研飞客户端支持数万种期刊查询,助你在阅读和写作中随时了解期刊动态
ISeCure
短名 | |
Journal Impact | 0.87 |
国际分区 | COMPUTER SCIENCE, INFORMATION SYSTEMS(Q4) |
ISSN | 2008-2045, 2008-3076 |
h-index | 7 |
阅读文献时,研飞即可帮你快速了解期刊,查询影响因子与分区,智能高亮期刊预警!
涉及主题 | isecureinformationsecuritycryptology |
出版信息 | 出版商: Iranian Society of Cryptology,出版周期: ,期刊类型: journal |
基本数据 | 创刊年份: 2019,原创研究文献占比: 100.00%,自引率:25.00%, Gold OA占比: 0.00% |
平均审稿周期 | 网友分享经验:10 Weeks |
期刊引文格式
这些示例是对学术期刊文章的引用,以及它们应该如何出现在您的参考文献中。
并非所有期刊都按卷和期组织其已发表的文章,因此这些字段是可选的。有些电子期刊不提供页面范围,而是列出文章标识符。在这种情况下,使用文章标识符而不是页面范围是安全的。
只有1位作者的期刊
有2位作者的期刊
有3位作者的期刊
有5位以上作者的期刊
书籍引用格式
以下是创作和编辑的书籍的参考文献的示例。
学位论文引用格式
网页引用格式
这些示例是对网页的引用,以及它们应该如何出现在您的参考文献中。
专利引用格式
手工熬夜修改参考文献?研飞自动匹配期刊,一键轻松成稿,支持 Word/WPS
点击下方按钮,免费开启试用!
最新文章
A Study of Timing Side-Channel Attacks and Countermeasures on JavaScript and WebAssembly
2021-9-6
A Binary Relevance Adaptive Model-Selection for Ensemble Steganalysis
2021-9-6
A New Variant of the Winternitz One Time Signature Based on Graded Encoding Schemes
2021-9-6
A Time Randomization-Based Countermeasure Against the Template Side-Channel Attack
2021-9-6
SANT: Static Analysis of Native Threads for Security Vetting of Android Applications
2021-9-5
An Efficient Pairing-Free Identity-Based Certificateless Signcryption
2021-8-28
Ransomware Detection Based on PE Header Using Convolutional Neural Networks
2021-8-28
A Privacy Preserving Mutual Authentication Scheme Suitable for IoT-Based Medical Systems
2021-8-28
Intensive Analysis of Physical Parameters of Power Sensors for Remote Side-Channel Attacks
2021-7-1
Better Sampling Method of Enumeration Solution for BKZ-Simulation
2021-7-1
Blind Multipurpose Image Watermarking with Perfect Security
2021-7-1
IDOT: Black-Box Detection of Access Control Violations in Web Applications
2021-7-1
An Obfuscation Method Based on CFGLUTs for Security of FPGAs
2021-7-1
Curious-Monkey: Evolved Monkey for Triggering Malicious Payloads in Android Malware
2021-7-1
File Fragment Type Classification by Bag-Of-Visual-Words
2021-5-8
Privacy Preserving Attribute-Based Encryption with Conjunctive Keyword Search for E-health Records in Cloud
2021-5-8
OT-Feature Extraction on Scrambled Images with Instantaneous Clustering for CBIR Scheme in Cloud Computing
2021-1-1
An Efficient Pairing-Free Identity Based Proxy Blind Signature Scheme with Message Recovery
2021-1-1
A Trusted Design Platform for Trojan Detection in FPGA Bitstreams Using Partial Reconfiguration
2021-1-1
Evict+Time Attack on Intel CPUs without Explicit Knowledge of Address Offsets
2021-1-1
Indexed View Technique to Speed-up Data Warehouse Query Processing
2020-11-1
A New Derivation of the Leftover Hash Lemma.
2020-11-1
Knowledge Discovery in Cloud-Computing Environment and the Challenges
2020-11-1
A Hybrid Encryption Algorithm for Mitigating the Effects of Attacks in Ad Hoc Networks
2020-11-1
The Use of Local Sensitive Hashing for E-learner Face Identification.
2020-11-1
Anomaly-Based Network Intrusion Detection Using Bidirectional Long Short Term Memory and Convolutional Neural Network
2020-11-1
A Multilingual Infobot in Airports
2020-11-1
Suspended Stripline Low-pass Filter Design for Wide Stopband Attenuation Applications
2020-11-1
Modeling a Cloud-Based Smart Parking WLAN Networks Using IEEE802.11AC Technology
2020-11-1
Fuzzy Histogram Equalization and Computer Vision Automated Identification of Microcalcifications in Breast Cancer
2020-11-1
Evaluation of a Wireless ZigBee with PID Controller for Networked Control System Using True Time Toolbox.
2020-11-1
The Impact of Mobile Payment Quality on User’s Continuance Intention Toward Mobile Payment in Saudi Arabia
2020-11-1
CEMD: A Cluster-based Ensemble Motif Discovery Tool
2020-11-1
The Establishment of a Distance Training Device within the Regional Center of the Taza Education and Training: Administrative Cycle Case
2020-11-1
Identifying Entrepreneurial Influencers on Twitter
2020-11-1
CPA on COLM Authenticated Cipher and the Protection Using Domain-Oriented Masking
2020-7-1
Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems
2020-7-1
A Fast Publicly Verifiable Secret Sharing Scheme using Non-homogeneous Linear Recursions
2020-7-1
Enhanced Flush+Reload Attack on AES
2020-7-1
F-STONE: A Fast Real-Time DDOS Attack Detection Method Using an Improved Historical Memory Management
2020-7-1
GSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
2020-7-1
New High Secure Network Steganography Method Based on Packet Length
2020-1-1
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
2020-1-1
Improved Univariate Microaggregation for Integer Values
2020-1-1
Investigation of Some Attacks on GAGE (v1), InGAGE (v1), (v1.03), and CiliPadi (v1) Variants
2020-1-1
Anomaly-based Web Attack Detection: The Application of Deep Neural Network Seq2Seq With Attention Mechanism
2020-1-1
Modified Sliding-Mode Control Method for Synchronization a Class of Chaotic Fractional-Order Systems with Application in Encryption.
2020-1-1
Access and Mobility Policy Control at the Network Edge
2019-8-1
An Optimal Utilization of Cloud Resources using Adaptive Back Propagation Neural Network and Multi-Level Priority Queue Scheduling
2019-8-1
IoT Protocols Based Fog/Cloud over High Traffic
2019-8-1
帮你贴心管理全部的文献
研飞ivySCI,高效的论文管理
投稿经验分享
分享我的经验,帮你走得更远