Search dblp for Publications

export results for "toc:db/journals/ijipsi/ijipsi5.bht:"

 download as .bib file

@article{DBLP:journals/ijipsi/DeepaS23,
  author       = {O. Deepa and
                  J. Suguna},
  title        = {An optimised QoS-based clustering with multipath secure routing protocol
                  for wireless sensor networks},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {173--199},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131532},
  doi          = {10.1504/IJIPSI.2023.131532},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DeepaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/DubeyB23,
  author       = {Himanshu Dubey and
                  Shobha Bhatt},
  title        = {Comparative analysis of Autopsy and WinHex tools on data acquisition
                  method},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {200--210},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131545},
  doi          = {10.1504/IJIPSI.2023.131545},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/DubeyB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/FernandezN23,
  author       = {Jincy J. Fernandez and
                  P. Nithyanandam},
  title        = {Biometric watermarking: an application-based review},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {211--226},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131546},
  doi          = {10.1504/IJIPSI.2023.131546},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/FernandezN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Muhammad23,
  author       = {Yousuf Muhammad},
  title        = {Data privacy laws in the {USA}},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {238--249},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131571},
  doi          = {10.1504/IJIPSI.2023.131571},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Muhammad23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Rao23,
  author       = {Vemuri Sudarsan Rao},
  title        = {Security policies and trust issues in cloud computing},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {3},
  pages        = {227--237},
  year         = {2023},
  url          = {https://doi.org/10.1504/IJIPSI.2023.131575},
  doi          = {10.1504/IJIPSI.2023.131575},
  timestamp    = {Wed, 05 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Rao23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/BisginMNH21,
  author       = {Halil Bisgin and
                  Fadi Mohsen and
                  Vincent Nwobodo and
                  Rachael Havens},
  title        = {Enhancing malware detection in Android application by incorporating
                  broadcast receivers},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {36--68},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119168},
  doi          = {10.1504/IJIPSI.2021.119168},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/BisginMNH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/GeorgeJ21,
  author       = {Geethu Mary George and
                  L. S. Jayashree},
  title        = {A survey on user privacy preserving blockchain for health insurance
                  using Ethereum smart contract},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {111--137},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120354},
  doi          = {10.1504/IJIPSI.2021.120354},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/GeorgeJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/GreisYVMS21,
  author       = {Jakob Greis and
                  Artem Yushchenko and
                  Daniel Vogel and
                  Michael Meier and
                  Volker Steinhage},
  title        = {Automated identification of vulnerable devices in networks using traffic
                  data and deep learning},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {1--17},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119166},
  doi          = {10.1504/IJIPSI.2021.119166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijipsi/GreisYVMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/HendricksHP21,
  author       = {Matthew Kenneth Hendricks and
                  Benedikt Hirschfelder and
                  Pragasen Pillay},
  title        = {The willingness to provide personal information - a potential relationship
                  with the usage of privacy enhancing self-sovereign identity technology},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {138--153},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120356},
  doi          = {10.1504/IJIPSI.2021.120356},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/HendricksHP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/Mitropoulos21,
  author       = {Sarandis Mitropoulos},
  title        = {Conflict resolution in management policies: case study in cloud computing
                  and internet of things},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {93--110},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120352},
  doi          = {10.1504/IJIPSI.2021.120352},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/Mitropoulos21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PagaleP21,
  author       = {Madhuri Pagale and
                  Richa Purohit},
  title        = {A review on privacy protection in the internet of things using machine
                  learning-based solutions},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {69--91},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119169},
  doi          = {10.1504/IJIPSI.2021.119169},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PagaleP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/PatelMW21,
  author       = {N. D. Patel and
                  B. M. Mehtre and
                  Rajeev Wankar},
  title        = {Novel attribute selection technique for an efficient intrusion detection
                  system},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {2},
  pages        = {154--172},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.120358},
  doi          = {10.1504/IJIPSI.2021.120358},
  timestamp    = {Fri, 28 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/PatelMW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijipsi/WangCP21,
  author       = {Huanhuan Wang and
                  Debin Cheng and
                  Hui Peng},
  title        = {Phishing website detection method based on {CNAIR} framework},
  journal      = {Int. J. Inf. Priv. Secur. Integr.},
  volume       = {5},
  number       = {1},
  pages        = {18--35},
  year         = {2021},
  url          = {https://doi.org/10.1504/IJIPSI.2021.119167},
  doi          = {10.1504/IJIPSI.2021.119167},
  timestamp    = {Thu, 30 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijipsi/WangCP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics