Search dblp for Publications

export results for "toc:db/journals/compsec/compsec29.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlbrechtsenH10,
  author       = {Eirik Albrechtsen and
                  Jan Hovden},
  title        = {Improving information security awareness and behaviour through dialogue,
                  participation and collective reflection. An intervention study},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {432--445},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.005},
  doi          = {10.1016/J.COSE.2009.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlbrechtsenH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArdagnaVFGJS10,
  author       = {Claudio A. Ardagna and
                  Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Tyrone Grandison and
                  Sushil Jajodia and
                  Pierangela Samarati},
  title        = {Access control for smarter healthcare using policy spaces},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {848--858},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.07.001},
  doi          = {10.1016/J.COSE.2010.07.001},
  timestamp    = {Mon, 21 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ArdagnaVFGJS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BasagiannisKP10,
  author       = {Stylianos Basagiannis and
                  Panagiotis Katsaros and
                  Andrew Pombortsis},
  title        = {An intruder model with message inspection for model checking security
                  protocols},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {16--34},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.003},
  doi          = {10.1016/J.COSE.2009.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BasagiannisKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BauerJ10,
  author       = {Andreas Bauer and
                  Jan J{\"{u}}rjens},
  title        = {Runtime verification of cryptographic protocols},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {315--330},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.003},
  doi          = {10.1016/J.COSE.2009.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BauerJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BlundoCVSFPS10,
  author       = {Carlo Blundo and
                  Stelvio Cimato and
                  Sabrina De Capitani di Vimercati and
                  Alfredo De Santis and
                  Sara Foresti and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Managing key hierarchies for access control enforcement: Heuristic
                  approaches},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {533--547},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.006},
  doi          = {10.1016/J.COSE.2009.12.006},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BlundoCVSFPS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangTH10,
  author       = {Chin{-}Chen Chang and
                  Hao{-}Chuan Tsai and
                  Yi{-}Pei Hsieh},
  title        = {An efficient and fair buyer-seller fingerprinting scheme for large
                  scale networks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {269--277},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.008},
  doi          = {10.1016/J.COSE.2009.08.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangTH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CheneauBL10,
  author       = {Tony Cheneau and
                  Aymen Boudguiga and
                  Maryline Laurent},
  title        = {Significantly improved performances of the cryptographically generated
                  addresses thanks to {ECC} and {GPGPU}},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {419--431},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.008},
  doi          = {10.1016/J.COSE.2009.12.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CheneauBL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiLLK10,
  author       = {Yoon{-}Ho Choi and
                  Lunquan Li and
                  Peng Liu and
                  George Kesidis},
  title        = {Worm virulence estimation for the containment of local worm outbreak},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {104--123},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.002},
  doi          = {10.1016/J.COSE.2009.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiLLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cohen10,
  author       = {Fred Cohen},
  title        = {A method for forensic analysis of control},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {891--902},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.05.003},
  doi          = {10.1016/J.COSE.2010.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cohen10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ColantonioPOV10,
  author       = {Alessandro Colantonio and
                  Roberto Di Pietro and
                  Alberto Ocello and
                  Nino Vincenzo Verde},
  title        = {Taming role mining complexity in {RBAC}},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {548--564},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.01.001},
  doi          = {10.1016/J.COSE.2010.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ColantonioPOV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CostaMMSW10,
  author       = {Gabriele Costa and
                  Fabio Martinelli and
                  Paolo Mori and
                  Christian Schaefer and
                  Thomas Walter},
  title        = {Runtime monitoring for next generation Java {ME} platform},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {74--87},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.005},
  doi          = {10.1016/J.COSE.2009.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CostaMMSW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EhlertGM10,
  author       = {Sven Ehlert and
                  Dimitris Geneiatakis and
                  Thomas Magedanz},
  title        = {Survey of network security systems to counter SIP-based denial-of-service
                  attacks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {225--243},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.004},
  doi          = {10.1016/J.COSE.2009.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EhlertGM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FarleyW10,
  author       = {Ryan Farley and
                  Xinyuan Wang},
  title        = {Roving bugnet: Distributed surveillance threat and mitigation},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {592--602},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.002},
