Search dblp for Publications

export results for "stream:journals/sap:"

 download as .bib file

@article{DBLP:journals/sap/AbdmeziemAZ24,
  author       = {Mohammed Riyadh Abdmeziem and
                  Hiba Akli and
                  Rima Zourane},
  title        = {Nodes selection review for federated learning in the blockchain-based
                  internet of things},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.344},
  doi          = {10.1002/SPY2.344},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AbdmeziemAZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AllavarpuNM24,
  author       = {V. V. L. Divakar Allavarpu and
                  Vankamamidi Srinivasa Naresh and
                  A. Krishna Mohan},
  title        = {Privacy-preserving credit risk analysis based on homomorphic encryption
                  aware logistic regression in the cloud},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.372},
  doi          = {10.1002/SPY2.372},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AllavarpuNM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BarmanCS24,
  author       = {Subhas Barman and
                  Samiran Chattopadhyay and
                  Debasis Samanta},
  title        = {Toward design a secure protocol for updating remotely stored credentials
                  of a crypto-biometric framework for multi-server environment},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.339},
  doi          = {10.1002/SPY2.339},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BarmanCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BilakantiPPU24,
  author       = {Harini Bilakanti and
                  Sreevani Pasam and
                  Varshini Palakollu and
                  Sairam Utukuru},
  title        = {Anomaly detection in IoT environment using machine learning},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.366},
  doi          = {10.1002/SPY2.366},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BilakantiPPU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BishtDG24,
  author       = {Abhishek Bisht and
                  Ashok Kumar Das and
                  Debasis Giri},
  title        = {Personal health record storage and sharing using searchable encryption
                  and blockchain: {A} comprehensive survey},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.351},
  doi          = {10.1002/SPY2.351},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BishtDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BodkheT24,
  author       = {Umesh Bodkhe and
                  Sudeep Tanwar},
  title        = {\emph{V2XCom:} Lightweight and secure message dissemination scheme
                  for Internet of vehicles},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.352},
  doi          = {10.1002/SPY2.352},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BodkheT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DashSS24,
  author       = {Priyabrata Dash and
                  Monalisa Sarma and
                  Debasis Samanta},
  title        = {Privacy preserving unique identity generation from multimodal biometric
                  data for privacy and security applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.375},
  doi          = {10.1002/SPY2.375},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DashSS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DekkerA24,
  author       = {Martijn Dekker and
                  Lampis Alevizos},
  title        = {A threat-intelligence driven methodology to incorporate uncertainty
                  in cyber risk analysis and enhance decision-making},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.333},
  doi          = {10.1002/SPY2.333},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DekkerA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DemlaA24,
  author       = {Kunal Demla and
                  Ashima Anand},
  title        = {MieWC: Medical image encryption using wavelet transform and multiple
                  chaotic maps},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.369},
  doi          = {10.1002/SPY2.369},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DemlaA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DhadhaniaBMTSV24,
  author       = {Archan Dhadhania and
                  Jitendra Bhatia and
                  Rachana Mehta and
                  Sudeep Tanwar and
                  Ravi Sharma and
                  Amit Verma},
  title        = {Unleashing the power of {SDN} and {GNN} for network anomaly detection:
                  State-of-the-art, challenges, and future directions},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.337},
  doi          = {10.1002/SPY2.337},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DhadhaniaBMTSV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DinAAAZ24,
  author       = {Ikram Ud Din and
                  Wajahat Ali and
                  Ahmad Almogren and
                  Iehab Al Rassan and
                  Sherali Zeadally},
  title        = {Using smart grid infrastructure for authentication and data management
                  in Internet of Medical Things},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.376},
  doi          = {10.1002/SPY2.376},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DinAAAZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GuptaCBK24,
  author       = {Sangeeta Gupta and
                  Premkumar Chithaluru and
                  May El Barachi and
                  Manoj Kumar},
  title        = {Secure data access using blockchain technology through IoT cloud and
                  fabric environment},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.356},
  doi          = {10.1002/SPY2.356},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/GuptaCBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HassanHESE24,
  author       = {Heba A. Hassan and
                  Ezz El{-}Din Hemdan and
                  Walid El{-}Shafai and
                  Mona Shokair and
                  Fathi E. Abd El{-}Samie},
  title        = {Detection of attacks on software defined networks using machine learning
                  techniques and imbalanced data handling methods},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.350},
  doi          = {10.1002/SPY2.350},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HassanHESE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HemaB24,
  author       = {P. P. Hema and
                  Anchare V. Babu},
  title        = {Full-duplex jamming for physical layer security improvement in NOMA-enabled
                  overlay cognitive radio networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.371},
  doi          = {10.1002/SPY2.371},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HemaB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HuangWCC24,
  author       = {Zhongming Huang and
                  Feng Wang and
                  Chin{-}Chen Chang and
                  Xiuqiang Chen},
  title        = {A new authentication scheme for dynamic charging system of electric
                  vehicles in fog environment},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.365},
  doi          = {10.1002/SPY2.365},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HuangWCC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/IslamM24,
  author       = {Md. Azharul Islam and
                  Sanjay Madria},
  title        = {Attribute-based encryption scheme for secure data sharing in cloud
                  with fine-grained revocation},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.336},
  doi          = {10.1002/SPY2.336},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/IslamM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JavedAMK24,
  author       = {Mubeen Javed and
                  Muhammad Arslan Akram and
                  Adnan Noor Mian and
                  Saru Kumari},
  title        = {On the security of a novel privacy-preserving authentication scheme
                  for {V2G} networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.357},
  doi          = {10.1002/SPY2.357},
  timestamp    = {Wed, 03 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/JavedAMK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KarnatakMTWSD24,
  author       = {Vijay Karnatak and
                  Amit Kumar Mishra and
                  Neha Tripathi and
                  Mohammad Wazid and
                  Jaskaran Singh and
                  Ashok Kumar Das},
  title        = {A secure signature-based access control and key management scheme
                  for fog computing-based IoT-enabled big data applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.353},
  doi          = {10.1002/SPY2.353},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KarnatakMTWSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhalafRASSSE24,
  author       = {Osamah Ibrahim Khalaf and
                  Ashokkumar S. R and
                  Sameer Algburi and
                  Anupallavi S and
                  Dhanasekaran Selvaraj and
                  Mhd Saeed Sharif and
                  Wael Elmedany},
  title        = {Federated learning with hybrid differential privacy for secure and
                  reliable cross-IoT platform knowledge sharing},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.374},
  doi          = {10.1002/SPY2.374},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhalafRASSSE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Khan24,
  author       = {Mohammed Rauf Ali Khan},
  title        = {Understanding impacts of a ransomware on medical and health facilities
                  by utilizing LockBit as a case study},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.328},
  doi          = {10.1002/SPY2.328},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Khan24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KrishnaiahNS24,
  author       = {Parikshith Nayaka Sheetakallu Krishnaiah and
                  Dayanand Lal Narayan and
                  Kartick Sutradhar},
  title        = {A survey on secure metadata of agile software development process
                  using blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.342},
  doi          = {10.1002/SPY2.342},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KrishnaiahNS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarDP24,
  author       = {Animesh Kumar and
                  Sandip Dutta and
                  Prashant Pranav},
  title        = {Analysis of {SQL} injection attacks in the cloud and in {WEB} applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.370},
  doi          = {10.1002/SPY2.370},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarDP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarS24,
  author       = {Pawan Kumar and
                  Sukhdip Singh},
  title        = {Enhancing android application security: {A} novel approach using DroidXGB
                  for malware detection based on permission analysis},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.361},
  doi          = {10.1002/SPY2.361},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarSSKG24,
  author       = {Ravi Kumar and
                  Samayveer Singh and
                  Deepti Singh and
                  Mohit Kumar and
                  Sukhpal Singh Gill},
  title        = {A robust and secure user authentication scheme based on multifactor
                  and multi-gateway in IoT enabled sensor networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.335},
  doi          = {10.1002/SPY2.335},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarSSKG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumariSGNGR24,
  author       = {Indu Kumari and
                  Pranav Kumar Singh and
                  Shivram N. Gowtham and
                  Sukumar Nandi and
                  Uttam Ghosh and
                  Danda B. Rawat},
  title        = {{RFPM:} {A} RSU-aided framework for pseudonym management to preserve
                  location privacy in IoV},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.329},
  doi          = {10.1002/SPY2.329},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumariSGNGR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LiLXDG24,
  author       = {Ruiqi Li and
                  Fupeng Li and
                  Peng Xu and
                  Shuiting Du and
                  Bingling Gu},
  title        = {Location privacy protection of nodes in the perception layer of the
                  Internet of things based on Radio Frequency Identification location
                  aware algorithm},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.368},
  doi          = {10.1002/SPY2.368},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LiLXDG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MakinaLR24,
  author       = {Hela Makina and
                  Asma Ben Letaifa and
                  Abderrezak Rachedi},
  title        = {Survey on security and privacy in Internet of Things-based eHealth
                  applications: Challenges, architectures, and future directions},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.346},
  doi          = {10.1002/SPY2.346},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MakinaLR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MekdadAACLFU24,
  author       = {Yassine Mekdad and
                  Ahmet Aris and
                  Abbas Acar and
                  Mauro Conti and
                  Riccardo Lazzeretti and
                  Abdeslam El Fergougui and
                  A. Selcuk Uluagac},
  title        = {A comprehensive security and performance assessment of {UAV} authentication
                  schemes},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.338},
  doi          = {10.1002/SPY2.338},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MekdadAACLFU24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MishraOM24,
  author       = {Ankita Mishra and
                  Mohammad S. Obaidat and
                  Dheerendra Mishra},
  title        = {Privacy preserving content distribution framework for multidistributor
                  {DRM} systems},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.327},
  doi          = {10.1002/SPY2.327},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MishraOM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NareshR24,
  author       = {Vankamamidi Srinivasa Naresh and
                  Sivaranjani Reddi},
  title        = {An identity-based secure {VANET} communication system},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.349},
  doi          = {10.1002/SPY2.349},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NareshR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OishiSATO24,
  author       = {Keiichiro Oishi and
                  Yuichi Sei and
                  J. Andrew and
                  Yasuyuki Tahara and
                  Akihiko Ohsuga},
  title        = {Algorithm to satisfy \emph{l}-diversity by combining dummy records
                  and grouping},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.373},
  doi          = {10.1002/SPY2.373},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OishiSATO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PaliAA24,
  author       = {Isha Pali and
                  Ruhul Amin and
                  Mohammad Abdussami},
  title        = {Autonomous vehicle security: Current survey and future research challenges},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.367},
  doi          = {10.1002/SPY2.367},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PaliAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PatelPKOATSY24,
  author       = {Alay Patel and
                  Devam Patel and
                  Riya Kakkar and
                  Parita Rajiv Oza and
                  Smita Agrawal and
                  Sudeep Tanwar and
                  Ravi Sharma and
                  Nagendar Yamsani},
  title        = {Safeguarding the IoT: Taxonomy, security solutions, and future research
                  opportunities},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.354},
  doi          = {10.1002/SPY2.354},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PatelPKOATSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PradhanDCJV24,
  author       = {Grishan Pradhan and
                  Babu R. Dawadi and
                  Abiral Chaulagain and
                  Anish Lal Joshi and
                  Prajal Govinda Vaidya},
  title        = {Chaos and {DNA} coding technique for image cryptography},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.359},
  doi          = {10.1002/SPY2.359},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PradhanDCJV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RaniKC24,
  author       = {Deepa Rani and
                  Rajeev Kumar and
                  Naveen Chauhan},
  title        = {A secure framework for IoT-based healthcare using blockchain and {IPFS}},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.348},
  doi          = {10.1002/SPY2.348},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RaniKC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RostamME24,
  author       = {Habib Esmaeelzadeh Rostam and
                  Homayun Motameni and
                  Rasul Enayatifar},
  title        = {Privacy-preserving in the smart healthcare system using steganography
                  and chaotic functions based on {DNA}},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.363},
  doi          = {10.1002/SPY2.363},
  timestamp    = {Fri, 17 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RostamME24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SanghviBHGVNDJTSY24,
  author       = {Harshil Sanghvi and
                  Rushir Bhavsar and
                  Vini Hundlani and
                  Lata Gohil and
                  Tarjni Vyas and
                  Anuja Nair and
                  Shivani Desai and
                  Nilesh Kumar Jadav and
                  Sudeep Tanwar and
                  Ravi Sharma and
                  Nagendar Yamsani},
  title        = {\emph{MetaHate}: AI-based hate speech detection for secured online
                  gaming in metaverse using blockchain},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.343},
  doi          = {10.1002/SPY2.343},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SanghviBHGVNDJTSY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SankhwarACJJV24,
  author       = {Shweta Sankhwar and
                  Rupali Ahuja and
                  Tanya Choubey and
                  Priyanshi Jain and
                  Tanusha Jain and
                  Muskan Verma},
  title        = {Cybercrime in India: An analysis of crime against women in ever expanding
                  digital space},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.340},
  doi          = {10.1002/SPY2.340},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SankhwarACJJV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SaurabhS24,
  author       = {Shyam Saurabh and
                  Kishore Sinha},
  title        = {Optimal key pre-distribution schemes from affine resolvable and partially
                  affine resolvable designs},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.334},
  doi          = {10.1002/SPY2.334},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SaurabhS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SchraheS24,
