Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec29.bht:"
@article{DBLP:journals/compsec/AlbrechtsenH10, author = {Eirik Albrechtsen and Jan Hovden}, title = {Improving information security awareness and behaviour through dialogue, participation and collective reflection. An intervention study}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {432--445}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.005}, doi = {10.1016/J.COSE.2009.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlbrechtsenH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArdagnaVFGJS10, author = {Claudio A. Ardagna and Sabrina De Capitani di Vimercati and Sara Foresti and Tyrone Grandison and Sushil Jajodia and Pierangela Samarati}, title = {Access control for smarter healthcare using policy spaces}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {848--858}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.07.001}, doi = {10.1016/J.COSE.2010.07.001}, timestamp = {Mon, 21 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ArdagnaVFGJS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BasagiannisKP10, author = {Stylianos Basagiannis and Panagiotis Katsaros and Andrew Pombortsis}, title = {An intruder model with message inspection for model checking security protocols}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {16--34}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.003}, doi = {10.1016/J.COSE.2009.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BasagiannisKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BauerJ10, author = {Andreas Bauer and Jan J{\"{u}}rjens}, title = {Runtime verification of cryptographic protocols}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {315--330}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.003}, doi = {10.1016/J.COSE.2009.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BauerJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BlundoCVSFPS10, author = {Carlo Blundo and Stelvio Cimato and Sabrina De Capitani di Vimercati and Alfredo De Santis and Sara Foresti and Stefano Paraboschi and Pierangela Samarati}, title = {Managing key hierarchies for access control enforcement: Heuristic approaches}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {533--547}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.006}, doi = {10.1016/J.COSE.2009.12.006}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BlundoCVSFPS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangTH10, author = {Chin{-}Chen Chang and Hao{-}Chuan Tsai and Yi{-}Pei Hsieh}, title = {An efficient and fair buyer-seller fingerprinting scheme for large scale networks}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {269--277}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.008}, doi = {10.1016/J.COSE.2009.08.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangTH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CheneauBL10, author = {Tony Cheneau and Aymen Boudguiga and Maryline Laurent}, title = {Significantly improved performances of the cryptographically generated addresses thanks to {ECC} and {GPGPU}}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {419--431}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.008}, doi = {10.1016/J.COSE.2009.12.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CheneauBL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiLLK10, author = {Yoon{-}Ho Choi and Lunquan Li and Peng Liu and George Kesidis}, title = {Worm virulence estimation for the containment of local worm outbreak}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {104--123}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.002}, doi = {10.1016/J.COSE.2009.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoiLLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cohen10, author = {Fred Cohen}, title = {A method for forensic analysis of control}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {891--902}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.05.003}, doi = {10.1016/J.COSE.2010.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cohen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ColantonioPOV10, author = {Alessandro Colantonio and Roberto Di Pietro and Alberto Ocello and Nino Vincenzo Verde}, title = {Taming role mining complexity in {RBAC}}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {548--564}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.01.001}, doi = {10.1016/J.COSE.2010.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ColantonioPOV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CostaMMSW10, author = {Gabriele Costa and Fabio Martinelli and Paolo Mori and Christian Schaefer and Thomas Walter}, title = {Runtime monitoring for next generation Java {ME} platform}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {74--87}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.005}, doi = {10.1016/J.COSE.2009.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CostaMMSW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EhlertGM10, author = {Sven Ehlert and Dimitris Geneiatakis and Thomas Magedanz}, title = {Survey of network security systems to counter SIP-based denial-of-service attacks}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {225--243}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.004}, doi = {10.1016/J.COSE.2009.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EhlertGM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FarleyW10, author = {Ryan Farley and Xinyuan Wang}, title = {Roving bugnet: Distributed surveillance threat and mitigation}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {592--602}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.002}, doi = {10.1016/J.COSE.2009.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FarleyW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandezCSD10, author = {Marcel Fernandez and Josep Cotrina and Miguel Soriano and Neus Domingo}, title = {A note about the identifier parent property in Reed-Solomon codes}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {628--635}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.012}, doi = {10.1016/J.COSE.2009.12.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FernandezCSD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ferrer-GomillaOPL10, author = {Josep Llu{\'{\i}}s Ferrer{-}Gomila and Jose Antonio Onieva and Magdalena Payeras{-}Capell{\`{a}} and Javier L{\'{o}}pez}, title = {Certified electronic mail: Properties revisited}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {167--179}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.06.009}, doi = {10.1016/J.COSE.2009.06.009}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ferrer-GomillaOPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ForneHMMLMLD10, author = {Jordi Forn{\'{e}} and M. Francisca Hinarejos and Andr{\'{e}}s Mar{\'{\i}}n and Florina Almen{\'{a}}rez and Javier L{\'{o}}pez and Jos{\'{e}} A. Montenegro and Marc Lacoste and Daniel D{\'{\i}}az S{\'{a}}nchez}, title = {Pervasive authentication and authorization infrastructures for mobile users}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {501--514}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.001}, doi = {10.1016/J.COSE.2009.09.