


default search action
Computers & Security, Volume 48
Volume 48, February 2015
- Mhamed Zineddine
:
Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights. 1-18 - Antoni Lluís Mesquida
, Antònia Mas Picahaco
:
Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension. 19-34 - Ivo Friedberg
, Florian Skopik
, Giuseppe Settanni, Roman Fiedler:
Combating advanced persistent threats: From network event correlation to incident detection. 35-57 - David J. Barnes, Julio C. Hernandez-Castro
:
On the limits of engine analysis for cheating detection in chess. 58-73 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo
:
Exfiltrating data from Android devices. 74-91 - Daniel Díaz López
, Ginés Dólera Tormo, Félix Gómez Mármol
, Gregorio Martínez Pérez
:
Managing XACML systems in distributed environments through Meta-Policies. 92-115 - Jianfeng Lu
, James B. D. Joshi
, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. 116-130 - Shu-Yuan Shen
, Li-Hong Huang
:
A data hiding scheme using pixel value differencing and improving exploiting modification directions. 131-141 - Xi Jun Lin, Lin Sun, Haipeng Qu:
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. 142-149 - Alexander D. Kent
, Lorie M. Liebrock, Joshua C. Neil:
Authentication graphs: Analyzing user behavior within an enterprise network. 150-166 - YoungJae Maeng
, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. 167-181 - R. P. Reece, Bernd Carsten Stahl:
The professionalisation of information security: Perspectives of UK practitioners. 182-195 - Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou
, Robert H. Deng
:
Leakage-resilient password entry: Challenges, design, and evaluation. 196-211 - Shahid Alam
, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar
:
A framework for metamorphic malware analysis and real-time detection. 212-233 - Ilker Özçelik
, Richard R. Brooks
:
Deceiving entropy based DoS detection. 234-245 - Nir Nissim, Aviad Cohen, Chanan Glezer
, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. 246-266 - Gustavo Percio Zimmermann Montesdioca, Antônio Carlos Gastaud Maçada
:
Measuring user satisfaction with information security practices. 267-280 - Duy Dang-Pham
, Siddhi Pittayachawan
:
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. 281-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