  author       = {Dominik Schrahe and
                  Thomas St{\"{a}}dter},
  title        = {Privacy preserving vaccinating- and testing-pass for the European
                  Union},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.332},
  doi          = {10.1002/SPY2.332},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SchraheS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SharmaAK24,
  author       = {Sandeep Sharma and
                  Prachi Ahlawat and
                  Kavita Khanna},
  title        = {DeepMDFC: {A} deep learning based android malware detection and family
                  classification method},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.347},
  doi          = {10.1002/SPY2.347},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SharmaAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SharmilaN24,
  author       = {B. S. Sharmila and
                  Rohini Nagapadma},
  title        = {{P-DNN:} Parallel {DNN} based {IDS} framework for the detection of
                  IoT vulnerabilities},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.330},
  doi          = {10.1002/SPY2.330},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SharmilaN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SinghHSB24,
  author       = {N. Joychandra Singh and
                  Nazrul Hoque and
                  Kh Robindro Singh and
                  Dhruba K. Bhattacharyya},
  title        = {Botnet-based IoT network traffic analysis using deep learning},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.355},
  doi          = {10.1002/SPY2.355},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SinghHSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SuHLJQXS24,
  author       = {Xiaole Su and
                  Yuanchao Hu and
                  Wei Liu and
                  Zhipeng Jiang and
                  Chan Qiu and
                  Jie Xiong and
                  Ju Sun},
  title        = {A blockchain-based smart contract model for secured energy trading
                  management in smart microgrids},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.341},
  doi          = {10.1002/SPY2.341},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SuHLJQXS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SubramaniARL24,
  author       = {Jegadeesan Subramani and
                  Maria Azees and
                  Arun Sekar Rajasekaran and
                  Jaime Lloret},
  title        = {Physically secure and privacy-preserving blockchain enabled authentication
                  scheme for internet of drones},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {3},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.364},
  doi          = {10.1002/SPY2.364},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SubramaniARL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VadherPNVDGTGS24,
  author       = {Himanshu Vadher and
                  Pal Patel and
                  Anuja Nair and
                  Tarjni Vyas and
                  Shivani Desai and
                  Lata Gohil and
                  Sudeep Tanwar and
                  Deepak Garg and
                  Anupam Singh},
  title        = {EEG-based biometric authentication system using convolutional neural
                  network for military applications},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.345},
  doi          = {10.1002/SPY2.345},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/VadherPNVDGTGS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VangalaDKVKP24,
  author       = {Anusha Vangala and
                  Ashok Kumar Das and
                  Neeraj Kumar and
                  Pandi Vijayakumar and
                  Marimuthu Karuppiah and
                  Youngho Park},
  title        = {Designing access control security protocol for Industry 4.0 using
                  Blockchain-as-a-Service},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.362},
  doi          = {10.1002/SPY2.362},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/VangalaDKVKP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VermaS24,
  author       = {Upendra Verma and
                  Mayank Sohani},
  title        = {An efficient lightweight authentication scheme for dew-assisted IoT
                  networks},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {2},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.360},
  doi          = {10.1002/SPY2.360},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/VermaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZoghiS24,
  author       = {Zeinab Zoghi and
                  G{\"{u}}rsel Serpen},
  title        = {{UNSW-NB15} computer security dataset: Analysis through visualization},
  journal      = {Secur. Priv.},
  volume       = {7},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1002/spy2.331},
  doi          = {10.1002/SPY2.331},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZoghiS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AbedA23,
  author       = {Ali Kamil Abed and
                  Angesh Anupam},
  title        = {Review of security issues in Internet of Things and artificial intelligence-driven
                  solutions},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.285},
  doi          = {10.1002/SPY2.285},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AbedA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AgrawalAT23,
  author       = {Kanika Agrawal and
                  Mayank Aggarwal and
                  Sudeep Tanwar},
  title        = {\emph{MyEasyHealthcare}: An efficient and secure three-tier blockchain-based
                  healthcare system},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.314},
  doi          = {10.1002/SPY2.314},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AgrawalAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AithekarGD23,
  author       = {Ashutosh Aithekar and
                  Pratik Gupta and
                  Dharminder Dharminder},
  title        = {A provably secure, shortest, and efficient identity based signcryption
                  technique in the standard model},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.272},
  doi          = {10.1002/SPY2.272},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AithekarGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlAttarAZ23,
  author       = {Zaid Shakir Al{-}Attar and
                  Tarek Abbes and
                  Faouzi Zerai},
  title        = {Privacy-preserving hands-free voice authentication leveraging edge
                  technology},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.290},
  doi          = {10.1002/SPY2.290},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AlAttarAZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AryamanNVA23,
  author       = {Aryaman and
                  Nenavath Srinivas Naik and
                  Satyanarayana Vollala and
                  Ruhul Amin},
  title        = {Detecting and predicting countermeasures against clickjacking},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.302},
  doi          = {10.1002/SPY2.302},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AryamanNVA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BangaB23,
  author       = {Manu Banga and
                  Abhay Bansal},
  title        = {Proposed software faults detection using hybrid approach},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.103},
  doi          = {10.1002/SPY2.103},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BangaB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BenimamST23,
  author       = {Houssem Benimam and
                  Said Sadoudi and
                  Djamel Teguig},
  title        = {Software defined radio implementation of a secure waveform for real-time
                  data transmission using universal software radio peripheral},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.280},
  doi          = {10.1002/SPY2.280},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BenimamST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BhattacharyaRCDS23,
  author       = {Munmun Bhattacharya and
                  Sandip Roy and
                  Samiran Chattopadhyay and
                  Ashok Kumar Das and
                  Sachin Shetty},
  title        = {A comprehensive survey on online social networks security and privacy
                  issues: Threats, machine learning-based solutions, and open challenges},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.275},
  doi          = {10.1002/SPY2.275},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BhattacharyaRCDS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/CaiZHZY23,
  author       = {Baorui Cai and
                  Bin Zhang and
                  Jinding He and
                  Rongkui Zhang and
                  Wenlin Yan},
  title        = {The risks brought by blockchain applications to the safe operation
                  of power grids},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.219},
  doi          = {10.1002/SPY2.219},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/CaiZHZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChandrakarBKDA23,
  author       = {Palak Chandrakar and
                  Rashi Bagga and
                  Yogesh Kumar and
                  Sanjeev Kumar Dwivedi and
                  Ruhul Amin},
  title        = {Blockchain based security protocol for device to device secure communication
                  in internet of things networks},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.267},
  doi          = {10.1002/SPY2.267},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ChandrakarBKDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChatterjeeRAKD23,
  author       = {Uddalak Chatterjee and
                  Sangram Ray and
                  Sharmistha Adhikari and
                  Muhammad Khurram Khan and
                  Mou Dasgupta},
  title        = {Efficient and secure e-voting scheme using elliptic curve cryptography},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.283},
  doi          = {10.1002/SPY2.283},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ChatterjeeRAKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChenHLYYZN23,
  author       = {Zhikui Chen and
                  Muhammad Zeeshan Haider and
                  Naiwen Luo and
                  Shuo Yu and
                  Xu Yuan and
                  Yaochen Zhang and
                  Tayyaba Noreen},
  title        = {Reputation-based partition scheme for IoT security},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.287},
  doi          = {10.1002/SPY2.287},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ChenHLYYZN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DamghaniED23,
  author       = {Hamidreza Damghani and
                  Soheila Estaji and
                  Leila Damghani},
  title        = {Providing robust and reversible watermarking algorithm and detection
                  of malicious manipulation},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.270},
  doi          = {10.1002/SPY2.270},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DamghaniED23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DuOWH23,
  author       = {Zhuang Du and
                  Mohammad S. Obaidat and
                  Guowei Wu and
                  Kuei{-}Fang Hsiao},
  title        = {An efficient caching security approach for content-centric mobile
                  networks in internet of things systems},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.294},
  doi          = {10.1002/SPY2.294},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DuOWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FarAH23,
  author       = {Saeed Banaeian Far and
                  Maryam Rajabzadeh Asaar and
                  Afrooz Haghbin},
  title        = {Zero-knowledge-based distributed auditing protocol},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.289},
  doi          = {10.1002/SPY2.289},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FarAH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FarR23,
  author       = {Saeed Banaeian Far and
                  Azadeh Imani Rad},
  title        = {What are the benefits and opportunities of launching a Metaverse for
                  {NEOM} city?},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.282},
  doi          = {10.1002/SPY2.282},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/FarR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FarooqCK23,
  author       = {Sameer Farooq and
                  Priyanka Chawla and
                  Neeraj Kumar},
  title        = {A cryptographic security framework for hybrid Cloud-Internet of Things
                  network},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.309},
  doi          = {10.1002/SPY2.309},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FarooqCK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GuptaK23,
  author       = {Shweta Gupta and
                  Adesh Kumar},
  title        = {Study on early accurate diagnosis and treatment of {COVID-19} with
                  smart phone tracking using bionics},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.303},
  doi          = {10.1002/SPY2.303},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/GuptaK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Hao23,
  author       = {Yunhui Hao},
  title        = {Intelligent control of electric automation instrumentation based on
                  blockchain},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.206},
  doi          = {10.1002/SPY2.206},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Hao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HemmatiZS23,
  author       = {Atefeh Hemmati and
                  Mani Zarei and
                  Alireza Souri},
  title        = {Blockchain-based internet of vehicles (BIoV): {A} systematic review
                  of surveys and reviews},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.317},
  doi          = {10.1002/SPY2.317},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HemmatiZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Hu23,
  author       = {Lei Hu},
  title        = {Implementation of the expansion of sensor information storage based
                  on the Internet of Things and cloud computing},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.215},
  doi          = {10.1002/SPY2.215},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Hu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/IbrishimovaL23,
  author       = {Marina Danchovsky Ibrishimova and
                  Kin Fun Li},
  title        = {Discerning cyber threatening incidents from ordinary events using
                  sentiment analysis and logistic regression},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.69},
  doi          = {10.1002/SPY2.69},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/IbrishimovaL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/IganiboAMBB23,
  author       = {Ibifubara Iganibo and
                  Massimiliano Albanese and
                  Marc Mosko and
                  Eric Bier and
                  Alejandro E. Brito},
  title        = {An attack volume metric},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.298},
  doi          = {10.1002/SPY2.298},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/IganiboAMBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JumaniSLHNQ23,
  author       = {Awais Khan Jumani and
                  Jinglun Shi and
                  Asif Ali Laghari and
                  Zhihui Hu and
                  Aftab ul Nabi and
                  Huang Qian},
  title        = {Fog computing security: {A} review},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.313},
  doi          = {10.1002/SPY2.313},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/JumaniSLHNQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KaushikK23,
  author       = {Keshav Kaushik and
                  Adarsh Kumar},
  title        = {Demystifying quantum blockchain for healthcare},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.284},
  doi          = {10.1002/SPY2.284},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KaushikK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhanparaLTTVS23,
  author       = {Pimal Khanpara and
                  Kruti Lavingia and
                  Rajvi Trivedi and
                  Sudeep Tanwar and
                  Amit Verma and
                  Ravi Sharma},
  title        = {A context-aware internet of things-driven security scheme for smart
                  homes},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.269},
  doi          = {10.1002/SPY2.269},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhanparaLTTVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhanparaSTVS23,
  author       = {Pimal Khanpara and
                  Ishwa Shah and
                  Sudeep Tanwar and
                  Amit Verma and
                  Ravi Sharma},
  title        = {Toward the internet of things forensics: {A} data analytics perspective},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.306},
  doi          = {10.1002/SPY2.306},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhanparaSTVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KiranMB23,
  author       = {Usha Kiran and
                  Rajat Moona and
                  Santosh Biswas},
  title        = {A protocol to establish trust on biometric authentication devices},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.305},
  doi          = {10.1002/SPY2.305},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KiranMB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarAB23,
  author       = {C. Madan Kumar and
                  Ruhul Amin and
                  M. Brindha},
  title        = {Cryptanalysis and improvement of {REAS-TMIS:} Resource-efficient authentication
                  scheme for telecare medical information system},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.268},
  doi          = {10.1002/SPY2.268},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KumarAB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarK23,
  author       = {Sunil Kumar and
                  Dilip Kumar},
  title        = {Performance evaluation and design of {B-128} modified Blowfish algorithm},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.307},
  doi          = {10.1002/SPY2.307},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarRS23,
  author       = {Akshay Kumar and
                  Rajneesh Rani and
                  Samayveer Singh},
  title        = {A survey of recent advances in image steganography},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.281},
  doi          = {10.1002/SPY2.281},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarRS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarRSKD23,
  author       = {Vivek Kumar and
                  Sangram Ray and
                  Dipanwita Sadhukhan and
                  Jayashree Karmakar and
                  Mou Dasgupta},
  title        = {Enhanced pairing-free identity-based broadcast authentication protocol
                  in {WSN} using ElGamal {ECC}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.278},
  doi          = {10.1002/SPY2.278},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarRSKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarWSSDPR23,
  author       = {Pankaj Kumar and
                  Mohammad Wazid and
                  Devesh Pratap Singh and
                  Jaskaran Singh and
                  Ashok Kumar Das and
                  Youngho Park and
                  Joel J. P. C. Rodrigues},
  title        = {Explainable artificial intelligence envisioned security mechanism
                  for cyber threat hunting},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.312},
  doi          = {10.1002/SPY2.312},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarWSSDPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumharB23,
  author       = {Malaram Kumhar and
                  Jitendra Bhatia},
  title        = {Software-defined networks-enabled fog computing for IoT-based healthcare:
                  Security, challenges and opportunities},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.291},
  doi          = {10.1002/SPY2.291},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumharB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LauYYC23,
  author       = {Chi Ho Lau and
                  Kai{-}Hau Yeung and
                  Fan Yan and
                  Sammy Chan},
  title        = {Blockchain-based authentication and secure communication in IoT networks},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.319},
  doi          = {10.1002/SPY2.319},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/LauYYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Li23,
  author       = {Qiang Li},
  title        = {Evaluation of enterprise financial investment environment based on
                  block-chain and cloud computing},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.217},
  doi          = {10.1002/SPY2.217},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Li23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LoneMA23,
  author       = {Aejaz Nazir Lone and
                  Suhel Mustajab and
                  Mahfooz Alam},
  title        = {A comprehensive study on cybersecurity challenges and opportunities
                  in the IoT world},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.318},
  doi          = {10.1002/SPY2.318},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LoneMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LuoLD23,
  author       = {Wenjun Luo and
                  Die Lai and
                  Zesen Dai},
  title        = {Research on disturbing white-box cryptography algorithm based on local
                  differential privacy},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.320},
  doi          = {10.1002/SPY2.320},
  timestamp    = {Fri, 15 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/LuoLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MaccarioN23,
  author       = {Guglielmo Maccario and
                  Maurizio Naldi},
  title        = {Privacy in smart speakers: {A} systematic literature review},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.274},
  doi          = {10.1002/SPY2.274},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MaccarioN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Mahajan23,
  author       = {Shilpa Mahajan},
  title        = {Phishing uniform resource locator detection using machine learning:
                  {A} step towards secure system},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.311},
  doi          = {10.1002/SPY2.311},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Mahajan23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MalarvizhiPB23,
  author       = {N. Malarvizhi and
                  R. Priya and
                  Rajaram Bhavani},
  title        = {An enhanced reversible image steganography using distributive Tian's
                  method},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.266},
  doi          = {10.1002/SPY2.266},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MalarvizhiPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MarascoAPVS23,
  author       = {Emanuela Marasco and
                  Massimiliano Albanese and
                  Venkata Vamsi Ram Patibandla and
                  Anudeep Vurity and
                  Sumanth Sai Sriram},
  title        = {Biometric multi-factor authentication: On the usability of the FingerPIN
                  scheme},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.261},
  doi          = {10.1002/SPY2.261},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MarascoAPVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MittalKK23,
  author       = {Gaurav Mittal and
                  Sunil Kumar and
                  Sandeep Kumar},
  title        = {An efficient procedure for online/offline ID-based signature using
                  extended chaotic maps and group ring},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.279},
  doi          = {10.1002/SPY2.279},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MittalKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MoritzU23,
  author       = {Stephan Moritz and
                  Osmanbey Uzunkol},
  title        = {Secure delegation of group exponentiations: Efficient and fully verifiable
                  schemes with two servers\({}^{\mbox{{\textdagger}}}\)},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.70},
  doi          = {10.1002/SPY2.70},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MoritzU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NkurunzizaTEL23,
  author       = {Egide Nkurunziza and
                  Lawrence Tandoh and
                  Issameldeen Elfadul and
                  Fagen Li},
  title        = {{ECAAP-SG:} Efficient certificateless anonymous authentication protocol
                  for {SG}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.273},
  doi          = {10.1002/SPY2.273},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/NkurunzizaTEL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PulipetiK23,
  author       = {Srikanth Pulipeti and
                  Adarsh Kumar},
  title        = {Secure quantum computing for healthcare sector: {A} short analysis},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.293},
  doi          = {10.1002/SPY2.293},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PulipetiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PursharthiM23,
  author       = {Komal Pursharthi and
                  Dheerendra Mishra},
  title        = {On the security of ring learning with error-based key exchange protocol
                  against signal leakage attack},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.310},
  doi          = {10.1002/SPY2.310},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PursharthiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RenugadeviJVBT23,
  author       = {N. Renugadevi and
                  Stheya Julakanti and
                  Sai Charan Vemula and
                  Somya Bhatnagar and
                  Shirisha Thangallapally},
  title        = {Low area and high throughput implementation of advanced encryption
                  standard hardware accelerator on {FPGA} using Mux-Demux pair},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.292},
  doi          = {10.1002/SPY2.292},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/RenugadeviJVBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SainiSJ23,
  author       = {Ikjot Saini and
                  Sherif Saad and
                  Arunita Jaekel},
  title        = {Evaluating the effectiveness of pseudonym changing strategies for
                  location privacy in vehicular ad-hoc network},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.68},
  doi          = {10.1002/SPY2.68},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SainiSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SalahdineHZ23,
  author       = {Fatima Salahdine and
                  Tao Han and
                  Ning Zhang},
  title        = {Security in 5G and beyond recent advances and future challenges},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.271},
  doi          = {10.1002/SPY2.271},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SalahdineHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SallamEEASEE23,
  author       = {Youssef F. Sallam and
                  Samy Abd El{-}Nabi and
                  Walid El{-}Shafai and
                  Hossam Eldin H. Ahmed and
                  Adel A. Saleeb and
                  Nirmeen A. El{-}Bahnasawy and
                  Fathi E. Abd El{-}Samie},
  title        = {Efficient implementation of image representation, visual geometry
                  group with 19 layers and residual network with 152 layers for intrusion
                  detection from {UNSW-NB15} dataset},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.300},
  doi          = {10.1002/SPY2.300},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SallamEEASEE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Sarda23,
  author       = {Thais Sard{\'{a}}},
  title        = {An onion with layers of hope and fear: {A} cross-case analysis of
                  the media representation of Tor Network reflecting theoretical perspectives
                  of new technologies},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.296},
  doi          = {10.1002/SPY2.296},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Sarda23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Sarker23,
  author       = {Iqbal H. Sarker},
  title        = {Multi-aspects AI-based modeling and adversarial learning for cybersecurity
                  intelligence and robustness: {A} comprehensive overview},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.295},
  doi          = {10.1002/SPY2.295},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Sarker23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ShahKPDTVS23,
  author       = {Kaushal Shah and
                  Sarth Kanani and
                  Shivam Patel and
                  Manan Devani and
                  Sudeep Tanwar and
                  Amit Verma and
                  Ravi Sharma},
  title        = {Blockchain-based object detection scheme using federated learning},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.276},
  doi          = {10.1002/SPY2.276},
  timestamp    = {Sat, 02 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ShahKPDTVS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ShanmugamB23,
  author       = {Sathiya Devi Shanmugam and
                  Arumugam Bhuvaneswari},
  title        = {Design of efficient storage and retrieval of medical records in blockchain
                  based on InterPlanetary File System and modified bloom tree},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.301},
  doi          = {10.1002/SPY2.301},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ShanmugamB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SharmaMR23,
  author       = {Shanil Sharma and
                  Dheerendra Mishra and
                  Saurabh Rana},
  title        = {A privacy oriented authorized key agreement framework for vehicular
                  edge computing},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {1},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.277},
  doi          = {10.1002/SPY2.277},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SharmaMR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SikiruOFOAOSGI23,
  author       = {Ismaeel Abiodun Sikiru and
                  Lukman Abiodun Olawoyin and
                  Nasir Faruk and
                  Abdulkarim Ayopo Oloyede and
                  Abubakar Abdulkarim and
                  Imam{-}Fulani Yusuf Olayinka and
                  Olugbenga A. Sowande and
                  Salisu Garba and
                  Agbotiname Lucky Imoize},
  title        = {Physical layer security using boundary technique for emerging wireless
                  communication systems},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.288},
  doi          = {10.1002/SPY2.288},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SikiruOFOAOSGI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SouriAK23,
  author       = {Alireza Souri and
                  Eyhab Al{-}Masri and
                  Saru Kumari},
  title        = {Blockchain architecture and methodologies for internet of things environment},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.299},
  doi          = {10.1002/SPY2.299},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SouriAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SreedharanK23,
  author       = {Ajish Sreedharan and
                  K. S. Anil Kumar},
  title        = {Effect of Hadamard multiplication on bloom filter and double bloom
                  filter transformations},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.316},
  doi          = {10.1002/SPY2.316},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SreedharanK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TrivediRPBTS23,
  author       = {Chandan Trivedi and
                  Udai Pratap Rao and
                  Keyur Parmar and
                  Pronaya Bhattacharya and
                  Sudeep Tanwar and
                  Ravi Sharma},
  title        = {A transformative shift toward blockchain-based IoT environments: Consensus,
                  smart contracts, and future directions},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.308},
  doi          = {10.1002/SPY2.308},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/TrivediRPBTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VasilopoulosOME23,
  author       = {Dimitrios Vasilopoulos and
                  Melek {\"{O}}nen and
                  Refik Molva and
                  Kaoutar Elkhiyaoui},
  title        = {Proofs of Data Reliability: Verification of reliable data storage
                  with automatic maintenance{\textdagger}},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.137},
  doi          = {10.1002/SPY2.137},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/VasilopoulosOME23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang23,
  author       = {Lin Wang},
  title        = {Optimization algorithm of digital media sharing platform based on
                  blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.205},
  doi          = {10.1002/SPY2.205},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang23a,
  author       = {Liping Wang},
  title        = {Financial risk analysis system and supervision based on big data and
                  blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.224},
  doi          = {10.1002/SPY2.224},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang23b,
  author       = {Ruijun Wang},
  title        = {Convergence model of "cloud + VR" technology on account of mobile
                  Internet of Things and exhibition industry},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.211},
  doi          = {10.1002/SPY2.211},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang23b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang23c,
  author       = {Yue Wang},
  title        = {Import and export trade forecasting algorithm based on blockchain
                  security and {PSO} optimized hybrid {RVM} model},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.218},
  doi          = {10.1002/SPY2.218},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang23c.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang23d,
  author       = {Juanling Wang},
  title        = {Research on the construction of accounting information audit quality
                  control system based on blockchain},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.227},
  doi          = {10.1002/SPY2.227},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang23d.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/WangLC23,
  author       = {Xu Wang and
                  Jui{-}Chuan Liu and
                  Chin{-}Chen Chang},
  title        = {A novel reversible data hiding scheme for {VQ} codebooks},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {6},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.315},
  doi          = {10.1002/SPY2.315},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/WangLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/WangLHY23,
  author       = {Rongxia Wang and
                  Zhifang Liu and
                  Fen He and
                  Weihuang Yang},
  title        = {Protection and detection of physical hazards for the intelligent system
                  under industrial Internet of Things by neural network},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.207},
  doi          = {10.1002/SPY2.207},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/WangLHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/XiaoW23,
  author       = {Haiyan Xiao and
                  Lifang Wang},
  title        = {Differential fault analysis on the lightweight block cipher plug-in
                  plug-out},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {3},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.286},
  doi          = {10.1002/SPY2.286},
  timestamp    = {Mon, 01 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/XiaoW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Yu23,
  author       = {Haiping Yu},
  title        = {Application of blockchain technology in the data processing security
                  system of financial enterprises},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.230},
  doi          = {10.1002/SPY2.230},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Yu23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Zhang23,
  author       = {Erni Zhang},
  title        = {Economic supply chain management of advanced manufacturing industry
                  based on blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.204},
  doi          = {10.1002/SPY2.204},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Zhang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Zhang23a,
  author       = {Baicheng Zhang},
  title        = {The strategy guidance of business English intercultural communication
                  based on blockchain security and genetic algorithms},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.214},
  doi          = {10.1002/SPY2.214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Zhang23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZhangYH23,
  author       = {Lan Zhang and
                  Bin Yu and
                  Liangsheng He},
  title        = {Differential analysis of the {NBC} algorithm based on mixed integer
                  linear programming model},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {4},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.297},
  doi          = {10.1002/SPY2.297},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZhangYH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZhangZ23,
  author       = {Jinfeng Zhang and
                  Dongdong Zhang},
  title        = {Internet of things network intrusion detection model based on quantum
                  artificial fish group and fuzzy kernel clustering algorithm},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.220},
  doi          = {10.1002/SPY2.220},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZhangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Zhen23,
  author       = {Yeping Zhen},