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ForneHMMLMLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisE10, author = {Dimitris Gritzalis and Jan H. P. Eloff}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {1--2}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.10.006}, doi = {10.1016/J.COSE.2009.10.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisL10, author = {Dimitris Gritzalis and Javier L{\'{o}}pez}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {521--522}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.03.003}, doi = {10.1016/J.COSE.2010.03.003}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisS10, author = {Dimitris Gritzalis and Pierangela Samarati}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {381--382}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.01.004}, doi = {10.1016/J.COSE.2010.01.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GritzalisV10, author = {Dimitris Gritzalis and Sabrina De Capitani di Vimercati}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {165--166}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.004}, doi = {10.1016/J.COSE.2009.12.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GritzalisV10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuindeZ10, author = {Nitesh B. Guinde and Sotirios G. Ziavras}, title = {Efficient hardware support for pattern matching in network intrusion detection}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {756--769}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.05.001}, doi = {10.1016/J.COSE.2010.05.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuindeZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hernandez-CastroR10, author = {Carlos Javier Hern{\'{a}}ndez{-}Castro and Arturo Ribagorda}, title = {Pitfalls in {CAPTCHA} design and implementation: The Math CAPTCHA, a case study}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {141--157}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.06.006}, doi = {10.1016/J.COSE.2009.06.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hernandez-CastroR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HerranzMNT10, author = {Javier Herranz and Stan Matwin and Jordi Nin and Vicen{\c{c}} Torra}, title = {Classifying data from protected statistical datasets}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {875--890}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.05.005}, doi = {10.1016/J.COSE.2010.05.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HerranzMNT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HilgenstielerDKS10, author = {Egon Hilgenstieler and Elias P. Duarte Jr. and Glenn Mansfield Keeni and Norio Shiratori}, title = {Extensions to the source path isolation engine for precise and efficient log-based {IP} traceback}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {383--392}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.011}, doi = {10.1016/J.COSE.2009.12.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HilgenstielerDKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HinarejosMFE10, author = {M. Francisca Hinarejos and Jose L. Mu{\~{n}}oz and Jordi Forn{\'{e}} and Oscar Esparza}, title = {{PREON:} An efficient cascade revocation mechanism for delegation paths}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {697--711}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.03.001}, doi = {10.1016/J.COSE.2010.03.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HinarejosMFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HolblWB10, author = {Marko H{\"{o}}lbl and Tatjana Welzer and Bostjan Brumen}, title = {Two proposed identity-based three-party authenticated key agreement protocols from pairings}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {244--252}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.006}, doi = {10.1016/J.COSE.2009.08.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HolblWB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JarrayaL10, author = {Houssem Jarraya and Maryline Laurent}, title = {A secure peer-to-peer backup service keeping great autonomy while under the supervision of a provider}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {180--195}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.10.003}, doi = {10.1016/J.COSE.2009.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JarrayaL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KantzavelouK10, author = {Ioanna Kantzavelou and Sokratis K. Katsikas}, title = {A game-based intrusion detection mechanism to confront internal attackers}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {859--874}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.06.002}, doi = {10.1016/J.COSE.2010.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KantzavelouK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KavallarisK10, author = {Theodoros Kavallaris and Vasilios Katos}, title = {On the detection of pod slurping attacks}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {680--685}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.01.002}, doi = {10.1016/J.COSE.2010.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KavallarisK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KolterKP10, author = {Jan Paul Kolter and Thomas Kernchen and G{\"{u}}nther Pernul}, title = {Collaborative privacy management}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {580--591}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.007}, doi = {10.1016/J.COSE.2009.12.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KolterKP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KritzingerS10, author = {Elmarie Kritzinger and Sebastiaan H. von Solms}, title = {Cyber security for home users: {A} new way of protection through awareness enforcement}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {840--847}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.08.001}, doi = {10.1016/J.COSE.2010.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KritzingerS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeM10, author = {Seok{-}Won Lee and Mattia Monga}, title = {Special issue on software engineering for secure systems}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {299--301}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.01.003}, doi = {10.1016/J.COSE.2010.01.003}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeitoldPR10, author = {Herbert Leitold and Reinhard Posch and Thomas R{\"{o}}ssler}, title = {Reconstruction of electronic signatures from eDocument printouts}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {523--532}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.002}, doi = {10.1016/J.COSE.2009.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeitoldPR10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuK10, author = {Fuwen Liu and Hartmut K{\"{o}}nig}, title = {A survey of video encryption algorithms}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {3--15}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.06.004}, doi = {10.1016/J.COSE.2009.