID-Based Strong Designated Verifier Signature over {\(\mathscr{R}\)}-SIS Assumption}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9678095:1--9678095:8}, year = {2019}, url = {https://doi.org/10.1155/2019/9678095}, doi = {10.1155/2019/9678095}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaiJZZWLX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaproluRP19, author = {Maurantonio Caprolu and Simone Raponi and Roberto Di Pietro}, title = {{FORTRESS:} An Efficient and Distributed Firewall for Stateful Data Plane {SDN}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6874592:1--6874592:16}, year = {2019}, url = {https://doi.org/10.1155/2019/6874592}, doi = {10.1155/2019/6874592}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaproluRP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CeponisG19, author = {Dainius Ceponis and Nikolaj Goranin}, title = {Evaluation of Deep Learning Methods Efficiency for Malicious and Benign System Calls Classification on the {AWSCTD}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2317976:1--2317976:12}, year = {2019}, url = {https://doi.org/10.1155/2019/2317976}, doi = {10.1155/2019/2317976}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/CeponisG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenC19, author = {Hefeng Chen and Chin{-}Chen Chang}, title = {A Novel (t, n) Secret Sharing Scheme Based upon Euler's Theorem}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2387358:1--2387358:7}, year = {2019}, url = {https://doi.org/10.1155/2019/2387358}, doi = {10.1155/2019/2387358}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenSY19, author = {Jiageng Chen and Chunhua Su and Zheng Yan}, title = {AI-Driven Cyber Security Analytics and Privacy Protection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1859143:1--1859143:2}, year = {2019}, url = {https://doi.org/10.1155/2019/1859143}, doi = {10.1155/2019/1859143}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChenWCC19, author = {Hefeng Chen and Hsiao{-}Ling Wu and Chin{-}Chen Chang and Long{-}Sheng Chen}, title = {Light Repository Blockchain System with Multisecret Sharing for Industrial Big Data}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9060756:1--9060756:7}, year = {2019}, url = {https://doi.org/10.1155/2019/9060756}, doi = {10.1155/2019/9060756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChenWCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChengLTSLG19, author = {Jieren Cheng and Mengyang Li and Xiangyan Tang and Victor S. Sheng and Yifu Liu and Wei Guo}, title = {Corrigendum to "Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6809054:1}, year = {2019}, url = {https://doi.org/10.1155/2019/6809054}, doi = {10.1155/2019/6809054}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChengLTSLG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChoiB19, author = {Joseph I. Choi and Kevin R. B. Butler}, title = {Secure Multiparty Computation and Trusted Hardware: Examining Adoption Challenges and Opportunities}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1368905:1--1368905:28}, year = {2019}, url = {https://doi.org/10.1155/2019/1368905}, doi = {10.1155/2019/1368905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChoiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChoiBKKM19, author = {Mi{-}Jung Choi and Jiwon Bang and Jongwook Kim and Hajin Kim and Yang{-}Sae Moon}, title = {All-in-One Framework for Detection, Unpacking, and Verification for Malware Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5278137:1--5278137:16}, year = {2019}, url = {https://doi.org/10.1155/2019/5278137}, doi = {10.1155/2019/5278137}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChoiBKKM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChoiSC19, author = {SeokHwan Choi and Jin{-}Myeong Shin and Yoon{-}Ho Choi}, title = {Dynamic Nonparametric Random Forest Using Covariance}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3984031:1--3984031:12}, year = {2019}, url = {https://doi.org/10.1155/2019/3984031}, doi = {10.1155/2019/3984031}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChoiSC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ChuLL19, author = {Ankang Chu and Yingxu Lai and Jing Liu}, title = {Industrial Control Intrusion Detection Approach Based on Multiclassification GoogLeNet-LSTM Model}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6757685:1--6757685:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6757685}, doi = {10.1155/2019/6757685}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ChuLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DangT19, author = {Tran Khanh Dang and Khanh T. K. Tran}, title = {The Meeting of Acquaintances: {A} Cost-Efficient Authentication Scheme for Light-Weight Objects with Transient Trust Level and Plurality Approach}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8123259:1--8123259:18}, year = {2019}, url = {https://doi.org/10.1155/2019/8123259}, doi = {10.1155/2019/8123259}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DangT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DhailahTA19, author = {Hala Abu Dhailah and Eyad Taqieddin and Abdallah Y. Alma'aitah}, title = {An Enhanced and Resource-Aware {RFID} Multitag Grouping Protocol}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6862052:1--6862052:15}, year = {2019}, url = {https://doi.org/10.1155/2019/6862052}, doi = {10.1155/2019/6862052}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DhailahTA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DingWGJG19, author = {Lin Ding and Lei Wang and Dawu Gu and Chenhui Jin and Jie Guan}, title = {Algebraic Degree Estimation of {ACORN} v3 Using Numeric Mapping}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7429320:1--7429320:5}, year = {2019}, url = {https://doi.org/10.1155/2019/7429320}, doi = {10.1155/2019/7429320}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DingWGJG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DorokhinFL19, author = {{\'{E}}dgar Salguero Dorokhin and Walter Fuertes and Edison Lascano}, title = {On the Development of an Optimal Structure of Tree Parity Machine for the Establishment of a Cryptographic Key}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8214681:1--8214681:10}, year = {2019}, url = {https://doi.org/10.1155/2019/8214681}, doi = {10.1155/2019/8214681}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/DorokhinFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/DwiardhikaT19, author = {Dhanu Dwiardhika and Takuji Tachibana}, title = {Virtual Network Embedding Based on Security Level with {VNF} Placement}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5640134:1--5640134:11}, year = {2019}, url = {https://doi.org/10.1155/2019/5640134}, doi = {10.1155/2019/5640134}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/DwiardhikaT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ElhadyEE19, author = {Abd Elghaffar M. Elhady and Hazem M. El{-}Bakry and Ahmed Abou Elfetouh}, title = {Comprehensive Risk Identification Model for {SCADA} Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3914283:1--3914283:24}, year = {2019}, url = {https://doi.org/10.1155/2019/3914283}, doi = {10.1155/2019/3914283}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ElhadyEE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EllinidouSRVMD19, author = {Soultana Ellinidou and Gaurav Sharma and Th{\'{e}}o Rigas and Tristan Vanspouwen and Olivier Markowitch and Jean{-}Michel Dricot}, title = {SSPSoC: {A} Secure SDN-Based Protocol over MPSoC}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4869167:1--4869167:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4869167}, doi = {10.1155/2019/4869167}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EllinidouSRVMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/EmuraHKMOOS19, author = {Keita Emura and Goichiro Hanaoka and Yutaka Kawai and Takahiro Matsuda and Kazuma Ohara and Kazumasa Omote and Yusuke Sakai}, title = {Group Signatures with Message-Dependent Opening: Formal Definitions and Constructions}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4872403:1--4872403:36}, year = {2019}, url = {https://doi.org/10.1155/2019/4872403}, doi = {10.1155/2019/4872403}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/EmuraHKMOOS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FaisalARKR19, author = {Mohammad Faisal and Sohail Abbas and Haseeb Ur Rahman and Muhammad Zahid Khan and Arif Ur Rahman}, title = {An Analysis of DDoS Attacks on the Instant Messengers}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1751285:1--1751285:8}, year = {2019}, url = {https://doi.org/10.1155/2019/1751285}, doi = {10.1155/2019/1751285}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/FaisalARKR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FanZ19, author = {Sijie Fan and Yaqun Zhao}, title = {Analysis of {DES} Plaintext Recovery Based on {BP} Neural Network}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9580862:1--9580862:5}, year = {2019}, url = {https://doi.org/10.1155/2019/9580862}, doi = {10.1155/2019/9580862}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FanZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FengLJGM19, author = {Bo Feng and Qiang Li and Yuede Ji and Dong Guo and Xiangyu Meng}, title = {Stopping the Cyberattack in the Early Stage: Assessing the Security Risks of Social Network Users}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3053418:1--3053418:14}, year = {2019}, url = {https://doi.org/10.1155/2019/3053418}, doi = {10.1155/2019/3053418}, timestamp = {Mon, 02 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FengLJGM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FerragMD19, author = {Mohamed Amine Ferrag and Leandros A. Maglaras and Abdelouahid Derhab}, title = {Authentication and Authorization for Mobile IoT Devices Using Biofeatures: Recent Advances and Future Trends}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5452870:1--5452870:20}, year = {2019}, url = {https://doi.org/10.1155/2019/5452870}, doi = {10.1155/2019/5452870}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/FerragMD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/FilhoSBVS19, author = {Francisco Sales de Lima Filho and Frederico Augusto Fernandes Silveira and Agostinho de Medeiros Brito J{\'{u}}nior and Genoveva Vargas{-}Solar and Luiz Felipe Q. Silveira}, title = {Smart Detection: An Online Approach for DoS/DDoS Attack Detection Using Machine Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1574749:1--1574749:15}, year = {2019}, url = {https://doi.org/10.1155/2019/1574749}, doi = {10.1155/2019/1574749}, timestamp = {Sun, 28 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/FilhoSBVS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GaoCZ19, author = {Hui Gao and Yunfang Chen and Wei Zhang}, title = {Detection of Trojaning Attack on Neural Networks via Cost of Sample Classification}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1953839:1--1953839:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1953839}, doi = {10.1155/2019/1953839}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GaoCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GaoZ19, author = {Yunpeng Gao and Nan Zhang}, title = {Social Security and Privacy for Social IoT Polymorphic Value Set: {A} Solution to Inference Attacks on Social Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5498375:1--5498375:16}, year = {2019}, url = {https://doi.org/10.1155/2019/5498375}, doi = {10.1155/2019/5498375}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GaoZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GinkelGMP19, author = {Neline van Ginkel and Willem De Groef and Fabio Massacci and Frank Piessens}, title = {A Server-Side JavaScript Security Architecture for Secure Integration of Third-Party Libraries}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9629034:1--9629034:21}, year = {2019}, url = {https://doi.org/10.1155/2019/9629034}, doi = {10.1155/2019/9629034}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/GinkelGMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/GurbuzUU19, author = {Emre G{\"{u}}rb{\"{u}}z and G{\"{u}}zin Ulutas and Mustafa Ulutas}, title = {Detection of Free-Form Copy-Move Forgery on Digital Images}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8124521:1--8124521:14}, year = {2019}, url = {https://doi.org/10.1155/2019/8124521}, doi = {10.1155/2019/8124521}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/GurbuzUU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HajjajiGAM19, author = {Mohamed Ali Hajjaji and Mohamed Gafsi and Abdessalem Ben Abdelali and Abdellatif Mtibaa}, title = {{FPGA} Implementation of Digital Images Watermarking System Based on Discrete Haar Wavelet Transform}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1294267:1--1294267:17}, year = {2019}, url = {https://doi.org/10.1155/2019/1294267}, doi = {10.1155/2019/1294267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HajjajiGAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanKK19, author = {Mee Lan Han and Byung Il Kwak and Huy Kang Kim}, title = {CBR-Based Decision Support Methodology for Cybercrime Investigation: Focused on the Data-Driven Website Defacement Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1901548:1--1901548:21}, year = {2019}, url = {https://doi.org/10.1155/2019/1901548}, doi = {10.1155/2019/1901548}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanKK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HanZZ19, author = {Bo Han and Yinliang Zhao and Changpeng Zhu}, title = {An Object Proxy-Based Dynamic Layer Replacement to Protect IoMT Applications}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2798571:1--2798571:9}, year = {2019}, url = {https://doi.org/10.1155/2019/2798571}, doi = {10.1155/2019/2798571}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HanZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HaoZWZC19, author = {Yaojun Hao and Fuzhi Zhang and Jian Wang and Qingshan Zhao and Jianfang Cao}, title = {Detecting Shilling Attacks with Automatic Features from Multiple Views}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6523183:1--6523183:13}, year = {2019}, url = {https://doi.org/10.1155/2019/6523183}, doi = {10.1155/2019/6523183}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HaoZWZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeMMW19, author = {Lei He and Jianfeng Ma and Ruo Mo and Dawei Wei}, title = {Designated Verifier Proxy Blind Signature Scheme for Unmanned Aerial Vehicle Network Based on Mobile Edge Computing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8583130:1--8583130:12}, year = {2019}, url = {https://doi.org/10.1155/2019/8583130}, doi = {10.1155/2019/8583130}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/HeMMW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HeinrichVAKSBFK19, author = {Markus Heinrich and Tsvetoslava Vateva{-}Gurova and Tolga Arul and Stefan Katzenbeisser and Neeraj Suri and Henk Birkholz and Andreas Fuchs and Christoph Krau{\ss} and Maria Zhdanova and Don Kuzhiyelil and Sergey Tverdyshev and Christian Schlehuber}, title = {Security Requirements Engineering in Safety-Critical Railway Signalling Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8348925:1--8348925:14}, year = {2019}, url = {https://doi.org/10.1155/2019/8348925}, doi = {10.1155/2019/8348925}, timestamp = {Wed, 01 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HeinrichVAKSBFK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuNZLLL19, author = {Teng Hu and Weina Niu and Xiaosong Zhang and Xiaolei Liu and Jiazhong Lu and Yuan Liu}, title = {An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3898951:1--3898951:12}, year = {2019}, url = {https://doi.org/10.1155/2019/3898951}, doi = {10.1155/2019/3898951}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/HuNZLLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuZC19, author = {Langtao Hu and Xin Zheng and Chunsheng Chen}, title = {Physical Layer Security in Nonorthogonal Multiple Access Wireless Network with Jammer Selection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7869317:1--7869317:9}, year = {2019}, url = {https://doi.org/10.1155/2019/7869317}, doi = {10.1155/2019/7869317}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangHZL19, author = {Cheng Huang and Jiaxuan Han and Xing Zhang and Jiayong Liu}, title = {Automatic Identification of Honeypot Server Using Machine Learning Techniques}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2627608:1--2627608:8}, year = {2019}, url = {https://doi.org/10.1155/2019/2627608}, doi = {10.1155/2019/2627608}, timestamp = {Wed, 19 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/HuangHZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangKMWWW19, author = {Darong Huang and Lanyan Ke and Bo Mi and Guosheng Wei and Jian Wang and Shaohua Wan}, title = {A Cooperative Denoising Algorithm with Interactive Dynamic Adjustment Function for Security of Stacker in Industrial Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4049765:1--4049765:16}, year = {2019}, url = {https://doi.org/10.1155/2019/4049765}, doi = {10.1155/2019/4049765}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangKMWWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangLYYT19, author = {Kaifan Huang and Pengdeng Li and Lu{-}Xing Yang and Xiaofan Yang and Yuan Yan Tang}, title = {Seeking Best-Balanced Patch-Injecting Strategies through Optimal Control Approach}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2315627:1--2315627:12}, year = {2019}, url = {https://doi.org/10.1155/2019/2315627}, doi = {10.1155/2019/2315627}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangLYYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/HuangWXXH19, author = {Guoyan Huang and Qian Wang and Xinqian Liu and Xiaobing Hao and Huaizhi Yan}, title = {Mining the Key Nodes from Software Network Based on Fault Accumulation and Propagation}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7140480:1--7140480:11}, year = {2019}, url = {https://doi.org/10.1155/2019/7140480}, doi = {10.1155/2019/7140480}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/HuangWXXH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/IraqiB19, author = {Omar Iraqi and Hanan El Bakkali}, title = {Application-Level Unsupervised Outlier-Based Intrusion Detection and Prevention}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8368473:1--8368473:13}, year = {2019}, url = {https://doi.org/10.1155/2019/8368473}, doi = {10.1155/2019/8368473}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/IraqiB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JafarySSR19, author = {Peyman Jafary and Antti Supponen and Mikko Salmenper{\"{a}} and Sami Repo}, title = {Analyzing Reliability of the Communication for Secure and Highly Available GOOSE-Based Logic Selectivity}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9682189:1--9682189:16}, year = {2019}, url = {https://doi.org/10.1155/2019/9682189}, doi = {10.1155/2019/9682189}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JafarySSR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JeongJ19, author = {Jaeyeol Jeong and Ik Rae Jeong}, title = {Efficient Cancelable Iris Template Generation for Wearable Sensors}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7473591:1--7473591:13}, year = {2019}, url = {https://doi.org/10.1155/2019/7473591}, doi = {10.1155/2019/7473591}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JeongJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JeongWK19, author = {Young{-}Seob Jeong and Jiyoung Woo and Ah Reum Kang}, title = {Malware Detection on Byte Streams of {PDF} Files Using Convolutional Neural Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8485365:1--8485365:9}, year = {2019}, url = {https://doi.org/10.1155/2019/8485365}, doi = {10.1155/2019/8485365}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JeongWK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JuGYLM19, author = {Ankang Ju and Yuanbo Guo and Ziwei Ye and Tao Li and Jing Ma}, title = {HeteMSD: {A} Big Data Analytics Framework for Targeted Cyber-Attacks Detection Using Heterogeneous Multisource Data}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5483918:1--5483918:9}, year = {2019}, url = {https://doi.org/10.1155/2019/5483918}, doi = {10.1155/2019/5483918}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JuGYLM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Kamola19, author = {Mariusz Kamola}, title = {Sensitivity of Importance Metrics for Critical Digital Services Graph to Service Operators' Self-Assessment Errors}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7510809:1--7510809:8}, year = {2019}, url = {https://doi.org/10.1155/2019/7510809}, doi = {10.1155/2019/7510809}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Kamola19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KawanishiNSYH19, author = {Yasuyuki Kawanishi and Hideaki Nishihara and Daisuke Souma and Hirotaka Yoshida and Yoichi Hata}, title = {A Comparative Study of {JASO} TP15002-Based Security Risk Assessment Methods for Connected Vehicle System Design}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4614721:1--4614721:35}, year = {2019}, url = {https://doi.org/10.1155/2019/4614721}, doi = {10.1155/2019/4614721}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KawanishiNSYH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhalidKN19, author = {Madiha Khalid and Umar Mujahid Khokhar and Muhammad Najam{-}ul{-}Islam}, title = {Ultralightweight {RFID} Authentication Protocols for Low-Cost Passive {RFID} Tags}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3295616:1--3295616:25}, year = {2019}, url = {https://doi.org/10.1155/2019/3295616}, doi = {10.1155/2019/3295616}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhalidKN19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhanH19, author = {Zeeshan Ali Khan and Peter Herrmann}, title = {Recent Advancements in Intrusion Detection Systems for the Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4301409:1--4301409:19}, year = {2019}, url = {https://doi.org/10.1155/2019/4301409}, doi = {10.1155/2019/4301409}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhanH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KhatibzadehBB19, author = {Leila Khatibzadeh and Zarrintaj Bornaee and Abbas Ghaemi Bafghi}, title = {Applying Catastrophe Theory for Network Anomaly Detection in Cloud Computing Traffic}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5306395:1--5306395:11}, year = {2019}, url = {https://doi.org/10.1155/2019/5306395}, doi = {10.1155/2019/5306395}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KhatibzadehBB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KholidyE19, author = {Hisham A. Kholidy and Abdelkarim Erradi}, title = {{VHDRA:} {A} Vertical and Horizontal Intelligent Dataset Reduction Approach for Cyber-Physical Power Aware Intrusion Detection Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6816943:1--6816943:15}, year = {2019}, url = {https://doi.org/10.1155/2019/6816943}, doi = {10.1155/2019/6816943}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KholidyE19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimCCPS19, author = {Bohun Kim and Junghoon Cho and Byungjun Choi and Jongsun Park and Hwajeong Seo}, title = {Compact Implementations of {HIGHT} Block Cipher on IoT Platforms}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5323578:1--5323578:10}, year = {2019}, url = {https://doi.org/10.1155/2019/5323578}, doi = {10.1155/2019/5323578}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimCCPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimK19, author = {Daegeon Kim and Huy Kang Kim}, title = {Automated Dataset Generation System for Collaborative Research of Cyber Threat Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6268476:1--6268476:10}, year = {2019}, url = {https://doi.org/10.1155/2019/6268476}, doi = {10.1155/2019/6268476}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KimYRJ19, author = {Pyung{-}Han Kim and Eun{-}Jun Yoon and Kwan{-}Woo Ryu and Ki{-}Hyun Jung}, title = {Data-Hiding Scheme Using Multidirectional Pixel-Value Differencing on Colour Images}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9038650:1--9038650:11}, year = {2019}, url = {https://doi.org/10.1155/2019/9038650}, doi = {10.1155/2019/9038650}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KimYRJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KomanoOSIV19, author = {Yuichi Komano and Kazuo Ohta and Kazuo Sakiyama and Mitsugu Iwamoto and Ingrid Verbauwhede}, title = {Single-Round Pattern Matching Key Generation Using Physically Unclonable Function}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1719585:1--1719585:13}, year = {2019}, url = {https://doi.org/10.1155/2019/1719585}, doi = {10.1155/2019/1719585}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KomanoOSIV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KosmanosAM19, author = {Dimitrios Kosmanos and Antonios Argyriou and Leandros A. Maglaras}, title = {Estimating the Relative Speed of {RF} Jammers in VANETs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2064348:1--2064348:18}, year = {2019}, url = {https://doi.org/10.1155/2019/2064348}, doi = {10.1155/2019/2064348}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KosmanosAM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LagoPB19, author = {Federica Lago and Quoc{-}Tin Phan and Giulia Boato}, title = {Visual and Textual Analysis for Image Trustworthiness Assessment within Online News}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9236910:1--9236910:14}, year = {2019}, url = {https://doi.org/10.1155/2019/9236910}, doi = {10.1155/2019/9236910}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LagoPB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LaiZL19, author = {Yingxu Lai and Jingwen Zhang and Zenghui Liu}, title = {Industrial Anomaly Detection and Attack Classification Method Based on Convolutional Neural Network}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8124254:1--8124254:11}, year = {2019}, url = {https://doi.org/10.1155/2019/8124254}, doi = {10.1155/2019/8124254}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LaiZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeJ19, author = {Sanghoon Lee and Ik Rae Jeong}, title = {A Cancelable Template for the Low-Quality Fingerprints from Wearable Devices}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4202671:1--4202671:8}, year = {2019}, url = {https://doi.org/10.1155/2019/4202671}, doi = {10.1155/2019/4202671}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LeeSK19, author = {Yong{-}Seok Lee and Young{-}Ho Seo and Dong{-}Wook Kim}, title = {Blind Image Watermarking Based on Adaptive Data Spreading in\emph{ n}-Level {DWT} Subbands}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8357251:1--8357251:11}, year = {2019}, url = {https://doi.org/10.1155/2019/8357251}, doi = {10.1155/2019/8357251}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LeeSK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiCC19, author = {Lin Li and Chin{-}Chen Chang and Hefeng Chen}, title = {An Improved Bidirectional Shift-Based Reversible Data Hiding Scheme Using Double-Way Prediction Strategy}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3031506:1--3031506:17}, year = {2019}, url = {https://doi.org/10.1155/2019/3031506}, doi = {10.1155/2019/3031506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiHCH19, author = {Quanrun Li and Ching{-}Fang Hsu and Kim{-}Kwang Raymond Choo and Debiao He}, title = {A Provably Secure and Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for Vehicular Ad Hoc Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7871067:1--7871067:13}, year = {2019}, url = {https://doi.org/10.1155/2019/7871067}, doi = {10.1155/2019/7871067}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LiHCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiYSZ19, author = {Xiaoye Li and Jing Yang and Zhenlong Sun and Jianpei Zhang}, title = {Differentially Private Release of the Distribution of Clustering Coefficients across Communities}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2518714:1--2518714:9}, year = {2019}, url = {https://doi.org/10.1155/2019/2518714}, doi = {10.1155/2019/2518714}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiYSZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiZLLZ19, author = {Chenghai Li and Fangzheng Zhao and Chen Liu and Lei Lei and Jie Zhang}, title = {A Hyperchaotic Color Image Encryption Algorithm and Security Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8132547:1--8132547:8}, year = {2019}, url = {https://doi.org/10.1155/2019/8132547}, doi = {10.1155/2019/8132547}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiZLLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiangW19, author = {Huicong Liang and Meiqin Wang}, title = {Cryptanalysis of the Lightweight Block Cipher {BORON}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7862738:1--7862738:12}, year = {2019}, url = {https://doi.org/10.1155/2019/7862738}, doi = {10.1155/2019/7862738}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiangW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LinXYS19, author = {Guofeng Lin and Yunhao Xia and Chun Ying and Zhixin Sun}, title = {{F2P-ABS:} {A} Fast and Secure Attribute-Based Signature for Mobile Platforms}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5380710:1--5380710:12}, year = {2019}, url = {https://doi.org/10.1155/2019/5380710}, doi = {10.1155/2019/5380710}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LinXYS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuGLCZ19, author = {Wenjie Liu and Peipei Gao and Zhihao Liu and Hanwu Chen and Maojun Zhang}, title = {A Quantum-Based Database Query Scheme for Privacy Preservation in Cloud Environment}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4923590:1--4923590:14}, year = {2019}, url = {https://doi.org/10.1155/2019/4923590}, doi = {10.1155/2019/4923590}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuGLCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuLZ19, author = {Yu Liu and Xiaolei Liu and Yanmin Zhao}, title = {Security Cryptanalysis of {NUX} for the Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2062697:1--2062697:12}, year = {2019}, url = {https://doi.org/10.1155/2019/2062697}, doi = {10.1155/2019/2062697}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuWYL19, author = {Jingang Liu and Yongge Wang and Zongxiang Yi and Zhiqiang Lin}, title = {polarRLCE: {A} New Code-Based Cryptosystem Using Polar Codes}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3086975:1--3086975:10}, year = {2019}, url = {https://doi.org/10.1155/2019/3086975}, doi = {10.1155/2019/3086975}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZW19, author = {Muhua Liu and Ping Zhang and Qingtao Wu}, title = {A Novel Construction of Constrained Verifiable Random Functions}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4187892:1--4187892:15}, year = {2019}, url = {https://doi.org/10.1155/2019/4187892}, doi = {10.1155/2019/4187892}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZZSH19, author = {Xiaohu Liu and Hengwei Zhang and Yuchen Zhang and Lulu Shao and Jihong Han}, title = {Active Defense Strategy Selection Method Based on Two-Way Signaling Game}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1362964:1--1362964:14}, year = {2019}, url = {https://doi.org/10.1155/2019/1362964}, doi = {10.1155/2019/1362964}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZZSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuHZZG19, author = {Dan Lu and Qilong Han and Kejia Zhang and Haitao Zhang and Bisma Gull}, title = {A Novel Method for Location Privacy Protection in {LBS} Applications}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1914038:1--1914038:11}, year = {2019}, url = {https://doi.org/10.1155/2019/1914038}, doi = {10.1155/2019/1914038}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuHZZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuLZZLHD19, author = {Jiazhong Lu and Fengmao Lv and Zhongliu Zhuo and Xiaosong Zhang and Xiaolei Liu and Teng Hu and Wei Deng}, title = {Integrating Traffics with Network Device Logs for Anomaly Detection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5695021:1--5695021:10}, year = {2019}, url = {https://doi.org/10.1155/2019/5695021}, doi = {10.1155/2019/5695021}, timestamp = {Thu, 22 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/LuLZZLHD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuMLDLZZ19, author = {Tianbo Lu and Ting Meng and Chao Li and Guozhen Dong and Huiyang Li and Jiao Zhang and Xiaoyan Zhang}, title = {{MSFA:} Multiple System Fingerprint Attack Scheme for IoT Anonymous Communication}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9078176:1--9078176:15}, year = {2019}, url = {https://doi.org/10.1155/2019/9078176}, doi = {10.1155/2019/9078176}, timestamp = {Tue, 11 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuMLDLZZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LuQOZ19, author = {Qian Lu and Haipeng Qu and Yuzhan Ouyang and Jiahui Zhang}, title = {\emph{SLFAT}: Client-Side Evil Twin Detection Approach Based on Arrival Time of Special Length Frames}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2718741:1--2718741:10}, year = {2019}, url = {https://doi.org/10.1155/2019/2718741}, doi = {10.1155/2019/2718741}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LuQOZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Luckner19, author = {Marcin Luckner}, title = {Practical Web Spam Lifelong Machine Learning System with Automatic Adjustment to Current Lifecycle Phase}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6587020:1--6587020:16}, year = {2019}, url = {https://doi.org/10.1155/2019/6587020}, doi = {10.1155/2019/6587020}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Luckner19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaGBCXP19, author = {Xin Ma and Shize Guo and Wei Bai and Jun Chen and Shiming Xia and Zhisong Pan}, title = {An {API} Semantics-Aware Malware Detection Method Based on Deep Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1315047:1--1315047:9}, year = {2019}, url = {https://doi.org/10.1155/2019/1315047}, doi = {10.1155/2019/1315047}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaGBCXP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaHHL19, author = {Liran Ma and Yan Huo and Chunqiang Hu and Wei Li}, title = {Security and Privacy for Smart Cyber-Physical Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7045862:1--7045862:2}, year = {2019}, url = {https://doi.org/10.1155/2019/7045862}, doi = {10.1155/2019/7045862}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaHHL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaLWWLS19, author = {Bin Ma and Bing Li and Xiao{-}Yu Wang and Chunpeng Wang and Jian Li and Yun{-}Qing Shi}, title = {Code Division Multiplexing and Machine Learning Based Reversible Data Hiding Scheme for Medical Image}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4732632:1--4732632:9}, year = {2019}, url = {https://doi.org/10.1155/2019/4732632}, doi = {10.1155/2019/4732632}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/MaLWWLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MaWG19, author = {Haiying Ma and Zhanjun Wang and Zhijin Guan}, title = {Efficient Ciphertext-Policy Attribute-Based Online/Offline Encryption with User Revocation}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8093578:1--8093578:11}, year = {2019}, url = {https://doi.org/10.1155/2019/8093578}, doi = {10.1155/2019/8093578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MaWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MoC19, author = {Jiaqing Mo and Hang Chen}, title = {A Lightweight Secure User Authentication and Key Agreement Protocol for Wireless Sensor Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2136506:1--2136506:17}, year = {2019}, url = {https://doi.org/10.1155/2019/2136506}, doi = {10.1155/2019/2136506}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MoC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/MunivelK19, author = {E. Munivel and Kannammal Annadurai}, title = {New Authentication Scheme to Secure against the Phishing Attack in the Mobile Cloud Computing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5141395:1--5141395:11}, year = {2019}, url = {https://doi.org/10.1155/2019/5141395}, doi = {10.1155/2019/5141395}, timestamp = {Mon, 08 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/MunivelK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NiakanlahijiJ19, author = {Amirreza Niakanlahiji and Jafar Haadi Jafarian}, title = {WebMTD: Defeating Cross-Site Scripting Attacks Using Moving Target Defense}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2156906:1--2156906:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2156906}, doi = {10.1155/2019/2156906}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NiakanlahijiJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/NiuLZHJW19, author = {Weina Niu and Ting Li and Xiaosong Zhang and Teng Hu and Tianyu Jiang and Heng Wu}, title = {Using XGBoost to Discover Infected Hosts Based on {HTTP} Traffic}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2182615:1--2182615:11}, year = {2019}, url = {https://doi.org/10.1155/2019/2182615}, doi = {10.1155/2019/2182615}, timestamp = {Thu, 11 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/NiuLZHJW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OchiengMA19, author = {Nelson Ochieng and Waweru Mwangi and Ismail Ateya}, title = {Optimizing Computer Worm Detection Using Ensembles}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4656480:1--4656480:10}, year = {2019}, url = {https://doi.org/10.1155/2019/4656480}, doi = {10.1155/2019/4656480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OchiengMA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/OhLL19, author = {Junhyoung Oh and Ukjin Lee and Kyungho Lee}, title = {Usability Evaluation Model for Biometric System considering Privacy Concern Based on {MCDM} Model}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8715264:1--8715264:14}, year = {2019}, url = {https://doi.org/10.1155/2019/8715264}, doi = {10.1155/2019/8715264}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/OhLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanLZ19, author = {Jiaji Pan and Yi{-}Ning Liu and Weiming Zhang}, title = {Detection of Dummy Trajectories Using Convolutional Neural Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8431074:1--8431074:12}, year = {2019}, url = {https://doi.org/10.1155/2019/8431074}, doi = {10.1155/2019/8431074}, timestamp = {Thu, 29 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanYHZ19, author = {Chen Pan and Guodong Ye and Xiaoling Huang and Junwei Zhou}, title = {Novel Meaningful Image Encryption Based on Block Compressive Sensing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6572105:1--6572105:12}, year = {2019}, url = {https://doi.org/10.1155/2019/6572105}, doi = {10.1155/2019/6572105}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanYHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanYSXM19, author = {Zhaoqing Pan and Ching{-}Nung Yang and Victor S. Sheng and Naixue Xiong and Weizhi Meng}, title = {Machine Learning for Wireless Multimedia Data Security}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7682306:1--7682306:2}, year = {2019}, url = {https://doi.org/10.1155/2019/7682306}, doi = {10.1155/2019/7682306}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanYSXM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PanZS19, author = {Jiaye Pan and Yi Zhuang and Binglin Sun}, title = {Efficient and Transparent Method for Large-Scale {TLS} Traffic Analysis of Browsers and Analogous Programs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8467081:1--8467081:22}, year = {2019}, url = {https://doi.org/10.1155/2019/8467081}, doi = {10.1155/2019/8467081}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PanZS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Park19, author = {Hyun{-}A. Park}, title = {Secure Information Sharing System for Online Patient Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7541269:1--7541269:16}, year = {2019}, url = {https://doi.org/10.1155/2019/7541269}, doi = {10.1155/2019/7541269}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Park19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ParkYK19, author = {Hojoong Park and Yongjin Yeom and Ju{-}Sung Kang}, title = {A Lightweight {BCH} Code Corrector of {TRNG} with Measurable Dependence}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9684239:1--9684239:11}, year = {2019}, url = {https://doi.org/10.1155/2019/9684239}, doi = {10.1155/2019/9684239}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ParkYK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PedoneLV19, author = {Ignazio Pedone and Antonio Lioy and Fulvio Valenza}, title = {Towards an Efficient Management and Orchestration Framework for Virtual Network Security Functions}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2425983:1--2425983:11}, year = {2019}, url = {https://doi.org/10.1155/2019/2425983}, doi = {10.1155/2019/2425983}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PedoneLV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Pham-NguyenT19, author = {Hoang{-}Nam Pham{-}Nguyen and Quang Tran Minh}, title = {Dynamic Resource Provisioning on Fog Landscapes}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1798391:1--1798391:15}, year = {2019}, url = {https://doi.org/10.1155/2019/1798391}, doi = {10.1155/2019/1798391}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Pham-NguyenT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PhiriK19, author = {Kenan Kingsley Phiri and Hyunsung Kim}, title = {Linear (t, n) Secret Sharing Scheme with Reduced Number of Polynomials}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5134534:1--5134534:16}, year = {2019}, url = {https://doi.org/10.1155/2019/5134534}, doi = {10.1155/2019/5134534}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PhiriK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/PhuDQTB19, author = {Tran Nghi Phu and Kien Hoang Dang and Dung Ngo Quoc and Nguyen Dai Tho and Nguyen Ngoc Binh}, title = {A Novel Framework to Classify Malware in {MIPS} Architecture-Based IoT Devices}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4073940:1--4073940:13}, year = {2019}, url = {https://doi.org/10.1155/2019/4073940}, doi = {10.1155/2019/4073940}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/PhuDQTB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QiWH19, author = {Ping Qi and Fucheng Wang and Shu Hong}, title = {A Novel Trust Model Based on Node Recovery Technique for {WSN}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2545129:1--2545129:12}, year = {2019}, url = {https://doi.org/10.1155/2019/2545129}, doi = {10.1155/2019/2545129}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QiWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Qin19, author = {Baodong Qin}, title = {Tightly Secure Lossy Trapdoor Functions: Constructions and Applications}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3636759:1--3636759:13}, year = {2019}, url = {https://doi.org/10.1155/2019/3636759}, doi = {10.1155/2019/3636759}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Qin19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QuD19, author = {Zhen Qu and Ivan B. Djordjevic}, title = {Comment on "Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1484593:1}, year = {2019}, url = {https://doi.org/10.1155/2019/1484593}, doi = {10.1155/2019/1484593}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QuD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/QuWPZ19, author = {Quanbo Qu and Baocang Wang and Yuan Ping and Zhili Zhang}, title = {Improved Cryptanalysis of a Fully Homomorphic Symmetric Encryption Scheme}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8319508:1--8319508:6}, year = {2019}, url = {https://doi.org/10.1155/2019/8319508}, doi = {10.1155/2019/8319508}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/QuWPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RantosDKIPF19, author = {Konstantinos Rantos and George Drosatos and Antonios Kritsas and Christos Ilioudis and Alexandros Papanikolaou and Adam P. Filippidis}, title = {A Blockchain-Based Platform for Consent Management of Personal Data Processing in the IoT Ecosystem}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1431578:1--1431578:15}, year = {2019}, url = {https://doi.org/10.1155/2019/1431578}, doi = {10.1155/2019/1431578}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RantosDKIPF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenGWYXJ19, author = {Jiadong Ren and Jiawei Guo and Qian Wang and Huang Yuan and Hao Xiaobing and Hu Jingjing}, title = {Building an Effective Intrusion Detection System by Using Hybrid Data Optimization Based on Machine Learning Algorithms}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7130868:1--7130868:11}, year = {2019}, url = {https://doi.org/10.1155/2019/7130868}, doi = {10.1155/2019/7130868}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RenGWYXJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RenZLWY19, author = {Jiadong Ren and Zhangqi Zheng and Qian Liu and Zhiyao Wei and Huaizhi Yan}, title = {A Buffer Overflow Prediction Approach Based on Software Metrics and Machine Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8391425:1--8391425:13}, year = {2019}, url = {https://doi.org/10.1155/2019/8391425}, doi = {10.1155/2019/8391425}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/RenZLWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ReyYK19, author = {{\'{A}}ngel Mart{\'{\i}}n del Rey and Lu{-}Xing Yang and Vasileios Karyotis}, title = {Mathematical Models for Malware Propagation}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6046353:1--6046353:2}, year = {2019}, url = {https://doi.org/10.1155/2019/6046353}, doi = {10.1155/2019/6046353}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ReyYK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/RiziDb19, author = {A. Karimi Rizi and Mohammad Naderi Dehkordi and N. Nemat bakhsh}, title = {{SNI:} Supervised Anonymization Technique to Publish Social Networks Having Multiple Sensitive Labels}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8171263:1--8171263:23}, year = {2019}, url = {https://doi.org/10.1155/2019/8171263}, doi = {10.1155/2019/8171263}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/RiziDb19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SantiniGBC19, author = {Paolo Santini and Giuseppe Gottardi and Marco Baldi and Franco Chiaraluce}, title = {A Data-Driven Approach to Cyber Risk Assessment}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6716918:1--6716918:8}, year = {2019}, url = {https://doi.org/10.1155/2019/6716918}, doi = {10.1155/2019/6716918}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SantiniGBC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SchneiderBSUK19, author = {Daniel Schneider and Jens Braband and Erwin Schoitsch and Sascha Uhrig and Stefan Katzenbeisser}, title = {Safety and Security Coengineering in Embedded Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5381856:1--5381856:2}, year = {2019}, url = {https://doi.org/10.1155/2019/5381856}, doi = {10.1155/2019/5381856}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SchneiderBSUK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShabbirSRA19, author = {Aysha Shabbir and Maryam Shabbir and Muhammad Rizwan and Fahad Ahmad}, title = {Ensuring the Confidentiality of Nuclear Information at Cloud Using Modular Encryption Standard}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2509898:1--2509898:16}, year = {2019}, url = {https://doi.org/10.1155/2019/2509898}, doi = {10.1155/2019/2509898}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShabbirSRA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShahzadMR19, author = {Imran Shahzad and Qaiser Mushtaq and Abdul Razaq}, title = {Construction of New S-Box Using Action of Quotient of the Modular Group for Multimedia Security}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2847801:1--2847801:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2847801}, doi = {10.1155/2019/2847801}, timestamp = {Thu, 03 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ShahzadMR19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShangGCHZ19, author = {Wenli Shang and Tianyu Gong and Chunyu Chen and Jing Hou and Peng Zeng}, title = {Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3574675:1--3574675:11}, year = {2019}, url = {https://doi.org/10.1155/2019/3574675}, doi = {10.1155/2019/3574675}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShangGCHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShangWYL19, author = {Fute Shang and Buhong Wang and Fuhu Yan and Tengyao Li}, title = {Multidevice False Data Injection Attack Models of {ADS-B} Multilateration Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8936784:1--8936784:11}, year = {2019}, url = {https://doi.org/10.1155/2019/8936784}, doi = {10.1155/2019/8936784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShangWYL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenQM19, author = {Wenting Shen and Jing Qin and Jixin Ma}, title = {A Lightweight Identity-Based Cloud Storage Auditing Supporting Proxy Update and Workload-Based Payment}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8275074:1--8275074:15}, year = {2019}, url = {https://doi.org/10.1155/2019/8275074}, doi = {10.1155/2019/8275074}, timestamp = {Mon, 12 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenQM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenZC19, author = {Zhidong Shen and Yuhao Zhang and Weiying Chen}, title = {A Bayesian Classification Intrusion Detection Method Based on the Fusion of {PCA} and {LDA}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6346708:1--6346708:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6346708}, doi = {10.1155/2019/6346708}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShenZWY19, author = {Yanping Shen and Kangfeng Zheng and Chunhua Wu and Yixian Yang}, title = {A Neighbor Prototype Selection Method Based on {CCHPSO} for Intrusion Detection}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1283495:1--1283495:9}, year = {2019}, url = {https://doi.org/10.1155/2019/1283495}, doi = {10.1155/2019/1283495}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShenZWY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShuaiLYX19, author = {Mengxia Shuai and Bin Liu and Nenghai Yu and Ling Xiong}, title = {Lightweight and Secure Three-Factor Authentication Scheme for Remote Patient Monitoring Using On-Body Wireless Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8145087:1--8145087:14}, year = {2019}, url = {https://doi.org/10.1155/2019/8145087}, doi = {10.1155/2019/8145087}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShuaiLYX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SongTSG19, author = {Haitao Song and Guangming Tang and Yifeng Sun and Zhanzhan Gao}, title = {Security Measure for Image Steganography Based on High Dimensional {KL} Divergence}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3546367:1--3546367:13}, year = {2019}, url = {https://doi.org/10.1155/2019/3546367}, doi = {10.1155/2019/3546367}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SongTSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SongWWW19, author = {Yujiao Song and Hao Wang and Xiaochao Wei and Lei Wu}, title = {Efficient Attribute-Based Encryption with Privacy-Preserving Key Generation and Its Application in Industrial Cloud}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3249726:1--3249726:9}, year = {2019}, url = {https://doi.org/10.1155/2019/3249726}, doi = {10.1155/2019/3249726}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SongWWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SongYHY19, author = {Baek Kyung Song and Joon Soo Yoo and Miyeon Hong and Ji Won Yoon}, title = {A Bitwise Design and Implementation for Privacy-Preserving Data Mining: From Atomic Operations to Advanced Algorithms}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3648671:1--3648671:14}, year = {2019}, url = {https://doi.org/10.1155/2019/3648671}, doi = {10.1155/2019/3648671}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SongYHY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SourekZ19, author = {Gustav Sourek and Filip Zelezn{\'{y}}}, title = {Efficient Extraction of Network Event Types from NetFlows}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8954914:1--8954914:18}, year = {2019}, url = {https://doi.org/10.1155/2019/8954914}, doi = {10.1155/2019/8954914}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/SourekZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunHSZD19, author = {Jian Sun and Guanhua Huang and Arun Kumar Sangaiah and Guangyang Zhu and Xiaojiang Du}, title = {Towards Supporting Security and Privacy for Social IoT Applications: {A} Network Virtualization Perspective}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4074272:1--4074272:15}, year = {2019}, url = {https://doi.org/10.1155/2019/4074272}, doi = {10.1155/2019/4074272}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunHSZD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SunZCYSJ19, author = {Wei Sun and Hao Zhang and Li{-}jun Cai and Ai{-}min Yu and Jinqiao Shi and Jian{-}Guo Jiang}, title = {A Novel Device Identification Method Based on Passive Measurement}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6045251:1--6045251:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6045251}, doi = {10.1155/2019/6045251}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SunZCYSJ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TangLLHGX19, author = {Junwei Tang and Jingjing Li and Ruixuan Li and Hongmu Han and Xiwu Gu and Zhiyong Xu}, title = {SSLDetecter: Detecting {SSL} Security Vulnerabilities of Android Applications Based on a Novel Automatic Traversal Method}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7193684:1--7193684:20}, year = {2019}, url = {https://doi.org/10.1155/2019/7193684}, doi = {10.1155/2019/7193684}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TangLLHGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TangYXYZ19, author = {Zhenjun Tang and Ye Yang and Shijie Xu and Chunqiang Yu and Xianquan Zhang}, title = {Image Encryption with Double Spiral Scans and Chaotic Maps}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8694678:1--8694678:15}, year = {2019}, url = {https://doi.org/10.1155/2019/8694678}, doi = {10.1155/2019/8694678}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TangYXYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ThwinV19, author = {Thein Than Thwin and Sangsuree Vasupongayya}, title = {Blockchain-Based Access Control Model to Preserve Privacy for Personal Health Record Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8315614:1--8315614:15}, year = {2019}, url = {https://doi.org/10.1155/2019/8315614}, doi = {10.1155/2019/8315614}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ThwinV19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Trinh19, author = {Viet Cuong Trinh}, title = {A Short Server-Aided Certificateless Aggregate Multisignature Scheme in the Standard Model}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3424890:1--3424890:14}, year = {2019}, url = {https://doi.org/10.1155/2019/3424890}, doi = {10.1155/2019/3424890}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Trinh19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TruongTD19, author = {Toan{-}Thinh Truong and Minh{-}Triet Tran and Anh Duc Duong}, title = {Improved Chebyshev Polynomials-Based Authentication Scheme in Client-Server Environment}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4250743:1--4250743:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4250743}, doi = {10.1155/2019/4250743}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/TruongTD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UrreaM19, author = {Claudio Urrea and Claudio Morales}, title = {Enhancing Modbus-RTU Communications for Smart Metering in Building Energy Management Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7010717:1--7010717:8}, year = {2019}, url = {https://doi.org/10.1155/2019/7010717}, doi = {10.1155/2019/7010717}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/UrreaM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UstimenkoRWPZ19, author = {Vasyl Ustimenko and Urszula Romanczuk{-}Polubiec and Aneta Wr{\'{o}}blewska and Monika Katarzyna Polak and Eustrat Zhupa}, title = {On the Constructions of New Symmetric Ciphers Based on Nonbijective Multivariate Maps of Prescribed Degree}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2137561:1--2137561:15}, year = {2019}, url = {https://doi.org/10.1155/2019/2137561}, doi = {10.1155/2019/2137561}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/UstimenkoRWPZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Wang19, author = {Jizhi Wang}, title = {The Prediction of Serial Number in OpenSSL's {X.509} Certificate}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6013846:1--6013846:11}, year = {2019}, url = {https://doi.org/10.1155/2019/6013846}, doi = {10.1155/2019/6013846}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Wang19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangHYZC19, author = {JingJing Wang and Yiliang Han and Xiaoyuan Yang and Tanping Zhou and Jiayong Chen}, title = {A New Group Location Privacy-Preserving Method Based on Distributed Architecture in {LBS}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2414687:1--2414687:14}, year = {2019}, url = {https://doi.org/10.1155/2019/2414687}, doi = {10.1155/2019/2414687}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangHYZC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLSSW19, author = {Ping Wang and Bin Li and Hongjin Shi and Yaosheng Shen and Ding Wang}, title = {Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2516963:1--2516963:13}, year = {2019}, url = {https://doi.org/10.1155/2019/2516963}, doi = {10.1155/2019/2516963}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLSSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangLZLW19, author = {Jun Wang and Feixiang Luo and Zequan Zhou and Xiling Luo and Zhen Wang}, title = {Optimistic Fair Exchange in Cloud-Assisted Cyber-Physical Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5175076:1--5175076:14}, year = {2019}, url = {https://doi.org/10.1155/2019/5175076}, doi = {10.1155/2019/5175076}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangLZLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangSNLGNZ19, author = {Xu Wang and Bo Song and Wei Ni and Ren Ping Liu and Y. Jay Guo and Xinxin Niu and Kangfeng Zheng}, title = {Group-Based Susceptible-Infectious-Susceptible Model in Large-Scale Directed Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1657164:1--1657164:9}, year = {2019}, url = {https://doi.org/10.1155/2019/1657164}, doi = {10.1155/2019/1657164}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangSNLGNZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWC19, author = {Baosheng Wang and Yi Wang and Rongmao Chen}, title = {A Practical Authentication Framework for VANETs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4752612:1--4752612:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4752612}, doi = {10.1155/2019/4752612}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWWG19, author = {Qihua Wang and Huaqun Wang and Yufeng Wang and Rui Guo}, title = {A Distributed Access Control with Outsourced Computation in Fog Computing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6782753:1--6782753:10}, year = {2019}, url = {https://doi.org/10.1155/2019/6782753}, doi = {10.1155/2019/6782753}, timestamp = {Thu, 29 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WangWWG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangWWTZ19, author = {Yubiao Wang and Junhao Wen and Xibin Wang and Bamei Tao and Wei Zhou}, title = {A Cloud Service Trust Evaluation Model Based on Combining Weights and Gray Correlation Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2437062:1--2437062:11}, year = {2019}, url = {https://doi.org/10.1155/2019/2437062}, doi = {10.1155/2019/2437062}, timestamp = {Fri, 09 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangWWTZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangXG19, author = {Feifei Wang and Guoai Xu and Lize Gu}, title = {A Secure and Efficient ECC-Based Anonymous Authentication Protocol}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4656281:1--4656281:13}, year = {2019}, url = {https://doi.org/10.1155/2019/4656281}, doi = {10.1155/2019/4656281}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangXG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangXWP19, author = {Feifei Wang and Guoai Xu and Chenyu Wang and Junhao Peng}, title = {A Provably Secure Biometrics-Based Authentication Scheme for Multiserver Environment}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2838615:1--2838615:15}, year = {2019}, url = {https://doi.org/10.1155/2019/2838615}, doi = {10.1155/2019/2838615}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangXWP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangYQZYZG19, author = {Tao Wang and Bo Yang and Guoyong Qiu and Lina Zhang and Yong Yu and Yanwei Zhou and Juncai Guo}, title = {An Approach Enabling Various Queries on Encrypted Industrial Data Stream}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6293970:1--6293970:12}, year = {2019}, url = {https://doi.org/10.1155/2019/6293970}, doi = {10.1155/2019/6293970}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangYQZYZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZCL19, author = {Dong Wang and Xiaosong Zhang and Ting Chen and Jingwei Li}, title = {Discovering Vulnerabilities in {COTS} IoT Devices through Blackbox Fuzzing Web Management Interface}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5076324:1--5076324:19}, year = {2019}, url = {https://doi.org/10.1155/2019/5076324}, doi = {10.1155/2019/5076324}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WangZLZ19, author = {Weiping Wang and Feng Zhang and Xi Luo and Shigeng Zhang}, title = {{PDRCNN:} Precise Phishing Detection with Recurrent Convolutional Neural Networks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2595794:1--2595794:15}, year = {2019}, url = {https://doi.org/10.1155/2019/2595794}, doi = {10.1155/2019/2595794}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WangZLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuSHJL19, author = {Yixin Wu and Yuqiang Sun and Cheng Huang and Peng Jia and Luping Liu}, title = {Session-Based Webshell Detection Using Machine Learning in Web Logs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3093809:1--3093809:11}, year = {2019}, url = {https://doi.org/10.1155/2019/3093809}, doi = {10.1155/2019/3093809}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/WuSHJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WuWZH19, author = {Libing Wu and Jing Wang and Sherali Zeadally and Debiao He}, title = {Anonymous and Efficient Message Authentication Scheme for Smart Grid}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4836016:1--4836016:12}, year = {2019}, url = {https://doi.org/10.1155/2019/4836016}, doi = {10.1155/2019/4836016}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WuWZH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiaFZWS19, author = {Zhuoqun Xia and Zhenwei Fang and Fengfei Zou and Jin Wang and Arun Kumar Sangaiah}, title = {Research on Defensive Strategy of Real-Time Price Attack Based on Multiperson Zero-Determinant}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6956072:1--6956072:13}, year = {2019}, url = {https://doi.org/10.1155/2019/6956072}, doi = {10.1155/2019/6956072}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiaFZWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XieZLLC19, author = {Yong Xie and Songsong Zhang and Xiang Li and Yanggui Li and Yuan Chai}, title = {\emph{CasCP}: Efficient and Secure Certificateless Authentication Scheme for Wireless Body Area Networks with Conditional Privacy-Preserving}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5860286:1--5860286:13}, year = {2019}, url = {https://doi.org/10.1155/2019/5860286}, doi = {10.1155/2019/5860286}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XieZLLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XiongZLYD19, author = {Yinqiao Xiong and Peidong Zhu and Zhizhu Liu and Hui Yin and Tiantian Deng}, title = {{EPLC:} An Efficient Privacy-Preserving Line-Loss Calculation Scheme for Residential Areas of Smart Grid}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9637578:1--9637578:14}, year = {2019}, url = {https://doi.org/10.1155/2019/9637578}, doi = {10.1155/2019/9637578}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XiongZLYD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuH19, author = {Ming Xu and Weili Han}, title = {An Explainable Password Strength Meter Addon via Textual Pattern Recognition}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5184643:1--5184643:10}, year = {2019}, url = {https://doi.org/10.1155/2019/5184643}, doi = {10.1155/2019/5184643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuH19a, author = {Yibin Xu and Yangyu Huang}, title = {MWPoW: Multiple Winners Proof of Work Protocol, a Decentralisation Strengthened Fast-Confirm Blockchain Protocol}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3674274:1--3674274:13}, year = {2019}, url = {https://doi.org/10.1155/2019/3674274}, doi = {10.1155/2019/3674274}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuH19a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuS19, author = {Dawen Xu and Shubing Su}, title = {Separable Reversible Data Hiding in Encrypted Images Based on Difference Histogram Modification}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7480147:1--7480147:14}, year = {2019}, url = {https://doi.org/10.1155/2019/7480147}, doi = {10.1155/2019/7480147}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuYB19, author = {Yahong Xu and Geng Yang and Shuangjie Bai}, title = {Laplace Input and Output Perturbation for Differentially Private Principal Components Analysis}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9169802:1--9169802:10}, year = {2019}, url = {https://doi.org/10.1155/2019/9169802}, doi = {10.1155/2019/9169802}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XuYB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XuZYM19, author = {Haiyan Xu and Zhaoxin Zhang and Jianen Yan and Xin Ma}, title = {Evaluating the Impact of Name Resolution Dependence on the {DNS}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8565397:1--8565397:12}, year = {2019}, url = {https://doi.org/10.1155/2019/8565397}, doi = {10.1155/2019/8565397}, timestamp = {Thu, 16 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/XuZYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/XueYLW19, author = {Mingfu Xue and Chengxiang Yuan and Zhe Liu and Jian Wang}, title = {{SSL:} {A} Novel Image Hashing Technique Using {SIFT} Keypoints with Saliency Detection and {LBP} Feature Extraction against Combinatorial Manipulations}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9795621:1--9795621:18}, year = {2019}, url = {https://doi.org/10.1155/2019/9795621}, doi = {10.1155/2019/9795621}, timestamp = {Tue, 11 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/XueYLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YamamotoO19, author = {Dan Yamamoto and Wakaha Ogata}, title = {Multidivisible Online/Offline Cryptography and Its Application to Signcryptions}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1042649:1--1042649:21}, year = {2019}, url = {https://doi.org/10.1155/2019/1042649}, doi = {10.1155/2019/1042649}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YamamotoO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YanWXWL19, author = {Yunxue Yan and Lei Wu and Wenyu Xu and Hao Wang and Zhaoman Liu}, title = {Integrity Audit of Shared Cloud Data with Identity Tracking}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1354346:1--1354346:11}, year = {2019}, url = {https://doi.org/10.1155/2019/1354346}, doi = {10.1155/2019/1354346}, timestamp = {Tue, 05 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YanWXWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangWPS19, author = {Laurence T. Yang and Wei Wang and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Willy Susilo}, title = {Security, Privacy, and Trust for Cyberphysical-Social Systems}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2964673:1--2964673:2}, year = {2019}, url = {https://doi.org/10.1155/2019/2964673}, doi = {10.1155/2019/2964673}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangWPS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YangZGZYM19, author = {Chao Yang and Junwei Zhang and Jingjing Guo and Yu Zheng and Li Yang and Jianfeng Ma}, title = {Fingerprint Protected Password Authentication Protocol}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1694702:1--1694702:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1694702}, doi = {10.1155/2019/1694702}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YangZGZYM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YinCWWW19, author = {Mingyong Yin and Xingshu Chen and Qixu Wang and Wei Wang and Yulong Wang}, title = {Dynamics on Hybrid Complex Network: Botnet Modeling and Analysis of Medical IoT}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6803801:1--6803801:14}, year = {2019}, url = {https://doi.org/10.1155/2019/6803801}, doi = {10.1155/2019/6803801}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YinCWWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuCC19, author = {Chuan Yu and Shuhui Chen and Zhiping Cai}, title = {{LTE} Phone Number Catcher: {A} Practical Attack against Mobile Privacy}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7425235:1--7425235:10}, year = {2019}, url = {https://doi.org/10.1155/2019/7425235}, doi = {10.1155/2019/7425235}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuCC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuFL19, author = {Bin Yu and Zhengxin Fu and Sijia Liu}, title = {A Novel Three-Layer {QR} Code Based on Secret Sharing Scheme and Liner Code}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {7937816:1--7937816:13}, year = {2019}, url = {https://doi.org/10.1155/2019/7937816}, doi = {10.1155/2019/7937816}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuLQ19, author = {Haisheng Yu and Keqiu Li and Heng Qi}, title = {An