


default search action
Computers & Security, Volume 56
Volume 56, February 2016
- Yulia Cherdantseva

, Pete Burnap
, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart
:
A review of cyber security risk assessment methods for SCADA systems. 1-27 - Fabio Pierazzi

, Sara Casolari, Michele Colajanni
, Mirco Marchetti
:
Exploratory security analytics for anomaly detection. 28-49 - Diego A. López García

:
A flexible e-voting scheme for debate tools. 50-62 - Gurpreet Dhillon

, Romilla Syed, Cristiane Pedron
:
Interpreting information security culture: An organizational transformation case study. 63-69 - Nader Sohrabi Safa

, Rossouw von Solms, Steven Furnell
:
Information security policy compliance model in organizations. 70-82 - Gizem Ögütçü, Özlem Müge Testik

, Oumout Chouseinoglou
:
Analysis of personal information security behavior and awareness. 83-93 - Christian D'Orazio, Kim-Kwang Raymond Choo

:
An adversary model to evaluate DRM protection of video contents on iOS devices. 94-110 - Karanpreet Singh, Paramvir Singh, Krishan Kumar

:
A systematic review of IP traceback schemes for denial of service attacks. 111-139 - Mun-Kyu Lee, Hyeonjin Nam, Dong Kyue Kim:

Secure bimodal PIN-entry method using audio signals. 140-150 - Graeme Horsman:

The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. 151-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














