Search dblp for Publications

export results for "toc:db/journals/compsec/compsec78.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlvesM18,
  author       = {Thiago Alves and
                  Thomas H. Morris},
  title        = {OpenPLC: An {IEC} 61, 131-3 compliant open source industrial controller
                  for cyber security research},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {364--379},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.007},
  doi          = {10.1016/J.COSE.2018.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlvesM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiARTB18,
  author       = {Eirini Anthi and
                  Shazaib Ahmad and
                  Omer F. Rana and
                  George Theodorakopoulos and
                  Pete Burnap},
  title        = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {477--490},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.016},
  doi          = {10.1016/J.COSE.2018.07.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnthiARTB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeuranTPCTS18,
  author       = {Razvan Beuran and
                  Dat Tang and
                  Cuong Pham and
                  Ken{-}ichi Chinen and
                  Yasuo Tan and
                  Yoichi Shinoda},
  title        = {Integrated framework for hands-on cybersecurity training: CyTrONE},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {43--59},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.001},
  doi          = {10.1016/J.COSE.2018.06.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeuranTPCTS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BottarelliEIKA18,
  author       = {Mirko Bottarelli and
                  Gregory Epiphaniou and
                  Dhouha Kbaier Ben Ismail and
                  Petros Karadimas and
                  Haider M. Al{-}Khateeb},
  title        = {Physical characteristics of wireless communication channels for secret
                  key establishment: {A} survey of the research},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {454--476},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.08.001},
  doi          = {10.1016/J.COSE.2018.08.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BottarelliEIKA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CarrascoS18,
  author       = {Rafael San{-}Miguel Carrasco and
                  Miguel{-}{\'{A}}ngel Sicilia},
  title        = {Unsupervised intrusion detection through skip-gram models of network
                  behavior},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {187--197},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.003},
  doi          = {10.1016/J.COSE.2018.07.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CarrascoS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChongGLP18,
  author       = {Isis Chong and
                  Huangyi Ge and
                  Ninghui Li and
                  Robert W. Proctor},
  title        = {Influence of privacy priming and security framing on mobile app selection},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {143--154},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.005},
  doi          = {10.1016/J.COSE.2018.06.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChongGLP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DalmazoVC18,
  author       = {Bruno Lopes Dalmazo and
                  Jo{\~{a}}o P. Vilela and
                  Mar{\'{\i}}lia Curado},
  title        = {Triple-Similarity Mechanism for alarm management in the cloud},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {33--42},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.016},
  doi          = {10.1016/J.COSE.2018.05.016},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DalmazoVC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GeethaJJ18,
  author       = {P. Geetha and
                  V. S. Jayanthi and
                  A. N. Jayanthi},
  title        = {Optimal visual cryptographic scheme with multiple share creation for
                  multimedia applications},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {301--320},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.009},
  doi          = {10.1016/J.COSE.2018.07.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GeethaJJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuerarMMP18,
  author       = {Meriem Guerar and
                  Alessio Merlo and
                  Mauro Migliardi and
                  Francesco Palmieri},
  title        = {Invisible {CAPPCHA:} {A} usable mechanism to distinguish between malware
                  and humans on the mobile IoT},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {255--266},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.007},
  doi          = {10.1016/J.COSE.2018.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuerarMMP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HablerS18,
  author       = {Edan Habler and
                  Asaf Shabtai},
  title        = {Using {LSTM} encoder-decoder algorithm for detecting anomalous {ADS-B}
                  messages},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {155--173},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.004},
  doi          = {10.1016/J.COSE.2018.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HablerS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HammiHBS18,
  author       = {Mohamed Tahar Hammi and
                  Badis Hammi and
                  Patrick Bellot and
                  Ahmed Serhrouchni},
  title        = {Bubbles of Trust: {A} decentralized blockchain-based authentication
                  system for IoT},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {126--142},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.004},
  doi          = {10.1016/J.COSE.2018.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HammiHBS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaqCCJ18,
  author       = {Irfan Ul Haq and
                  Sergio Chica and
                  Juan Caballero and
                  Somesh Jha},
  title        = {Malware lineage in the wild},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {347--363},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.012},
  doi          = {10.1016/J.COSE.2018.07.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaqCCJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeartfieldLBBFF18,
  author       = {Ryan Heartfield and
                  George Loukas and
                  Sanja Budimir and
                  Anatolij Bezemskij and
                  Johnny R. J. Fontaine and
                  Avgoustinos Filippoupolitis and
                  Etienne B. Roesch},
  title        = {A taxonomy of cyber-physical threats and impact in the smart home},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {398--428},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.011},
  doi          = {10.1016/J.COSE.2018.07.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeartfieldLBBFF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuZMH18,
  author       = {Qiao Hu and
                  Jingyi Zhang and
                  Aikaterini Mitrokotsa and
                  Gerhard P. Hancke},
  title        = {Tangible security: Survey of methods supporting secure ad-hoc connects
                  of edge devices with physical context},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {281--300},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.009},
  doi          = {10.1016/J.COSE.2018.06.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZMH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinLPJ18,
  author       = {Lei Jin and
                  Chao Li and
                  Balaji Palanisamy and
                  James Joshi},
  title        = {\emph{k-Trustee}: Location injection attack-resilient anonymization
                  for location privacy},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {212--230},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.002},
  doi          = {10.1016/J.COSE.2018.07.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinLPJ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KwonKPYC18,
