


default search action
Computers & Security, Volume 84
Volume 84, July 2019
- Shaoxin Li

, Nankun Mu, Junqing Le, Xiaofeng Liao:
Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction. 17-34 - Novia Nurain, Suraiya Tairin

, Taslim Arefin Khan, Shahad Ishraq, A. B. M. Alim Al Islam:
Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries. 35-52 - Wenjun Xiong

, Robert Lagerström
:
Threat modeling - A systematic literature review. 53-69 - Iman Sharafaldin, Arash Habibi Lashkari

, Ali A. Ghorbani:
An evaluation framework for network security visualizations. 70-92 - Damiano Di Francesco Maesa

, Paolo Mori
, Laura Ricci
:
A blockchain based approach for the definition of auditable Access Control systems. 93-119 - Robert Luh, Helge Janicke

, Sebastian Schrittwieser
:
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. 120-147 - Sari Sultan

:
Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. 148-165 - Zhanwei Song, Zenghui Liu:

Abnormal detection method of industrial control system based on behavior model. 166-178 - Ali Gezer

, Gary Warner, Clifford Wilson, Prakash Shrestha:
A flow-based approach for Trickbot banking trojan detection. 179-192 - Nilesh Chakraborty, S. Vijay Anand, Samrat Mondal

:
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services. 193-205 - Christoforos Ntantogian

, Stefanos Malliaros, Christos Xenakis
:
Evaluation of password hashing schemes in open source web platforms. 206-224 - Meir Kalech:

Cyber-attack detection in SCADA systems using temporal pattern recognition techniques. 225-238 - Andrew Jones, Olga Angelopoulou

, L. Noriega:
Survey of data remaining on second hand memory cards in the UK. 239-243 - Samaneh Rashidibajgan

, Robin Doss
:
Privacy-preserving history-based routing in Opportunistic Networks. 244-255 - Yan Ding

, Nurbol Luktarhan, Keqin Li, Wushour Slamu:
A keyword-based combination approach for detecting phishing webpages. 256-275 - Daren Fadolalkarim, Elisa Bertino:

A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration. 276-287 - Martin Kolár

, M. Carmen Fernández Gago, Javier López:
A model specification for the design of trust negotiations. 288-300 - Mohammad Ashiqur Rahman

, Amarjit Datta, Ehab Al-Shaer:
Security design against stealthy attacks on power system state estimation: A formal approach. 301-317 - Zhou Xu, Yaping Lin, Voundi Koe Arthur Sandor

, Zhisheng Huang, Xinbo Liu:
A lightweight privacy and integrity preserving range query scheme for mobile cloud computing. 318-333 - Toan Nguyen, Aditi Roy, Nasir D. Memon

:
Kid on the phone! Toward automatic detection of children on mobile devices. 334-348 - Lin Zhong, Qianhong Wu, Jan Xie

, Zhenyu Guan, Bo Qin:
A secure large-scale instant payment system based on blockchain. 349-364 - Tingting Lu

, Junfeng Wang:
Data-flow bending: On the effectiveness of data-flow integrity. 365-375 - Jixin Zhang

, Zheng Qin, Hui Yin
, Lu Ou
, Kehuan Zhang:
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. 376-392 - Han Jiang

, Hao Wang
, Zhihua Zheng, Qiuliang Xu:
Privacy preserved wireless sensor location protocols based on mobile edge computing. 393-401

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














