


default search action
Computers & Security, Volume 58
Volume 58, May 2016
- Xiao-Fan Chen, Shun-Zheng Yu:

CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. 1-19 - José Miguel Horcas

, Mónica Pinto
, Lidia Fuentes
, Wissam Mallouli, Edgardo Montes de Oca:
An approach for deploying and monitoring dynamic security policies. 20-38 - Christian Konradt, Andreas Schilling, Brigitte Werners

:
Phishing: An economic analysis of cybercrime perpetrators. 39-46 - Cheng Huang, Jiayong Liu, Yong Fang

, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. 47-62 - Hira Asghar, Zahid Anwar

, Khalid Latif
:
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms. 63-82 - Mohammad GhasemiGol

, Abbas Ghaemi Bafghi, Hassan Takabi:
A comprehensive approach for network attack forecasting. 83-105 - James Obert

, Inna Pivkina, Hong Huang, Huiping Cao:
Proactively applied encryption in multipath networks. 106-124 - Jae-wook Jang, Hyun-Jae Kang

, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim
:
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. 125-138 - Farzaneh Abazari

, Morteza Analoui
, Hassan Takabi:
Effect of anti-malware software on infectious nodes in cloud environment. 139-148 - Weize Li, Lun Xie, Zulan Deng, Zhiliang Wang:

False sequential logic attack on SCADA system and its physical impact analysis. 149-159 - Debanjan Sadhya

, Sanjay Kumar Singh
:
Privacy preservation for soft biometrics based multimodal recognition system. 160-179 - Hao Zhang

, Danfeng (Daphne) Yao
, Naren Ramakrishnan
, Zhibin Zhang:
Causality reasoning about network events for detecting stealthy malware activities. 180-198 - Siru Ni, Yi Zhuang, Jingjing Gu, Ying Huo:

A formal model and risk assessment method for security-critical real-time embedded systems. 199-215 - Georgios Spanos

, Lefteris Angelis:
The impact of information security events to the stock market: A systematic literature review. 216-229 - Yuede Ji

, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li
:
Combating the evasion mechanisms of social bots. 230-249 - Cihan Ulas, Ulas Asik, Cantürk Karadeniz:

Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines. 250-267 - Paolo Farina

, Enrico Cambiaso
, Gianluca Papaleo
, Maurizio Aiello
:
Are mobile botnets a possible threat? The case of SlowBot Net. 268-283

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














