


default search action
Computers & Security, Volume 44
Volume 44, July 2014
- Jeb Webb, Atif Ahmad

, Sean B. Maynard
, Graeme G. Shanks
:
A situation awareness model for information security risk management. 1-15 - Yki Kortesniemi, Mikko Särelä:

Survey of certificate usage in distributed access control. 16-32 - Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:

Implementing a database encryption solution, design and implementation issues. 33-50 - Mehmet Ercan Nergiz, Muhammed Zahit Gök:

Hybrid k-Anonymity. 51-63 - Martin Kirchner, Edgar R. Weippl

:
Securing Cloud and Mobility. 64 - Yuxin Ding, Wei Dai, Shengli Yan, Yumei Zhang:

Control flow-based opcode behavior analysis for Malware detection. 65-74 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:

Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems. 75-91 - Sancheng Peng, Min Wu, Guojun Wang, Shui Yu

:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. 92-103 - Young-Su Jang, Jin-Young Choi

:
Detecting SQL injection attacks using query result size. 104-118

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














