


default search action
Computers & Security, Volume 73
Volume 73, March 2018
- Vennila Ganesan
, M. S. K. Manikandan, M. N. Suresh:
Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network. 1-16 - Mariusz Sepczuk
, Zbigniew Kotulski
:
A new risk-based authentication management model oriented on user's experience. 17-33 - Fuzel Jamil, Abid Khan
, Adeel Anjum, Mansoor Ahmed
, Farhana Jabeen
, Nadeem Javaid
:
Secure provenance using an authenticated data structure approach. 34-56 - Yan Zhuang:
The performance cost of software obfuscation for Android applications. 57-72 - Yuxin Ding, Xiaoling Xia, Sheng Chen, Ye Li:
A malware detection method based on family behavior graph. 73-86 - Florian Menges
, Günther Pernul:
A comparative analysis of incident reporting formats. 87-101 - Joseph M. Hatfield
:
Social engineering in cybersecurity: The evolution of a concept. 102-113 - Norbou Buchler, Prashanth Rajivan, Laura R. Marusich, Lewis Lightner, Cleotilde Gonzalez:
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition. 114-136 - Tarfa Hamed
, Rozita Dara, Stefan C. Kremer:
Network intrusion detection system based on recursive feature addition and bigram technique. 137-155 - Kamel Adi, Lamia Hamza
, Liviu Pene:
Automatic security policy enforcement in computer systems. 156-171 - Mahdi Alizadeh, Xixi Lu, Dirk Fahland
, Nicola Zannone
, Wil M. P. van der Aalst
:
Linking data and process perspectives for conformance analysis. 172-193 - Constantinos Patsakis
, Athanasios Charemis
, Achilleas Papageorgiou, Dimitrios Mermigas, Sotirios Pirounias:
The market's response toward privacy and mass surveillance: The Snowden aftermath. 194-206 - Hang Wei, Guan-Yu Hu, Zhi-Jie Zhou, Peili Qiao
, Zhiguo Zhou, Youmin Zhang
:
A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments. 207-218 - Salvatore Aurigemma, Thomas Mattson:
Exploring the effect of uncertainty avoidance on taking voluntary protective security actions. 219-234 - Aisha I. Ali-Gombe, Brendan Saltaformaggio, J. Ramanujam, Dongyan Xu, Golden G. Richard III
:
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming. 235-248 - Yaser Baseri
, Abdelhakim Hafid, Soumaya Cherkaoui
:
Privacy preserving fine-grained location-based access control for mobile cloud. 249-265 - Ron Bitton, Andrey Finkelshtein, Lior Sidi, Rami Puzis
, Lior Rokach, Asaf Shabtai:
Taxonomy of mobile users' security awareness. 266-293 - Graeme Horsman:
Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics. 294-306 - Georgios Karopoulos
, Christoforos Ntantogian, Christos Xenakis
:
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem. 307-325 - Sen Chen, Minhui Xue
, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu
, Bo Li:
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach. 326-344 - Margaret Gratian, Sruthi Bandi
, Michel Cukier, Josiah Dykstra
, Amy Ginther:
Correlating human traits and cyber security behavior intentions. 345-358 - Chih-Hung Lin
, Hsing-Kuo Pao, Jian-Wei Liao:
Efficient dynamic malware analysis using virtual time control mechanics. 359-373 - Sanjeev Das
, Bihuan Chen, Mahinthan Chandramohan, Yang Liu
, Wei Zhang:
ROPSentry: Runtime defense against ROP attacks using hardware performance counters. 374-388 - José Antonio Gómez-Hernández
, L. Álvarez-González, Pedro García-Teodoro:
R-Locker: Thwarting ransomware action through a honeyfile-based approach. 389-398 - Pete Burnap
, Richard French, Frederick Turner, Kevin Jones:
Malware classification using self organising feature maps and machine activity data. 399-410 - Gabriel Maciá-Fernández
, José Camacho
, Roberto Magán-Carrión, Pedro García-Teodoro, Roberto Therón
:
UGR'16: A new dataset for the evaluation of cyclostationarity-based network IDSs. 411-424 - Yunlong Mao
, Yuan Zhang, Xiaoyan Zhang, Fengyuan Xu, Sheng Zhong:
Location privacy in public access points positioning: An optimization and geometry approach. 425-438 - Rory Coulter, Lei Pan
:
Intelligent agents defending for an IoT world: A review. 439-458 - Micah Bushouse
, Douglas S. Reeves:
Goalkeeper: Comprehensive process enforcement from the hypervisor. 459-473 - Sean Carlisto de Alvarenga, Sylvio Barbon
, Rodrigo Sanches Miani, Michel Cukier, Bruno Bogaz Zarpelão:
Process mining and hierarchical clustering to help intrusion alert visualization. 474-491 - Yuchuan Luo, Ming Xu, Kai Huang, Dongsheng Wang, Shaojing Fu:
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing. 492-506 - Yimin Guo, Zhenfeng Zhang:
LPSE: Lightweight password-strength estimation for password meters. 507-518 - Diksha Goel
, Ankit Kumar Jain
:
Mobile phishing attacks and defence mechanisms: State of art and open research challenges. 519-544

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.