Search dblp for Publications

export results for "toc:db/journals/isjgp/isjgp18.bht:"

 download as .bib file

@article{DBLP:journals/isjgp/AnitaV09,
  author       = {E. A. Mary Anita and
                  V. Vasudevan},
  title        = {Prevention of Black Hole Attack in Multicast Routing Protocols for
                  Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {248--256},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903324928},
  doi          = {10.1080/19393550903324928},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/AnitaV09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Borandi09,
  author       = {Todd Borandi},
  title        = {Introduction to Secure Global Collaboration},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {51--56},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791473},
  doi          = {10.1080/19393550902791473},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Borandi09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/BoukhtoutaAD09,
  author       = {Amine Boukhtouta and
                  Dima Alhadidi and
                  Mourad Debbabi},
  title        = {Capturing Returned Computable Values in AspectJ for Security Hardening},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {87--98},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791432},
  doi          = {10.1080/19393550902791432},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/BoukhtoutaAD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Davis09,
  author       = {John Davis},
  title        = {Safe Harbor Data Privacy and Security for European Union Employee
                  Data},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {4},
  pages        = {194--198},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903074119},
  doi          = {10.1080/19393550903074119},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Davis09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Desoky09,
  author       = {Abdelrahman Desoky},
  title        = {Notestega: Notes-based Steganography Methodology},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {4},
  pages        = {178--193},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903076841},
  doi          = {10.1080/19393550903076841},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Desoky09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Galante09,
  author       = {Victoria Galante},
  title        = {Practical Role-Based Access Control},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {64--73},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791465},
  doi          = {10.1080/19393550902791465},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Galante09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Geers09,
  author       = {Kenneth Geers},
  title        = {The Cyber Threat to National Critical Infrastructures: Beyond Theory},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {1--7},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802676097},
  doi          = {10.1080/19393550802676097},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Geers09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/GuptaJM09,
  author       = {Brij B. Gupta and
                  Ramesh Chandra Joshi and
                  Manoj Misra},
  title        = {Defending against Distributed Denial of Service Attacks: Issues and
                  Challenges},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {224--247},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903317070},
  doi          = {10.1080/19393550903317070},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/GuptaJM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hayden09,
  author       = {Lance Hayden},
  title        = {Designing Common Control Frameworks: {A} Model for Evaluating Information
                  Technology Governance, Risk, and Compliance Control Rationalization
                  Strategies},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {6},
  pages        = {297--305},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903324936},
  doi          = {10.1080/19393550903324936},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hayden09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/HeinS09,
  author       = {Daniel D. Hein and
                  Hossein Saiedian},
  title        = {Secure Software Engineering: Learning from the Past to Address Future
                  Challenges},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {8--25},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802623206},
  doi          = {10.1080/19393550802623206},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/HeinS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Herrmann09,
  author       = {Mimi Herrmann},
  title        = {Security Strategy: From Soup to Nuts},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {26--32},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802656115},
  doi          = {10.1080/19393550802656115},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Herrmann09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hoesing09,
  author       = {Michael T. Hoesing},
  title        = {Virtualization Security Assessment},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {124--130},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791440},
  doi          = {10.1080/19393550902791440},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hoesing09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Hyatt09,
  author       = {Derrick Hyatt},
  title        = {Web 2.0 Injection Infection Vulnerability Class},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {213--223},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903317054},
  doi          = {10.1080/19393550903317054},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/Hyatt09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Karthikeyan09,
  author       = {Eswar Karthikeyan},
  title        = {Modified Lim-Lee Combing Using Signed Window and Direct Doublings},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {267--271},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903317062},
  doi          = {10.1080/19393550903317062},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Karthikeyan09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KhanQK09,
  author       = {Abdul Nasir Khan and
                  Kalim Qureshi and
                  Sumair Khan},
  title        = {Enhanced Switched Network Sniffer Detection Technique Based on {IP}
                  Packet Routing},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {4},
  pages        = {153--162},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903044120},
  doi          = {10.1080/19393550903044120},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/KhanQK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KhanSRR09,
  author       = {Zeeshan Shafi Khan and
                  Muhammad Sher and
                  Khalid Rashid and
                  Aneel Rahim},
  title        = {A Three-Layer Secure Architecture for {IP} Multimedia Subsystem-Based
                  Instant Messaging},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {139--148},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902926046},
  doi          = {10.1080/19393550902926046},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/KhanSRR09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/KumarG09,
  author       = {Anil Kumar and
                  Mrinal Kanti Ghose},
  title        = {Overview of Information Security Using Genetic Algorithm and Chaos},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {6},
  pages        = {306--315},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903327558},
