


default search action
Computers & Security, Volume 76
Volume 76, July 2018
- Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon

, Sylvain Gombault, Jean-Marie Bonnin:
A training-resistant anomaly detection system. 1-11 - Chen Zhong

, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. 12-31 - T. Divya Sai Keerthi

, Pallapa Venkataram:
Confirmation of wormhole attack in MANETs using honeypot. 32-49 - Alexander Amigud

, Joan Arnedo-Moreno, Thanasis Daradoumis
, Ana-Elena Guerrero-Roldán
:
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives. 50-70 - Huasong Meng

, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang:
A survey of Android exploits in the wild. 71-91 - Vlasta Stavova, Lenka Dedkova

, Vashek Matyas, Mike Just
, David Smahel
, Martin Ukrop
:
Experimental large-scale review of attractors for detection of potentially unwanted applications. 92-100 - Ryan Heartfield

, George Loukas
:
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. 101-127 - Minh Hai Nguyen, Dung Le Nguyen, Xuan Mao Nguyen, Tho Thanh Quan:

Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. 128-155 - Myria Bouhaddi

, Mohammed Said Radjef
, Kamel Adi
:
An efficient intrusion detection in resource-constrained mobile ad-hoc networks. 156-177 - Valentin Tudor, Magnus Almgren

, Marina Papatriantafilou:
The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure. 178-196 - Shane Murnion

, William J. Buchanan
, Adrian Smales, Gordon Russell
:
Machine learning and semantic analysis of in-game chat for cyberbullying. 197-213
- Elisa Bertino, Valentina Casola

, Aniello Castiglione
, Willy Susilo
:
Editorial: Security and privacy protection vs sustainable development. 250-251 - Weizhi Meng

, Lijun Jiang, Yu Wang
, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. 252-264 - Tingmin Wu

, Sheng Wen
, Yang Xiang, Wanlei Zhou
:
Twitter spam detection: Survey of new approaches and comparative study. 265-284 - Andeep S. Toor, Harry Wechsler, Michele Nappi, Kim-Kwang Raymond Choo

:
Visual Question Authentication Protocol (VQAP). 285-294 - Davide Polverini

, Fulvio Ardente, Ignacio Sánchez, Fabrice Mathieux, Paolo Tecchio, Laurent Beslay:
Resource efficiency, privacy and security by design: A first experience on enterprise servers and data storage products triggered by a policy process. 295-310 - Sherenaz W. Al-Haj Baddar

, Alessio Merlo
, Mauro Migliardi
, Francesco Palmieri
:
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition. 311-326 - Georgia Lykou, Despina Mentzelioti, Dimitris Gritzalis:

A new methodology toward effectively assessing data center sustainability. 327-340 - Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan

, Qingqi Pei, Yajuan Xie, Jian Weng
:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. 341-353 - Mihai Varga

, Alina Petrescu-Nita, Florin Pop:
Deadline scheduling algorithm for sustainable computing in Hadoop environment. 354-366

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














