callback( { "result":{ "query":":facetid:toc:\"db/journals/compsec/compsec75.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"74.11" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"13", "@dc":"13", "@oc":"13", "@id":"43443353", "text":":facetid:toc:db/journals/compsec/compsec75.bht" } }, "hits":{ "@total":"13", "@computed":"13", "@sent":"13", "@first":"0", "hit":[{ "@score":"1", "@id":"2392682", "info":{"authors":{"author":[{"@pid":"199/8975","text":"Jeffrey Avery"},{"@pid":"138/2552","text":"John Ross Wallrabenstein"}]},"title":"Formally modeling deceptive patches using a game-based approach.","venue":"Comput. Secur.","volume":"75","pages":"182-190","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/AveryW18","doi":"10.1016/J.COSE.2018.02.009","ee":"https://doi.org/10.1016/j.cose.2018.02.009","url":"https://dblp.org/rec/journals/compsec/AveryW18"}, "url":"URL#2392682" }, { "@score":"1", "@id":"2392700", "info":{"authors":{"author":[{"@pid":"77/3368","text":"Krzysztof Cabaj"},{"@pid":"60/632","text":"Dulce Domingos"},{"@pid":"84/1790","text":"Zbigniew Kotulski"},{"@pid":"92/1755","text":"Ana Respício"}]},"title":"Cybersecurity education: Evolution of the discipline and analysis of master programs.","venue":"Comput. Secur.","volume":"75","pages":"24-35","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/CabajDKR18","doi":"10.1016/J.COSE.2018.01.015","ee":"https://doi.org/10.1016/j.cose.2018.01.015","url":"https://dblp.org/rec/journals/compsec/CabajDKR18"}, "url":"URL#2392700" }, { "@score":"1", "@id":"2392706", "info":{"authors":{"author":[{"@pid":"65/4423-61","text":"Chen Chen 0061"},{"@pid":"22/1154","text":"Baojiang Cui"},{"@pid":"117/5485","text":"Jinxin Ma"},{"@pid":"153/5312","text":"Runpu Wu"},{"@pid":"218/2159","text":"Jianchao Guo"},{"@pid":"218/2011","text":"Wenqian Liu"}]},"title":"A systematic review of fuzzing techniques.","venue":"Comput. Secur.","volume":"75","pages":"118-137","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/ChenCMWGL18","doi":"10.1016/J.COSE.2018.02.002","ee":"https://doi.org/10.1016/j.cose.2018.02.002","url":"https://dblp.org/rec/journals/compsec/ChenCMWGL18"}, "url":"URL#2392706" }, { "@score":"1", "@id":"2392708", "info":{"authors":{"author":[{"@pid":"179/8342","text":"Zouhair Chiba"},{"@pid":"213/8760","text":"Noureddine Abghour"},{"@pid":"147/0976","text":"Khalid Moussaid"},{"@pid":"147/0858","text":"Amina El Omri"},{"@pid":"75/1858","text":"Mohamed Rida"}]},"title":"A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection.","venue":"Comput. Secur.","volume":"75","pages":"36-58","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/ChibaAMOR18","doi":"10.1016/J.COSE.2018.01.023","ee":"https://doi.org/10.1016/j.cose.2018.01.023","url":"https://dblp.org/rec/journals/compsec/ChibaAMOR18"}, "url":"URL#2392708" }, { "@score":"1", "@id":"2392722", "info":{"authors":{"author":[{"@pid":"89/1563","text":"Bo Fu"},{"@pid":"181/1848-1","text":"Yang Xiao 0001"},{"@pid":"12/417-1","text":"Hui Chen 0001"}]},"title":"FNF: Flow-net based fingerprinting and its applications.","venue":"Comput. Secur.","volume":"75","pages":"167-181","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/FuXC18","doi":"10.1016/J.COSE.2018.02.005","ee":"https://doi.org/10.1016/j.cose.2018.02.005","url":"https://dblp.org/rec/journals/compsec/FuXC18"}, "url":"URL#2392722" }, { "@score":"1", "@id":"2392723", "info":{"authors":{"author":[{"@pid":"83/2392","text":"Steven Furnell"},{"@pid":"181/0008","text":"Warut Khern-am-nuai"},{"@pid":"218/2146","text":"Rawan Esmael"},{"@pid":"119/5073","text":"Weining Yang"},{"@pid":"l/NinghuiLi","text":"Ninghui Li"}]},"title":"Enhancing security behaviour by supporting the user.","venue":"Comput. Secur.","volume":"75","pages":"1-9","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/FurnellKEYL18","doi":"10.1016/J.COSE.2018.01.016","ee":"https://doi.org/10.1016/j.cose.2018.01.016","url":"https://dblp.org/rec/journals/compsec/FurnellKEYL18"}, "url":"URL#2392723" }, { "@score":"1", "@id":"2392740", "info":{"authors":{"author":[{"@pid":"196/3827","text":"Talal