Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/ijipsi/ijipsi5.bht:"
@article{DBLP:journals/ijipsi/DeepaS23, author = {O. Deepa and J. Suguna}, title = {An optimised QoS-based clustering with multipath secure routing protocol for wireless sensor networks}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {173--199}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131532}, doi = {10.1504/IJIPSI.2023.131532}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DeepaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/DubeyB23, author = {Himanshu Dubey and Shobha Bhatt}, title = {Comparative analysis of Autopsy and WinHex tools on data acquisition method}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {200--210}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131545}, doi = {10.1504/IJIPSI.2023.131545}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/DubeyB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/FernandezN23, author = {Jincy J. Fernandez and P. Nithyanandam}, title = {Biometric watermarking: an application-based review}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {211--226}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131546}, doi = {10.1504/IJIPSI.2023.131546}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/FernandezN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Muhammad23, author = {Yousuf Muhammad}, title = {Data privacy laws in the {USA}}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {238--249}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131571}, doi = {10.1504/IJIPSI.2023.131571}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Muhammad23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Rao23, author = {Vemuri Sudarsan Rao}, title = {Security policies and trust issues in cloud computing}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {3}, pages = {227--237}, year = {2023}, url = {https://doi.org/10.1504/IJIPSI.2023.131575}, doi = {10.1504/IJIPSI.2023.131575}, timestamp = {Wed, 05 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/Rao23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/BisginMNH21, author = {Halil Bisgin and Fadi Mohsen and Vincent Nwobodo and Rachael Havens}, title = {Enhancing malware detection in Android application by incorporating broadcast receivers}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {36--68}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119168}, doi = {10.1504/IJIPSI.2021.119168}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/BisginMNH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/GeorgeJ21, author = {Geethu Mary George and L. S. Jayashree}, title = {A survey on user privacy preserving blockchain for health insurance using Ethereum smart contract}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {111--137}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120354}, doi = {10.1504/IJIPSI.2021.120354}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/GeorgeJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/GreisYVMS21, author = {Jakob Greis and Artem Yushchenko and Daniel Vogel and Michael Meier and Volker Steinhage}, title = {Automated identification of vulnerable devices in networks using traffic data and deep learning}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {1--17}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119166}, doi = {10.1504/IJIPSI.2021.119166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijipsi/GreisYVMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/HendricksHP21, author = {Matthew Kenneth Hendricks and Benedikt Hirschfelder and Pragasen Pillay}, title = {The willingness to provide personal information - a potential relationship with the usage of privacy enhancing self-sovereign identity technology}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {138--153}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120356}, doi = {10.1504/IJIPSI.2021.120356}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/HendricksHP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/Mitropoulos21, author = {Sarandis Mitropoulos}, title = {Conflict resolution in management policies: case study in cloud computing and internet of things}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {93--110}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120352}, doi = {10.1504/IJIPSI.2021.120352}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/Mitropoulos21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PagaleP21, author = {Madhuri Pagale and Richa Purohit}, title = {A review on privacy protection in the internet of things using machine learning-based solutions}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {69--91}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119169}, doi = {10.1504/IJIPSI.2021.119169}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PagaleP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/PatelMW21, author = {N. D. Patel and B. M. Mehtre and Rajeev Wankar}, title = {Novel attribute selection technique for an efficient intrusion detection system}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {2}, pages = {154--172}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.120358}, doi = {10.1504/IJIPSI.2021.120358}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/PatelMW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijipsi/WangCP21, author = {Huanhuan Wang and Debin Cheng and Hui Peng}, title = {Phishing website detection method based on {CNAIR} framework}, journal = {Int. J. Inf. Priv. Secur. Integr.}, volume = {5}, number = {1}, pages = {18--35}, year = {2021}, url = {https://doi.org/10.1504/IJIPSI.2021.119167}, doi = {10.1504/IJIPSI.2021.119167}, timestamp = {Thu, 30 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijipsi/WangCP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.