


default search action
Computers & Security, Volume 39
Volume 39, November 2013
- David Zhao, Issa Traoré, Bassam Sayed, Wei Lu

, Sherif Saad, Ali A. Ghorbani, Daniel Garant:
Botnet detection based on traffic behavior analysis and flow intervals. 2-16 - Dominik Herrmann, Christian Banse

, Hannes Federrath:
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic. 17-33 - Ruben Rios, Jose Antonio Onieva

, Javier López
:
Covert communications through network configuration messages. 34-46 - Sabrina De Capitani di Vimercati

, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Enforcing dynamic write privileges in data outsourcing. 47-63 - Joaquín García-Alfaro

, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez
, Jordi Cabot
:
Management of stateful firewall misconfiguration. 64-85 - Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi

, Luigi Logrippo:
A framework for risk assessment in access control systems. 86-103 - Alessandro Armando

, Alessio Merlo, Mauro Migliardi
, Luca Verderame
:
Breaking and fixing the Android Launching Flow. 104-115
- Isaac Agudo

, Ruben Rios, Javier López
:
A privacy-aware continuous authentication scheme for proximity-based access control. 117-126 - Heather Crawford

, Karen Renaud
, Tim Storer:
A framework for continuous, transparent mobile device authentication. 127-136 - Mohammad Omar Derawi, Patrick Bours:

Gait and activity recognition using commercial phones. 137-144
- Jordan B. Barlow, Merrill Warkentin

, Dustin Ormond, Alan R. Dennis:
Don't make excuses! Discouraging neutralization to reduce IT policy violation. 145-159 - Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi

:
Dynamic traffic awareness statistical model for firewall performance enhancement. 160-172 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais:

A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. 173-189 - Saman A. Zonouz, Parisa Haghani:

Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior. 190-200 - Manisha Sharma, Shamik Sural

, Jaideep Vaidya, Vijayalakshmi Atluri
:
AMTRAC: An administrative model for temporal role-based access control. 201-218 - M. Ajmal Azad

, Ricardo Morla
:
Caller-REP: Detecting unwanted calls with caller social strength. 219-236 - Nathalie Baracaldo

, James Joshi:
An adaptive risk management and access control framework to mitigate insider threats. 237-254 - Chun Guo, Yajian Zhou, Yuan Ping

, Shoushan Luo, Yu-Ping Lai, Zhongkun Zhang:
Efficient intrusion detection using representative instances. 255-267 - Reza Azmi

, Boshra Pishgoo:
SHADuDT: Secure hypervisor-based anomaly detection using danger theory. 268-288 - Lubica Staneková, Martin Stanek:

Analysis of dictionary methods for PIN selection. 289-298 - Chris I. Djamaludin, Ernest Foo

, Peter I. Corke
:
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI. 299-314 - Yuxin Ding, Xuebing Yuan, Ke Tang, Xiao Xiao, Yibin Zhang:

A fast malware detection algorithm based on objective-oriented association mining. 315-324 - Rima Belguechi, Estelle Cherrier, Christophe Rosenberger

, Samy Ait-Aoudia:
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates. 325-339 - Ying-Dar Lin, Yuan-Cheng Lai, Chien-Hung Chen, Hao-Chuan Tsai:

Identifying android malicious repackaged applications by thread-grained system call sequences. 340-350 - Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache

, Maryline Laurent
:
Trust management system design for the Internet of Things: A context-aware and multi-service approach. 351-365 - Dongwon Seo, Heejo Lee, Adrian Perrig:

APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks. 366-385 - Mario Silic

:
Dual-use open source security software in organizations - Dilemma: Help or hinder? 386-395 - Debi Ashenden

, M. Angela Sasse:
CISOs and organisational culture: Their own worst enemy? 396-405 - Georgios Karopoulos, Paolo Mori

, Fabio Martinelli:
Usage control in SIP-based multimedia delivery. 406-418 - Young Hee Park, Douglas S. Reeves, Mark Stamp

:
Deriving common malware behavior through graph clustering. 419-430 - Peng Zhou

, Xiapu Luo
, Rocky K. C. Chang
:
Inference attacks against trust-based onion routing: Trust degree to the rescue. 431-446 - Lijiao Cheng, Ying Li, Wenli Li, Eric Holm

, Qingguo Zhai
:
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. 447-459 - Ying-Dar Lin, Yuan-Cheng Lai, Cheng-Yuan Ho, Wei-Hsuan Tai:

Creditability-based weighted voting for reducing false positives and negatives in intrusion detection. 460-474 - Marios Anagnostopoulos

, Georgios Kambourakis
, Panagiotis Kopanos, Georgios Louloudakis, Stefanos Gritzalis
:
DNS amplification attack revisited. 475-485 - Chris G. Hocking, Steven M. Furnell

, Nathan L. Clarke
, Paul L. Reynolds:
Co-operative user identity verification using an Authentication Aura. 486-502

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














