


default search action
Computers & Security, Volume 65
Volume 65, March 2017
- Marko Niemimaa:

Information systems continuity process: Conceptual foundations for the study of the "social". 1-13 - Hossein Siadati

, Toan Nguyen
, Payas Gupta, Markus Jakobsson, Nasir D. Memon
:
Mind your SMSes: Mitigating social engineering in second factor authentication. 14-28 - Faheem Zafar, Abid Khan

, Saif Ur Rehman Malik
, Mansoor Ahmed
, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. 29-49 - Razieh Nokhbeh Zaeem

, Monisha Manoharan, Yongpeng Yang, K. Suzanne Barber:
Modeling and analysis of identity threat behaviors through text mining of identity theft stories. 50-63 - Eun Hee Park, Jongwoo Kim, Young Soon Park:

The role of information security learning and individual factors in disclosing patients' health information. 64-76 - Keyun Ruan:

Introducing cybernomics: A unifying economic framework for measuring cyber risk. 77-89 - Bahman Rashidi

, Carol J. Fung, Elisa Bertino:
Android resource usage risk assessment using hidden Markov model and online learning. 90-107 - June-ho Bang, Young-Jong Cho, Kyungran Kang:

Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model. 108-120 - Ali Feizollah

, Nor Badrul Anuar
, Rosli Salleh
, Guillermo Suarez-Tangil
, Steven Furnell
:
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. 121-134 - Abdulla Amin Aburomman

, Mamun Bin Ibne Reaz
:
A survey of intrusion detection systems based on ensemble and hybrid classifiers. 135-152 - Masooda N. Bashir

, Colin Wee, Nasir D. Memon
, Boyi Guo
:
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. 153-165 - Alexander Motzek, Ralf Möller

:
Context- and bias-free probabilistic mission impact assessment. 166-186 - Wenlin Han, Yang Xiao

:
NFD: Non-technical loss fraud detection in Smart Grid. 187-201 - Mingxu Yi, Jinxia Wei, Lingwei Song:

Efficient integrity verification of replicated data in cloud computing system. 202-212 - Weizhi Meng

, Wenjuan Li
, Lam-for Kwok
, Kim-Kwang Raymond Choo
:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. 213-229 - Shahid Alam

, Zhengyang Qu, Ryan D. Riley
, Yan Chen, Vaibhav Rastogi:
DroidNative: Automating and optimizing detection of Android native code malware variants. 230-246 - Haribabu Kandi, Deepak Mishra

, Gorthi R. K. Sai Subrahmanyam
:
Exploring the learning capabilities of convolutional neural networks for robust image watermarking. 247-268 - Majeed Alajeely

, Robin Doss
, Asma'a Ahmad, Vicky H. Mak-Hau
:
Defense against packet collusion attacks in opportunistic networks. 269-282 - Hatem Ismail, Daniel Germanus, Neeraj Suri

:
P2P routing table poisoning: A quorum-based sanitizing approach. 283-299 - Jan Meszaros, Alena Buchalcevová

:
Introducing OSSF: A framework for online service cybersecurity risk management. 300-313 - Zhaomin Chen

, Chai Kiat Yeo
, Bu-Sung Lee, Chiew Tong Lau:
Detection of network anomalies using Improved-MSPCA with sketches. 314-328 - Hongliang Liang, Mingyu Li, Jian Xu, Wenying Hu, Xiaoxiao Pei, Xiaodong Jia, Yan Song:

vmOS: A virtualization-based, secure desktop system. 329-343 - Karanpreet Singh, Paramvir Singh, Krishan Kumar

:
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. 344-372 - Rudresh Dwivedi, Somnath Dey, Ramveer Singh, Aditya Prasad:

A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. 373-386 - Neminath Hubballi, Nikhil Tripathi

:
A closer look into DHCP starvation attack in wireless networks. 387-404 - Naipeng Dong

, Hugo L. Jonker
, Jun Pang:
Formal modelling and analysis of receipt-free auction protocols in applied pi. 405-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














