


default search action
Computers & Security, Volume 30
Volume 30, Number 1, January 2011
- Eugene H. Spafford

:
Editorial. 1 - Eugene H. Spafford

:
Security, technology, publishing, and ethics (part II). 2-3 - Zac Sadan, David G. Schwartz

:
WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure. 4-12 - Qijun Gu, Christopher Ferguson, Rizwan Noorani:

A study of self-propagating mal-packets in sensor networks: Attacks and defenses. 13-27 - Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang:

An efficient and non-interactive hierarchical key agreement protocol. 28-34 - Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza

:
Designing a cluster-based covert channel to evade disk investigation and forensics. 35-49 - Sung-Whan Woo, HyunChul Joh, Omar Hussain Alhazmi

, Yashwant K. Malaiya:
Modeling vulnerability discovery process in Apache and IIS HTTP servers. 50-62 - Christos Xenakis

, Christoforos Panos, Ioannis Stavrakakis
:
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. 63-80
Volume 30, Numbers 2-3, March - May 2011
- Dimitris Gritzalis, James Joshi:

Editorial. 89-90 - Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo

:
Fine-grained integration of access control policies. 91-107 - Barbara Carminati

, Elena Ferrari
, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Semantic web-based social network access control. 108-115 - Jing Jin, Gail-Joon Ahn

, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. 116-127 - Samrat Mondal

, Shamik Sural
, Vijayalakshmi Atluri
:
Security analysis of GTRBAC and its variants using model checking. 128-147 - Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:

Symbolic reachability analysis for parameterized administrative role-based access control. 148-164
Volume 30, Number 4, June 2011
- Eugene H. Spafford:

Editorial. 171 - Xiongfeng Ma

, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau:
Universally composable and customizable post-processing for practical quantum key distribution. 172-177 - Travis D. Breaux

, David L. Baumer:
Legally "reasonable" security requirements: A 10-year FTC retrospective. 178-193 - Hugues Chabot, Raphaël Khoury, Nadia Tawbi

:
Extending the enforcement power of truncation monitors using static analysis. 194-207 - Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn A. Jack:

User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. 208-220 - Davide Ariu

, Roberto Tronci
, Giorgio Giacinto
:
HMMPayl: An intrusion detection system based on Hidden Markov Models. 221-241 - Sebastian Möller

, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer:
Modeling the behavior of users who are confronted with security mechanisms. 242-256 - Stylianos Basagiannis

, Sophia G. Petridou
, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros
:
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach. 257-272 - Dong-Her Shih, David C. Yen

, Chih-Hung Cheng, Ming-Hung Shih:
A secure multi-item e-auction mechanism with bid privacy. 273-287
Volume 30, Number 5, July 2011
- Yang Xiang

, Jiankun Hu
, Wanlei Zhou
:
Editorial: Advances in network and system security. 295-296 - Juan E. Tapiador

, John A. Clark:
Masquerade mimicry attack detection: A randomised approach. 297-310 - Peng Zhang

, Jiankun Hu
, Cai Li, Mohammed Bennamoun
, Vijayakumar Bhagavatula
:
A pitfall in fingerprint bio-cryptographic key generation. 311-319 - Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:

Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. 320-331 - Xiaoxun Sun, Hua Wang

, Jiuyong Li
, Yanchun Zhang:
Injecting purpose and trust into data anonymisation. 332-345
Volume 30, Numbers 6-7, September - October 2011
- Eugene H. Spafford

:
Editorial. 351-352
- Jonathan J. Davis, Andrew J. Clark:

Data preprocessing for anomaly based network intrusion detection: A review. 353-375
- Slim Rekhis

, Noureddine Boudriga:
Logic-based approach for digital forensic investigation in communication Networks. 376-396 - Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen:

Modeling behavioral considerations related to information security. 397-409 - Klaus Julisch, Christophe Suter, Thomas Woitalla, Olaf Zimmermann:

