


default search action
Computers & Security, Volume 88
Volume 88, January 2020
- Agne Brilingaite

, Linas Bukauskas
, Ausrius Juozapavicius
:
A framework for competence development and assessment in hybrid cybersecurity exercises. - Kevin C. Desouza

, Atif Ahmad
, Humza Naseer
, Munish Sharma:
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). - Hanna Paananen

, Michael Lapke, Mikko T. Siponen:
State of the art in information security policy development. - Constantinos Patsakis, Fran Casino

, Vasilios Katos
:
Encrypted and covert DNS queries for botnets: Challenges and countermeasures. - Carlo Marcelo Revoredo da Silva

, Eduardo Luzeiro Feitosa
, Vinicius Cardoso Garcia
:
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach. - Emrah Yasasin, Julian Prester

, Gerit Wagner
, Guido Schryen:
Forecasting IT security vulnerabilities - An empirical analysis. - Xinwen Hu

, Yi Zhuang
, Fuyuan Zhang:
A security modeling and verification method of embedded software based on Z and MARTE. - Lotfi Ben Othmane, Doug Jacobson

, Edgar R. Weippl:
Editorial: Special issue on security and privacy in smart cyber-physical systems. - Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng

, Kaitai Liang
, Duncan S. Wong, Hao Wang
:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. - Pedro Tubío Figueira

, Cristina López-Bravo
, José Luis Rivas López:
Improving information security risk analysis by including threat-occurrence predictive models. - Qian Lu

, Ruobing Jiang
, Yuzhan Ouyang, Haipeng Qu
, Jiahui Zhang:
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks. - James Obert

, Adrian R. Chavez, Jay Johnson
:
Distributed renewable energy resource trust metrics and secure routing. - Jiaqing Dong

, Kai Wang
, Wei Quan, Hao Yin:
InterestFence: Simple but efficient way to counter interest flooding attack. - Abbas Yazdinejad

, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. - Ding Wang

, Xizhe Zhang, Zijian Zhang, Ping Wang:
Understanding security failures of multi-factor authentication schemes for multi-server environments. - Ahto Buldas, Olga Gadyatskaya

, Aleksandr Lenin
, Sjouke Mauw, Rolando Trujillo-Rasua
:
Attribute evaluation on attack trees with incomplete information. - Mikko T. Siponen

, Petri Puhakainen, Anthony Vance
:
Can individuals' neutralization techniques be overcome? A field experiment on password policy. - Jun Zhou

, Meng Zheng, Zhenfu Cao
, Xiaolei Dong:
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. - Meng Wang

, Yiqin Lu, Jiancheng Qin
:
A dynamic MLP-based DDoS attack detection method using feature selection and feedback. - Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos:

Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. - Frank Breitinger

, Ryan Tully-Doyle, Courtney Hassenfeldt:
A survey on smartphone user's security choices, awareness and education. - Fatmah H. Alqahtani

, Fawaz A. Alsulaiman
:
Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. - Nikita Y. Lovyagin

, George A. Chernishev, Kirill Smirnov, Roman Yu. Dayneko:
FGACFS: A fine-grained access control for *nix userspace file system. - Hamza Djelouat, Abbes Amira, Faycal Bensaali

, Issam Boukhennoufa
:
Secure compressive sensing for ECG monitoring. - Abdulaziz Aldribi

, Issa Traoré
, Belaid Moa, Onyekachi Nwamuo:
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. - Cosimo Anglano

, Massimo Canonico
, Marco Guazzone
:
The Android Forensics Automator (AnForA): A tool for the Automated Forensic Analysis of Android Applications. - Imran Makhdoom

, Ian Zhou
, Mehran Abolhasan
, Justin Lipman
, Wei Ni
:
PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. - Lyuye Zhang, Maode Ma:

FKR: An efficient authentication scheme for IEEE 802.11ah networks. - Eleni Philippou, Sylvain Frey, Awais Rashid

:
Contextualising and aligning security metrics and business objectives: A GQM-based methodology. - Mauro Conti

, Chhagan Lal
:
Context-based Co-presence detection techniques: A survey. - Ashleigh Wiley, Agata McCormac, Dragana Calic

:
More than the individual: Examining the relationship between culture and Information Security Awareness. - Omnia Abu Waraga, Meriem Bettayeb

, Qassim Nasir
, Manar AbuTalib:
Design and implementation of automated IoT security testbed. - Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo

, Ali Dehghantanha:
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. - Na Ruan

, Ruoyu Deng
, Chunhua Su:
GADM: Manual fake review detection for O2O commercial platforms. - Amel Arfaoui, Omar Rafik Merad Boudia

, Ali Kribeche, Sidi-Mohammed Senouci
, Mohamed Hamdi:
Context-aware access control and anonymous authentication in WBAN. - Ramiro Alvarez, Mehrdad Nojoumian:

Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. - Yang Hu, Mingshen Sun, John C. S. Lui:

Exploiting non-uniform program execution time to evade record/replay forensic analysis. - Xiaodong Zhu

, Yi Zhang, Liehui Jiang, Rui Chang:
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching. - François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez

:
Spartan Networks: Self-feature-squeezing neural networks for increased robustness in adversarial settings. - Ruishan Xin, Yidong Yuan, Jiaji He

, Shuai Zhen, Yiqiang Zhao:
Random active shield generation based on modified artificial fish-swarm algorithm. - Haibin Zheng, Qianhong Wu, Jan Xie

, Zhenyu Guan, Bo Qin, Zhiqiang Gu:
An organization-friendly blockchain system.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














