


default search action
Computers & Security, Volume 34
Volume 34, May 2013
- Eugene H. Spafford
:
Editorial. iv - Olga Kussul, Nataliia Kussul
, Sergii Skakun
:
Assessing security threat scenarios for utility-based reputation model in grids. 1-15 - Amin Hassanzadeh, Radu Stoleru:
On the optimality of cooperative intrusion detection for resource constrained wireless networks. 16-35 - Gyu-Sang Cho:
A computer forensic method for detecting timestamp forgery in NTFS. 36-46 - Alexios Mylonas
, Anastasia Kastania, Dimitris Gritzalis:
Delegate the smartphone user? Security awareness in smartphone platforms. 47-66 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres
, José María de Fuentes
, Benjamín Ramos:
A taxonomy and survey of attacks on digital signatures. 67-112 - Khaled Salah
, José M. Alcaraz Calero
, Jorge Bernal Bernabé
, Juan Manuel Marín Pérez, Sherali Zeadally:
Analyzing the security of Windows 7 and Linux for cloud computing. 113-122 - Venkatesh Ramanathan, Harry Wechsler:
Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation. 123-139

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.