


default search action
Computers & Security, Volume 73
Volume 73, March 2018
- Vennila Ganesan

, M. S. K. Manikandan, M. N. Suresh:
Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network. 1-16 - Mariusz Sepczuk

, Zbigniew Kotulski
:
A new risk-based authentication management model oriented on user's experience. 17-33 - Fuzel Jamil, Abid Khan

, Adeel Anjum, Mansoor Ahmed
, Farhana Jabeen
, Nadeem Javaid
:
Secure provenance using an authenticated data structure approach. 34-56 - Yan Zhuang:

The performance cost of software obfuscation for Android applications. 57-72 - Yuxin Ding, Xiaoling Xia, Sheng Chen, Ye Li:

A malware detection method based on family behavior graph. 73-86 - Florian Menges

, Günther Pernul:
A comparative analysis of incident reporting formats. 87-101 - Joseph M. Hatfield

:
Social engineering in cybersecurity: The evolution of a concept. 102-113 - Norbou Buchler, Prashanth Rajivan, Laura R. Marusich, Lewis Lightner, Cleotilde Gonzalez:

Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition. 114-136 - Tarfa Hamed

, Rozita Dara, Stefan C. Kremer:
Network intrusion detection system based on recursive feature addition and bigram technique. 137-155 - Kamel Adi

, Lamia Hamza
, Liviu Pene:
Automatic security policy enforcement in computer systems. 156-171 - Mahdi Alizadeh, Xixi Lu

, Dirk Fahland
, Nicola Zannone
, Wil M. P. van der Aalst
:
Linking data and process perspectives for conformance analysis. 172-193 - Constantinos Patsakis

, Athanasios Charemis
, Achilleas Papageorgiou, Dimitrios Mermigas, Sotirios Pirounias:
The market's response toward privacy and mass surveillance: The Snowden aftermath. 194-206 - Hang Wei, Guan-Yu Hu, Zhi-Jie Zhou, Peili Qiao

, Zhiguo Zhou, Youmin Zhang
:
A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments. 207-218 - Salvatore Aurigemma, Thomas Mattson:

Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. 219-234 - Aisha I. Ali-Gombe

, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III
:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. 235-248 - Yaser Baseri

, Abdelhakim Hafid, Soumaya Cherkaoui
:
Privacy preserving fine-grained location-based access control for mobile cloud. 249-265 - Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis

, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. 266-293 - Graeme Horsman:

Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. 294-306 - Georgios Karopoulos

, Christoforos Ntantogian
, Christos Xenakis
:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. 307-325 - Sen Chen, Minhui Xue

, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu
, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. 326-344 - Margaret Gratian, Sruthi Bandi

, Michel Cukier, Josiah Dykstra
, Amy Ginther:
Correlating human traits and cyber security behavior intentions. 345-358 - Chih-Hung Lin

, Hsing-Kuo Pao, Jian-Wei Liao:
Efficient dynamic malware analysis using virtual time control mechanics. 359-373 - Sanjeev Das

, Bihuan Chen, Mahinthan Chandramohan, Yang Liu
, Wei Zhang:
ROPSentry: Runtime defense against ROP attacks using hardware performance counters. 374-388 - José Antonio Gómez-Hernández

, L. Álvarez-González, Pedro García-Teodoro:
R-Locker: Thwarting ransomware action through a honeyfile-based approach. 389-398 - Pete Burnap

, Richard French, Frederick Turner, Kevin Jones:
Malware classification using self organising feature maps and machine activity data. 399-410 - Gabriel Maciá-Fernández

, José Camacho
, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón
:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. 411-424 - Yunlong Mao

, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. 425-438 - Rory Coulter, Lei Pan

:
Intelligent agents defending for an IoT world: A review. 439-458 - Micah Bushouse

, Douglas S. Reeves:
Goalkeeper: Comprehensive process enforcement from the hypervisor. 459-473 - Sean Carlisto de Alvarenga, Sylvio Barbon

, Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão:
Process mining and hierarchical clustering to help intrusion alert visualization. 474-491 - Yuchuan Luo, Ming Xu, Kai Huang, Dongsheng Wang, Shaojing Fu:

Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. 492-506 - Yimin Guo, Zhenfeng Zhang:

LPSE: Lightweight password-strength estimation for password meters. 507-518 - Diksha Goel

, Ankit Kumar Jain
:
Mobile phishing attacks and defence mechanisms: State of art and open research challenges. 519-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














