


default search action
Computers & Security, Volume 64
Volume 64, January 2017
- Tzy Shiah Wang, Hui-Tang Lin

, Wei-Tsung Cheng, Chang-Yu Chen:
DBod: Clustering and detecting DGA-based botnets using DNS traffic analysis. 1-15 - Ghanshyam S. Bopche

, Babu M. Mehtre:
Graph similarity metrics for assessing temporal changes in attack surface of dynamic networks. 16-43 - Jonathan D. Fuller

, Benjamin W. P. Ramsey, Mason Rice, John M. Pecarina:
Misuse-based detection of Z-Wave network attacks. 44-58 - Steve Muller, Carlo Harpes, Yves Le Traon

, Sylvain Gombault, Jean-Marie Bonnin:
Efficiently computing the likelihoods of cyclically interdependent risk scenarios. 59-68 - José Fran. Ruiz, Marcos Arjona, Antonio Maña

, Carsten Rudolph
:
Security knowledge representation artifacts for creating secure IT systems. 69-91 - Ahmed Patel, Hitham Alhussian, Jens Myrup Pedersen

, Bouchaib Bounabat, Joaquim Celestino Júnior, Sokratis K. Katsikas:
A nifty collaborative intrusion detection and prevention architecture for Smart Grid ecosystems. 92-109 - Christos Dimitrakakis

, Aikaterini Mitrokotsa
:
Near-optimal blacklisting. 110-121 - Spyros Kokolakis:

Privacy attitudes and privacy behaviour: A review of current research on the privacy paradox phenomenon. 122-134

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














