


default search action
Computers & Security, Volume 77
Volume 77, August 2018
- Muhammad Ajmal Azad

, Ricardo Morla
, Khaled Salah:
Systems and methods for SPIT detection in VoIP: Survey and future directions. 1-20 - Barnana Baruah

, Subhasish Dhal:
A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System. 21-35 - Bodhi Chakraborty

, Shekhar Verma
, Krishna Pratap Singh
:
Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. 36-48 - Tianchong Gao

, Feng Li:
Studying the utility preservation in social network anonymization via persistent homology. 49-64 - Eric J. E. Molin, Kirsten Meeuwisse, Wolter Pieters, Caspar G. Chorus:

Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment. 65-78 - Peng Xun

, Peidong Zhu, Sabita Maharjan, Pengshuai Cui:
Successive direct load altering attack in smart grid. 79-93 - Ercan Nurcan Yilmaz, Serkan Gönen

:
Attack detection/prevention system against cyber attack in industrial control systems. 94-105 - Josep Lluís Ferrer-Gomila

, M. Francisca Hinarejos
, Llorenç Huguet i Rotger:
A survey on electronic coupons. 106-127 - Kylie Molinaro

, Matthew L. Bolton:
Evaluating the applicability of the double system lens model to the analysis of phishing email judgments. 128-137 - Daiki Chiba

, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori
, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. 138-161 - Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino:

A context-aware system to secure enterprise content: Incorporating reliability specifiers. 162-178 - Iraklis Symeonidis

, Gergely Biczók
, Fatemeh Shirazi, Cristina Pérez-Solà
, Jessica Schroers
, Bart Preneel
:
Collateral damage of Facebook third-party applications: a comprehensive study. 179-208 - Alberto Geniola

, Markku Antikainen, Tuomas Aura
:
Automated analysis of freeware installers promoted by download portals. 209-225 - Nina Gerber

, Paul Gerber, Melanie Volkamer:
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. 226-261 - Rafal Leszczyna

:
A review of standards with cybersecurity requirements for smart grid. 262-276 - Vinu Sundararaj

, Selvi Muthukumar, R. S. Kumar:
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. 277-288 - Rabah AlShboul, Fadi A. Thabtah, Neda Abdelhamid, Mofleh Al-Diabat:

A visualization cybersecurity method based on features' dissimilarity. 289-303 - R. Vijayanand

, D. Devaraj, Kannapiran Balasubramanian
:
Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. 304-314 - Brahim Hamid

, Donatus Weber:
Engineering secure systems: Models, patterns and empirical validation. 315-348 - Urvashi Garg

, Geeta Sikka, Lalit Kumar Awasthi
:
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities. 349-359 - Madeline Cheah

, Siraj A. Shaikh
, Jeremy W. Bryans
, Paul Wooderson
:
Building an automotive security assurance case using systematic security evaluations. 360-379 - Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:

A self-protecting agents based model for high-performance mobile-cloud computing. 380-396 - Gábor Lencse

, Youki Kadobayashi:
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. 397-411 - Tianqiang Huang, Xueli Zhang, Wei Huang, Lingpeng Lin, Weifeng Su

:
A multi-channel approach through fusion of audio for detecting video inter-frame forgery. 412-426 - Mashael AlSabah, Gabriele Oligeri

, Ryan Riley:
Your culture is in your password: An analysis of a demographically-diverse password dataset. 427-441 - Waqar Khalid, Zahid Ullah, Naveed Ahmed, Yue Cao

, Muhammad Khalid
, Muhammad Arshad, Farhan Ahmad, Haitham S. Cruickshank:
A taxonomy on misbehaving nodes in delay tolerant networks. 442-471 - Christos Lyvas, Costas Lambrinoudakis

, Dimitris Geneiatakis:
Dypermin: Dynamic permission mining framework for android platform. 472-487 - Zhaowei Hu, Jing Yang, Jianpei Zhang:

Trajectory privacy protection method based on the time interval divided. 488-499 - Lukas Malina

, Petr Dzurenda
, Jan Hajny, Zdenek Martinasek:
Secure and efficient two-factor zero-knowledge authentication solution for access control systems. 500-513 - Samiran Bag

, Muhammad Ajmal Azad
, Feng Hao
:
A privacy-aware decentralized and personalized reputation system. 514-530 - Thiago Alves, Rishabh Das

, Aaron Werth, Thomas H. Morris
:
Virtualization of SCADA testbeds for cybersecurity research: A modular approach. 531-546 - Xiaofang Xia, Yang Xiao

, Wei Liang, Meng Zheng:
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid. 547-564 - Nadher Al-Safwani, Yousef Fazea

, Huda Ibrahim:
ISCP: In-depth model for selecting critical security controls. 565-577 - Matilda Rhode, Pete Burnap, Kevin Jones:

Early-stage malware prediction using recurrent neural networks. 578-594 - Marta Beltrán

:
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things. 595-611 - Li Yang, Teng Wei, Fengwei Zhang

, Jianfeng Ma:
SADUS: Secure data deletion in user space for mobile devices. 612-626 - Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan:

UFace: Your universal password that no one can see. 627-641 - Jun Jiang

, Bowei Xi, Murat Kantarcioglu:
Spatial counts under differential privacy mechanism on changing spatial scales. 642-652 - Koray Mancuhan, Chris Clifton

:
Support vector classification with ℓ-diversity. 653-665 - Javad Darivandpour, Mikhail J. Atallah:

Efficient and secure pattern matching with wildcards using lightweight cryptography. 666-674 - Padma Polash Paul, Madeena Sultana, Sorin Adam Matei

, Marina L. Gavrilova:
Authorship disambiguation in a collaborative editing environment. 675-693 - Christian Grothoff

, Matthias Wachs, Monika Ermert, Jacob Appelbaum:
Toward secure name resolution on the internet. 694-708 - Hu Chun, Kui Ren, Wei Jiang:

Privacy-preserving power usage and supply control in smart grid. 709-719 - Seulbae Kim

, Heejo Lee:
Software systems at risk: An empirical study of cloned vulnerabilities in practice. 720-736 - Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:

Gemini: Guest-transparent honey files via hypervisor-level access redirection. 737-744 - Reham Abdellatif Abouhogail, Mohammed S. Gadelrab

:
A new secure and privacy preserved protocol for IEEE802.11s networks. 745-755 - Paul Black

, Iqbal Gondal
, Robert Layton:
A survey of similarities in banking malware behaviours. 756-772 - Ruben Rios

, M. Carmen Fernández Gago, Javier López:
Modelling privacy-aware trust negotiations. 773-789 - Sungjin Kim, Jinkook Kim, Brent ByungHoon Kang:

Malicious URL protection based on attackers' habitual behavioral analysis. 790-806 - Eva Weishäupl, Emrah Yasasin, Guido Schryen

:
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning. 807-823 - Hojoon Lee

, Minsu Kim, Yunheung Paek, Brent ByungHoon Kang:
A dynamic per-context verification of kernel address integrity from external monitors. 824-837 - Kholood Al Tabash, Jassim Happa:

Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles. 838-859 - Silas Formunyuy Verkijika

:
Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. 860-870 - Sang Ni, Quan Qian

, Rui Zhang:
Malware identification using visualization images and deep learning. 871-885

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