  doi          = {10.1080/19393550903327558},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/KumarG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/LagouC09,
  author       = {Panagiota Lagou and
                  Gregory Chondrokoukis},
  title        = {Survey on Nonrepudiation: Digital Signature Versus Biometrics},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {257--266},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903300464},
  doi          = {10.1080/19393550903300464},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/LagouC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/LandryKBN09,
  author       = {Brett J. L. Landry and
                  M. Scott Koger and
                  Sandra Blanke and
                  Christian Nielsen},
  title        = {Using the Private-Internet-Enterprise {(PIE)} Model to Examine {IT}
                  Risks and Threats Due to Porous Perimeters},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {4},
  pages        = {163--169},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903044112},
  doi          = {10.1080/19393550903044112},
  timestamp    = {Sun, 06 Oct 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/LandryKBN09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Major09,
  author       = {Scott D. Applegate},
  title        = {Social Engineering: Hacking the Wetware!},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {40--46},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802623214},
  doi          = {10.1080/19393550802623214},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Major09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MalligaT09,
  author       = {S. Malliga and
                  A. Tamilarasi},
  title        = {Collaborative Framework for Detection, Prevention, and Traceback of
                  Flooding Attacks Using Marking and Filtering},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {74--86},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802676071},
  doi          = {10.1080/19393550802676071},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MalligaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Matusitz09,
  author       = {Jonathan Matusitz},
  title        = {A Postmodern Theory of Cyberterrorism: Game Theory},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {6},
  pages        = {273--281},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903200474},
  doi          = {10.1080/19393550903200474},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Matusitz09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/MuldnerLM09,
  author       = {Tomasz M{\"{u}}ldner and
                  Gregory Leighton and
                  Jan Krzysztof Miziolek},
  title        = {Parameterized Role-Based Access Control Policies for {XML} Documents},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {6},
  pages        = {282--296},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903249612},
  doi          = {10.1080/19393550903249612},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/MuldnerLM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Nganga09,
  author       = {Alexander Mwaura Ng'ang'a},
  title        = {Toward a Regional {ICT} Hub: Need for Cyber Laws in Kenya},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {47--50},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802651538},
  doi          = {10.1080/19393550802651538},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Nganga09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/OtrokZYB09,
  author       = {Hadi Otrok and
                  Benwen Zhu and
                  Hamdi Yahyaoui and
                  Prabir Bhattacharya},
  title        = {An Intrusion Detection Game Theoretical Model},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {5},
  pages        = {199--212},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903130390},
  doi          = {10.1080/19393550903130390},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/OtrokZYB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ParrishL09,
  author       = {Lee Parrish and
                  Mark Leary},
  title        = {Secure Global Collaboration Among Critical Infrastructures},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {57--63},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802676089},
  doi          = {10.1080/19393550802676089},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ParrishL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/ReinholdFO09,
  author       = {Christopher Reinhold and
                  Mark N. Frolick and
                  Adekunle Okunoye},
  title        = {Managing Your Security Future},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {116--123},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802656644},
  doi          = {10.1080/19393550802656644},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/ReinholdFO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/RybaPSG09,
  author       = {Miroslaw Ryba and
                  Aleksander Poniewierski and
                  J{\'{o}}zef Sulwinski and
                  Mateusz G{\'{o}}rnisiewicz},
  title        = {The Methodology for Managing the Abuse of {IT} Systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {107--115},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791457},
  doi          = {10.1080/19393550902791457},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/RybaPSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Scholz09,
  author       = {James A. Scholz},
  title        = {Securing Critical {IT} Infrastructure},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {1},
  pages        = {33--39},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550802644640},
  doi          = {10.1080/19393550802644640},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Scholz09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Sharma09,
  author       = {Varun Sharma},
  title        = {Testing Role-based Authorization Controls in Websites},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {4},
  pages        = {170--177},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550903074127},
  doi          = {10.1080/19393550903074127},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Sharma09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SinghGD09,
  author       = {Jyotsna Singh and
                  Parul Garg and
                  Alok Nath De},
  title        = {A Combined Watermarking and Encryption Algorithm for Secure VoIP},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {2},
  pages        = {99--105},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902791424},
  doi          = {10.1080/19393550902791424},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SinghGD09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/TawalbehSG09,
  author       = {Lo'ai Ali Tawalbeh and
                  Saed Swedan and
                  Adnan Abdul{-}Aziz Gutub},
  title        = {Efficient Modular Squaring Algorithms for Hardware Implementation
                  in GF(\emph{p})},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {131--138},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902926053},
  doi          = {10.1080/19393550902926053},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/TawalbehSG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/Trinckes09,
  author       = {John J. Trinckes Jr.},
  title        = {From the Field: {A} Hacker's Story},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {18},
  number       = {3},
  pages        = {149--151},
  year         = {2009},
  url          = {https://doi.org/10.1080/19393550902928596},
  doi          = {10.1080/19393550902928596},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isjgp/Trinckes09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}