


default search action
Computers & Security, Volume 48
Volume 48, February 2015
- Mhamed Zineddine

:
Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights. 1-18 - Antoni Lluís Mesquida

, Antònia Mas Picahaco
:
Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension. 19-34 - Ivo Friedberg

, Florian Skopik
, Giuseppe Settanni, Roman Fiedler:
Combating advanced persistent threats: From network event correlation to incident detection. 35-57 - David J. Barnes, Julio C. Hernandez-Castro

:
On the limits of engine analysis for cheating detection in chess. 58-73 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo

:
Exfiltrating data from Android devices. 74-91 - Daniel Díaz López

, Ginés Dólera Tormo, Félix Gómez Mármol
, Gregorio Martínez Pérez
:
Managing XACML systems in distributed environments through Meta-Policies. 92-115 - Jianfeng Lu

, James B. D. Joshi
, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. 116-130 - Shu-Yuan Shen

, Li-Hong Huang
:
A data hiding scheme using pixel value differencing and improving exploiting modification directions. 131-141 - Xi Jun Lin, Lin Sun, Haipeng Qu:

Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. 142-149 - Alexander D. Kent

, Lorie M. Liebrock, Joshua C. Neil:
Authentication graphs: Analyzing user behavior within an enterprise network. 150-166 - YoungJae Maeng

, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. 167-181 - R. P. Reece, Bernd Carsten Stahl:

The professionalisation of information security: Perspectives of UK practitioners. 182-195 - Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou

, Robert H. Deng
:
Leakage-resilient password entry: Challenges, design, and evaluation. 196-211 - Shahid Alam

, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar
:
A framework for metamorphic malware analysis and real-time detection. 212-233 - Ilker Özçelik

, Richard R. Brooks
:
Deceiving entropy based DoS detection. 234-245 - Nir Nissim, Aviad Cohen, Chanan Glezer

, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. 246-266 - Gustavo Percio Zimmermann Montesdioca, Antônio Carlos Gastaud Maçada

:
Measuring user satisfaction with information security practices. 267-280 - Duy Dang-Pham

, Siddhi Pittayachawan
:
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. 281-297

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














