Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec61.bht:"
@article{DBLP:journals/compsec/BalachandranSTT16, author = {Vivek Balachandran and Sufatrio and Darell J. J. Tan and Vrizlynn L. L. Thing}, title = {Control flow obfuscation for Android applications}, journal = {Comput. Secur.}, volume = {61}, pages = {72--93}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.003}, doi = {10.1016/J.COSE.2016.05.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BalachandranSTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoshmafLSLLRBH16, author = {Yazan Boshmaf and Dionysios Logothetis and Georgos Siganos and Jorge Ler{\'{\i}}a and Jos{\'{e}} Lorenzo and Matei Ripeanu and Konstantin Beznosov and Hassan Halawa}, title = {{\'{I}}ntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs}, journal = {Comput. Secur.}, volume = {61}, pages = {142--168}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.005}, doi = {10.1016/J.COSE.2016.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoshmafLSLLRBH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CanforaMV16, author = {Gerardo Canfora and Francesco Mercaldo and Corrado Aaron Visaggio}, title = {An {HMM} and structural entropy based detector for Android malware: An empirical study}, journal = {Comput. Secur.}, volume = {61}, pages = {1--18}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.04.009}, doi = {10.1016/J.COSE.2016.04.009}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CanforaMV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FlowerdayT16, author = {Stephen V. Flowerday and Tite Tuyikeze}, title = {Information security policy development and implementation: The what, how and who}, journal = {Comput. Secur.}, volume = {61}, pages = {169--183}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.002}, doi = {10.1016/J.COSE.2016.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FlowerdayT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KearneyK16, author = {Wayne D. Kearney and Hennie A. Kruger}, title = {Can perceptual differences account for enigmatic information security behaviour in an organisation?}, journal = {Comput. Secur.}, volume = {61}, pages = {46--58}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.006}, doi = {10.1016/J.COSE.2016.05.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KearneyK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LineMH16, author = {Maria Bartnes and Nils Brede Moe and Poul E. Heegaard}, title = {The future of information security incident management training: {A} case study of electrical power companies}, journal = {Comput. Secur.}, volume = {61}, pages = {32--45}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.004}, doi = {10.1016/J.COSE.2016.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LineMH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Rrushi16, author = {Julian L. Rrushi}, title = {{NIC} displays to thwart malware attacks mounted from within the {OS}}, journal = {Comput. Secur.}, volume = {61}, pages = {59--71}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.002}, doi = {10.1016/J.COSE.2016.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Rrushi16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenYXYG16, author = {Chao Shen and Tianwen Yu and Haodi Xu and Gengshan Yang and Xiaohong Guan}, title = {User practice in password security: An empirical study of real-life passwords in the wild}, journal = {Comput. Secur.}, volume = {61}, pages = {130--141}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.007}, doi = {10.1016/J.COSE.2016.05.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenYXYG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TranCFW16, author = {Hiep Tran and Enrique Campos{-}N{\'{a}}{\~{n}}ez and Pavel Fomin and James S. Wasek}, title = {Cyber resilience recovery model to combat zero-day malware attacks}, journal = {Comput. Secur.}, volume = {61}, pages = {19--31}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.05.001}, doi = {10.1016/J.COSE.2016.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TranCFW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Uzunov16, author = {Anton V. Uzunov}, title = {A survey of security solutions for distributed publish/subscribe systems}, journal = {Comput. Secur.}, volume = {61}, pages = {94--129}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.04.008}, doi = {10.1016/J.COSE.2016.04.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Uzunov16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.