Search dblp for Publications

export results for "toc:db/journals/compsec/compsec43.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BaileyOP14,
  author       = {Kyle O. Bailey and
                  James S. Okolica and
                  Gilbert L. Peterson},
  title        = {User identification and authentication using multi-modal behavioral
                  biometrics},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {77--89},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.005},
  doi          = {10.1016/J.COSE.2014.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaileyOP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bou-HarbDA14,
  author       = {Elias Bou{-}Harb and
                  Mourad Debbabi and
                  Chadi Assi},
  title        = {On fingerprinting probing activities},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {35--48},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.005},
  doi          = {10.1016/J.COSE.2014.02.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bou-HarbDA14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangHL14,
  author       = {Zheran Fang and
                  Weili Han and
                  Yingjiu Li},
  title        = {Permission based Android security: Issues and countermeasures},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {205--218},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.007},
  doi          = {10.1016/J.COSE.2014.02.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangHL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FloresAE14,
  author       = {Waldo Rocha Flores and
                  Egil Antonsen and
                  Mathias Ekstedt},
  title        = {Information security knowledge sharing in organizations: Investigating
                  the effect of behavioral information security governance and national
                  culture},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {90--110},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.004},
  doi          = {10.1016/J.COSE.2014.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FloresAE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Gonzalez-ManzanoGFR14,
  author       = {Lorena Gonz{\'{a}}lez{-}Manzano and
                  Ana Isabel Gonz{\'{a}}lez{-}Tablas Ferreres and
                  Jos{\'{e}} Mar{\'{\i}}a de Fuentes and
                  Arturo Ribagorda},
  title        = {SoNeUCON\({}_{\mbox{ABC}}\), an expressive usage control model for
                  Web-Based Social Networks},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {159--187},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.009},
  doi          = {10.1016/J.COSE.2014.03.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Gonzalez-ManzanoGFR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KajzerDCSB14,
  author       = {Mitchell Kajzer and
                  John D'Arcy and
                  Charles R. Crowell and
                  Aaron Striegel and
                  Dirk Van Bruggen},
  title        = {An exploratory investigation of message-person congruence in information
                  security awareness campaigns},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {64--76},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.003},
  doi          = {10.1016/J.COSE.2014.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KajzerDCSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengLK14,
  author       = {Weizhi Meng and
                  Wenjuan Li and
                  Lam{-}for Kwok},
  title        = {{EFM:} Enhancing the performance of signature-based network intrusion
                  detection systems using enhanced filter mechanism},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {189--204},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.006},
  doi          = {10.1016/J.COSE.2014.02.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MengLK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RughinisR14,
  author       = {Cosima Rughinis and
                  Razvan Rughinis},
  title        = {Nothing ventured, nothing gained. Profiles of online activity, cyber-crime
                  exposure, and security measures of end-users in European Union},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {111--125},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.008},
  doi          = {10.1016/J.COSE.2014.03.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RughinisR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShabtaiTMRSE14,
  author       = {Asaf Shabtai and
                  Lena Tenenboim{-}Chekina and
                  Dudu Mimran and
                  Lior Rokach and
                  Bracha Shapira and
                  Yuval Elovici},
  title        = {Mobile malware detection through analysis of deviations in application
                  network behavior},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {1--18},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.009},
  doi          = {10.1016/J.COSE.2014.02.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShabtaiTMRSE14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spafford14,
  author       = {Eugene H. Spafford},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {iv},
  year         = {2014},
  url          = {https://doi.org/10.1016/S0167-4048(14)00070-4},
  doi          = {10.1016/S0167-4048(14)00070-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Spafford14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StergiopoulosG14,
  author       = {George Stergiopoulos and
                  Dimitris Gritzalis},
  title        = {A Bug Hunter's Diary},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {188},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.001},
  doi          = {10.1016/J.COSE.2014.02.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StergiopoulosG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TamjidyamcholoBSR14,
  author       = {Alireza Tamjidyamcholo and
                  Mohd Sapiyan Bin Baba and
                  Nor Liyana Mohd Shuib and
                  Vala Ali Rohani},
  title        = {Evaluation model for knowledge sharing in information security professional
                  virtual community},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {19--34},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.010},
  doi          = {10.1016/J.COSE.2014.02.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TamjidyamcholoBSR14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ugarte-PedreroSGHSB14,
  author       = {Xabier Ugarte{-}Pedrero and
                  Igor Santos and
                  Iv{\'{a}}n Garc{\'{\i}}a{-}Ferreira and
                  Sergio Huerta and
                  Borja Sanz and
                  Pablo Garc{\'{\i}}a Bringas},
  title        = {On the adoption of anomaly detection for packed executable filtering},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {126--144},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.03.012},
  doi          = {10.1016/J.COSE.2014.03.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ugarte-PedreroSGHSB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VrakasGL14,
  author       = {Nikos Vrakas and
                  Dimitris Geneiatakis and
                  Costas Lambrinoudakis},
  title        = {Obscuring users' identity in VoIP/IMS environments},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {145--158},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.04.001},
  doi          = {10.1016/J.COSE.2014.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VrakasGL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuW14,
  author       = {Feng Zhu and
                  Jinpeng Wei},
  title        = {Static analysis based invariant detection for commodity operating
                  systems},
  journal      = {Comput. Secur.},
  volume       = {43},
  pages        = {49--63},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.008},
  doi          = {10.1016/J.COSE.2014.02.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics