default search action
Computers & Security, Volume 84
Volume 84, July 2019
- Shaoxin Li, Nankun Mu, Junqing Le, Xiaofeng Liao:
Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction. 17-34 - Novia Nurain, Suraiya Tairin, Taslim Arefin Khan, Shahad Ishraq, A. B. M. Alim Al Islam:
Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries. 35-52 - Wenjun Xiong, Robert Lagerström:
Threat modeling - A systematic literature review. 53-69 - Iman Sharafaldin, Arash Habibi Lashkari, Ali A. Ghorbani:
An evaluation framework for network security visualizations. 70-92 - Damiano Di Francesco Maesa, Paolo Mori, Laura Ricci:
A blockchain based approach for the definition of auditable Access Control systems. 93-119 - Robert Luh, Helge Janicke, Sebastian Schrittwieser:
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes. 120-147 - Sari Sultan:
Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey. 148-165 - Zhanwei Song, Zenghui Liu:
Abnormal detection method of industrial control system based on behavior model. 166-178 - Ali Gezer, Gary Warner, Clifford Wilson, Prakash Shrestha:
A flow-based approach for Trickbot banking trojan detection. 179-192 - Nilesh Chakraborty, S. Vijay Anand, Samrat Mondal:
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services. 193-205 - Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis:
Evaluation of password hashing schemes in open source web platforms. 206-224 - Meir Kalech:
Cyber-attack detection in SCADA systems using temporal pattern recognition techniques. 225-238 - Andrew Jones, Olga Angelopoulou, L. Noriega:
Survey of data remaining on second hand memory cards in the UK. 239-243 - Samaneh Rashidibajgan, Robin Doss:
Privacy-preserving history-based routing in Opportunistic Networks. 244-255 - Yan Ding, Nurbol Luktarhan, Keqin Li, Wushour Slamu:
A keyword-based combination approach for detecting phishing webpages. 256-275 - Daren Fadolalkarim, Elisa Bertino:
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration. 276-287 - Martin Kolár, M. Carmen Fernández Gago, Javier López:
A model specification for the design of trust negotiations. 288-300 - Mohammad Ashiqur Rahman, Amarjit Datta, Ehab Al-Shaer:
Security design against stealthy attacks on power system state estimation: A formal approach. 301-317 - Zhou Xu, Yaping Lin, Voundi Koe Arthur Sandor, Zhisheng Huang, Xinbo Liu:
A lightweight privacy and integrity preserving range query scheme for mobile cloud computing. 318-333 - Toan Nguyen, Aditi Roy, Nasir D. Memon:
Kid on the phone! Toward automatic detection of children on mobile devices. 334-348 - Lin Zhong, Qianhong Wu, Jan Xie, Zhenyu Guan, Bo Qin:
A secure large-scale instant payment system based on blockchain. 349-364 - Tingting Lu, Junfeng Wang:
Data-flow bending: On the effectiveness of data-flow integrity. 365-375 - Jixin Zhang, Zheng Qin, Hui Yin, Lu Ou, Kehuan Zhang:
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding. 376-392 - Han Jiang, Hao Wang, Zhihua Zheng, Qiuliang Xu:
Privacy preserved wireless sensor location protocols based on mobile edge computing. 393-401
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.