  doi          = {10.1016/J.COSE.2009.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FarleyW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandezCSD10,
  author       = {Marcel Fernandez and
                  Josep Cotrina and
                  Miguel Soriano and
                  Neus Domingo},
  title        = {A note about the identifier parent property in Reed-Solomon codes},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {628--635},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.012},
  doi          = {10.1016/J.COSE.2009.12.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandezCSD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ferrer-GomillaOPL10,
  author       = {Josep Llu{\'{\i}}s Ferrer{-}Gomila and
                  Jose Antonio Onieva and
                  Magdalena Payeras{-}Capell{\`{a}} and
                  Javier L{\'{o}}pez},
  title        = {Certified electronic mail: Properties revisited},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {167--179},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.06.009},
  doi          = {10.1016/J.COSE.2009.06.009},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ferrer-GomillaOPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ForneHMMLMLD10,
  author       = {Jordi Forn{\'{e}} and
                  M. Francisca Hinarejos and
                  Andr{\'{e}}s Mar{\'{\i}}n and
                  Florina Almen{\'{a}}rez and
                  Javier L{\'{o}}pez and
                  Jos{\'{e}} A. Montenegro and
                  Marc Lacoste and
                  Daniel D{\'{\i}}az S{\'{a}}nchez},
  title        = {Pervasive authentication and authorization infrastructures for mobile
                  users},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {501--514},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.001},
  doi          = {10.1016/J.COSE.2009.09.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ForneHMMLMLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisE10,
  author       = {Dimitris Gritzalis and
                  Jan H. P. Eloff},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {1--2},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.10.006},
  doi          = {10.1016/J.COSE.2009.10.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisL10,
  author       = {Dimitris Gritzalis and
                  Javier L{\'{o}}pez},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {521--522},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.03.003},
  doi          = {10.1016/J.COSE.2010.03.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisS10,
  author       = {Dimitris Gritzalis and
                  Pierangela Samarati},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {381--382},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.01.004},
  doi          = {10.1016/J.COSE.2010.01.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GritzalisV10,
  author       = {Dimitris Gritzalis and
                  Sabrina De Capitani di Vimercati},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {165--166},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.004},
  doi          = {10.1016/J.COSE.2009.12.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GritzalisV10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuindeZ10,
  author       = {Nitesh B. Guinde and
                  Sotirios G. Ziavras},
  title        = {Efficient hardware support for pattern matching in network intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {756--769},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.05.001},
  doi          = {10.1016/J.COSE.2010.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuindeZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Hernandez-CastroR10,
  author       = {Carlos Javier Hern{\'{a}}ndez{-}Castro and
                  Arturo Ribagorda},
  title        = {Pitfalls in {CAPTCHA} design and implementation: The Math CAPTCHA,
                  a case study},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {141--157},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.06.006},
  doi          = {10.1016/J.COSE.2009.06.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Hernandez-CastroR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HerranzMNT10,
  author       = {Javier Herranz and
                  Stan Matwin and
                  Jordi Nin and
                  Vicen{\c{c}} Torra},
  title        = {Classifying data from protected statistical datasets},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {875--890},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.05.005},
  doi          = {10.1016/J.COSE.2010.05.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HerranzMNT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HilgenstielerDKS10,
  author       = {Egon Hilgenstieler and
                  Elias P. Duarte Jr. and
                  Glenn Mansfield Keeni and
                  Norio Shiratori},
  title        = {Extensions to the source path isolation engine for precise and efficient
                  log-based {IP} traceback},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {383--392},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.011},
  doi          = {10.1016/J.COSE.2009.12.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HilgenstielerDKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HinarejosMFE10,
  author       = {M. Francisca Hinarejos and
                  Jose L. Mu{\~{n}}oz and
                  Jordi Forn{\'{e}} and
                  Oscar Esparza},
  title        = {{PREON:} An efficient cascade revocation mechanism for delegation
                  paths},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {697--711},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.03.001},
  doi          = {10.1016/J.COSE.2010.03.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HinarejosMFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HolblWB10,
  author       = {Marko H{\"{o}}lbl and
                  Tatjana Welzer and
                  Bostjan Brumen},
  title        = {Two proposed identity-based three-party authenticated key agreement
                  protocols from pairings},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {244--252},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.006},
  doi          = {10.1016/J.COSE.2009.08.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HolblWB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JarrayaL10,
  author       = {Houssem Jarraya and
                  Maryline Laurent},
  title        = {A secure peer-to-peer backup service keeping great autonomy while
