default search action
Computers & Security, Volume 73
Volume 73, March 2018
- Vennila Ganesan, M. S. K. Manikandan, M. N. Suresh:
Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network. 1-16 - Mariusz Sepczuk, Zbigniew Kotulski:
A new risk-based authentication management model oriented on user's experience. 17-33 - Fuzel Jamil, Abid Khan, Adeel Anjum, Mansoor Ahmed, Farhana Jabeen, Nadeem Javaid:
Secure provenance using an authenticated data structure approach. 34-56 - Yan Zhuang:
The performance cost of software obfuscation for Android applications. 57-72 - Yuxin Ding, Xiaoling Xia, Sheng Chen, Ye Li:
A malware detection method based on family behavior graph. 73-86 - Florian Menges, Günther Pernul:
A comparative analysis of incident reporting formats. 87-101 - Joseph M. Hatfield:
Social engineering in cybersecurity: The evolution of a concept. 102-113 - Norbou Buchler, Prashanth Rajivan, Laura R. Marusich, Lewis Lightner, Cleotilde Gonzalez:
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition. 114-136 - Tarfa Hamed, Rozita Dara, Stefan C. Kremer:
Network intrusion detection system based on recursive feature addition and bigram technique. 137-155 - Kamel Adi, Lamia Hamza, Liviu Pene:
Automatic security policy enforcement in computer systems. 156-171 - Mahdi Alizadeh, Xixi Lu, Dirk Fahland, Nicola Zannone, Wil M. P. van der Aalst:
Linking data and process perspectives for conformance analysis. 172-193 - Constantinos Patsakis, Athanasios Charemis, Achilleas Papageorgiou, Dimitrios Mermigas, Sotirios Pirounias:
The market's response toward privacy and mass surveillance: The Snowden aftermath. 194-206 - Hang Wei, Guan-Yu Hu, Zhi-Jie Zhou, Peili Qiao, Zhiguo Zhou, Youmin Zhang:
A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments. 207-218 - Salvatore Aurigemma, Thomas Mattson:
Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. 219-234 - Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. 235-248 - Yaser Baseri, Abdelhakim Hafid, Soumaya Cherkaoui:
Privacy preserving fine-grained location-based access control for mobile cloud. 249-265 - Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. 266-293 - Graeme Horsman:
Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. 294-306 - Georgios Karopoulos, Christoforos Ntantogian, Christos Xenakis:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. 307-325 - Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. 326-344 - Margaret Gratian, Sruthi Bandi, Michel Cukier, Josiah Dykstra, Amy Ginther:
Correlating human traits and cyber security behavior intentions. 345-358 - Chih-Hung Lin, Hsing-Kuo Pao, Jian-Wei Liao:
Efficient dynamic malware analysis using virtual time control mechanics. 359-373 - Sanjeev Das, Bihuan Chen, Mahinthan Chandramohan, Yang Liu, Wei Zhang:
ROPSentry: Runtime defense against ROP attacks using hardware performance counters. 374-388 - José Antonio Gómez-Hernández, L. Álvarez-González, Pedro García-Teodoro:
R-Locker: Thwarting ransomware action through a honeyfile-based approach. 389-398 - Pete Burnap, Richard French, Frederick Turner, Kevin Jones:
Malware classification using self organising feature maps and machine activity data. 399-410 - Gabriel Maciá-Fernández, José Camacho, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. 411-424 - Yunlong Mao, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. 425-438 - Rory Coulter, Lei Pan:
Intelligent agents defending for an IoT world: A review. 439-458 - Micah Bushouse, Douglas S. Reeves:
Goalkeeper: Comprehensive process enforcement from the hypervisor. 459-473 - Sean Carlisto de Alvarenga, Sylvio Barbon, Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão:
Process mining and hierarchical clustering to help intrusion alert visualization. 474-491 - Yuchuan Luo, Ming Xu, Kai Huang, Dongsheng Wang, Shaojing Fu:
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. 492-506 - Yimin Guo, Zhenfeng Zhang:
LPSE: Lightweight password-strength estimation for password meters. 507-518 - Diksha Goel, Ankit Kumar Jain:
Mobile phishing attacks and defence mechanisms: State of art and open research challenges. 519-544
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.