Active Controller Selection Scheme for Minimizing Packet-In Processing Latency in {SDN}}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1949343:1--1949343:11}, year = {2019}, url = {https://doi.org/10.1155/2019/1949343}, doi = {10.1155/2019/1949343}, timestamp = {Fri, 11 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuLQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanWYZ19, author = {Ye Yuan and Liji Wu and Yijun Yang and Xiangmin Zhang}, title = {Erratum to "A Novel Multiple-Bits Collision Attack Based on Double Detection with Error-Tolerant Mechanism"}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5742308:1--5742308:2}, year = {2019}, url = {https://doi.org/10.1155/2019/5742308}, doi = {10.1155/2019/5742308}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YuanWYZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZengWCZW19, author = {Jianping Zeng and Shuang Wu and Yanyu Chen and Rui Zeng and Chengrong Wu}, title = {Survey of Attack Graph Analysis Methods from the Perspective of Data and Knowledge Processing}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2031063:1--2031063:16}, year = {2019}, url = {https://doi.org/10.1155/2019/2031063}, doi = {10.1155/2019/2031063}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZengWCZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhanW19, author = {Yu Zhan and Baocang Wang}, title = {Cryptanalysis of a Certificateless Aggregate Signature Scheme for Healthcare Wireless Sensor Network}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6059834:1--6059834:5}, year = {2019}, url = {https://doi.org/10.1155/2019/6059834}, doi = {10.1155/2019/6059834}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhanW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangFDLL19, author = {Zhuo Zhang and Guangyuan Fu and Fuqiang Di and Changlong Li and Jia Liu}, title = {Generative Reversible Data Hiding by Image-to-Image Translation via GANs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4932782:1--4932782:10}, year = {2019}, url = {https://doi.org/10.1155/2019/4932782}, doi = {10.1155/2019/4932782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangFDLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangGL19, author = {Han Zhang and Yuanbo Guo and Tao Li}, title = {Multifeature Named Entity Recognition in Information Security Based on Adversarial Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6417407:1--6417407:9}, year = {2019}, url = {https://doi.org/10.1155/2019/6417407}, doi = {10.1155/2019/6417407}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangGL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangL19, author = {Yuchen Zhang and Jing Liu}, title = {Optimal Decision-Making Approach for Cyber Security Defense Using Game Theory and Intelligent Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3038586:1--3038586:16}, year = {2019}, url = {https://doi.org/10.1155/2019/3038586}, doi = {10.1155/2019/3038586}, timestamp = {Fri, 23 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLL19, author = {Ping Zhang and Yamin Li and Muhua Liu}, title = {An Indistinguishably Secure Function Encryption Scheme}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8567534:1--8567534:10}, year = {2019}, url = {https://doi.org/10.1155/2019/8567534}, doi = {10.1155/2019/8567534}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLLLXJL19, author = {Daode Zhang and Jie Li and Bao Li and Xianhui Lu and Haiyang Xue and Dingding Jia and Yamin Liu}, title = {Deterministic Identity-Based Encryption from Lattice-Based Programmable Hash Functions with High Min-Entropy}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1816393:1--1816393:12}, year = {2019}, url = {https://doi.org/10.1155/2019/1816393}, doi = {10.1155/2019/1816393}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLLLXJL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLMHFW19, author = {Lin Zhang and Li Li and Eric Medwedeff and Haiping Huang and Xiong Fu and Ruchuan Wang}, title = {Privacy Protection of Social Networks Based on Classified Attribute Encryption}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9108759:1--9108759:14}, year = {2019}, url = {https://doi.org/10.1155/2019/9108759}, doi = {10.1155/2019/9108759}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLMHFW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangLW19, author = {Yu Zhang and Yin Li and Yifan Wang}, title = {Secure and Efficient Searchable Public Key Encryption for Resource Constrained Environment Based on Pairings under Prime Order Group}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {5280806:1--5280806:14}, year = {2019}, url = {https://doi.org/10.1155/2019/5280806}, doi = {10.1155/2019/5280806}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYCZ19, author = {Shuaiwei Zhang and Xiaoyuan Yang and Lin Chen and Weidong Zhong}, title = {A Highly Effective Data Preprocessing in Side-Channel Attack Using Empirical Mode Decomposition}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6124165:1--6124165:10}, year = {2019}, url = {https://doi.org/10.1155/2019/6124165}, doi = {10.1155/2019/6124165}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYZLQP19, author = {Xuyun Zhang and Yuan Yuan and Zhili Zhou and Shancang Li and Lianyong Qi and Deepak Puthal}, title = {Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4529757:1--4529757:4}, year = {2019}, url = {https://doi.org/10.1155/2019/4529757}, doi = {10.1155/2019/4529757}, timestamp = {Thu, 23 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/ZhangYZLQP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZLCL19, author = {En Zhang and Jun{-}Zhe Zhu and Gong{-}Li Li and Jian Chang and Yu Li}, title = {Outsourcing Hierarchical Threshold Secret Sharing Scheme Based on Reputation}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {6989383:1--6989383:8}, year = {2019}, url = {https://doi.org/10.1155/2019/6989383}, doi = {10.1155/2019/6989383}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZLCL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangZZSG19, author = {Meiyu Zhang and Qianying Zhang and Shijun Zhao and Zhiping Shi and Yong Guan}, title = {SoftME: {A} Software-Based Memory Protection Approach for {TEE} System to Resist Physical Attacks}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8690853:1--8690853:12}, year = {2019}, url = {https://doi.org/10.1155/2019/8690853}, doi = {10.1155/2019/8690853}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangZZSG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoBFXY19, author = {Yuntao Zhao and Bo Bo and Yongxin Feng and ChunYu Xu and Bo Yu}, title = {A Feature Extraction Method of Hybrid Gram for Malicious Behavior Based on Machine Learning}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {2674684:1--2674684:8}, year = {2019}, url = {https://doi.org/10.1155/2019/2674684}, doi = {10.1155/2019/2674684}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoBFXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoCSCS19, author = {Shuang Zhao and Shuhui Chen and Yipin Sun and Zhiping Cai and Jinshu Su}, title = {Identifying Known and Unknown Mobile Application Traffic Using a Multilevel Classifier}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9595081:1--9595081:11}, year = {2019}, url = {https://doi.org/10.1155/2019/9595081}, doi = {10.1155/2019/9595081}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoCSCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoLYC19, author = {Yi Zhao and Kaitai Liang and Bo Yang and Liqun Chen}, title = {{CCA} Secure Public Key Encryption against After-the-Fact Leakage without {NIZK} Proofs}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8357241:1--8357241:8}, year = {2019}, url = {https://doi.org/10.1155/2019/8357241}, doi = {10.1155/2019/8357241}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoLYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoXBF19, author = {Yuntao Zhao and ChunYu Xu and Bo Bo and Yongxin Feng}, title = {MalDeep: {A} Deep Learning Classification Framework against Malware Variants Based on Texture Visualization}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4895984:1--4895984:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4895984}, doi = {10.1155/2019/4895984}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoXBF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhaoYZQ19, author = {Qinglan Zhao and Shuntong Yang and Dong Zheng and Baodong Qin}, title = {A {QR} Code Secret Hiding Scheme against Contrast Analysis Attack for the Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {8105787:1--8105787:8}, year = {2019}, url = {https://doi.org/10.1155/2019/8105787}, doi = {10.1155/2019/8105787}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhaoYZQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhouWZ19, author = {Yu Zhou and Yongzhuang Wei and Fengrong Zhang}, title = {Measuring the Sum-of-Squares Indicator of Boolean Functions in Encryption Algorithm for Internet of Things}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {1348639:1--1348639:15}, year = {2019}, url = {https://doi.org/10.1155/2019/1348639}, doi = {10.1155/2019/1348639}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhouWZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuSQM19, author = {Binrui Zhu and Jiameng Sun and Jing Qin and Jixin Ma}, title = {A Secure Data Sharing Scheme with Designated Server}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {4268731:1--4268731:16}, year = {2019}, url = {https://doi.org/10.1155/2019/4268731}, doi = {10.1155/2019/4268731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuSQM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhuXZY19, author = {Rui Zhu and Li Xu and Yali Zeng and Xun Yi}, title = {Lightweight Privacy Preservation for Securing Large-Scale Database-Driven Cognitive Radio Networks with Location Verification}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {9126376:1--9126376:12}, year = {2019}, url = {https://doi.org/10.1155/2019/9126376}, doi = {10.1155/2019/9126376}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhuXZY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.