Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec43.bht:"
@article{DBLP:journals/compsec/BaileyOP14, author = {Kyle O. Bailey and James S. Okolica and Gilbert L. Peterson}, title = {User identification and authentication using multi-modal behavioral biometrics}, journal = {Comput. Secur.}, volume = {43}, pages = {77--89}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.005}, doi = {10.1016/J.COSE.2014.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaileyOP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bou-HarbDA14, author = {Elias Bou{-}Harb and Mourad Debbabi and Chadi Assi}, title = {On fingerprinting probing activities}, journal = {Comput. Secur.}, volume = {43}, pages = {35--48}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.005}, doi = {10.1016/J.COSE.2014.02.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangHL14, author = {Zheran Fang and Weili Han and Yingjiu Li}, title = {Permission based Android security: Issues and countermeasures}, journal = {Comput. Secur.}, volume = {43}, pages = {205--218}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.007}, doi = {10.1016/J.COSE.2014.02.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FloresAE14, author = {Waldo Rocha Flores and Egil Antonsen and Mathias Ekstedt}, title = {Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture}, journal = {Comput. Secur.}, volume = {43}, pages = {90--110}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.004}, doi = {10.1016/J.COSE.2014.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FloresAE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gonzalez-ManzanoGFR14, author = {Lorena Gonz{\'{a}}lez{-}Manzano and Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and Jos{\'{e}} Mar{\'{\i}}a de Fuentes and Arturo Ribagorda}, title = {SoNeUCON\({}_{\mbox{ABC}}\), an expressive usage control model for Web-Based Social Networks}, journal = {Comput. Secur.}, volume = {43}, pages = {159--187}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.009}, doi = {10.1016/J.COSE.2014.03.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gonzalez-ManzanoGFR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KajzerDCSB14, author = {Mitchell Kajzer and John D'Arcy and Charles R. Crowell and Aaron Striegel and Dirk Van Bruggen}, title = {An exploratory investigation of message-person congruence in information security awareness campaigns}, journal = {Comput. Secur.}, volume = {43}, pages = {64--76}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.003}, doi = {10.1016/J.COSE.2014.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KajzerDCSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengLK14, author = {Weizhi Meng and Wenjuan Li and Lam{-}for Kwok}, title = {{EFM:} Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism}, journal = {Comput. Secur.}, volume = {43}, pages = {189--204}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.006}, doi = {10.1016/J.COSE.2014.02.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengLK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RughinisR14, author = {Cosima Rughinis and Razvan Rughinis}, title = {Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union}, journal = {Comput. Secur.}, volume = {43}, pages = {111--125}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.008}, doi = {10.1016/J.COSE.2014.03.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RughinisR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShabtaiTMRSE14, author = {Asaf Shabtai and Lena Tenenboim{-}Chekina and Dudu Mimran and Lior Rokach and Bracha Shapira and Yuval Elovici}, title = {Mobile malware detection through analysis of deviations in application network behavior}, journal = {Comput. Secur.}, volume = {43}, pages = {1--18}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.009}, doi = {10.1016/J.COSE.2014.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShabtaiTMRSE14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spafford14, author = {Eugene H. Spafford}, title = {Editorial}, journal = {Comput. Secur.}, volume = {43}, pages = {iv}, year = {2014}, url = {https://doi.org/10.1016/S0167-4048(14)00070-4}, doi = {10.1016/S0167-4048(14)00070-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Spafford14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StergiopoulosG14, author = {George Stergiopoulos and Dimitris Gritzalis}, title = {A Bug Hunter's Diary}, journal = {Comput. Secur.}, volume = {43}, pages = {188}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.001}, doi = {10.1016/J.COSE.2014.02.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StergiopoulosG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TamjidyamcholoBSR14, author = {Alireza Tamjidyamcholo and Mohd Sapiyan Bin Baba and Nor Liyana Mohd Shuib and Vala Ali Rohani}, title = {Evaluation model for knowledge sharing in information security professional virtual community}, journal = {Comput. Secur.}, volume = {43}, pages = {19--34}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.010}, doi = {10.1016/J.COSE.2014.02.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TamjidyamcholoBSR14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ugarte-PedreroSGHSB14, author = {Xabier Ugarte{-}Pedrero and Igor Santos and Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and Sergio Huerta and Borja Sanz and Pablo Garc{\'{\i}}a Bringas}, title = {On the adoption of anomaly detection for packed executable filtering}, journal = {Comput. Secur.}, volume = {43}, pages = {126--144}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.03.012}, doi = {10.1016/J.COSE.2014.03.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ugarte-PedreroSGHSB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VrakasGL14, author = {Nikos Vrakas and Dimitris Geneiatakis and Costas Lambrinoudakis}, title = {Obscuring users' identity in VoIP/IMS environments}, journal = {Comput. Secur.}, volume = {43}, pages = {145--158}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.04.001}, doi = {10.1016/J.COSE.2014.04.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VrakasGL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuW14, author = {Feng Zhu and Jinpeng Wei}, title = {Static analysis based invariant detection for commodity operating systems}, journal = {Comput. Secur.}, volume = {43}, pages = {49--63}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.008}, doi = {10.1016/J.COSE.2014.02.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhuW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.