Stop the war!
Остановите войну!
for scientists:
default search action
Computers & Security, Volume 74
Volume 74, May 2018
- Alberto Bartoli, Eric Medvet, Filippo Onesti:
Evil twins and WPA2 Enterprise: A coming security disaster? 1-11 - Daniel Conte de Leon, Christopher E. Goes, Michael A. Haney, Axel W. Krings:
ADLES: Specifying, deploying, and sharing hands-on cyber-exercises. 12-40 - Omar Nakhila, Muhammad Faisal Amjad, Erich Dondyk, Cliff C. Zou:
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. 41-54 - Hao Wu, Zhonghua Wang:
Multi-source fusion-based security detection method for heterogeneous networks. 55-70 - Asma'a Ahmad, Robin Doss, Majeed Alajeely, Sarab F. Al Rubeaai, Dua'a Ahmad:
Packet integrity defense mechanism in OppNets. 71-93 - Bhupendra Singh, Upasna Singh:
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability. 94-114 - Jana Medková:
Composition attack against social network data. 115-129 - Valentin J. M. Manès, DaeHee Jang, Chanho Ryu, Brent ByungHoon Kang:
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions. 130-143 - Bander Ali Saleh Al-rimy, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. 144-166 - Weixuan Mao, Zhongmin Cai, Yuan Yang, Xiaohong Shi, Xiaohong Guan:
From big data to knowledge: A spatio-temporal approach to malware detection. 167-183 - Christopher N. Gutierrez, Eugene H. Spafford, Saurabh Bagchi, Thomas Yurek:
Reactive redundancy for data destruction protection (R2D2). 184-201 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. 202-220 - Jan Stiborek, Tomás Pevný, Martin Rehák:
Probabilistic analysis of dynamic malware traces. 221-239 - Daniel Guerrero, Alin A. Carsteanu, Julio B. Clempner:
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis. 240-257 - Victor Sucasas, Georgios Mantas, Saud Althunibat, Leonardo Oliveira, Angelos Antonopoulos, Ifiok E. Otung, Jonathan Rodriguez:
A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications. 258-274
- Kim-Kwang Raymond Choo, Matt Bishop, William Bradley Glisson, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. 275-276 - Franco Callegati, Saverio Giallorenzo, Andrea Melis, Marco Prandini:
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective. 277-295 - Christopher M. Talbot, Michael A. Temple, Timothy J. Carbino, J. Addison Betances:
Detecting rogue attacks on commercial wireless Insteon home automation systems. 296-307 - Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain, Mohammed Atiquzzaman:
Security threats in Bluetooth technology. 308-322 - Mansour Alali, Ahmad Almogren, Mohammad Mehedi Hassan, Iehab Al Rassan, Md. Zakirul Alam Bhuiyan:
Improving risk assessment model of cyber security using fuzzy logic inference system. 323-339 - Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood, Victor Chang:
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. 340-354 - Flora Amato, Aniello Castiglione, Aniello De Santo, Vincenzo Moscato, Antonio Picariello, Fabio Persia, Giancarlo Sperlì:
Recognizing human behaviours in online social networks. 355-370 - Kosmas Pipyros, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. 371-383 - Raffaele Pizzolante, Arcangelo Castiglione, Bruno Carpentieri, Alfredo De Santis, Francesco Palmieri, Aniello Castiglione:
On the protection of consumer genomic data in the Internet of Living Things. 384-400
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.