default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 26 matches
- 2020
- Zakaria Hassan Abdelwahab, Talaat A. Elgarf, Abdelhalim Zekry:
Approved algorithmic security enhancement of stream cipher for advanced mobile communications. Inf. Secur. J. A Glob. Perspect. 29(6): 341-365 (2020) - Prema T. Akkasaligar, Sumangala Biradar:
Selective medical image encryption using DNA cryptography. Inf. Secur. J. A Glob. Perspect. 29(2): 91-101 (2020) - Abdalla Alameen, Ashu Gupta:
Fitness rate-based rider optimization enabled for optimal task scheduling in cloud. Inf. Secur. J. A Glob. Perspect. 29(6): 310-326 (2020) - Femi Emmanuel Ayo, Sakinat Oluwabukonla Folorunso, Adebayo Abayomi-Alli, Adebola Olayinka Adekunle, Joseph Bamidele Awotunde:
Network intrusion detection based on deep learning model optimized with rule-based hybrid feature selection. Inf. Secur. J. A Glob. Perspect. 29(6): 267-283 (2020) - Ashutosh Bahuguna, Raj Kishor Bisht, Jeetendra Pande:
Country-level cybersecurity posture assessment: Study and analysis of practices. Inf. Secur. J. A Glob. Perspect. 29(5): 250-266 (2020) - Francesco Bergadano, Milena Boetti, Fabio Cogno, Valerio Costamagna, Mario Leone, Marco Evangelisti:
A modular framework for mobile security analysis. Inf. Secur. J. A Glob. Perspect. 29(5): 220-243 (2020) - Akshay Gajanan Bhosale, Vikram Shripati Patil:
A (2, 2) Visual Cryptography Technique with Improved Contrast. Inf. Secur. J. A Glob. Perspect. 29(4): 199-208 (2020) - Debojit Boro, Mrinmoy Haloi, Dhruba K. Bhattacharyya:
A fast self-similarity matrix-based method for shrew DDoS attack detection. Inf. Secur. J. A Glob. Perspect. 29(2): 73-90 (2020) - Samir Chabbi, Rachid Boudour, Fouzi Semchedine, Djalel Chefrour:
Dynamic array PIN: A novel approach to secure NFC electronic payment between ATM and smartphone. Inf. Secur. J. A Glob. Perspect. 29(6): 327-340 (2020) - Mukesh Dalal, Mamta Juneja:
Evaluation of orthogonal and biorthogonal wavelets for video steganography. Inf. Secur. J. A Glob. Perspect. 29(1): 40-50 (2020) - Farah Deeba, Kun She, Fayaz Ali Dharejo, Hira Memon:
Digital image watermarking based on ANN and least significant bit. Inf. Secur. J. A Glob. Perspect. 29(1): 30-39 (2020) - Alka Gupta, Lalit Sen Sharma:
Detecting attacks in high-speed networks: Issues and solutions. Inf. Secur. J. A Glob. Perspect. 29(2): 51-61 (2020) - Charu Gupta, Rakesh Kumar Singh, Amar Kumar Mohapatra:
A survey and classification of XML based attacks on web applications. Inf. Secur. J. A Glob. Perspect. 29(4): 183-198 (2020) - Ogechukwu N. Iloanusi, Ugochi C. Ejiogu:
Gender classification from fused multi-fingerprint types. Inf. Secur. J. A Glob. Perspect. 29(5): 209-219 (2020) - Nanta Janpitak, Woraphon Lilakiatsakun, Chanboon Sathitwiriyawong:
The novel secure testament methodology for cryptocurrency wallet using mnemonic seed. Inf. Secur. J. A Glob. Perspect. 29(4): 169-182 (2020) - Ali Cherif Khalfallah, Naima Hadj-Said, Ali Pacha Adda:
A new chaotic encrypted image based on the trigonometric circle. Inf. Secur. J. A Glob. Perspect. 29(6): 297-309 (2020) - Yuancheng Li, Haiyan Hou, Wenping Chen:
A privacy-preserving multi-keyword ranked retrieval scheme in cloud computing. Inf. Secur. J. A Glob. Perspect. 29(6): 284-296 (2020) - Samaneh Mashhadi:
Toward a formal proof for multi-secret sharing in the random oracle model. Inf. Secur. J. A Glob. Perspect. 29(5): 244-249 (2020) - Sanaj Ms, Joe Prathap P. M, Valanto Alappatt:
Profit maximization based task scheduling in hybrid clouds using whale optimization technique. Inf. Secur. J. A Glob. Perspect. 29(4): 155-168 (2020) - Vankamamidi Srinivasa Naresh, Reddi Sivaranjani, Nistala V. E. S. Murthy:
Provable secure lightweight multiple shared key agreement based on hyper elliptic curve Diffie-Hellman for wireless sensor networks. Inf. Secur. J. A Glob. Perspect. 29(1): 1-13 (2020) - Mahsa Nooribakhsh, Mahdi MollaMotalebi:
A review on statistical approaches for anomaly detection in DDoS attacks. Inf. Secur. J. A Glob. Perspect. 29(3): 118-133 (2020) - Shravani Mahesh Patil, B. R. Purushothama:
DR-PRE: dual receiver proxy re-encryption scheme. Inf. Secur. J. A Glob. Perspect. 29(2): 62-72 (2020) - Thakkalapally Preethi, B. B. Amberker:
Lattice-based group signature scheme without random oracle. Inf. Secur. J. A Glob. Perspect. 29(6): 366-381 (2020) - Junaid Latief Shah, Heena Farooq Bhat:
Towards a Secure IPv6 Autoconfiguration. Inf. Secur. J. A Glob. Perspect. 29(1): 14-29 (2020) - Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp:
Convolutional neural networks for image spam detection. Inf. Secur. J. A Glob. Perspect. 29(3): 103-117 (2020) - Priyansh Singh, Shashikala Tapaswi, Sanchit Gupta:
Malware Detection in PDF and Office Documents: A survey. Inf. Secur. J. A Glob. Perspect. 29(3): 134-153 (2020)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-09-28 16:04 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint