


default search action
Computers & Security, Volume 59
Volume 59, June 2016
- Sofia-Anna Menesidou

, Dimitrios Vardalis, Vasilios Katos
:
Automated key exchange protocol evaluation in delay tolerant networks. 1-8 - Kevin A. Barton

, Gurvirender P. Tejay, Michael Lane
, Steve Terrell:
Information system security commitment: A study of external influences on senior management. 9-25 - Waldo Rocha Flores, Mathias Ekstedt:

Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. 26-44 - Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:

Secure, efficient and revocable multi-authority access control system in cloud storage. 45-59 - Chunghun Lee, Choong C. Lee, Suhyun Kim:

Understanding information security stress: Focusing on the type of information security compliance activity. 60-70 - Kamran Morovati

, Sanjay Kadam
, Ali A. Ghorbani:
A network based document management model to prevent data extrusion. 71-91 - Mohsin Junaid

, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models. 92-117 - José Camacho

, Alejandro Pérez-Villegas, Pedro García-Teodoro, Gabriel Maciá-Fernández
:
PCA-based multivariate statistical network monitoring for anomaly detection. 118-137 - Hsin-Yi Sandy Tsai, Mengtian Jiang

, Saleem Alhabash, Robert LaRose, Nora J. Rifon, Shelia R. Cotten:
Understanding online safety behaviors: A protection motivation theory perspective. 138-150 - Wassim El-Hajj, Ghassen Ben Brahim

, Hazem M. Hajj, Haïdar Safa, Ralph Adaimy:
Security-by-construction in web applications development via database annotations. 151-165 - Jonathan J. Davis, Ernest Foo

:
Automated feature engineering for HTTP tunnel detection. 166-185 - Francois Mouton

, Louise Leenen, H. S. Venter
:
Social engineering attack examples, templates and scenarios. 186-209 - Pin Shen Teh

, Ning Zhang, Andrew Beng Jin Teoh
, Ke Chen:
A survey on touch dynamics authentication in mobile devices. 210-235 - Liliana Pasquale, Sorren Hanvey, Mark Mcgloin, Bashar Nuseibeh

:
Adaptive evidence collection in the cloud using attack scenarios. 236-254

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