Halabi"},{"@pid":"06/7909","text":"Martine Bellaïche"}]},"title":"A broker-based framework for standardization and management of Cloud Security-SLAs.","venue":"Comput. Secur.","volume":"75","pages":"59-71","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/HalabiB18","doi":"10.1016/J.COSE.2018.01.019","ee":"https://doi.org/10.1016/j.cose.2018.01.019","url":"https://dblp.org/rec/journals/compsec/HalabiB18"}, "url":"URL#2392740" }, { "@score":"1", "@id":"2392755", "info":{"authors":{"author":[{"@pid":"81/6603","text":"Muzammil Hussain"},{"@pid":"143/4480","text":"Ahmed Al-Haiqi"},{"@pid":"24/7257","text":"A. A. Zaidan 0001"},{"@pid":"04/7255","text":"B. B. Zaidan"},{"@pid":"21/138","text":"Miss Laiha Mat Kiah"},{"@pid":"172/9913","text":"Salman Iqbal"},{"@pid":"218/2165","text":"Shaukat Iqbal"},{"@pid":"160/4607","text":"Mohamed Abdulnabi"}]},"title":"A security framework for mHealth apps on Android platform.","venue":"Comput. Secur.","volume":"75","pages":"191-217","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/HussainAZZKIIA18","doi":"10.1016/J.COSE.2018.02.003","ee":"https://doi.org/10.1016/j.cose.2018.02.003","url":"https://dblp.org/rec/journals/compsec/HussainAZZKIIA18"}, "url":"URL#2392755" }, { "@score":"1", "@id":"2392790", "info":{"authors":{"author":[{"@pid":"189/0394","text":"Philip Menard"},{"@pid":"06/67","text":"Merrill Warkentin"},{"@pid":"97/6395","text":"Paul Benjamin Lowry"}]},"title":"The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination.","venue":"Comput. Secur.","volume":"75","pages":"147-166","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/MenardWL18","doi":"10.1016/J.COSE.2018.01.020","ee":"https://doi.org/10.1016/j.cose.2018.01.020","url":"https://dblp.org/rec/journals/compsec/MenardWL18"}, "url":"URL#2392790" }, { "@score":"1", "@id":"2392794", "info":{"authors":{"author":[{"@pid":"218/1955","text":"Daniel Bradford Miller"},{"@pid":"72/6449","text":"William Bradley Glisson"},{"@pid":"74/1161","text":"Mark Yampolskiy"},{"@pid":"c/KimKwangRaymondChoo","text":"Kim-Kwang Raymond Choo"}]},"title":"Identifying 3D printer residual data via open-source documentation.","venue":"Comput. Secur.","volume":"75","pages":"10-23","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/MillerGYC18","doi":"10.1016/J.COSE.2018.01.011","ee":"https://doi.org/10.1016/j.cose.2018.01.011","url":"https://dblp.org/rec/journals/compsec/MillerGYC18"}, "url":"URL#2392794" }, { "@score":"1", "@id":"2392811", "info":{"authors":{"author":{"@pid":"03/3803","text":"Chang-Seop Park"}},"title":"One-time password based on hash chain without shared secret and re-registration.","venue":"Comput. Secur.","volume":"75","pages":"138-146","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/Park18","doi":"10.1016/J.COSE.2018.02.010","ee":"https://doi.org/10.1016/j.cose.2018.02.010","url":"https://dblp.org/rec/journals/compsec/Park18"}, "url":"URL#2392811" }, { "@score":"1", "@id":"2392821", "info":{"authors":{"author":[{"@pid":"10/7506","text":"Bassam Sayed"},{"@pid":"10/1711","text":"Issa Traoré"},{"@pid":"82/7507","text":"Amany Abdelhalim"}]},"title":"If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript.","venue":"Comput. Secur.","volume":"75","pages":"92-117","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/SayedTA18","doi":"10.1016/J.COSE.2018.01.017","ee":"https://doi.org/10.1016/j.cose.2018.01.017","url":"https://dblp.org/rec/journals/compsec/SayedTA18"}, "url":"URL#2392821" }, { "@score":"1", "@id":"2392860", "info":{"authors":{"author":[{"@pid":"218/2023","text":"Vahid Zangeneh"},{"@pid":"62/3104","text":"Mehdi Shajari"}]},"title":"A cost-sensitive move selection strategy for moving target defense.","venue":"Comput. Secur.","volume":"75","pages":"72-91","year":"2018","type":"Journal Articles","access":"closed","key":"journals/compsec/ZangenehS18","doi":"10.1016/J.COSE.2017.12.013","ee":"https://doi.org/10.1016/j.cose.2017.12.013","url":"https://dblp.org/rec/journals/compsec/ZangenehS18"}, "url":"URL#2392860" } ] } } } )