Search dblp for Publications

export results for "toc:db/journals/isecure/isecure16.bht:"

 download as .bib file

@article{DBLP:journals/isecure/AA24,
  author       = {Meharaj Begum A and
                  Michael Arock},
  title        = {Modified Parse-Tree Based Pattern Extraction Approach for Detecting
                  {SQLIA} Using Neural Network Model},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {1--16},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.370697.886},
  doi          = {10.22042/ISECURE.2023.370697.886},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AmirmohseniN24,
  author       = {Morteza Amirmohseni and
                  Sadegh Dorri Nogoorani},
  title        = {Safety Guards for Ethereum Smart Contracts},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {37--53},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.365808.846},
  doi          = {10.22042/ISECURE.2023.365808.846},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/AmirmohseniN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/AsaarA24,
  author       = {Maryam Rajabzadeh Asaar and
                  Mustafa Isam Ahmed Al{-}Baghdadi},
  title        = {Security Enhancement of an Authentication Scheme Based on {DAC} and
                  Intel {SGX} in WSNs},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {149--163},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.420100.1029},
  doi          = {10.22042/ISECURE.2024.420100.1029},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/AsaarA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/ChegenizadehAMA24,
  author       = {Mostafa Chegenizadeh and
                  Mohammad Ali and
                  Javad Mohajeri and
                  Mohammad Reza Aref},
  title        = {{HUAP:} Practical Attribute-Based Access Control Supporting Hidden
                  Updatable Access Policies for Resource-Constrained Devices},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {93--114},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.395028.954},
  doi          = {10.22042/ISECURE.2023.395028.954},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/ChegenizadehAMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GogoiBB24,
  author       = {Nilakshi Gogoi and
                  Dhruba K. Bhattacharyya and
                  Debojit Boro},
  title        = {Shrew DDoS Attack Detection Based on Statistical Analysis},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {205--220},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.420803.1032},
  doi          = {10.22042/ISECURE.2024.420803.1032},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GogoiBB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/GonenGO24,
  author       = {Mehmet Emin G{\"{o}}nen and
                  Muhammed Said G{\"{u}}ndogan and
                  Kamil Otal},
  title        = {Boomerang Attacks on Reduced-Round Midori64},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {191--203},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.421023.1033},
  doi          = {10.22042/ISECURE.2024.421023.1033},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/GonenGO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/JamshidiMA24,
  author       = {Mohammad Ali Jamshidi and
                  Mohammad Mahdi Mojahedian and
                  Mohammad Reza Aref},
  title        = {Customizable Utility-Privacy Trade-Off: {A} Flexible Autoencoder-Based
                  Obfuscator},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {137--147},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.422044.1037},
  doi          = {10.22042/ISECURE.2024.422044.1037},
  timestamp    = {Mon, 12 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/JamshidiMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/KalhoroSKAA24,
  author       = {Shadab Kalhoro and
                  Farhan Bashir Shaikh and
                  Anam Kalhoro and
                  Junaid Ur Rehman Abbasi and
                  Ramesh Kumar Ayyasamy},
  title        = {An Overview of Security Attacks in 5G Enabled Technologies: Applications
                  and Use Case Scenarios},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {17--35},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.354872.829},
  doi          = {10.22042/ISECURE.2023.354872.829},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/MalyshenkoSM24,
  author       = {Kostyantyn Anatolievich Malyshenko and
                  Majid Mohammad Shafiee and
                  Vadim Anatolievich Malyshenko},
  title        = {Identification of Fake News Using Emotional Profiling as an Approach
                  to Text Analysis},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {165--190},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.415442.1011},
  doi          = {10.22042/ISECURE.2024.415442.1011},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/MalyshenkoSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/PirmoradianDS24,
  author       = {Fatemeh Pirmoradian and
                  Mohammad Dakhilalian and
                  Masoumeh Safkhani},
  title        = {{ECKCI:} An ECC-Based Authenticated Key Agreement Scheme Resistant
                  to Key Compromise Impersonation Attack for {TMIS}},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {115--136},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2024.408640.989},
  doi          = {10.22042/ISECURE.2024.408640.989},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/PirmoradianDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/TalukdarB24,
  author       = {Kangkan Talukdar and
                  Debojit Boro},
  title        = {Slowloris Attack Detection Using Adaptive Timeout-Based Approach},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {79--92},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.392462.938},
  doi          = {10.22042/ISECURE.2023.392462.938},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isecure/TalukdarB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isecure/YalcinkayaK24,
  author       = {Mehmet Ali Yal{\c{c}}inkaya and
                  Ecir Ugur K{\"{u}}{\c{c}}{\"{u}}ksille},
  title        = {Artificial Intelligence and Dynamic Analysis-Based Web Application
                  Vulnerability Scanner},
  journal      = {{ISC} Int. J. Inf. Secur.},
  volume       = {16},
  number       = {1},
  pages        = {55--77},
  year         = {2024},
  url          = {https://doi.org/10.22042/isecure.2023.367746.847},
  doi          = {10.22042/ISECURE.2023.367746.847},
  timestamp    = {Sun, 04 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isecure/YalcinkayaK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}