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ManderCN10, author = {Todd Mander and Richard Cheung and Farhad Nabhani}, title = {Power system {DNP3} data object security using data sets}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {487--500}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.10.001}, doi = {10.1016/J.COSE.2009.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ManderCN10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MillanPPG10, author = {Gabriel L{\'{o}}pez Mill{\'{a}}n and Manuel Gil P{\'{e}}rez and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Antonio Fernandez G{\'{o}}mez{-}Skarmeta}, title = {PKI-based trust management in inter-domain scenarios}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {278--290}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.004}, doi = {10.1016/J.COSE.2009.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MillanPPG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiekerkS10, author = {Johan Van Niekerk and Rossouw von Solms}, title = {Information security culture: {A} management perspective}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {476--486}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.10.005}, doi = {10.1016/J.COSE.2009.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiekerkS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianXS10, author = {Christoforos Ntantogian and Christos Xenakis and Ioannis Stavrakakis}, title = {A generic mechanism for efficient authentication in {B3G} networks}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {460--475}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.001}, doi = {10.1016/J.COSE.2009.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Palmer10, author = {Anthony J. Palmer}, title = {Approach for selecting the most suitable Automated Personal Identification Mechanism {(ASMSA)}}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {785--806}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.03.002}, doi = {10.1016/J.COSE.2010.03.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Palmer10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PalmieriF10, author = {Francesco Palmieri and Ugo Fiore}, title = {Network anomaly detection through nonlinear analysis}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {737--755}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.05.002}, doi = {10.1016/J.COSE.2010.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PalmieriF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pavlich-MariscalDM10, author = {Jaime A. Pavlich{-}Mariscal and Steven A. Demurjian and Laurent D. Michel}, title = {A framework of composable access control features: Preserving separation of access control concerns from models to code}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {350--379}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.005}, doi = {10.1016/J.COSE.2009.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pavlich-MariscalDM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pavlich-MariscalDM10a, author = {Jaime A. Pavlich{-}Mariscal and Steven A. Demurjian and Laurent D. Michel}, title = {A framework for security assurance of access control enforcement code}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {770--784}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.03.004}, doi = {10.1016/J.COSE.2010.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pavlich-MariscalDM10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PhamRMD10, author = {Quan Pham and Jason Reid and Adrian McCullagh and Ed Dawson}, title = {On a taxonomy of delegation}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {565--579}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.009}, doi = {10.1016/J.COSE.2009.12.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PhamRMD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PirontiS10, author = {Alfredo Pironti and Riccardo Sisto}, title = {Provably correct Java implementations of Spi Calculus security protocols specifications}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {302--314}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.001}, doi = {10.1016/J.COSE.2009.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PirontiS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RossudowskiVEK10, author = {A. Maciej Rossudowski and Hein S. Venter and Jan H. P. Eloff and Derrick G. Kourie}, title = {A security privacy aware architecture and protocol for a single smart card used for multiple services}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {393--409}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.001}, doi = {10.1016/J.COSE.2009.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RossudowskiVEK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RuighaverMW10, author = {Anthonie B. Ruighaver and Sean B. Maynard and Matthew J. Warren}, title = {Ethical decision making: Improving the quality of acceptable use policies}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {731--736}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.05.004}, doi = {10.1016/J.COSE.2010.05.004}, timestamp = {Thu, 07 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RuighaverMW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SeewaldG10, author = {Alexander K. Seewald and Wilfried N. Gansterer}, title = {On the detection and identification of botnets}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {45--58}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.007}, doi = {10.1016/J.COSE.2009.07.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SeewaldG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShinVA10, author = {Heechang Shin and Jaideep Vaidya and Vijayalakshmi Atluri}, title = {Anonymization models for directional location based service environments}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {59--73}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.006}, doi = {10.1016/J.COSE.2009.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShinVA10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SommestadEJ10, author = {Teodor Sommestad and Mathias Ekstedt and Pontus Johnson}, title = {A probabilistic relational model for security risk analysis}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {659--679}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.02.002}, doi = {10.1016/J.COSE.2010.02.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SommestadEJ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SorniottiM10, author = {Alessandro Sorniotti and Refik Molva}, title = {A provably secure secret handshake with dynamic controlled matching}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {619--627}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.004}, doi = {10.1016/J.COSE.2009.11.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SoupionisG10, author = {Yannis Soupionis and Dimitris Gritzalis}, title = {Audio {CAPTCHA:} Existing solutions assessment and a new implementation for VoIP telephony}, journal = {Comput. Secur.}, volume = {29}, number = {5}, pages = {603--618}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.003}, doi = {10.1016/J.COSE.2009.12.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SoupionisG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spafford10, author = {Eugene H. Spafford}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {641--642}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.06.001}, doi = {10.1016/J.COSE.2010.06.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Spafford10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spafford10a, author = {Eugene H. Spafford}, title = {Editorial}, journal = {Comput. Secur.}, volume = {29}, number = {7}, pages = {729--730}, year = {2010}, url = {https://doi.org/10.1016/S0167-4048(10)00071-4}, doi = {10.1016/S0167-4048(10)00071-4}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Spafford10a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spafford10b, author = {Eugene H. Spafford}, title = {Security, technology, publishing, and ethics (Part {I)}}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {813--814}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.10.004}, doi = {10.1016/J.COSE.2010.10.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Spafford10b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpathoulasK10, author = {Georgios P. Spathoulas and Sokratis K. Katsikas}, title = {Reducing false positives in intrusion detection systems}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {35--44}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.008}, doi = {10.1016/J.COSE.2009.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpathoulasK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StakhanovaBW10, author = {Natalia Stakhanova and Samik Basu and Johnny Wong}, title = {On the symbiosis of specification-based and anomaly-based detection}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {253--268}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.007}, doi = {10.1016/J.COSE.2009.08.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StakhanovaBW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Su10, author = {Ming{-}Yang Su}, title = {{WARP:} {A} wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {208--224}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.005}, doi = {10.1016/J.COSE.2009.09.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Su10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TheoharidouKG10, author = {Marianthi Theoharidou and Panayiotis Kotzanikolaou and Dimitris Gritzalis}, title = {A multi-layer Criticality Assessment methodology based on interdependencies}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {643--658}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.02.003}, doi = {10.1016/J.COSE.2010.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TheoharidouKG10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TjhaiFPC10, author = {Gina C. Tjhai and Steven Furnell and Maria Papadaki and Nathan L. Clarke}, title = {A preliminary two-stage alarm correlation and filtering system using {SOM} neural network and K-means algorithm}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {712--723}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.02.001}, doi = {10.1016/J.COSE.2010.02.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TjhaiFPC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TolandFE10, author = {Tyrone S. Toland and Csilla Farkas and Caroline M. Eastman}, title = {The inference problem: Maintaining maximal availability in the presence of database updates}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {88--103}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.07.004}, doi = {10.1016/J.COSE.2009.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TolandFE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VeigaE10, author = {Ad{\'{e}}le da Veiga and Jan H. P. Eloff}, title = {A framework and assessment instrument for information security culture}, journal = {Comput. Secur.}, volume = {29}, number = {2}, pages = {196--207}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.09.002}, doi = {10.1016/J.COSE.2009.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VeigaE10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZWMM10, author = {Fangwei Wang and Yunkai Zhang and Changguang Wang and Jianfeng Ma and Sang{-}Jae Moon}, title = {Stability analysis of a {SEIQV} epidemic model for rapid spreading worms}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {410--418}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.10.002}, doi = {10.1016/J.COSE.2009.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZWMM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeiP10, author = {Jinpeng Wei and Calton Pu}, title = {Modeling and preventing {TOCTTOU} vulnerabilities in Unix-style file systems}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {815--830}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.09.004}, doi = {10.1016/J.COSE.2010.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WeiP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Workman10, author = {Michael Workman}, title = {A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives}, journal = {Comput. Secur.}, volume = {29}, number = {8}, pages = {831--839}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2010.09.003}, doi = {10.1016/J.COSE.2010.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Workman10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaoHCLD10, author = {Liang Xiao and Bo Hu and Madalina Croitoru and Paul H. Lewis and Srinandan Dasmahapatra}, title = {A knowledgeable security model for distributed health information systems}, journal = {Comput. Secur.}, volume = {29}, number = {3}, pages = {331--349}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.08.002}, doi = {10.1016/J.COSE.2009.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiaoHCLD10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YoonKH10, author = {Ji Won Yoon and Hyoungshick Kim and Jun Ho Huh}, title = {Hybrid spam filtering for mobile communication}, journal = {Comput. Secur.}, volume = {29}, number = {4}, pages = {446--459}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.11.003}, doi = {10.1016/J.COSE.2009.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YoonKH10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouLK10, author = {Chenfeng Vincent Zhou and Christopher Leckie and Shanika Karunasekera}, title = {A survey of coordinated attacks and collaborative intrusion detection}, journal = {Comput. Secur.}, volume = {29}, number = {1}, pages = {124--140}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.06.008}, doi = {10.1016/J.COSE.2009.06.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouLK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZiYPL10, author = {Xiaochao Zi and Lihong Yao and Li Pan and Jianhua Li}, title = {Implementing a passive network covert timing channel}, journal = {Comput. Secur.}, volume = {29}, number = {6}, pages = {686--696}, year = {2010}, url = {https://doi.org/10.1016/j.cose.2009.12.010}, doi = {10.1016/J.COSE.2009.12.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZiYPL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.