default search action
Search dblp for Publications
export results for "toc:db/journals/isecure/isecure16.bht:"
@article{DBLP:journals/isecure/AA24, author = {Meharaj Begum A and Michael Arock}, title = {Modified Parse-Tree Based Pattern Extraction Approach for Detecting {SQLIA} Using Neural Network Model}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {1--16}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.370697.886}, doi = {10.22042/ISECURE.2023.370697.886}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AmirmohseniN24, author = {Morteza Amirmohseni and Sadegh Dorri Nogoorani}, title = {Safety Guards for Ethereum Smart Contracts}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {37--53}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.365808.846}, doi = {10.22042/ISECURE.2023.365808.846}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/AmirmohseniN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/AsaarA24, author = {Maryam Rajabzadeh Asaar and Mustafa Isam Ahmed Al{-}Baghdadi}, title = {Security Enhancement of an Authentication Scheme Based on {DAC} and Intel {SGX} in WSNs}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {149--163}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.420100.1029}, doi = {10.22042/ISECURE.2024.420100.1029}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/AsaarA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/ChegenizadehAMA24, author = {Mostafa Chegenizadeh and Mohammad Ali and Javad Mohajeri and Mohammad Reza Aref}, title = {{HUAP:} Practical Attribute-Based Access Control Supporting Hidden Updatable Access Policies for Resource-Constrained Devices}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {93--114}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.395028.954}, doi = {10.22042/ISECURE.2023.395028.954}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/ChegenizadehAMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GogoiBB24, author = {Nilakshi Gogoi and Dhruba K. Bhattacharyya and Debojit Boro}, title = {Shrew DDoS Attack Detection Based on Statistical Analysis}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {205--220}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.420803.1032}, doi = {10.22042/ISECURE.2024.420803.1032}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GogoiBB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/GonenGO24, author = {Mehmet Emin G{\"{o}}nen and Muhammed Said G{\"{u}}ndogan and Kamil Otal}, title = {Boomerang Attacks on Reduced-Round Midori64}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {191--203}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.421023.1033}, doi = {10.22042/ISECURE.2024.421023.1033}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/GonenGO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/JamshidiMA24, author = {Mohammad Ali Jamshidi and Mohammad Mahdi Mojahedian and Mohammad Reza Aref}, title = {Customizable Utility-Privacy Trade-Off: {A} Flexible Autoencoder-Based Obfuscator}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {137--147}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.422044.1037}, doi = {10.22042/ISECURE.2024.422044.1037}, timestamp = {Mon, 12 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/JamshidiMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/KalhoroSKAA24, author = {Shadab Kalhoro and Farhan Bashir Shaikh and Anam Kalhoro and Junaid Ur Rehman Abbasi and Ramesh Kumar Ayyasamy}, title = {An Overview of Security Attacks in 5G Enabled Technologies: Applications and Use Case Scenarios}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {17--35}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.354872.829}, doi = {10.22042/ISECURE.2023.354872.829}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/KalhoroSKAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/MalyshenkoSM24, author = {Kostyantyn Anatolievich Malyshenko and Majid Mohammad Shafiee and Vadim Anatolievich Malyshenko}, title = {Identification of Fake News Using Emotional Profiling as an Approach to Text Analysis}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {165--190}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.415442.1011}, doi = {10.22042/ISECURE.2024.415442.1011}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/MalyshenkoSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/PirmoradianDS24, author = {Fatemeh Pirmoradian and Mohammad Dakhilalian and Masoumeh Safkhani}, title = {{ECKCI:} An ECC-Based Authenticated Key Agreement Scheme Resistant to Key Compromise Impersonation Attack for {TMIS}}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {2}, pages = {115--136}, year = {2024}, url = {https://doi.org/10.22042/isecure.2024.408640.989}, doi = {10.22042/ISECURE.2024.408640.989}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/PirmoradianDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/TalukdarB24, author = {Kangkan Talukdar and Debojit Boro}, title = {Slowloris Attack Detection Using Adaptive Timeout-Based Approach}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {79--92}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.392462.938}, doi = {10.22042/ISECURE.2023.392462.938}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isecure/TalukdarB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isecure/YalcinkayaK24, author = {Mehmet Ali Yal{\c{c}}inkaya and Ecir Ugur K{\"{u}}{\c{c}}{\"{u}}ksille}, title = {Artificial Intelligence and Dynamic Analysis-Based Web Application Vulnerability Scanner}, journal = {{ISC} Int. J. Inf. Secur.}, volume = {16}, number = {1}, pages = {55--77}, year = {2024}, url = {https://doi.org/10.22042/isecure.2023.367746.847}, doi = {10.22042/ISECURE.2023.367746.847}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isecure/YalcinkayaK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.