                  under the supervision of a provider},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {180--195},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.10.003},
  doi          = {10.1016/J.COSE.2009.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JarrayaL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KantzavelouK10,
  author       = {Ioanna Kantzavelou and
                  Sokratis K. Katsikas},
  title        = {A game-based intrusion detection mechanism to confront internal attackers},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {859--874},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.06.002},
  doi          = {10.1016/J.COSE.2010.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KantzavelouK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KavallarisK10,
  author       = {Theodoros Kavallaris and
                  Vasilios Katos},
  title        = {On the detection of pod slurping attacks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {680--685},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.01.002},
  doi          = {10.1016/J.COSE.2010.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KavallarisK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KolterKP10,
  author       = {Jan Paul Kolter and
                  Thomas Kernchen and
                  G{\"{u}}nther Pernul},
  title        = {Collaborative privacy management},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {580--591},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.007},
  doi          = {10.1016/J.COSE.2009.12.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KolterKP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KritzingerS10,
  author       = {Elmarie Kritzinger and
                  Sebastiaan H. von Solms},
  title        = {Cyber security for home users: {A} new way of protection through awareness
                  enforcement},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {840--847},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.08.001},
  doi          = {10.1016/J.COSE.2010.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KritzingerS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeM10,
  author       = {Seok{-}Won Lee and
                  Mattia Monga},
  title        = {Special issue on software engineering for secure systems},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {299--301},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.01.003},
  doi          = {10.1016/J.COSE.2010.01.003},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeitoldPR10,
  author       = {Herbert Leitold and
                  Reinhard Posch and
                  Thomas R{\"{o}}ssler},
  title        = {Reconstruction of electronic signatures from eDocument printouts},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {523--532},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.002},
  doi          = {10.1016/J.COSE.2009.11.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeitoldPR10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuK10,
  author       = {Fuwen Liu and
                  Hartmut K{\"{o}}nig},
  title        = {A survey of video encryption algorithms},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {3--15},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.06.004},
  doi          = {10.1016/J.COSE.2009.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ManderCN10,
  author       = {Todd Mander and
                  Richard Cheung and
                  Farhad Nabhani},
  title        = {Power system {DNP3} data object security using data sets},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {487--500},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.10.001},
  doi          = {10.1016/J.COSE.2009.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ManderCN10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillanPPG10,
  author       = {Gabriel L{\'{o}}pez Mill{\'{a}}n and
                  Manuel Gil P{\'{e}}rez and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Antonio Fernandez G{\'{o}}mez{-}Skarmeta},
  title        = {PKI-based trust management in inter-domain scenarios},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {278--290},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.004},
  doi          = {10.1016/J.COSE.2009.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MillanPPG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiekerkS10,
  author       = {Johan Van Niekerk and
                  Rossouw von Solms},
  title        = {Information security culture: {A} management perspective},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {476--486},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.10.005},
  doi          = {10.1016/J.COSE.2009.10.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiekerkS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianXS10,
  author       = {Christoforos Ntantogian and
                  Christos Xenakis and
                  Ioannis Stavrakakis},
  title        = {A generic mechanism for efficient authentication in {B3G} networks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {460--475},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.001},
  doi          = {10.1016/J.COSE.2009.11.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianXS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Palmer10,
  author       = {Anthony J. Palmer},
  title        = {Approach for selecting the most suitable Automated Personal Identification
                  Mechanism {(ASMSA)}},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {785--806},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.03.002},
  doi          = {10.1016/J.COSE.2010.03.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Palmer10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PalmieriF10,
  author       = {Francesco Palmieri and
                  Ugo Fiore},
  title        = {Network anomaly detection through nonlinear analysis},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {737--755},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.05.002},
  doi          = {10.1016/J.COSE.2010.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PalmieriF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pavlich-MariscalDM10,
  author       = {Jaime A. Pavlich{-}Mariscal and
                  Steven A. Demurjian and
                  Laurent D. Michel},
  title        = {A framework of composable access control features: Preserving separation
                  of access control concerns from models to code},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {350--379},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.005},