  title        = {Design of library smart cloud service system based on blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.213},
  doi          = {10.1002/SPY2.213},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Zhen23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Zhou23,
  author       = {Jingdong Zhou},
  title        = {Information construction of construction project management based
                  on internet of things blockchain},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {2},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.221},
  doi          = {10.1002/SPY2.221},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Zhou23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZiaMSMS23,
  author       = {Unsub Zia and
                  Mark McCartney and
                  Bryan W. Scotney and
                  Jorge Mart{\'{\i}}nez and
                  Ali Sajjad},
  title        = {A resource efficient pseudo random number generator based on sawtooth
                  maps for Internet of Things},
  journal      = {Secur. Priv.},
  volume       = {6},
  number       = {5},
  year         = {2023},
  url          = {https://doi.org/10.1002/spy2.304},
  doi          = {10.1002/SPY2.304},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZiaMSMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlevizosTE22,
  author       = {Lampis Alevizos and
                  Vinh{-}Thong Ta and
                  Max Hashem Eiza},
  title        = {Augmenting zero trust architecture to endpoints using blockchain:
                  {A} state-of-the-art review},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.191},
  doi          = {10.1002/SPY2.191},
  timestamp    = {Tue, 25 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlevizosTE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlmousaZSA22,
  author       = {May Almousa and
                  Tianyang Zhang and
                  Abdolhossein Sarrafzadeh and
                  Mohd Anwar},
  title        = {Phishing website detection: How effective are deep learning-based
                  models and hyperparameter optimization?},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.256},
  doi          = {10.1002/SPY2.256},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlmousaZSA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AnnaneALR22,
  author       = {Boubakeur Annane and
                  Adel Alti and
                  Lamri Laouamer and
                  Hamza Reffad},
  title        = {Cx-CP-ABE: Context-aware attribute-based access control schema and
                  blockchain technology to ensure scalable and efficient health data
                  privacy},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.249},
  doi          = {10.1002/SPY2.249},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AnnaneALR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AnwarGFG22,
  author       = {Memoona J. Anwar and
                  Asif Qumer Gill and
                  Anthony D. Fitzgibbon and
                  Inam Gull},
  title        = {{PESTLE+} risk analysis model to assess pandemic preparedness of digital
                  ecosystems},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.187},
  doi          = {10.1002/SPY2.187},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AnwarGFG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BairagiPBL22,
  author       = {Ravi Bairagi and
                  Preetesh Purohit and
                  Kailash Chandra Bandhu and
                  Ratnesh Litoriya},
  title        = {A secure and efficient mechanism for scheduling tasks in cloud computing
                  environments},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.252},
  doi          = {10.1002/SPY2.252},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BairagiPBL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BanerjeeKMAD22,
  author       = {Somesh Banerjee and
                  Khilesh Kumar and
                  Prajwal Masulkar and
                  Ruhul Amin and
                  Sanjeev Kumar Dwivedi},
  title        = {Blockchain and IPFS-based reliable land registry system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.236},
  doi          = {10.1002/SPY2.236},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BanerjeeKMAD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BarmanCSB22,
  author       = {Subhas Barman and
                  Samiran Chattopadhyay and
                  Debasis Samanta and
                  Sayantani Barman},
  title        = {A blockchain-based approach to secure electronic health records using
                  fuzzy commitment scheme},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.231},
  doi          = {10.1002/SPY2.231},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BarmanCSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BasicevicBO22,
  author       = {Ilija Basicevic and
                  Nikola Blazic and
                  Stanislav Ocovaj},
  title        = {On the use of principal component analysis in the entropy based detection
                  of denial-of-service attacks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.193},
  doi          = {10.1002/SPY2.193},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BasicevicBO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BegumU22,
  author       = {Mahbuba Begum and
                  Mohammad Shorif Uddin},
  title        = {Towards the development of an effective image watermarking system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.196},
  doi          = {10.1002/SPY2.196},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BegumU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BelalMGD22,
  author       = {Mohamad Mulham Belal and
                  Tanmoy Maitra and
                  Debasis Giri and
                  Ashok Kumar Das},
  title        = {Chaotic neural networks and farfalle construction based parallel keyed
                  secure hash function},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.259},
  doi          = {10.1002/SPY2.259},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BelalMGD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BhavnaniBMS22,
  author       = {Harshit Bhavnani and
                  Shreyansh Bardia and
                  Aniket Modi and
                  Ujwal Shah},
  title        = {An extensive review of data security infrastructure and legislature},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.189},
  doi          = {10.1002/SPY2.189},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BhavnaniBMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BryantS22,
  author       = {Blake D. Bryant and
                  Hossein Saiedian},
  title        = {Key challenges in security of IoT devices and securing them with the
                  blockchain technology},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.251},
  doi          = {10.1002/SPY2.251},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BryantS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Bu-Pasha22,
  author       = {Shakila Bu{-}Pasha},
  title        = {Legal aspects, public interest, and legitimate interest in processing
                  personal data to operate autonomous buses in the regular transportation
                  system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.247},
  doi          = {10.1002/SPY2.247},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Bu-Pasha22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/CheccoBLB22,
  author       = {Alessandro Checco and
                  Lorenzo Bracciale and
                  Douglas J. Leith and
                  Giuseppe Bianchi},
  title        = {OpenNym: Privacy preserving recommending via pseudonymous group authentication},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.201},
  doi          = {10.1002/SPY2.201},
  timestamp    = {Fri, 13 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/CheccoBLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChhabraL22,
  author       = {Surbhi Chhabra and
                  Kusum Lata},
  title        = {Towards the enhancement of {AES} {IP} security using hardware obfuscation
                  technique: {A} practical approach for secure data transmission in
                  IoT},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.233},
  doi          = {10.1002/SPY2.233},
  timestamp    = {Thu, 11 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ChhabraL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChhikaraRMM22,
  author       = {Deepak Chhikara and
                  Saurabh Rana and
                  Ankita Mishra and
                  Dheerendra Mishra},
  title        = {Construction of elliptic curve cryptography-based authentication protocol
                  for internet of things},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.226},
  doi          = {10.1002/SPY2.226},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ChhikaraRMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Choudhury22,
  author       = {Hiten Choudhury},
  title        = {Enhancing the Elliptic Curve Integrated Encryption Scheme in 5G mobile
                  network for home network identity privacy},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.222},
  doi          = {10.1002/SPY2.222},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Choudhury22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DandoohEEH22,
  author       = {Azza Dandooh and
                  Adel S. El{-}Fishawy and
                  Fathi E. Abd El{-}Samie and
                  Ezz El{-}Din Hemdan},
  title        = {Secure audio signal transmission based on color image watermarking},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.185},
  doi          = {10.1002/SPY2.185},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DandoohEEH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DharminderNA22,
  author       = {Dharminder Dharminder and
                  Ankur Nehra and
                  Aditya Arya},
  title        = {A construction of Chebyshev chaotic map based authenticated key agreement
                  protocol for satellite communication system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.257},
  doi          = {10.1002/SPY2.257},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/DharminderNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Dirik22,
  author       = {Mahmut Dirik},
  title        = {Predicting credit card fraud using multipurpose classification based
                  on evolutionary rules},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.239},
  doi          = {10.1002/SPY2.239},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Dirik22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DosselmannH22,
  author       = {Richard Dosselmann and
                  Howard J. Hamilton},
  title        = {Limiting sensitive values in an anonymized table while reducing information
                  loss via p-proportion},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.202},
  doi          = {10.1002/SPY2.202},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DosselmannH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DoyleGG22,
  author       = {Joseph Doyle and
                  Muhammed Golec and
                  Sukhpal Singh Gill},
  title        = {BlockchainBus: {A} lightweight framework for secure virtual machine
                  migration in cloud federations using blockchain},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.197},
  doi          = {10.1002/SPY2.197},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DoyleGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EbazadehF22,
  author       = {Yaser Ebazadeh and
                  Reza Fotohi},
  title        = {A reliable and secure method for network-layer attack discovery and
                  elimination in mobile ad-hoc networks based on a probabilistic threshold},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.183},
  doi          = {10.1002/SPY2.183},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EbazadehF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EldesoukySAE22,
  author       = {Samer Eldesouky and
                  Walid El Shafai and
                  Hossam Eldin H. Ahmed and
                  Fathi E. Abd El{-}Samie},
  title        = {Cancelable electrocardiogram biometric system based on chaotic encryption
                  using three-dimensional logistic map for biometric-based cloud services},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.198},
  doi          = {10.1002/SPY2.198},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EldesoukySAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GargWSSD22,
  author       = {Neha Garg and
                  Mohammad Wazid and
                  Jaskaran Singh and
                  Devesh Pratap Singh and
                  Ashok Kumar Das},
  title        = {Security in IoMT-driven smart healthcare: {A} comprehensive review
                  and open challenges},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.235},
  doi          = {10.1002/SPY2.235},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/GargWSSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GermanosZ22,
  author       = {Vasileios Germanos and
                  Wen Zeng},
  title        = {Model-based risk assessment evaluation},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.240},
  doi          = {10.1002/SPY2.240},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/GermanosZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/GuzeltepeC22,
  author       = {Murat G{\"{u}}zeltepe and
                  Selda {\c{C}}alkavur},
  title        = {Skew-cyclic codes based public-key cryptosystem approach},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.255},
  doi          = {10.1002/SPY2.255},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/GuzeltepeC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HathaliyaTS22,
  author       = {Jigna J. Hathaliya and
                  Sudeep Tanwar and
                  Priyanka Sharma},
  title        = {Adversarial learning techniques for security and privacy preservation:
                  {A} comprehensive review},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.209},
  doi          = {10.1002/SPY2.209},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HathaliyaTS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HemavathiAZS22,
  author       = {Hemavathi and
                  S. Akhila and
                  Samreen Zubeda and
                  Shashidhara},
  title        = {{DS2AN:} Deep stacked sparse autoencoder for secure and fast authentication
                  in HetNets},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.208},
  doi          = {10.1002/SPY2.208},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HemavathiAZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JalaliNEAF22,
  author       = {Foad Jalali and
                  Mehran Alidoost Nia and
                  Tatiana Ermakova and
                  Meisam Abdollahi and
                  Benjamin Fabian},
  title        = {Investigating the role of usable security in developers' intention
                  toward security enhancement in service-oriented applications},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.199},
  doi          = {10.1002/SPY2.199},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/JalaliNEAF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KebandeC22,
  author       = {Victor R. Kebande and
                  Kim{-}Kwang Raymond Choo},
  title        = {Finite state machine for cloud forensic readiness as a service (CFRaaS)
                  events},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.182},
  doi          = {10.1002/SPY2.182},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KebandeC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarA22,
  author       = {Shivansh Kumar and
                  Ruhul Amin},
  title        = {Decentralized trade finance using blockchain and lightning network},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.260},
  doi          = {10.1002/SPY2.260},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KumarA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarOGB22,
  author       = {Adarsh Kumar and
                  Carlo Ottaviani and
                  Sukhpal Singh Gill and
                  Rajkumar Buyya},
  title        = {Securing the future internet of things with post-quantum cryptography},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.200},
  doi          = {10.1002/SPY2.200},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarOGB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Li22,
  author       = {Yanting Li},
  title        = {A study of detection of abnormal network traffic: {A} comparison of
                  multiple algorithms},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.190},
  doi          = {10.1002/SPY2.190},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Li22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LuL22,
  author       = {Yang Lu and
                  Shujun Li},
  title        = {From data flows to privacy-benefit trade-offs: {A} user-centric semantic
                  model},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.225},
  doi          = {10.1002/SPY2.225},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LuL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MadaniMM22,
  author       = {Mirmorsal Madani and
                  Homayun Motameni and
                  Hosein Mohamadi},
  title        = {Fake news detection using deep learning integrating feature extraction,
                  natural language processing, and statistical descriptors},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.264},
  doi          = {10.1002/SPY2.264},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MadaniMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MahasingheJ22,
  author       = {Anuradha Mahasinghe and
                  Youvin Jayasinghe},
  title        = {An initial step toward a quantum annealing approach to the discrete
                  logarithm problem},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.234},
  doi          = {10.1002/SPY2.234},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MahasingheJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MannaSM22,
  author       = {Asmita Manna and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {A risk-based methodology for privacy requirements elicitation and
                  control selection},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.188},
  doi          = {10.1002/SPY2.188},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MannaSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MardiH22,
  author       = {Dhaneshwar Mardi and
                  Jaydeep Howlader},
  title        = {Anonymous Bitcoin transaction: {A} solution using secure multiparty
                  computation},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.232},
  doi          = {10.1002/SPY2.232},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MardiH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MartinRAA22,
  author       = {Kevin Martin and
                  Mohamed Rahouti and
                  Moussa Ayyash and
                  Izzat Alsmadi},
  title        = {Anomaly detection in blockchain using network representation and machine