  author       = {Hyun Kwon and
                  Yongchul Kim and
                  Ki{-}Woong Park and
                  Hyunsoo Yoon and
                  Daeseon Choi},
  title        = {Friend-safe evasion attack: An adversarial example that is correctly
                  recognized by a friendly classifier},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {380--397},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.015},
  doi          = {10.1016/J.COSE.2018.07.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KwonKPYC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Moreno-SanchezM18,
  author       = {Pedro Moreno{-}Sanchez and
                  Uzair Mahmood and
                  Aniket Kate},
  title        = {ClearChart: Ensuring integrity of consumer ratings in online marketplaces},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {90--102},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.04.014},
  doi          = {10.1016/J.COSE.2018.04.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Moreno-SanchezM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MyersSRF18,
  author       = {David Myers and
                  Suriadi Suriadi and
                  Kenneth Radke and
                  Ernest Foo},
  title        = {Anomaly detection for industrial control systems using process mining},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {103--125},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.002},
  doi          = {10.1016/J.COSE.2018.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MyersSRF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NavarroNGRD18,
  author       = {Luiz C. Navarro and
                  Alexandre K. W. Navarro and
                  Andr{\'{e}} Gr{\'{e}}gio and
                  Anderson Rocha and
                  Ricardo Dahab},
  title        = {Leveraging ontologies and machine-learning techniques for malware
                  analysis into Android permissions ecosystems},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {429--453},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.013},
  doi          = {10.1016/J.COSE.2018.07.013},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NavarroNGRD18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Nguyen18,
  author       = {Huu Hiep Nguyen},
  title        = {Privacy-preserving mechanisms for k-modes clustering},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {60--75},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.003},
  doi          = {10.1016/J.COSE.2018.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Nguyen18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NguyenM18,
  author       = {Toan Nguyen and
                  Nasir D. Memon},
  title        = {Tap-based user authentication for smartwatches},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {174--186},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.001},
  doi          = {10.1016/J.COSE.2018.07.001},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NguyenM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NyangKLKCLM18,
  author       = {DaeHun Nyang and
                  Hyoungshick Kim and
                  Woojoo Lee and
                  Sung{-}bae Kang and
                  Geumhwan Cho and
                  Mun{-}Kyu Lee and
                  Aziz Mohaisen},
  title        = {Two-Thumbs-Up: Physical protection for {PIN} entry secure against
                  recording attacks},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {1--15},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.012},
  doi          = {10.1016/J.COSE.2018.05.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NyangKLKCLM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenaudFWCO18,
  author       = {Karen Renaud and
                  Stephen Flowerday and
                  Merrill Warkentin and
                  Paul Cockshott and
                  Craig P. Orgeron},
  title        = {Is the responsibilization of the cyber security risk reasonable and
                  judicious?},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {198--211},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.006},
  doi          = {10.1016/J.COSE.2018.06.006},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RenaudFWCO18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShamsRU18,
  author       = {Erfan A. Shams and
                  Ahmet Rizaner and
                  Ali Hakan Ulusoy},
  title        = {Trust aware support vector machine intrusion detection and prevention
                  system in vehicular ad hoc networks},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {245--254},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.06.008},
  doi          = {10.1016/J.COSE.2018.06.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShamsRU18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenMCQBK18,
  author       = {Lixiang Shen and
                  Dejun Mu and
                  Guo Cao and
                  Maoyuan Qin and
                  Jeremy Blackstone and
                  Ryan Kastner},
  title        = {Symbolic execution based test-patterns generation algorithm for hardware
                  Trojan detection},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {267--280},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.006},
  doi          = {10.1016/J.COSE.2018.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenMCQBK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TripathyDJB18,
  author       = {Bata Krishna Tripathy and
                  Debi Prasad Das and
                  Swagat Kumar Jena and
                  Padmalochan Bera},
  title        = {Risk based Security Enforcement in Software Defined Network},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {321--335},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.010},
  doi          = {10.1016/J.COSE.2018.07.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TripathyDJB18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ViegasSOFJP18,
  author       = {Eduardo Viegas and
                  Altair Olivo Santin and
                  Luiz Oliveira and
                  Andr{\'{e}} Fran{\c{c}}a and
                  Ricardo P. Jasinski and
                  Volnei A. Pedroni},
  title        = {A reliable and energy-efficient classifier combination scheme for
                  intrusion detection in embedded systems},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {16--32},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.014},
  doi          = {10.1016/J.COSE.2018.05.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ViegasSOFJP18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WaltEG18,
  author       = {Est{\'{e}}e van der Walt and
                  Jan H. P. Eloff and
                  Jacomine Grobler},
  title        = {Cyber-security: Identity deception detection on social media platforms},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {76--89},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.05.015},
  doi          = {10.1016/J.COSE.2018.05.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WaltEG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuCDY18,
  author       = {Zezhi Wu and
                  Xingyuan Chen and
                  Xuehui Du and
                  Zhi Yang},
  title        = {CDroid: practically implementation a formal-analyzed {CIFC} model
                  on Android},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {231--244},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.005},
  doi          = {10.1016/J.COSE.2018.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuCDY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YaoCH18,
  author       = {Mei{-}Ling Yao and
                  Ming{-}Chuen Chuang and
                  Chun{-}Cheng Hsu},
  title        = {The Kano model analysis of features for mobile security applications},
  journal      = {Comput. Secur.},
  volume       = {78},
  pages        = {336--346},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2018.07.008},
  doi          = {10.1016/J.COSE.2018.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YaoCH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics