


default search action
Computers & Security, Volume 60
Volume 60, July 2016
- Nikolaos Alexiou, Stylianos Basagiannis

, Sophia G. Petridou
:
Formal security analysis of near field communication using model checking. 1-14 - Chris I. Djamaludin, Ernest Foo

, Seyit Ahmet Çamtepe
, Peter Corke
:
Revocation and update of trust in autonomous delay tolerant networks. 15-36 - Justin Scott Giboney

, Jeffrey Gainer Proudfoot, Sanjay Goel, Joseph S. Valacich
:
The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise. 37-51 - Gang Liu

, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu
, Aijun Liu:
Ts-RBAC: A RBAC model with transformation. 52-61 - Christos Xenakis

, Christoforos Ntantogian
, Orestis Panos:
(U)SimMonitor: A mobile application for security evaluation of cellular networks. 62-78 - Barsha Mitra, Shamik Sural

, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Mining temporal roles using many-valued concepts. 79-94 - Guido Schryen, Gerit Wagner

, Alexander Schlegel
:
Development of two novel face-recognition CAPTCHAs: A security and usability study. 95-116 - Jose M. Such, Antonios Gouglidis

, William Knowles, Gaurav Misra, Awais Rashid
:
Information assurance techniques: Perceived cost effectiveness. 117-133 - Paulo Henrique Pisani, Romain Giot

, André C. P. L. F. de Carvalho
, Ana Carolina Lorena:
Enhanced template update: Application to keystroke dynamics. 134-153 - Florian Skopik

, Giuseppe Settanni, Roman Fiedler:
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. 154-176 - Wenjuan Li

, Weizhi Meng
, Xiapu Luo
, Lam-for Kwok
:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. 177-192 - Victor Sucasas

, Georgios Mantas
, Firooz B. Saghezchi
, Ayman Radwan
, Jonathan Rodriguez:
An autonomous privacy-preserving authentication scheme for intelligent transportation systems. 193-205 - Debabrata Kar

, Suvasini Panigrahi, Srikanth Sundararajan:
SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM. 206-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