                  learning},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.192},
  doi          = {10.1002/SPY2.192},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MartinRAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MatyokurehwaRGC22,
  author       = {Kanos Matyokurehwa and
                  Norman Rudhumbu and
                  Cross Gombiro and
                  Colletor Chipfumbu{-}Kangara},
  title        = {Enhanced social engineering framework mitigating against social engineering
                  attacks in higher education},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.237},
  doi          = {10.1002/SPY2.237},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MatyokurehwaRGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MukherjeeSM22,
  author       = {Preetam Mukherjee and
                  Anirban Sengupta and
                  Chandan Mazumdar},
  title        = {"Security Gap" as a metric for enterprise business processes},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.263},
  doi          = {10.1002/SPY2.263},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MukherjeeSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MurthyAT22,
  author       = {Amith Murthy and
                  Muhammad Rizwan Asghar and
                  Wanqing Tu},
  title        = {Towards a data-driven framework for optimizing security-efficiency
                  tradeoff in {QUIC}},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.184},
  doi          = {10.1002/SPY2.184},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MurthyAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NemaN22,
  author       = {Prashant Nema and
                  Manisha J. Nene},
  title        = {Quantum web of trust},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.195},
  doi          = {10.1002/SPY2.195},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NemaN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NemaN22a,
  author       = {Prashant Nema and
                  Manisha J. Nene},
  title        = {Qubits based mutual authentication protocol},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.203},
  doi          = {10.1002/SPY2.203},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NemaN22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PatelD22,
  author       = {Shreya Patel and
                  Rinku Dewri},
  title        = {Private record linkage with linkage maps},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.265},
  doi          = {10.1002/SPY2.265},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PatelD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PonnuruPROK22,
  author       = {Raveendra Babu Ponnuru and
                  Basker Palaniswamy and
                  Alavalapati Goutham Reddy and
                  Vanga Odelu and
                  Hyunsung Kim},
  title        = {A survey on security challenges and protocols of electric vehicle
                  dynamic charging system},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.210},
  doi          = {10.1002/SPY2.210},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PonnuruPROK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RajamanickamVR22,
  author       = {Siranjeevi Rajamanickam and
                  Satyanarayana Vollala and
                  Natarajan Ramasubramanian},
  title        = {{EAPIOD:} {ECC} based authentication protocol for insider attack protection
                  in IoD scenario},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.248},
  doi          = {10.1002/SPY2.248},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/RajamanickamVR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RanaKHS22,
  author       = {Shubham Rana and
                  Nitesh Kumar and
                  Anand Handa and
                  Sandeep K. Shukla},
  title        = {Automated Windows behavioral tracing for malware analysis},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.253},
  doi          = {10.1002/SPY2.253},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/RanaKHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RenugadeviTVJB22,
  author       = {N. Renugadevi and
                  Shirisha Thangallapally and
                  Sai Charan Vemula and
                  Stheya Julakanti and
                  Somya Bhatnagar},
  title        = {Methods for improving the implementation of advanced encryption standard
                  hardware accelerator on field programmable gate array-A survey},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.254},
  doi          = {10.1002/SPY2.254},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RenugadeviTVJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RipanIAS22,
  author       = {Rony Chowdhury Ripan and
                  Md. Moinul Islam and
                  Hamed AlQahtani and
                  Iqbal H. Sarker},
  title        = {Effectively predicting cyber-attacks through isolation forest learning-based
                  outlier detection},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.212},
  doi          = {10.1002/SPY2.212},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RipanIAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SaadKB22,
  author       = {Sabra Ben Saad and
                  Adlen Ksentini and
                  Bouziane Brik},
  title        = {An end-to-end trusted architecture for network slicing in 5G and beyond
                  networks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {1},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.186},
  doi          = {10.1002/SPY2.186},
  timestamp    = {Tue, 15 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SaadKB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SaurabhS22,
  author       = {Shyam Saurabh and
                  Kishore Sinha},
  title        = {Perfect secret sharing schemes from combinatorial squares},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.262},
  doi          = {10.1002/SPY2.262},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SaurabhS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/StephenJ22,
  author       = {Steffie Maria Stephen and
                  Arunita Jaekel},
  title        = {Roadside unit-based pseudonym authentication in vehicular ad hoc network},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.238},
  doi          = {10.1002/SPY2.238},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/StephenJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SumithraSM22,
  author       = {V. Sumithra and
                  Shashidhara and
                  Debajyoti Mukhopadhyay},
  title        = {Design of a secure and privacy preserving authentication protocol
                  for telecare medical information systems},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.228},
  doi          = {10.1002/SPY2.228},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SumithraSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasmeenU22,
  author       = {Fauzia Yasmeen and
                  Mohammad Shorif Uddin},
  title        = {A novel watermarking scheme based on discrete wavelet transform-singular
                  value decomposition},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {3},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.216},
  doi          = {10.1002/SPY2.216},
  timestamp    = {Wed, 27 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YasmeenU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasmeenU22a,
  author       = {Fauzia Yasmeen and
                  Mohammad Shorif Uddin},
  title        = {An efficient image steganography approach based on {QR} factorization
                  and singular value decomposition in non-subsampled contourlet transform
                  domain},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.229},
  doi          = {10.1002/SPY2.229},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/YasmeenU22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YiHZM22,
  author       = {Yuzi Yi and
                  Jingsha He and
                  Nafei Zhu and
                  Xiangjun Ma},
  title        = {Social influence-based privacy inference attacks in online social
                  networks},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {2},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.194},
  doi          = {10.1002/SPY2.194},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YiHZM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZengBX22,
  author       = {Fanfeng Zeng and
                  Haoyin Bai and
                  Ke Xiao},
  title        = {Blind watermarking algorithm combining NSCT, DWT, SVD, and {HVS}},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {4},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.223},
  doi          = {10.1002/SPY2.223},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ZengBX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZeydanTT22,
  author       = {Engin Zeydan and
                  Yekta Turk and
                  Yaman Yagiz Tasbag},
  title        = {Entropy service for secure real-time mission critical communications},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {6},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.258},
  doi          = {10.1002/SPY2.258},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ZeydanTT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZhangZJY22,
  author       = {Yongbing Zhang and
                  Qiuyu Zhang and
                  Yilong Jiang and
                  Yan Yan},
  title        = {A location privacy protection method based on cipher-text retrieval
                  in cloud environment},
  journal      = {Secur. Priv.},
  volume       = {5},
  number       = {5},
  year         = {2022},
  url          = {https://doi.org/10.1002/spy2.250},
  doi          = {10.1002/SPY2.250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZhangZJY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AgwiIO21,
  author       = {Uche C. Agwi and
                  Martins E. Irhebhude and
                  Francisca Nonyelum Ogwueleka},
  title        = {Video surveillance in examination monitoring},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.144},
  doi          = {10.1002/SPY2.144},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AgwiIO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AhmadE21,
  author       = {Humza Ahmad and
                  Laszlo Erdodi},
  title        = {Overview of phishing landscape and homographs in Arabic domain names},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.159},
  doi          = {10.1002/SPY2.159},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AhmadE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AjdaniG21,
  author       = {Mahdi Ajdani and
                  Hamid Reza Ghaffary},
  title        = {Introduced a new method for enhancement of intrusion detection with
                  random forest and {PSO} algorithm},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.147},
  doi          = {10.1002/SPY2.147},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AjdaniG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlotaibiAH21,
  author       = {Reem Alotaibi and
                  Tahani Alnazzawi and
                  Nermin Hamza},
  title        = {A new location-based privacy protection algorithm with deep learning},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.139},
  doi          = {10.1002/SPY2.139},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlotaibiAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlzoubiOJA21,
  author       = {Yehia Ibrahim Alzoubi and
                  Valmira H. Osmanaj and
                  Ashraf Jaradat and
                  Ahmad Salah Al{-}Ahmad},
  title        = {Fog computing security and privacy for the Internet of Thing applications:
                  State-of-the-art},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.145},
  doi          = {10.1002/SPY2.145},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AlzoubiOJA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AshawaM21,
  author       = {Moses Ashawa and
                  Sarah Morris},
  title        = {Android Permission Classifier: a deep learning algorithmic framework
                  based on protection and threat levels},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.164},
  doi          = {10.1002/SPY2.164},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AshawaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BahlSA21,
  author       = {Aditya Bahl and
                  Aastha Sharma and
                  Muhammad Rizwan Asghar},
  title        = {Vulnerability disclosure and cybersecurity awareness campaigns on
                  twitter during {COVID-19}},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.180},
  doi          = {10.1002/SPY2.180},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/BahlSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BasicevicBO21,
  author       = {Ilija Basicevic and
                  Nikola Blazic and
                  Stanislav Ocovaj},
  title        = {On the use of generalized entropy formulas in detection of denial-of-service
                  attacks},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.134},
  doi          = {10.1002/SPY2.134},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BasicevicBO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ChunkaGB21,
  author       = {Chukhu Chunka and
                  Rajat Subhra Goswami and
                  Subhasish Banerjee},
  title        = {An efficient mechanism to generate dynamic keys based on genetic algorithm},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.37},
  doi          = {10.1002/SPY2.37},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ChunkaGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/CzeksterMCSPD21,
  author       = {Ricardo M. Czekster and
                  Charles Morisset and
                  John A. Clark and
                  Sadegh Soudjani and
                  Charalampos Patsios and
                  Peter Davison},
  title        = {Systematic review of features for co-simulating security incidents
                  in Cyber-Physical Systems},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.150},
  doi          = {10.1002/SPY2.150},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/CzeksterMCSPD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Faisal21,
  author       = {Kamrul Faisal},
  title        = {Balancing between Right to Be Forgotten and Right to Freedom of Expression
                  in Spent Criminal Convictions},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.157},
  doi          = {10.1002/SPY2.157},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Faisal21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FarR21,
  author       = {Saeed Banaeian Far and
                  Azadeh Imani Rad},
  title        = {Distributed auditing protocol for blockchain-based transactions using
                  a distributed signature},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.156},
  doi          = {10.1002/SPY2.156},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FarR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FuL21,
  author       = {Rui Fu and
                  Xinyu Li},
  title        = {Malicious attacks on the web and crawling of information data by Python
                  technology},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.173},
  doi          = {10.1002/SPY2.173},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Ghiyamipour21,
  author       = {Fatemeh Ghiyamipour},
  title        = {Secure graphical password based on cued click points using fuzzy logic},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.140},
  doi          = {10.1002/SPY2.140},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Ghiyamipour21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/JustinePT21,
  author       = {Cynara Justine and
                  Rendhir R. Prasad and
                  Ciza Thomas},
  title        = {Game theoretical analysis of usable security and privacy},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.55},
  doi          = {10.1002/SPY2.55},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/JustinePT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KatarahweireBMN21,
  author       = {Marriette Katarahweire and
                  Engineer Bainomugisha and
                  Khalid A. Mughal and
                  John Ngubiri},
  title        = {Form-based security in mobile health data collection systems},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.155},
  doi          = {10.1002/SPY2.155},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KatarahweireBMN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KebandeKCA21,
  author       = {Victor R. Kebande and
                  Nickson M. Karie and
                  Kim{-}Kwang Raymond Choo and
                  Sadi Alawadi},
  title        = {Digital forensic readiness intelligence crime repository},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.151},
  doi          = {10.1002/SPY2.151},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KebandeKCA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarA21,
  author       = {Shivansh Kumar and
                  Ruhul Amin},
  title        = {Mitigating distributed denial of service attack: Blockchain and software-defined
                  networking based approach, network model with future research challenges},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.163},
  doi          = {10.1002/SPY2.163},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KumarA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarBA21,
  author       = {Shivansh Kumar and
                  Aman Kumar Bharti and
                  Ruhul Amin},
  title        = {Decentralized secure storage of medical records using Blockchain and
                  {IPFS:} {A} comparative analysis with future directions},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.162},
  doi          = {10.1002/SPY2.162},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KumarBA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LiJ21,
  author       = {Zhijun Li and
                  Xuedong Jiang},
  title        = {Detection and defense of network virus using data mining technology},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.179},
  doi          = {10.1002/SPY2.179},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LiJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LiuGW21,
  author       = {Fei Liu and
                  Hongyan Gao and
                  Ze{-}Gang Wei},
  title        = {Research on the game of network security attack-defense confrontation
                  through the optimal defense strategy},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.136},
  doi          = {10.1002/SPY2.136},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LiuGW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MakuraVKKIA21,
  author       = {Sheunesu M. Makura and
                  H. S. Venter and
                  Victor R. Kebande and
                  Nickson M. Karie and
                  Richard Adeyemi Ikuesan and
                  Sadi Alawadi},
  title        = {Digital forensic readiness in operational cloud leveraging {ISO/IEC}
                  27043 guidelines on security monitoring},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.149},
  doi          = {10.1002/SPY2.149},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MakuraVKKIA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MardiTH21,
  author       = {Dhaneshwar Mardi and
                  Surbhi Tanwar and
                  Jaydeep Howlader},
  title        = {Multiparty protocol that usually shuffles},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.176},
  doi          = {10.1002/SPY2.176},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MardiTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MatyokurehwaRGM21,
  author       = {Kanos Matyokurehwa and
                  Norman Rudhumbu and
                  Cross Gombiro and
                  Chiedza Mlambo},
  title        = {Cybersecurity awareness in Zimbabwean universities: Perspectives from
                  the students},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.141},
  doi          = {10.1002/SPY2.141},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MatyokurehwaRGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MehibelH21,
  author       = {Nissa Mehibel and
                  M'hamed Hamadouche},
  title        = {Authenticated secret session key using elliptic curve digital signature
                  algorithm},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.148},
  doi          = {10.1002/SPY2.148},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MehibelH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MercanCAATD21,
  author       = {Suat Mercan and
                  Mumin Cebe and
                  Ramazan Savas Ayg{\"{u}}n and
                  Kemal Akkaya and
                  Elijah Toussaint and
                  Dominik Danko},
  title        = {Blockchain-based video forensics and integrity verification framework
                  for wireless Internet-of-Things devices},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.143},
  doi          = {10.1002/SPY2.143},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MercanCAATD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MisraGTK21,
  author       = {Sudip Misra and
                  Sumit Goswami and
                  Chaynika Taneja and
                  Pushpendu Kar},
  title        = {Heterogeneous polydentate mobile chelating node to detect breach in
                  surveillance sensor network},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.175},
  doi          = {10.1002/SPY2.175},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/MisraGTK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NaharGR21,
  author       = {Kamrun Nahar and
                  Asif Qumer Gill and
                  Terry Roach},
  title        = {Developing an access control management metamodel for secure digital
                  enterprise architecture modeling},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.160},
  doi          = {10.1002/SPY2.160},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NaharGR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OlakanmiD21,
  author       = {Oladayo Olufemi Olakanmi and
                  Adedamola Dada},
  title        = {An efficient point-to-point security solution for multihop routing
                  in wireless sensor networks},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.58},
  doi          = {10.1002/SPY2.58},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/OlakanmiD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OlakanmiO21,
  author       = {Oladayo Olufemi Olakanmi and
                  Kehinde Oluwasesan Odeyemi},
  title        = {A secure and collaborative data aggregation scheme for fine-grained
                  data distribution and management in Internet of Things},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.135},
  doi          = {10.1002/SPY2.135},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OlakanmiO21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OlakanmiO21a,
  author       = {Oladayo Olufemi Olakanmi and
                  Kehinde Oluwasesan Odeyemi},
  title        = {Throttle: An efficient approach to mitigate distributed denial of
                  service attacks on software-defined networks},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.158},
  doi          = {10.1002/SPY2.158},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OlakanmiO21a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PandaMMS21,
  author       = {Sandeep Kumar Panda and
                  Gouse Baig Mohammad and
                  Sachi Nandan Mohanty and
                  Sipra Sahoo},
  title        = {Smart contract-based land registry system to reduce frauds and time
                  delay},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.172},
  doi          = {10.1002/SPY2.172},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PandaMMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RanaM21,
  author       = {Saurabh Rana and
                  Dheerendra Mishra},
  title        = {Cryptanalysis and improvement of biometric based content distribution
                  framework for digital rights management systems},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.133},
  doi          = {10.1002/SPY2.133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RanaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RussoBB21,
  author       = {Pietro Russo and
                  Lorenzo Bracciale and
                  Giuseppe Bianchi},
  title        = {Dare-to-Share: Collaborative privacy-preserving recommendations with
                  (almost) no crypto},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.153},
  doi          = {10.1002/SPY2.153},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RussoBB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SahraouiB21,
  author       = {Somia Sahraoui and
                  Azeddine Bilami},
  title        = {Securing human-to-thing interactions in the Internet of Things with
                  asymmetric and selective mechanism},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.38},
  doi          = {10.1002/SPY2.38},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SahraouiB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SankhwarPKM21,
  author       = {Shweta Sankhwar and
                  Dhirendra Pandey and
                  Raees Ahmad Khan and
                  Sachi Nandan Mohanty},
  title        = {An anti-phishing enterprise environ model using feed-forward backpropagation
                  and Levenberg-Marquardt method},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.132},
  doi          = {10.1002/SPY2.132},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SankhwarPKM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SelimHSE21,
  author       = {Gamal Eldin I. Selim and
                  Ezz El{-}Din Hemdan and
                  Ahmed M. Shehata and
                  Nawal A. El{-}Fishawy},
  title        = {An efficient machine learning model for malicious activities recognition
                  in water-based industrial internet of things},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.154},
  doi          = {10.1002/SPY2.154},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SelimHSE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ShamsuzzohaR21,
  author       = {Ahm Shamsuzzoha and
                  Heli Raappana},
  title        = {Perspectives of business process ethics in data-driven marketing management},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.177},
  doi          = {10.1002/SPY2.177},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ShamsuzzohaR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ShashidharaALAD21,
  author       = {R. Shashidhara and
                  Nisha Ahuja and
                  M. Lajuvanthi and
                  S. Akhila and
                  Ashok Kumar Das and
                  Joel J. P. C. Rodrigues},
  title        = {SDN-chain: Privacy-preserving protocol for software defined networks
                  using blockchain},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.178},
  doi          = {10.1002/SPY2.178},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/ShashidharaALAD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SrivastavaMKJDP21,
  author       = {Shubhi Srivastava and
                  Mohit and
                  Arun Kumar and
                  Sudhanshu Kumar Jha and
                  Pratibha Dixit and
                  Shiv Prakash},
  title        = {Event-driven data alteration detection using block-chain},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.146},
  doi          = {10.1002/SPY2.146},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SrivastavaMKJDP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/StojnicVA21,
  author       = {Tatyana Stojnic and
                  Dinusha Vatsalan and
                  Nalin A. G. Arachchilage},
  title        = {Phishing email strategies: Understanding cybercriminals' strategies
                  of crafting phishing emails},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {5},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.165},
  doi          = {10.1002/SPY2.165},
  timestamp    = {Wed, 03 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/StojnicVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/UnderwoodS21,
  author       = {Ben Underwood and
                  Hossein Saiedian},
  title        = {Mass surveillance: {A} study of past practices and technologies to
                  predict future directions},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {2},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.142},
  doi          = {10.1002/SPY2.142},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/UnderwoodS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Wang21,
  author       = {Gang Wang},
  title        = {Comparative study on different neural networks for network security
                  situation prediction},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {1},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.138},
  doi          = {10.1002/SPY2.138},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Wang21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/WuLSG21,
  author       = {Haotian Wu and
                  Xin Li and
                  Caterina M. Scoglio and
                  Don Gruenbacher},
  title        = {Security inspection resource allocation in real time using {SDN}},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.174},
  doi          = {10.1002/SPY2.174},
  timestamp    = {Mon, 08 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/WuLSG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasinFLWAW21,
  author       = {Affan Yasin and
                  Rubia Fatima and
                  Lin Liu and
                  Jianmin Wang and
                  Raian Ali and
                  Ziqi Wei},
  title        = {Understanding and deciphering of social engineering attack scenarios},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {4},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.161},
  doi          = {10.1002/SPY2.161},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YasinFLWAW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Yuan21,
  author       = {Li Yuan},
  title        = {Prediction of network security situation awareness based on an improved
                  model combined with neural network},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {6},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.181},
  doi          = {10.1002/SPY2.181},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/Yuan21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ZareiF21,
  author       = {Seyed Meysam Zarei and
                  Reza Fotohi},
  title        = {Defense against flooding attacks using probabilistic thresholds in
                  the internet of things ecosystem},
  journal      = {Secur. Priv.},
  volume       = {4},
  number       = {3},
  year         = {2021},
  url          = {https://doi.org/10.1002/spy2.152},
  doi          = {10.1002/SPY2.152},
  timestamp    = {Sun, 16 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ZareiF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Adams20,
  author       = {Carlisle Adams},
  title        = {A privacy-preserving Blockchain with fine-grained access control},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.97},
  doi          = {10.1002/SPY2.97},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Adams20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AkramMSGT20,
  author       = {Shaik Vaseem Akram and
                  Praveen Kumar Malik and
                  Rajesh Singh and
                  Anita Gehlot and
                  Sudeep Tanwar},
  title        = {Adoption of blockchain technology in various realms: Opportunities
                  and challenges},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.109},
  doi          = {10.1002/SPY2.109},
  timestamp    = {Fri, 29 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AkramMSGT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Al-GhamdiAA20,
  author       = {Al{-}Batool Al{-}Ghamdi and
                  Ameenah Al{-}Sulami and
                  Asia Othman Aljahdali},
  title        = {On the security and confidentiality of quantum key distribution},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.111},
  doi          = {10.1002/SPY2.111},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Al-GhamdiAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AngaforYH20,
  author       = {Giddeon Njamngang Angafor and
                  Iryna Yevseyeva and
                  Ying He},
  title        = {Game-based learning: {A} review of tabletop exercises for cybersecurity
                  incident response training},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.126},
  doi          = {10.1002/SPY2.126},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/AngaforYH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BelguithKR20,
  author       = {Sana Belguith and
                  Nesrine Kaaniche and
                  Giovanni Russello},
  title        = {{CUPS:} Secure opportunistic cloud of things framework based on attribute-based
                  encryption scheme supporting access policy update},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.85},
  doi          = {10.1002/SPY2.85},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BelguithKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BoudjemaVMF20,
  author       = {El Habib Boudjema and
                  Sergey Verlan and
                  Lynda Mokdad and
                  Christ{\`{e}}le Faure},
  title        = {{VYPER:} Vulnerability detection in binary code},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.100},
  doi          = {10.1002/SPY2.100},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BoudjemaVMF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DashNNOI20,
  author       = {Pandit Byomakesha Dash and
                  Janmenjoy Nayak and
                  Bighnaraj Naik and
                  Etuari Oram and
                  SK Hafizul Islam},
  title        = {Model based IoT security framework using multiclass adaptive boosting
                  with {SMOTE}},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.112},
  doi          = {10.1002/SPY2.112},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DashNNOI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DeyCG20,
  author       = {Sankhanil Dey and
                  Amlan Chakrabarti and
                  Ranjan Ghosh},
  title        = {4-bit Boolean functions in generation and cryptanalysis of secure
                  4-bit crypto S-boxes},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.90},
  doi          = {10.1002/SPY2.90},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DeyCG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DeyCG20a,
  author       = {Sankhanil Dey and
                  Amlan Chakrabarti and
                  Ranjan Ghosh},
  title        = {A new algorithm to find monic irreducible polynomials over extended
                  Galois field GF(pq) using positional arithmetic},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.110},
  doi          = {10.1002/SPY2.110},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DeyCG20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DharminderM20,
  author       = {Dharminder Dharminder and
                  Dheerendra Mishra},
  title        = {Understanding signcryption security in standard model},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.105},
  doi          = {10.1002/SPY2.105},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DharminderM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DuarteHTG20,
  author       = {Elias P. Duarte Jr. and
                  Carmem S. Hara and
                  Pedro R. Torres Jr. and
                  Christian Gomes},
  title        = {BackStreamDB: {A} stream processing engine for backbone traffic monitoring
                  with anomaly detection},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.106},
  doi          = {10.1002/SPY2.106},
  timestamp    = {Mon, 24 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/DuarteHTG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ElkhodrA20,
  author       = {Mahmoud Elkhodr and
                  Belal Alsinglawi},
  title        = {Data provenance and trust establishment in the Internet of Things},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.99},
  doi          = {10.1002/SPY2.99},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ElkhodrA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FerraWBHPS20,
  author       = {Fenia Ferra and
                  Isabel Wagner and
                  Eerke A. Boiten and
                  Lee Hadlington and
                  Ismini Psychoula and
                  Richard Snape},
  title        = {Challenges in assessing privacy impact: Tales from the front lines},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.101},
  doi          = {10.1002/SPY2.101},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/FerraWBHPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FiroozjaeiLG20,
  author       = {Mahdi Daghmehchi Firoozjaei and
                  Rongxing Lu and
                  Ali A. Ghorbani},
  title        = {An evaluation framework for privacy-preserving solutions applicable
                  for blockchain-based internet-of-things platforms},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.131},
  doi          = {10.1002/SPY2.131},
  timestamp    = {Sat, 25 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/FiroozjaeiLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HosseinzadehSIL20,
  author       = {Shohreh Hosseinzadeh and
                  Bernardo Sequeiros and
                  Pedro R. M. In{\'{a}}cio and
                  Ville Lepp{\"{a}}nen},
  title        = {Recent trends in applying {TPM} to cloud computing},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.93},
  doi          = {10.1002/SPY2.93},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HosseinzadehSIL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KamilO20,
  author       = {Ismaila Adeniyi Kamil and
                  Sunday Oyinlola Ogundoyin},
  title        = {On the security of privacy-preserving authentication scheme with full
                  aggregation in vehicular ad hoc network},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.104},