  doi          = {10.1016/J.COSE.2009.11.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pavlich-MariscalDM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pavlich-MariscalDM10a,
  author       = {Jaime A. Pavlich{-}Mariscal and
                  Steven A. Demurjian and
                  Laurent D. Michel},
  title        = {A framework for security assurance of access control enforcement code},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {770--784},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.03.004},
  doi          = {10.1016/J.COSE.2010.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pavlich-MariscalDM10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PhamRMD10,
  author       = {Quan Pham and
                  Jason Reid and
                  Adrian McCullagh and
                  Ed Dawson},
  title        = {On a taxonomy of delegation},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {565--579},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.009},
  doi          = {10.1016/J.COSE.2009.12.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PhamRMD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PirontiS10,
  author       = {Alfredo Pironti and
                  Riccardo Sisto},
  title        = {Provably correct Java implementations of Spi Calculus security protocols
                  specifications},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {302--314},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.001},
  doi          = {10.1016/J.COSE.2009.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PirontiS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RossudowskiVEK10,
  author       = {A. Maciej Rossudowski and
                  Hein S. Venter and
                  Jan H. P. Eloff and
                  Derrick G. Kourie},
  title        = {A security privacy aware architecture and protocol for a single smart
                  card used for multiple services},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {393--409},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.001},
  doi          = {10.1016/J.COSE.2009.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RossudowskiVEK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RuighaverMW10,
  author       = {Anthonie B. Ruighaver and
                  Sean B. Maynard and
                  Matthew J. Warren},
  title        = {Ethical decision making: Improving the quality of acceptable use policies},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {731--736},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.05.004},
  doi          = {10.1016/J.COSE.2010.05.004},
  timestamp    = {Thu, 07 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RuighaverMW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SeewaldG10,
  author       = {Alexander K. Seewald and
                  Wilfried N. Gansterer},
  title        = {On the detection and identification of botnets},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {45--58},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.007},
  doi          = {10.1016/J.COSE.2009.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SeewaldG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShinVA10,
  author       = {Heechang Shin and
                  Jaideep Vaidya and
                  Vijayalakshmi Atluri},
  title        = {Anonymization models for directional location based service environments},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {59--73},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.006},
  doi          = {10.1016/J.COSE.2009.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShinVA10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SommestadEJ10,
  author       = {Teodor Sommestad and
                  Mathias Ekstedt and
                  Pontus Johnson},
  title        = {A probabilistic relational model for security risk analysis},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {659--679},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.02.002},
  doi          = {10.1016/J.COSE.2010.02.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SommestadEJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SorniottiM10,
  author       = {Alessandro Sorniotti and
                  Refik Molva},
  title        = {A provably secure secret handshake with dynamic controlled matching},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {619--627},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.004},
  doi          = {10.1016/J.COSE.2009.11.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SorniottiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SoupionisG10,
  author       = {Yannis Soupionis and
                  Dimitris Gritzalis},
  title        = {Audio {CAPTCHA:} Existing solutions assessment and a new implementation
                  for VoIP telephony},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {5},
  pages        = {603--618},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.003},
  doi          = {10.1016/J.COSE.2009.12.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SoupionisG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spafford10,
  author       = {Eugene H. Spafford},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {641--642},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.06.001},
  doi          = {10.1016/J.COSE.2010.06.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Spafford10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spafford10a,
  author       = {Eugene H. Spafford},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {7},
  pages        = {729--730},
  year         = {2010},
  url          = {https://doi.org/10.1016/S0167-4048(10)00071-4},
  doi          = {10.1016/S0167-4048(10)00071-4},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Spafford10a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spafford10b,
  author       = {Eugene H. Spafford},
  title        = {Security, technology, publishing, and ethics (Part {I)}},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {813--814},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.10.004},
  doi          = {10.1016/J.COSE.2010.10.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Spafford10b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpathoulasK10,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  title        = {Reducing false positives in intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {35--44},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.008},
  doi          = {10.1016/J.COSE.2009.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpathoulasK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StakhanovaBW10,
