


default search action
Computers & Security, Volume 74
Volume 74, May 2018
- Alberto Bartoli

, Eric Medvet, Filippo Onesti:
Evil twins and WPA2 Enterprise: A coming security disaster? 1-11 - Daniel Conte de Leon

, Christopher E. Goes, Michael A. Haney, Axel W. Krings:
ADLES: Specifying, deploying, and sharing hands-on cyber-exercises. 12-40 - Omar Nakhila

, Muhammad Faisal Amjad, Erich Dondyk, Cliff C. Zou:
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. 41-54 - Hao Wu

, Zhonghua Wang:
Multi-source fusion-based security detection method for heterogeneous networks. 55-70 - Asma'a Ahmad

, Robin Doss
, Majeed Alajeely, Sarab F. Al Rubeaai, Dua'a Ahmad:
Packet integrity defense mechanism in OppNets. 71-93 - Bhupendra Singh

, Upasna Singh
:
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability. 94-114 - Jana Medková

:
Composition attack against social network data. 115-129 - Valentin J. M. Manès, DaeHee Jang, Chanho Ryu, Brent ByungHoon Kang:

Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions. 130-143 - Bander Ali Saleh Al-rimy

, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. 144-166 - Weixuan Mao, Zhongmin Cai, Yuan Yang

, Xiaohong Shi, Xiaohong Guan:
From big data to knowledge: A spatio-temporal approach to malware detection. 167-183 - Christopher N. Gutierrez

, Eugene H. Spafford
, Saurabh Bagchi, Thomas Yurek:
Reactive redundancy for data destruction protection (R2D2). 184-201 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang

:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. 202-220 - Jan Stiborek

, Tomás Pevný
, Martin Rehák:
Probabilistic analysis of dynamic malware traces. 221-239 - Daniel Guerrero, Alin A. Carsteanu

, Julio B. Clempner:
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis. 240-257 - Victor Sucasas

, Georgios Mantas, Saud Althunibat
, Leonardo Oliveira, Angelos Antonopoulos
, Ifiok E. Otung
, Jonathan Rodriguez:
A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications. 258-274
- Kim-Kwang Raymond Choo

, Matt Bishop
, William Bradley Glisson
, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. 275-276 - Franco Callegati

, Saverio Giallorenzo
, Andrea Melis
, Marco Prandini
:
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective. 277-295 - Christopher M. Talbot, Michael A. Temple, Timothy J. Carbino, J. Addison Betances:

Detecting rogue attacks on commercial wireless Insteon home automation systems. 296-307 - Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain

, Mohammed Atiquzzaman
:
Security threats in Bluetooth technology. 308-322 - Mansour Alali, Ahmad Almogren

, Mohammad Mehedi Hassan
, Iehab Al Rassan, Md. Zakirul Alam Bhuiyan
:
Improving risk assessment model of cyber security using fuzzy logic inference system. 323-339 - Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood

, Victor Chang
:
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. 340-354 - Flora Amato

, Aniello Castiglione
, Aniello De Santo
, Vincenzo Moscato, Antonio Picariello, Fabio Persia
, Giancarlo Sperlì:
Recognizing human behaviours in online social networks. 355-370 - Kosmas Pipyros

, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. 371-383 - Raffaele Pizzolante, Arcangelo Castiglione

, Bruno Carpentieri, Alfredo De Santis
, Francesco Palmieri, Aniello Castiglione
:
On the protection of consumer genomic data in the Internet of Living Things. 384-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