  doi          = {10.1002/SPY2.104},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KamilO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhanasB20,
  author       = {Yuriy Khanas and
                  Michal Borecki},
  title        = {Research on the use of algorithms for matrix transformations for encrypting
                  text information},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.108},
  doi          = {10.1002/SPY2.108},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhanasB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KhwajaMA20,
  author       = {Amir A. Khwaja and
                  Muniba Murtaza and
                  Hafiz F. Ahmed},
  title        = {A security feature framework for programming languages to minimize
                  application layer vulnerabilities},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.95},
  doi          = {10.1002/SPY2.95},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KhwajaMA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KunalGST20,
  author       = {Sourav Kunal and
                  Parth Gandhi and
                  Ronak Sutariya and
                  Hardik Tarpara},
  title        = {A secure software defined networking for distributed environment},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.130},
  doi          = {10.1002/SPY2.130},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KunalGST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MeshramIMKB20,
  author       = {Chandrashekhar Meshram and
                  Rabha W. Ibrahim and
                  Sarita Gajbhiye Meshram and
                  Kailash Wamanrao Kalare and
                  Sunil D. Bagde},
  title        = {An efficient ID-based cryptographic technique using {IFP} and {GDLP}},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.119},
  doi          = {10.1002/SPY2.119},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MeshramIMKB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MustacogluCF20,
  author       = {Ahmet Fatih Mustacoglu and
                  Ferhat {\"{O}}zg{\"{u}}r {\c{C}}atak and
                  Geoffrey C. Fox},
  title        = {Password-based encryption approach for securing sensitive data},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.121},
  doi          = {10.1002/SPY2.121},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MustacogluCF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NgwenyaN20,
  author       = {Mfanasibili Ngwenya and
                  Mpho Ngoepe},
  title        = {A framework for data security, privacy, and trust in "consumer internet
                  of things" assemblages in South Africa},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.122},
  doi          = {10.1002/SPY2.122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NgwenyaN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NikooghadamA20,
  author       = {Mahdi Nikooghadam and
                  Haleh Amintoosi},
  title        = {A secure and robust elliptic curve cryptography-based mutual authentication
                  scheme for session initiation protocol},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {1},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.92},
  doi          = {10.1002/SPY2.92},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NikooghadamA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NodelandB20,
  author       = {Brooke Nodeland and
                  Scott Belshaw},
  title        = {Establishing a criminal justice cyber lab to develop and enhance professional
                  and educational opportunities},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.123},
  doi          = {10.1002/SPY2.123},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NodelandB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/NtonjaA20,
  author       = {Morris Ntonja and
                  Moses Ashawa},
  title        = {Examining artifacts generated by setting Facebook Messenger as a default
                  {SMS} application on Android: Implication for personal data privacy},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.128},
  doi          = {10.1002/SPY2.128},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/NtonjaA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OlorunsolaOE20,
  author       = {Olufunso Stephen Olorunsola and
                  Francisca Nonyelum Ogwueleka and
                  Abraham E. Evwiekpaefe},
  title        = {Assessment of privacy and security perception of biometric technology
                  case study of Kaduna state tertiary academic institutions},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.124},
  doi          = {10.1002/SPY2.124},
  timestamp    = {Thu, 08 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OlorunsolaOE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PRSG20,
  author       = {Akhila G. P. and
                  Gayathri R. and
                  Keerthana S. and
                  Angelin Gladston},
  title        = {A machine learning framework for domain generating algorithm based
                  malware detection},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.127},
  doi          = {10.1002/SPY2.127},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PRSG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SarfrazZA20,
  author       = {Umair Sarfraz and
                  Sherali Zeadally and
                  Masoom Alam},
  title        = {Outsourcing {IOTA} proof-of-work to volunteer public devices},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {2},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.98},
  doi          = {10.1002/SPY2.98},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SarfrazZA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SharmaN20,
  author       = {Mohit Kumar Sharma and
                  Manisha J. Nene},
  title        = {Two-factor authentication using biometric based quantum operations},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.102},
  doi          = {10.1002/SPY2.102},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SharmaN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SharmaN20a,
  author       = {Mohit Kumar Sharma and
                  Manisha J. Nene},
  title        = {Dual factor third-party biometric-based authentication scheme using
                  quantum one time passwords{\textdagger}},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.129},
  doi          = {10.1002/SPY2.129},
  timestamp    = {Mon, 14 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SharmaN20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SiiskonenR20,
  author       = {Tuuli Siiskonen and
                  Mika Rantonen},
  title        = {Detecting Stuxnet-like data integrity attacks},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.107},
  doi          = {10.1002/SPY2.107},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SiiskonenR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SinghTS20,
  author       = {Rajeev Singh and
                  Sudeep Tanwar and
                  Teek Parval Sharma},
  title        = {Utilization of blockchain for mitigating the distributed denial of
                  service attacks},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {3},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.96},
  doi          = {10.1002/SPY2.96},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SinghTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/StergiopoulosKV20,
  author       = {George Stergiopoulos and
                  Nick Kapetanas and
                  Efstratios Vasilellis and
                  Dimitris Gritzalis},
  title        = {Leaking supervisory controls and data acquisition commands over unpadded
                  {TCP/IP} encryption through differential packet size analysis},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.82},
  doi          = {10.1002/SPY2.82},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/StergiopoulosKV20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TharaniA20,
  author       = {Jeyakumar Samantha Tharani and
                  Nalin A. G. Arachchilage},
  title        = {Understanding phishers' strategies of mimicking uniform resource locators
                  to leverage phishing attacks: {A} machine learning approach},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {5},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.120},
  doi          = {10.1002/SPY2.120},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/TharaniA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VaddetiVPPSA20,
  author       = {Ankitha Vaddeti and
                  Deepthi Vidiyala and
                  Vineetha Puritipati and
                  Raveendra Babu Ponnuru and
                  Ji Sun Shin and
                  Goutham Reddy Alavalapati},
  title        = {Graphical passwords: Behind the attainment of goals},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {6},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.125},
  doi          = {10.1002/SPY2.125},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/VaddetiVPPSA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YaqubKA20,
  author       = {Waheeb Yaqub and
                  Ibrahim Kamel and
                  Zeyar Aung},
  title        = {Toward watermarking compressed data in columnar database architectures},
  journal      = {Secur. Priv.},
  volume       = {3},
  number       = {4},
  year         = {2020},
  url          = {https://doi.org/10.1002/spy2.84},
  doi          = {10.1002/SPY2.84},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YaqubKA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Abbasinezhad-Mood19,
  author       = {Dariush Abbasinezhad{-}Mood and
                  Arezou Ostad{-}Sharif and
                  Morteza Nikooghadam},
  title        = {Novel chaotic map-based privacy-preserving authenticated key agreement
                  scheme without the electricity service provider involvement},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.74},
  doi          = {10.1002/SPY2.74},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AcarLBAU19,
  author       = {Abbas Acar and
                  Wenyi Liu and
                  Raheem Beyah and
                  Kemal Akkaya and
                  Arif Selcuk Uluagac},
  title        = {A privacy-preserving multifactor authentication system},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.88},
  doi          = {10.1002/SPY2.88},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AcarLBAU19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AcarLBAU19a,
  author       = {Abbas Acar and
                  Wenyi Liu and
                  Raheem Beyah and
                  Kemal Akkaya and
                  Arif Selcuk Uluagac},
  title        = {A privacy-preserving multifactor authentication system},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.94},
  doi          = {10.1002/SPY2.94},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AcarLBAU19a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AgarkarA19,
  author       = {Aarti Amod Agarkar and
                  Himanshu Agrawal},
  title        = {A review and vision on authentication and privacy preservation schemes
                  in smart grid network},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.62},
  doi          = {10.1002/SPY2.62},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AgarkarA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AlshanketiTA19,
  author       = {Faisal Alshanketi and
                  Issa Traor{\'{e}} and
                  Ahmed Awad},
  title        = {Multimodal mobile keystroke dynamics biometrics combining fixed and
                  variable passwords},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.48},
  doi          = {10.1002/SPY2.48},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AlshanketiTA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BaguiKBNP19,
  author       = {Sikha Bagui and
                  Ezhil Kalaimannan and
                  Subhash C. Bagui and
                  Debarghya Nandi and
                  Anthony Pinto},
  title        = {Using machine learning techniques to identify rare cyber-attacks on
                  the {UNSW-NB15} dataset},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.91},
  doi          = {10.1002/SPY2.91},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BaguiKBNP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BharadwajS19,
  author       = {Nitesh K. Bharadwaj and
                  Upasna Singh},
  title        = {An intelligent approach for examining and detecting target data fragments
                  in suspected large storage drives},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.71},
  doi          = {10.1002/SPY2.71},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BharadwajS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/EltayiebWHEL19,
  author       = {Nabeil Eltayieb and
                  Ping Wang and
                  Alzubair Hassan and
                  Rashad Elhabob and
                  Fagen Li},
  title        = {{ASDS:} Attribute-based secure data sharing scheme for reliable cloud
                  environment},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.57},
  doi          = {10.1002/SPY2.57},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/EltayiebWHEL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/FengCLF19,
  author       = {Tao Feng and
                  Xuan Chen and
                  Chunyan Liu and
                  Xiaoqin Feng},
  title        = {Research on privacy enhancement scheme of blockchain transactions},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.89},
  doi          = {10.1002/SPY2.89},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/FengCLF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/HijaziO19,
  author       = {Sherin Hijazi and
                  Mohammad S. Obaidat},
  title        = {Address resolution protocol spoofing attacks and security approaches:
                  {A} survey},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.49},
  doi          = {10.1002/SPY2.49},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/HijaziO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Ifinedo19,
  author       = {Princely Ifinedo},
  title        = {End user nonmalicious, counterproductive computer security behaviors:
                  concept, development, and validation of an instrument},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.66},
  doi          = {10.1002/SPY2.66},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Ifinedo19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KaciBRY19,
  author       = {Abdellah Kaci and
                  Thouraya Bouabana{-}Tebibel and
                  Abderrezak Rachedi and
                  Chafia Yahiaoui},
  title        = {Toward a big data approach for indexing encrypted data in Cloud Computing},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.65},
  doi          = {10.1002/SPY2.65},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KaciBRY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KaruppiahOIV19,
  author       = {Marimuthu Karuppiah and
                  Mohammad S. Obaidat and
                  SK Hafizul Islam and
                  Pandi Vijayakumar},
  title        = {Security analysis on "mutual authentication scheme for multimedia
                  medical information systems"},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.67},
  doi          = {10.1002/SPY2.67},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KaruppiahOIV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KunalSA19,
  author       = {Sourav Kunal and
                  Arijit Saha and
                  Ruhul Amin},
  title        = {An overview of cloud-fog computing: Architectures, applications with
                  security challenges},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.72},
  doi          = {10.1002/SPY2.72},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/KunalSA19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LokhandeV19,
  author       = {Vaibhav G. Lokhande and
                  Deepti Vidyarthi},
  title        = {A study of hardware architecture based attacks to bypass operating
                  system security},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.81},
  doi          = {10.1002/SPY2.81},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LokhandeV19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MaccariP19,
  author       = {Leonardo Maccari and
                  Andrea Passerini},
  title        = {A Big Data and machine learning approach for network monitoring and
                  security},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.53},
  doi          = {10.1002/SPY2.53},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MaccariP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MisraKM19,
  author       = {Subhas C. Misra and
                  Ashutosh Kumar and
                  Aswani K. Munnangi},
  title        = {Cloud-based healthcare management: Identifying the privacy concerns
                  and their moderating effect on the cloud-based health-care services},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {3},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.63},
  doi          = {10.1002/SPY2.63},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MisraKM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PalJB19,
  author       = {Pabitra Pal and
                  Biswapati Jana and
                  Jaydeb Bhaumik},
  title        = {Watermarking scheme using local binary pattern for image authentication
                  and tamper detection through dual image},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.59},
  doi          = {10.1002/SPY2.59},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PalJB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Pandey19,
  author       = {Sushant Kumar Pandey},
  title        = {Design and performance analysis of various feature selection methods
                  for anomaly-based techniques in intrusion detection system},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.56},
  doi          = {10.1002/SPY2.56},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Pandey19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RaiRTM19,
  author       = {Vikash Kumar Rai and
                  Boreddy V. Reddy and
                  Somanath Tripathy and
                  Jimson Mathew},
  title        = {Correlation power analysis and effective defense approach on light
                  encryption device block cipher},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.87},
  doi          = {10.1002/SPY2.87},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RaiRTM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SahaAKVD19,
  author       = {Arijit Saha and
                  Ruhul Amin and
                  Sourav Kunal and
                  Satyanarayana Vollala and
                  Sanjeev Kumar Dwivedi},
  title        = {Review on "Blockchain technology based medical healthcare system with
                  privacy issues"},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {5},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.83},
  doi          = {10.1002/SPY2.83},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/SahaAKVD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SalemO19,
  author       = {Asma Salem and
