


default search action
Computers & Security, Volume 72
Volume 72, January 2018
- Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:

Secure attribute-based data sharing for resource-limited users in cloud computing. 1-12 - Abdullah Yasin Nur

, Mehmet Engin Tozal
:
Record route IP traceback: Combating DoS attacks and the variants. 13-25 - Antoine Lemay, Joan Calvet, François Menet, José M. Fernandez

:
Survey of publicly available reports on advanced persistent threat actors. 26-59 - Qiang Fu, Bo Feng, Dong Guo, Qiang Li:

Combating the evolving spammers in online social networks. 60-73 - Saad A. Abdelhameed

, Sherin M. Moussa
, Mohamed E. Khalifa:
Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud. 74-95 - Wangtong Liu

, Senlin Luo, Yu Liu, Limin Pan, Qamas Gul Khan Safi:
A kernel stack protection model against attacks from kernel execution units. 96-106 - Marek Klonowski

, Ania M. Piotrowska:
Light-weight and secure aggregation protocols based on Bloom filters✰. 107-121 - Li-e Wang

, Xianxian Li:
A graph-based multifold model for anonymizing data with attributes of multiple types. 122-135 - A. Vijayalakshmi Venugopal

:
Inadvertent disclosures of inventions in social media affecting patent rights. 136-144 - Dong Shen

, Zhoujun Li, Xiaojing Su, Jinxin Ma, Robert Huijie Deng
:
TinyVisor: An extensible secure framework on android platforms. 145-162 - Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang

, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. 163-174 - Houssein Abdo, Mohamad Kaouk, Jean-Marie Flaus, François Massé:

A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis. 175-195 - Adeel Anjum

, Saif Ur Rehman Malik
, Kim-Kwang Raymond Choo
, Abid Khan
, Asma Haroon, Sangeen Khan
, Samee U. Khan
, Naveed Ahmad, Basit Raza
:
An efficient privacy mechanism for electronic health records. 196-211 - Wiem Tounsi

, Helmi Rais:
A survey on technical threat intelligence in the age of sophisticated cyber attacks. 212-233 - Marco Anisetti

, Claudio A. Ardagna
, Ernesto Damiani, Nabil El Ioini
, Filippo Gaudenzi:
Modeling time, probability, and configuration constraints for continuous cloud service certification. 234-254 - Nikhil Tripathi

, Neminath Hubballi:
Slow rate denial of service attacks against HTTP/2 and detection. 255-272

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














