


default search action
Computers & Security, Volume 53
Volume 53, September 2015
- Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. 1-17 - Hannes Holm
, Khalid Khan Afridi:
An expert-based investigation of the Common Vulnerability Scoring System. 18-30 - Abdul Serwadda, Vir V. Phoha
:
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet. 31-43 - Yongge Wang
, Tony Nicol:
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL. 44-64 - Nader Sohrabi Safa
, Mehdi Sookhak
, Rossouw von Solms, Steven Furnell
, Norjihan Binti Abdul Ghani
, Tutut Herawan
:
Information security conscious care behaviour formation in organizations. 65-78 - Izzat Alsmadi
, Dianxiang Xu:
Security of Software Defined Networks: A survey. 79-108 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud, Kilani Ghoudi
:
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement. 109-131 - Bukelwa Ngoqo
, Stephen V. Flowerday
:
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users. 132-142 - Chao Shen
, Shichao Pei, Zhenyu Yang, Xiaohong Guan:
Input extraction via motion-sensor behavior analysis on smartphones. 143-155 - Sokratis Vavilis
, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone
:
An anomaly analysis framework for database systems. 156-173
- Michele Carminati
, Roberto Caron
, Federico Maggi
, Ilenia Epifani
, Stefano Zanero
:
BankSealer: A decision support system for online banking fraud analysis and investigation. 175-186 - Gökhan Bal
, Kai Rannenberg, Jason I. Hong
:
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns. 187-202 - Kevin Atighehchi, Alexis Bonnecaze, Gabriel Risterucci:
New models for efficient authenticated dictionaries. 203-214 - Siamak Fayyaz Shahandashti
, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling user privacy and implicit authentication for mobile devices. 215-233 - Hataichanok Saevanee, Nathan L. Clarke
, Steven Furnell
, Valerio Biscione:
Continuous user authentication using multi-modal biometrics. 234-246

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
