


default search action
Computers & Security, Volume 43
Volume 43, June 2014
- Eugene H. Spafford

:
Editorial. iv - Asaf Shabtai, Lena Tenenboim-Chekina, Dudu Mimran, Lior Rokach, Bracha Shapira

, Yuval Elovici:
Mobile malware detection through analysis of deviations in application network behavior. 1-18 - Alireza Tamjidyamcholo, Mohd Sapiyan Bin Baba, Nor Liyana Mohd Shuib

, Vala Ali Rohani
:
Evaluation model for knowledge sharing in information security professional virtual community. 19-34 - Elias Bou-Harb

, Mourad Debbabi
, Chadi Assi:
On fingerprinting probing activities. 35-48 - Feng Zhu, Jinpeng Wei:

Static analysis based invariant detection for commodity operating systems. 49-63 - Mitchell Kajzer, John D'Arcy, Charles R. Crowell, Aaron Striegel

, Dirk Van Bruggen
:
An exploratory investigation of message-person congruence in information security awareness campaigns. 64-76 - Kyle O. Bailey, James S. Okolica, Gilbert L. Peterson

:
User identification and authentication using multi-modal behavioral biometrics. 77-89 - Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt:

Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. 90-110 - Cosima Rughinis

, Razvan Rughinis
:
Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union. 111-125 - Xabier Ugarte-Pedrero, Igor Santos, Iván García-Ferreira, Sergio Huerta, Borja Sanz, Pablo García Bringas

:
On the adoption of anomaly detection for packed executable filtering. 126-144 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis

:
Obscuring users' identity in VoIP/IMS environments. 145-158 - Lorena González-Manzano

, Ana Isabel González-Tablas Ferreres
, José María de Fuentes
, Arturo Ribagorda:
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks. 159-187 - George Stergiopoulos, Dimitris Gritzalis:

A Bug Hunter's Diary. 188 - Weizhi Meng

, Wenjuan Li
, Lam-for Kwok
:
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. 189-204 - Zheran Fang, Weili Han, Yingjiu Li:

Permission based Android security: Issues and countermeasures. 205-218

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