  author       = {Natalia Stakhanova and
                  Samik Basu and
                  Johnny Wong},
  title        = {On the symbiosis of specification-based and anomaly-based detection},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {253--268},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.007},
  doi          = {10.1016/J.COSE.2009.08.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StakhanovaBW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Su10,
  author       = {Ming{-}Yang Su},
  title        = {{WARP:} {A} wormhole-avoidance routing protocol by anomaly detection
                  in mobile ad hoc networks},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {208--224},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.005},
  doi          = {10.1016/J.COSE.2009.09.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Su10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TheoharidouKG10,
  author       = {Marianthi Theoharidou and
                  Panayiotis Kotzanikolaou and
                  Dimitris Gritzalis},
  title        = {A multi-layer Criticality Assessment methodology based on interdependencies},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {643--658},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.02.003},
  doi          = {10.1016/J.COSE.2010.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TheoharidouKG10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TjhaiFPC10,
  author       = {Gina C. Tjhai and
                  Steven Furnell and
                  Maria Papadaki and
                  Nathan L. Clarke},
  title        = {A preliminary two-stage alarm correlation and filtering system using
                  {SOM} neural network and K-means algorithm},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {712--723},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.02.001},
  doi          = {10.1016/J.COSE.2010.02.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TjhaiFPC10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TolandFE10,
  author       = {Tyrone S. Toland and
                  Csilla Farkas and
                  Caroline M. Eastman},
  title        = {The inference problem: Maintaining maximal availability in the presence
                  of database updates},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {88--103},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.07.004},
  doi          = {10.1016/J.COSE.2009.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TolandFE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VeigaE10,
  author       = {Ad{\'{e}}le da Veiga and
                  Jan H. P. Eloff},
  title        = {A framework and assessment instrument for information security culture},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {2},
  pages        = {196--207},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.09.002},
  doi          = {10.1016/J.COSE.2009.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VeigaE10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZWMM10,
  author       = {Fangwei Wang and
                  Yunkai Zhang and
                  Changguang Wang and
                  Jianfeng Ma and
                  Sang{-}Jae Moon},
  title        = {Stability analysis of a {SEIQV} epidemic model for rapid spreading
                  worms},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {410--418},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.10.002},
  doi          = {10.1016/J.COSE.2009.10.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZWMM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeiP10,
  author       = {Jinpeng Wei and
                  Calton Pu},
  title        = {Modeling and preventing {TOCTTOU} vulnerabilities in Unix-style file
                  systems},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {815--830},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.09.004},
  doi          = {10.1016/J.COSE.2010.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WeiP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Workman10,
  author       = {Michael Workman},
  title        = {A behaviorist perspective on corporate harassment online: Validation
                  of a theoretical model of psychological motives},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {8},
  pages        = {831--839},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2010.09.003},
  doi          = {10.1016/J.COSE.2010.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Workman10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaoHCLD10,
  author       = {Liang Xiao and
                  Bo Hu and
                  Madalina Croitoru and
                  Paul H. Lewis and
                  Srinandan Dasmahapatra},
  title        = {A knowledgeable security model for distributed health information
                  systems},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {3},
  pages        = {331--349},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.08.002},
  doi          = {10.1016/J.COSE.2009.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaoHCLD10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YoonKH10,
  author       = {Ji Won Yoon and
                  Hyoungshick Kim and
                  Jun Ho Huh},
  title        = {Hybrid spam filtering for mobile communication},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {4},
  pages        = {446--459},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.11.003},
  doi          = {10.1016/J.COSE.2009.11.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YoonKH10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouLK10,
  author       = {Chenfeng Vincent Zhou and
                  Christopher Leckie and
                  Shanika Karunasekera},
  title        = {A survey of coordinated attacks and collaborative intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {1},
  pages        = {124--140},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.06.008},
  doi          = {10.1016/J.COSE.2009.06.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouLK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZiYPL10,
  author       = {Xiaochao Zi and
                  Lihong Yao and
                  Li Pan and
                  Jianhua Li},
  title        = {Implementing a passive network covert timing channel},
  journal      = {Comput. Secur.},
  volume       = {29},
  number       = {6},
  pages        = {686--696},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.cose.2009.12.010},
  doi          = {10.1016/J.COSE.2009.12.010},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZiYPL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics