


default search action
Computers & Security, Volume 55
Volume 55, November 2015
- Jukka Ruohonen

, Sami Hyrynsalmi
, Ville Leppänen
:
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit. 1-20 - Nameer N. El-Emam

:
New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. 21-45 - Romain Giot, Bernadette Dorizzi, Christophe Rosenberger

:
A review on the public benchmark databases for static keystroke dynamics. 46-61 - Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang

:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. 62-80 - Nima Zahadat

, Paul Blessner, Timothy D. Blackburn, Bill A. Olson:
BYOD security engineering: A framework and its analysis. 81-99 - Kresimir Solic, Hrvoje Ocevcic, Marin Golub:

The information systems' security level assessment model based on an ontology and evidential reasoning approach. 100-112 - Nikolaos Tsalis, Dimitris Gritzalis:

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). 113 - Francois Mouton, Mercia M. Malan, Kai K. Kimppa

, H. S. Venter
:
Necessity for ethics in social engineering research. 114-127 - Vasilis Stavrou, Dimitris Gritzalis:

Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015). 128-129 - Ting Yin, Gaobo Yang, Leida Li

, Dengyong Zhang, Xingming Sun:
Detecting seam carving based image resizing using local binary patterns. 130-141 - Matija Stevanovic

, Jens Myrup Pedersen
, Alessandro D'Alconzo, Stefan Ruehrup, Andreas Berger:
On the ground truth problem of malicious DNS traffic analysis. 142-158 - Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Juan E. Tapiador

, Rolando Salazar-Hernández
:
Automatic generation of HTTP intrusion signatures by selective identification of anomalies. 159-174 - Xiang Cheng, Sen Su, Shengzhi Xu, Peng Tang, Zhengyi Li:

Differentially private maximal frequent sequence mining. 175-192
- Anton V. Uzunov, Eduardo B. Fernández

, Katrina Falkner
:
Security solution frames and security patterns for authorization in distributed, collaborative systems. 193-234 - Lorena Cazorla

, Cristina Alcaraz
, Javier López
:
A three-stage analysis of IDS for critical infrastructures. 235-250 - Bing Liu, Chao-Hsien Chu

:
Relationship-based federated access control model for EPC Discovery Service. 251-270 - Prosanta Gope, Tzonelih Hwang:

A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. 271-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














