


default search action
Computers & Security, Volume 45
Volume 45, September 2014
- Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj

:
Taxonomy of intrusion risk assessment and response system. 1-16 - Mohammed N. Alenezi

, Martin J. Reed:
Uniform DoS traceback. 17-26 - Isredza Rahmi A. Hamid

, Jemal H. Abawajy:
An approach for profiling phishing activities. 27-41 - Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun

:
Information security incident management: Current practice as reported in the literature. 42-57 - Monica Lagazio, Nazneen Sherif, Mike Cushman:

A multi-level approach to understanding the impact of cyber crime on the financial sector. 58-74 - Heloise Pieterse

, Martin S. Olivier
:
Bluetooth Command and Control channel. 75-83 - Vu Duc Nguyen, Yang-Wai Chow

, Willy Susilo
:
On the security of text-based 3D CAPTCHAs. 84-99 - Sebastián García

, Martin Grill, Jan Stiborek
, Alejandro Zunino
:
An empirical comparison of botnet detection methods. 100-123 - Abdul Razzaq

, Zahid Anwar, Hafiz Farooq Ahmad
, Khalid Latif
, Rana Faisal Munir:
Ontology for attack detection: An intelligent approach to web application security. 124-146 - Syed Zulkarnain Syed Idrus

, Estelle Cherrier, Christophe Rosenberger
, Patrick Bours:
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords. 147-155 - Chao Shen

, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. 156-171 - Stefan Thalmann

, Daniel Bachlechner, Lukas Demetz, Markus Manhart:
Complexity is dead, long live complexity! How software can help service providers manage security and compliance. 172-185 - José A. Montenegro

, Javier López
:
A practical solution for sealed bid and multi-currency auctions. 186-198 - Aikaterini Mitrokotsa

, Cristina Onete
, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. 199-209 - Hao Zhang, Nenghai Yu, Yonggang Wen, Weiming Zhang:

Towards optimal noise distribution for privacy preserving in data aggregation. 210-230 - Roshan Chitrakar, Chuanhe Huang:

Selection of Candidate Support Vectors in incremental SVM for network intrusion detection. 231-241 - Aditya Oza, Kevin Ross, Richard M. Low, Mark Stamp

:
HTTP attack detection using n-gram analysis. 242-254 - Anca D. Jurcut

, Tom Coffey, Reiner Dojen
:
Design guidelines for security protocols to prevent replay & parallel session attacks. 255-273 - Mario Silic

, Andrea Back:
Shadow IT - A view from behind the curtain. 274-283 - Rennie Archibald, Dipak Ghosal

:
A comparative analysis of detection metrics for covert timing channels. 284-292 - Fred Cohen, Don Cohen:

Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations. 293-304 - Nikolaos Tsalis, Dimitris Gritzalis:

Securing cloud and mobility: A practitioner's guide. 305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