Compliance by design - Bridging the chasm between auditors and IT architects. 410-426 - Romain Giot

, Mohamad El-Abed
, Baptiste Hemery
, Christophe Rosenberger
:
Unconstrained keystroke dynamics authentication with shared secret. 427-445 - Fernando Pereñíguez-Garcia

, Rafael Marín López, Georgios Kambourakis
, Stefanos Gritzalis
, Antonio Fernandez Gómez-Skarmeta
:
PrivaKERB: A user privacy framework for Kerberos. 446-463 - Arne Tauber:

A survey of certified mail systems provided on the Internet. 464-485 - Clay Posey, Rebecca J. Bennett, Tom L. Roberts:

Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes. 486-497 - Amit Sachan, Sabu Emmanuel:

Rights violation detection in multi-level digital rights management system. 498-513 - Yuxin Ding, Xuebing Yuan, Di Zhou, Li Dong, Zhanchao An:

Feature representation and selection in malicious code detection methods based on static system calls. 514-524 - Zonghua Zhang

, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi:
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. 525-537 - Jianhua Yang, David Woolbright:

Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. 538-546
Volume 30, Number 8, November 2011
- Eugene H. Spafford

:
Editorial for 30/8. 553-554
- Da Zhang, Chai Kiat Yeo

:
Distributed Court System for intrusion detection in mobile ad hoc networks. 555-570 - Trent Jaeger, Paul C. van Oorschot

, Glenn Wurster:
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification. 571-579 - Argyris Arnellos

, Dimitrios Lekkas, Dimitrios Zissis
, Thomas Spyrou
, John Darzentas:
Fair digital signing: The structural reliability of signed documents. 580-596 - Nayantara Mallesh, Matthew K. Wright

:
An analysis of the statistical disclosure attack and receiver-bound cover. 597-612 - Hugo Gascon, Agustín Orfila, Jorge Blasco Alís

:
Analysis of update delays in signature-based network intrusion detection systems. 613-624 - Constantinos Kolias, Georgios Kambourakis

, Manolis Maragoudakis
:
Swarm intelligence in intrusion detection: A survey. 625-642 - Eleftheria Makri, Elisavet Konstantinou:

Constant round group key agreement protocols: A comparative study. 643-678 - Nikos Mavrogiannopoulos

, Nessim Kisserli, Bart Preneel
:
A taxonomy of self-modifying code for obfuscation. 679-691 - Christian Callegari

, Stefano Giordano
, Michele Pagano
, Teresa Pepe:
Combining sketches and wavelet analysis for multi time-scale network anomaly detection. 692-704 - Giampaolo Bella

, Rosario Giustolisi
, Salvatore Riccobene:
Enforcing privacy in e-commerce by balancing anonymity and trust. 705-718 - Kim-Kwang Raymond Choo

:
The cyber threat landscape: Challenges and future research directions. 719-731 - Lin Huang, Mark Stamp

:
Masquerade detection using profile hidden Markov models. 732-747 - Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu:

Roles in information security - A survey and classification of the research area. 748-769 - James S. Okolica, Gilbert L. Peterson

:
Windows driver memory analysis: A reverse engineering methodology. 770-779 - GuangXu Zhou, Rustu Murat Demirer

, Coskun Bayrak, Licheng Wang:
Enable delegation for RBAC with Secure Authorization Certificate. 780-790 - Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:

Estimating botnet virulence within mathematical models of botnet propagation dynamics. 791-802 - Nigel J. Martin, John L. Rice

:
Cybercrime: Understanding and addressing the concerns of stakeholders. 803-814 - Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj

, Ayman I. Kayssi, Ali Chehab
:
E2VoIP2: Energy efficient voice over IP privacy. 815-829 - Jung-San Lee, Ming-Huang Hsieh:

An interactive mobile SMS confirmation method using secret sharing technique. 830-839

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