                  Mohammad S. Obaidat},
  title        = {A novel security scheme for behavioral authentication systems based
                  on keystroke dynamics},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.64},
  doi          = {10.1002/SPY2.64},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SalemO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SinhaT19,
  author       = {Ashutosh Kumar Sinha and
                  Somanath Tripathy},
  title        = {CookieArmor : Safeguarding against cross-site request forgery and
                  session hijacking},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {2},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.60},
  doi          = {10.1002/SPY2.60},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SinhaT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SwarnkarH19,
  author       = {Mayank Swarnkar and
                  Neminath Hubballi},
  title        = {SpamDetector : Detecting spam callers in Voice over Internet Protocol
                  with graph anomalies},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {1},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.54},
  doi          = {10.1002/SPY2.54},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SwarnkarH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VidyarthiDRKC19,
  author       = {Deepti Vidyarthi and
                  Gaurav Damri and
                  Subrata Rakshit and
                  C. R. Suthikshn Kumar and
                  Shailesh Chansarkar},
  title        = {Classification of malicious process using high-level activity based
                  dynamic analysis},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {6},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.86},
  doi          = {10.1002/SPY2.86},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/VidyarthiDRKC19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/YasinF0Y019,
  author       = {Affan Yasin and
                  Rubia Fatima and
                  Lin Liu and
                  Awaid Yasin and
                  Jianmin Wang},
  title        = {Contemplating social engineering studies and attack scenarios: {A}
                  review study},
  journal      = {Secur. Priv.},
  volume       = {2},
  number       = {4},
  year         = {2019},
  url          = {https://doi.org/10.1002/spy2.73},
  doi          = {10.1002/SPY2.73},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/YasinF0Y019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Abbasinezhad-Mood18,
  author       = {Dariush Abbasinezhad{-}Mood and
                  Morteza Nikooghadam},
  title        = {Efficient design and extensive hardware evaluation of an anonymous
                  data aggregation scheme for smart grid},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.24},
  doi          = {10.1002/SPY2.24},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Abbasinezhad-Mood18a,
  author       = {Dariush Abbasinezhad{-}Mood and
                  Morteza Nikooghadam},
  title        = {Design and microcontroller-based hardware performance analysis of
                  a security-enhanced lightweight communication scheme for smart grid},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.34},
  doi          = {10.1002/SPY2.34},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Abbasinezhad-Mood18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AbdAllahZH18,
  author       = {Eslam G. AbdAllah and
                  Mohammad Zulkernine and
                  Hossam S. Hassanein},
  title        = {{DADI:} Defending against distributed denial of service in information-centric
                  networking routing and caching},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.16},
  doi          = {10.1002/SPY2.16},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AbdAllahZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AbdAllahZH18a,
  author       = {Eslam G. AbdAllah and
                  Mohammad Zulkernine and
                  Hossam S. Hassanein},
  title        = {Preventing unauthorized access in information centric networking},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.33},
  doi          = {10.1002/SPY2.33},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AbdAllahZH18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AhmedTS18,
  author       = {Hadeer Ahmed and
                  Issa Traor{\'{e}} and
                  Sherif Saad},
  title        = {Detecting opinion spams and fake news using text classification},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.9},
  doi          = {10.1002/SPY2.9},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AhmedTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Allam18,
  author       = {Ali M. Allam},
  title        = {A secret key establishment in frequency division duplex communication
                  systems under active attacker},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.45},
  doi          = {10.1002/SPY2.45},
  timestamp    = {Fri, 25 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Allam18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ArmanFLS18,
  author       = {Ala Arman and
                  Sara Foresti and
                  Giovanni Livraga and
                  Pierangela Samarati},
  title        = {Cloud plan selection under requirements of multiple applications},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.35},
  doi          = {10.1002/SPY2.35},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ArmanFLS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/AsadianJ18,
  author       = {Hooman Asadian and
                  Hamid Haj Seyed Javadi},
  title        = {Identification of Sybil attacks on social networks using a framework
                  based on user interactions},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.19},
  doi          = {10.1002/SPY2.19},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/AsadianJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BaoCO18,
  author       = {Rongxin Bao and
                  Zhikui Chen and
                  Mohammad S. Obaidat},
  title        = {Challenges and techniques in Big data security and privacy: {A} review},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.13},
  doi          = {10.1002/SPY2.13},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BaoCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BharadwajS18,
  author       = {Nitesh K. Bharadwaj and
                  Upasna Singh},
  title        = {Significant data region identification and analysis using k -means
                  in large storage drive forensics},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.40},
  doi          = {10.1002/SPY2.40},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BharadwajS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/BoudjemaFSM18,
  author       = {El Habib Boudjema and
                  Christ{\`{e}}le Faure and
                  Mathieu Sassolas and
                  Lynda Mokdad},
  title        = {Detection of security vulnerabilities in {C} language applications},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.8},
  doi          = {10.1002/SPY2.8},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/BoudjemaFSM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Chen18,
  author       = {Lei Chen},
  title        = {Security and privacy on physical layer for wireless sensing: {A} survey},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.22},
  doi          = {10.1002/SPY2.22},
  timestamp    = {Fri, 21 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Chen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DeyGJMM18,
  author       = {Dipankar Dey and
                  Debasis Giri and
                  Biswapati Jana and
                  Tanmoy Maitra and
                  Ram N. Mohapatra},
  title        = {Linear-feedback shift register-based multi-ant cellular automation
                  and chaotic map-based image encryption},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.52},
  doi          = {10.1002/SPY2.52},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DeyGJMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/DhasarathanDTP18,
  author       = {Chandramohan Dhasarathan and
                  Rajaguru Dayalan and
                  Vengattaraman Thirumal and
                  Dhavachelvan Ponnurangam},
  title        = {A coordinator-specific privacy-preserving model for E-health monitoring
                  using artificial bee colony approach},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.32},
  doi          = {10.1002/SPY2.32},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/DhasarathanDTP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/KumarSK18,
  author       = {Sanjeev Kumar and
                  Amarpal Singh and
                  Manoj Kumar},
  title        = {Covert information sharing with novel fuzzy adaptive edge detection},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.47},
  doi          = {10.1002/SPY2.47},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/KumarSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/LosavioCKJ18,
  author       = {Michael Martin Losavio and
                  Kam{-}Pui Chow and
                  Andras Koltay and
                  Joshua James},
  title        = {The Internet of Things and the Smart City: Legal challenges with digital
                  forensics, privacy, and security},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.23},
  doi          = {10.1002/SPY2.23},
  timestamp    = {Wed, 10 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/LosavioCKJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MeshramOM18,
  author       = {Chandrashekhar Meshram and
                  Mohammad S. Obaidat and
                  Sarita Gajbhiye Meshram},
  title        = {Chebyshev chaotic map-based ID-based cryptographic model using subtree
                  and fuzzy-entity data sharing for public key cryptography},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.12},
  doi          = {10.1002/SPY2.12},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MeshramOM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MihoubiRLL18,
  author       = {Miloud Mihoubi and
                  Abdellatif Rahmoun and
                  Pascal Lorenz and
                  Noureddine Lasla},
  title        = {An effective Bat algorithm for node localization in distributed wireless
                  sensor network},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.7},
  doi          = {10.1002/SPY2.7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MihoubiRLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/MoschosPN18,
  author       = {Achillefs Moschos and
                  Georgios I. Papadimitriou and
                  Petros Nicopolitidis},
  title        = {Proactive encryption of personal area networks and small office-home
                  office networks under advanced encryption standard application},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.10},
  doi          = {10.1002/SPY2.10},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/MoschosPN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Obaidat18,
  author       = {Mohammad S. Obaidat},
  title        = {Inaugural Editorial: {A} Message from the Founding Editor-in-Chief},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.14},
  doi          = {10.1002/SPY2.14},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Obaidat18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/Ogundoyin18,
  author       = {Sunday Oyinlola Ogundoyin},
  title        = {An anonymous and privacy-preserving scheme for efficient traffic movement
                  analysis in intelligent transportation system},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.50},
  doi          = {10.1002/SPY2.50},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/Ogundoyin18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OmalaAL18,
  author       = {Anyembe Andrew Omala and
                  Ikram Ali and
                  Fagen Li},
  title        = {Heterogeneous signcryption with keyword search for wireless body area
                  network},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.25},
  doi          = {10.1002/SPY2.25},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/OmalaAL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/OppermannTTS18,
  author       = {Alexander Oppermann and
                  Federico Grasso Toro and
                  Florian Thiel and
                  Jean{-}Pierre Seifert},
  title        = {Secure Cloud Computing: Reference Architecture for Measuring Instrument
                  under Legal Control},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.18},
  doi          = {10.1002/SPY2.18},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/OppermannTTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PattersonO18,
  author       = {Jack Patterson and
                  Mohammad S. Obaidat},
  title        = {Submission and citation practices and Security and Privacy's commitment
                  to integrity and ethics},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.17},
  doi          = {10.1002/SPY2.17},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/PattersonO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/PerezZC18,
  author       = {Alfredo J. Perez and
                  Sherali Zeadally and
                  Jonathan Cochran},
  title        = {A review and an empirical analysis of privacy policy and notices for
                  consumer Internet of things},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.15},
  doi          = {10.1002/SPY2.15},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/PerezZC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/RaniyalWDA18,
  author       = {Maninder Singh Raniyal and
                  Isaac Woungang and
                  Sanjay Kumar Dhurandher and
                  Sherif Saad Ahmed},
  title        = {Passphrase protected device-to-device mutual authentication schemes
                  for smart homes},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.42},
  doi          = {10.1002/SPY2.42},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/RaniyalWDA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ResendeD18,
  author       = {Paulo Angelo Alves Resende and
                  Andr{\'{e}} Costa Drummond},
  title        = {Adaptive anomaly-based intrusion detection system using genetic algorithm
                  and profiling},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {4},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.36},
  doi          = {10.1002/SPY2.36},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ResendeD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/ResendeD18a,
  author       = {Paulo Angelo Alves Resende and
                  Andr{\'{e}} Costa Drummond},
  title        = {{HTTP} and contact-based features for Botnet detection},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.41},
  doi          = {10.1002/SPY2.41},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/ResendeD18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SamailaNFFI18,
  author       = {Musa G. Samaila and
                  Miguel Neto and
                  Diogo A. B. Fernandes and
                  M{\'{a}}rio M. Freire and
                  Pedro R. M. In{\'{a}}cio},
  title        = {Challenges of securing Internet of Things devices: {A} survey},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.20},
  doi          = {10.1002/SPY2.20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SamailaNFFI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/SinhaIO18,
  author       = {Shobhit Sinha and
                  SK Hafizul Islam and
                  Mohammad S. Obaidat},
  title        = {A comparative study and analysis of some pseudorandom number generator
                  algorithms},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.46},
  doi          = {10.1002/SPY2.46},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/SinhaIO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TanwarVT0O18,
  author       = {Sudeep Tanwar and
                  Jayneel Vora and
                  Sudhanshu Tyagi and
                  Neeraj Kumar and
                  Mohammad S. Obaidat},
  title        = {A systematic review on security issues in vehicular ad hoc network},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {5},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.39},
  doi          = {10.1002/SPY2.39},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sap/TanwarVT0O18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TeniouB18,
  author       = {Ahcene Teniou and
                  Boucif Amar Bensaber},
  title        = {Efficient and dynamic elliptic curve qu-vanstone implicit certificates
                  distribution scheme for vehicular cloud networks},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {1},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.11},
  doi          = {10.1002/SPY2.11},
  timestamp    = {Tue, 13 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/TeniouB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TraoreAO18,
  author       = {Issa Traor{\'{e}} and
                  Mohammed Alshahrani and
                  Mohammad S. Obaidat},
  title        = {State of the art and perspectives on traditional and emerging biometrics:
                  {A} survey},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.44},
  doi          = {10.1002/SPY2.44},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/TraoreAO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/TsengNK18,
  author       = {Yuchia Tseng and
                  Farid Na{\"{\i}}t{-}Abdesselam and
                  Ashfaq A. Khokhar},
  title        = {A comprehensive 3-dimensional security analysis of a controller in
                  software-defined networking},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {2},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.21},
  doi          = {10.1002/SPY2.21},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/TsengNK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/VenkatesanACSC18,
  author       = {Sridhar Venkatesan and
                  Massimiliano Albanese and
                  Cho{-}Yu Jason Chiang and
                  Angelo Sapello and
                  Ritu Chadha},
  title        = {DeBot: {A} novel network-based mechanism to detect exfiltration by
                  architectural stealthy botnets},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {6},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.51},
  doi          = {10.1002/SPY2.51},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/VenkatesanACSC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sap/WoungangDRA18,
  author       = {Isaac Woungang and
                  Sanjay Kumar Dhurandher and
                  Joel J. P. C. Rodrigues and
                  Ahmed Awad},
  title        = {Special Issue on security and privacy in Internet of Things and cloud
                  computing systems},
  journal      = {Secur. Priv.},
  volume       = {1},
  number       = {3},
  year         = {2018},
  url          = {https://doi.org/10.1002/spy2.43},
  doi          = {10.1002/SPY2.43},
  timestamp    = {Fri, 29 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sap/WoungangDRA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics