default search action
Search dblp for Publications
export results for "toc:db/journals/isjgp/isjgp18.bht:"
@article{DBLP:journals/isjgp/AnitaV09, author = {E. A. Mary Anita and V. Vasudevan}, title = {Prevention of Black Hole Attack in Multicast Routing Protocols for Mobile Ad-Hoc Networks Using a Self-Organized Public Key Infrastructure}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {248--256}, year = {2009}, url = {https://doi.org/10.1080/19393550903324928}, doi = {10.1080/19393550903324928}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/AnitaV09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Borandi09, author = {Todd Borandi}, title = {Introduction to Secure Global Collaboration}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {51--56}, year = {2009}, url = {https://doi.org/10.1080/19393550902791473}, doi = {10.1080/19393550902791473}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Borandi09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/BoukhtoutaAD09, author = {Amine Boukhtouta and Dima Alhadidi and Mourad Debbabi}, title = {Capturing Returned Computable Values in AspectJ for Security Hardening}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {87--98}, year = {2009}, url = {https://doi.org/10.1080/19393550902791432}, doi = {10.1080/19393550902791432}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/BoukhtoutaAD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Davis09, author = {John Davis}, title = {Safe Harbor Data Privacy and Security for European Union Employee Data}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {4}, pages = {194--198}, year = {2009}, url = {https://doi.org/10.1080/19393550903074119}, doi = {10.1080/19393550903074119}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Davis09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Desoky09, author = {Abdelrahman Desoky}, title = {Notestega: Notes-based Steganography Methodology}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {4}, pages = {178--193}, year = {2009}, url = {https://doi.org/10.1080/19393550903076841}, doi = {10.1080/19393550903076841}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Desoky09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Galante09, author = {Victoria Galante}, title = {Practical Role-Based Access Control}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {64--73}, year = {2009}, url = {https://doi.org/10.1080/19393550902791465}, doi = {10.1080/19393550902791465}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Galante09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Geers09, author = {Kenneth Geers}, title = {The Cyber Threat to National Critical Infrastructures: Beyond Theory}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {1--7}, year = {2009}, url = {https://doi.org/10.1080/19393550802676097}, doi = {10.1080/19393550802676097}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Geers09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/GuptaJM09, author = {Brij B. Gupta and Ramesh Chandra Joshi and Manoj Misra}, title = {Defending against Distributed Denial of Service Attacks: Issues and Challenges}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {224--247}, year = {2009}, url = {https://doi.org/10.1080/19393550903317070}, doi = {10.1080/19393550903317070}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/GuptaJM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hayden09, author = {Lance Hayden}, title = {Designing Common Control Frameworks: {A} Model for Evaluating Information Technology Governance, Risk, and Compliance Control Rationalization Strategies}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {6}, pages = {297--305}, year = {2009}, url = {https://doi.org/10.1080/19393550903324936}, doi = {10.1080/19393550903324936}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Hayden09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/HeinS09, author = {Daniel D. Hein and Hossein Saiedian}, title = {Secure Software Engineering: Learning from the Past to Address Future Challenges}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {8--25}, year = {2009}, url = {https://doi.org/10.1080/19393550802623206}, doi = {10.1080/19393550802623206}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/HeinS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Herrmann09, author = {Mimi Herrmann}, title = {Security Strategy: From Soup to Nuts}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {26--32}, year = {2009}, url = {https://doi.org/10.1080/19393550802656115}, doi = {10.1080/19393550802656115}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Herrmann09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hoesing09, author = {Michael T. Hoesing}, title = {Virtualization Security Assessment}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {124--130}, year = {2009}, url = {https://doi.org/10.1080/19393550902791440}, doi = {10.1080/19393550902791440}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Hoesing09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Hyatt09, author = {Derrick Hyatt}, title = {Web 2.0 Injection Infection Vulnerability Class}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {213--223}, year = {2009}, url = {https://doi.org/10.1080/19393550903317054}, doi = {10.1080/19393550903317054}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/Hyatt09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Karthikeyan09, author = {Eswar Karthikeyan}, title = {Modified Lim-Lee Combing Using Signed Window and Direct Doublings}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {267--271}, year = {2009}, url = {https://doi.org/10.1080/19393550903317062}, doi = {10.1080/19393550903317062}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Karthikeyan09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KhanQK09, author = {Abdul Nasir Khan and Kalim Qureshi and Sumair Khan}, title = {Enhanced Switched Network Sniffer Detection Technique Based on {IP} Packet Routing}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {4}, pages = {153--162}, year = {2009}, url = {https://doi.org/10.1080/19393550903044120}, doi = {10.1080/19393550903044120}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/KhanQK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KhanSRR09, author = {Zeeshan Shafi Khan and Muhammad Sher and Khalid Rashid and Aneel Rahim}, title = {A Three-Layer Secure Architecture for {IP} Multimedia Subsystem-Based Instant Messaging}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {139--148}, year = {2009}, url = {https://doi.org/10.1080/19393550902926046}, doi = {10.1080/19393550902926046}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/KhanSRR09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/KumarG09, author = {Anil Kumar and Mrinal Kanti Ghose}, title = {Overview of Information Security Using Genetic Algorithm and Chaos}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {6}, pages = {306--315}, year = {2009}, url = {https://doi.org/10.1080/19393550903327558}, doi = {10.1080/19393550903327558}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/KumarG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/LagouC09, author = {Panagiota Lagou and Gregory Chondrokoukis}, title = {Survey on Nonrepudiation: Digital Signature Versus Biometrics}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {257--266}, year = {2009}, url = {https://doi.org/10.1080/19393550903300464}, doi = {10.1080/19393550903300464}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/LagouC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/LandryKBN09, author = {Brett J. L. Landry and M. Scott Koger and Sandra Blanke and Christian Nielsen}, title = {Using the Private-Internet-Enterprise {(PIE)} Model to Examine {IT} Risks and Threats Due to Porous Perimeters}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {4}, pages = {163--169}, year = {2009}, url = {https://doi.org/10.1080/19393550903044112}, doi = {10.1080/19393550903044112}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/LandryKBN09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Major09, author = {Scott D. Applegate}, title = {Social Engineering: Hacking the Wetware!}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {40--46}, year = {2009}, url = {https://doi.org/10.1080/19393550802623214}, doi = {10.1080/19393550802623214}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Major09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MalligaT09, author = {S. Malliga and A. Tamilarasi}, title = {Collaborative Framework for Detection, Prevention, and Traceback of Flooding Attacks Using Marking and Filtering}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {74--86}, year = {2009}, url = {https://doi.org/10.1080/19393550802676071}, doi = {10.1080/19393550802676071}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MalligaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Matusitz09, author = {Jonathan Matusitz}, title = {A Postmodern Theory of Cyberterrorism: Game Theory}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {6}, pages = {273--281}, year = {2009}, url = {https://doi.org/10.1080/19393550903200474}, doi = {10.1080/19393550903200474}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Matusitz09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/MuldnerLM09, author = {Tomasz M{\"{u}}ldner and Gregory Leighton and Jan Krzysztof Miziolek}, title = {Parameterized Role-Based Access Control Policies for {XML} Documents}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {6}, pages = {282--296}, year = {2009}, url = {https://doi.org/10.1080/19393550903249612}, doi = {10.1080/19393550903249612}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/MuldnerLM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Nganga09, author = {Alexander Mwaura Ng'ang'a}, title = {Toward a Regional {ICT} Hub: Need for Cyber Laws in Kenya}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {47--50}, year = {2009}, url = {https://doi.org/10.1080/19393550802651538}, doi = {10.1080/19393550802651538}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Nganga09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/OtrokZYB09, author = {Hadi Otrok and Benwen Zhu and Hamdi Yahyaoui and Prabir Bhattacharya}, title = {An Intrusion Detection Game Theoretical Model}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {5}, pages = {199--212}, year = {2009}, url = {https://doi.org/10.1080/19393550903130390}, doi = {10.1080/19393550903130390}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/OtrokZYB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ParrishL09, author = {Lee Parrish and Mark Leary}, title = {Secure Global Collaboration Among Critical Infrastructures}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {57--63}, year = {2009}, url = {https://doi.org/10.1080/19393550802676089}, doi = {10.1080/19393550802676089}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ParrishL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/ReinholdFO09, author = {Christopher Reinhold and Mark N. Frolick and Adekunle Okunoye}, title = {Managing Your Security Future}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {116--123}, year = {2009}, url = {https://doi.org/10.1080/19393550802656644}, doi = {10.1080/19393550802656644}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/ReinholdFO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/RybaPSG09, author = {Miroslaw Ryba and Aleksander Poniewierski and J{\'{o}}zef Sulwinski and Mateusz G{\'{o}}rnisiewicz}, title = {The Methodology for Managing the Abuse of {IT} Systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {107--115}, year = {2009}, url = {https://doi.org/10.1080/19393550902791457}, doi = {10.1080/19393550902791457}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/RybaPSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Scholz09, author = {James A. Scholz}, title = {Securing Critical {IT} Infrastructure}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {1}, pages = {33--39}, year = {2009}, url = {https://doi.org/10.1080/19393550802644640}, doi = {10.1080/19393550802644640}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Scholz09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Sharma09, author = {Varun Sharma}, title = {Testing Role-based Authorization Controls in Websites}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {4}, pages = {170--177}, year = {2009}, url = {https://doi.org/10.1080/19393550903074127}, doi = {10.1080/19393550903074127}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Sharma09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SinghGD09, author = {Jyotsna Singh and Parul Garg and Alok Nath De}, title = {A Combined Watermarking and Encryption Algorithm for Secure VoIP}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {2}, pages = {99--105}, year = {2009}, url = {https://doi.org/10.1080/19393550902791424}, doi = {10.1080/19393550902791424}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SinghGD09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/TawalbehSG09, author = {Lo'ai Ali Tawalbeh and Saed Swedan and Adnan Abdul{-}Aziz Gutub}, title = {Efficient Modular Squaring Algorithms for Hardware Implementation in GF(\emph{p})}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {131--138}, year = {2009}, url = {https://doi.org/10.1080/19393550902926053}, doi = {10.1080/19393550902926053}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/TawalbehSG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/Trinckes09, author = {John J. Trinckes Jr.}, title = {From the Field: {A} Hacker's Story}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {18}, number = {3}, pages = {149--151}, year = {2009}, url = {https://doi.org/10.1080/19393550902928596}, doi = {10.1080/19393550902928596}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isjgp/Trinckes09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.