


default search action
Computers & Security, Volume 52
Volume 52, July 2015
- Walter Cerroni

, Gianluca Moro
, Roberto Pasolini, Marco Ramilli:
Decentralized detection of network attacks through P2P data clustering of SNMP data. 1-16 - Christoforos Ntantogian

, Stefanos Malliaros, Christos Xenakis
:
Gaithashing: A two-factor authentication scheme based on gait features. 17-32 - Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:

Hypervisor-based malware protection with AccessMiner. 33-50 - Erzhou Zhu, Feng Liu, Zuo Wang, Alei Liang, Yiwen Zhang, Xuejian Li, Xuejun Li:

Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs. 51-69 - Mohamed Elyas

, Atif Ahmad, Sean B. Maynard
, Andrew Lonie
:
Digital forensic readiness: Expert perspectives on a theoretical framework. 70-89 - Nikos Virvilis, Alexios Mylonas

, Nikolaos Tsalis, Dimitris Gritzalis:
Security Busters: Web browser security vs. rogue sites. 90-105 - Yongzhi Wang

, Jinpeng Wei:
Toward protecting control flow confidentiality in cloud-based computation. 106-127 - Aggeliki Tsohou, Maria Karyda

, Spyros Kokolakis:
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. 128-141 - Jennifer Cowley, Frank L. Greitzer

, Bronwyn Woods:
Effect of network infrastructure factors on information system risk judgments. 142-158 - Ting Wang, Dongyao Ji:

Comment on "Design and formal security evaluation of NeMHIP". 159-161
- Padmanabhan Krishnan, Kostyantyn Vorobyov:

Enforcement of privacy requirements. 164-177 - Bernd Zwattendorfer

, Daniel Slamanig
:
Design strategies for a privacy-friendly Austrian eID system in the public cloud. 178-193 - Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:

The design of phishing studies: Challenges for researchers. 194-206 - Sascha Wessel, Manuel Huber

, Frederic Stumpf, Claudia Eckert:
Improving mobile device security with operating system-level virtualization. 207-220 - Karl-Peter Fuchs, Dominik Herrmann

, Hannes Federrath:
Workload modelling for mix-based anonymity services. 221-233 - Jehyun Lee, Suyeon Lee, Heejo Lee:

Screening smartphone applications using malware family signatures. 234-249
- Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn

:
Preface - WISA 2014. 250 - Aziz Mohaisen

, Omar Alrawi, Manar Mohaisen
:
AMAL: High-fidelity, behavior-based automated malware analysis and classification. 251-266 - Eunhyun Kim, Kyungwon Park

, Hyoungshick Kim
, Jaeseung Song
:
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk. 267-275 - Hwajeong Seo

, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Montgomery multiplication and squaring for Optimal Prime Fields. 276-291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














