


default search action
Computers & Security, Volume 83
Volume 83, June 2019
- Leon Böck, Emmanouil Vasilomanolakis

, Jan Helge Wolf, Max Mühlhäuser:
Autonomously detecting sensors in fully distributed botnets. 1-13 - Ram Mahesh Yadav:

Effective analysis of malware detection in cloud computing. 14-21 - George Tsakalidis

, Kostas Vergidis
, Sophia G. Petridou
, Maro Vlachopoulou:
A cybercrime incident architecture with adaptive response policy. 22-37 - Alberto Urueña-López

, Fernando Mateo, Julio Navío-Marco
, José María Martínez-Martínez
, Juan Gómez-Sanchís
, Joan Vila-Francés
, Antonio José Serrano-López
:
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps. 38-51 - Erhan Sindiren

, Bünyamin Ciylan
:
Application model for privileged account access control system in enterprise networks. 52-67 - Karim Akilal, Hachem Slimani

, Mawloud Omar:
A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. 68-78 - Jinsoo Jang

, Brent ByungHoon Kang:
Securing a communication channel for the trusted execution environment. 79-92 - Parisa Kaghazgaran, Hassan Takabi, Flannery Hope Currin, Armando Soriano

:
Communication-efficient private distance calculation based on oblivious transfer extensions. 93-105 - Feng Yu, Qiang Liu

, Shu Wu, Liang Wang, Tieniu Tan:
Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. 106-121 - Sandeep Gupta

, Attaullah Buriro
, Bruno Crispo
:
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. 122-139 - Max Smith-Creasey, Muttukrishnan Rajarajan:

A novel word-independent gesture-typing continuous authentication scheme for mobile devices. 140-150 - Abir Mhenni

, Estelle Cherrier, Christophe Rosenberger
, Najoua Essoukri Ben Amara:
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. 151-166 - DaeHee Jang, Yunjong Jeong, Sungman Lee, Minjoon Park, Kuenhwan Kwak, Donguk Kim

, Brent ByungHoon Kang:
Rethinking anti-emulation techniques for large-scale software deployment. 182-200 - Seow Wooi Liew, Nor Fazlida Mohd Sani

, Mohd Taufik Abdullah, Razali Yaakob, Mohd Yunus Sharum:
An effective security alert mechanism for real-time phishing tweet detection on Twitter. 201-207 - Weijie Han

, Jingfeng Xue, Yong Wang
, Lu Huang, Zixiao Kong, Limin Mao:
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. 208-233 - Florian Gottwalt

, Elizabeth Chang
, Tharam S. Dillon:
CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques. 234-245 - Routhu Srinivasa Rao

, Alwyn Roshan Pais
:
Jail-Phish: An improved search engine based phishing detection system. 246-267 - Nikos Chondros

, Bingsheng Zhang
, Thomas Zacharias
, Panos Diamantopoulos
, Stathis Maneas
, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. 268-299 - Vanga Odelu

, Sourav Saha
, Rajendra Prasath
, Lakshminarayana Sadineni
, Mauro Conti
, Minho Jo
:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. 300-312 - Morta Vitunskaite, Ying He

, Thomas Brandstetter
, Helge Janicke
:
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. 313-331 - Majid Hatamian

, Jetzabel M. Serna, Kai Rannenberg:
Revealing the unrevealed: Mining smartphone users privacy perception on app markets. 332-353 - Joseph M. Hatfield

:
Virtuous human hacking: The ethics of social engineering in penetration-testing. 354-366 - Louise Axon

, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. 367-388 - Vineeta Jain

, Vijay Laxmi
, Manoj Singh Gaur
, Mohamed Mosbah
:
ETGuard: Detecting D2D attacks using wireless Evil Twins. 389-405

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














