


default search action
Computers & Security, Volume 40
Volume 40, February 2014
- Alessandro Armando
, Serena Elisa Ponta:
Model checking authorization requirements in business processes. 1-22 - Gowtham Ramesh
, Ilango Krishnamurthi:
A comprehensive and efficacious architecture for detecting phishing webpages. 23-37 - Daniel Bachlechner, Stefan Thalmann, Ronald Maier:
Security and compliance challenges in complex IT outsourcing arrangements: A multi-stakeholder perspective. 38-59 - Constantinos Patsakis
, Kleanthis Dellios, Mélanie Bouroche
:
Towards a distributed secure in-vehicle communication architecture for modern vehicles. 60-74 - Jie Yang
, Haitao Liu, Zuping Zhang, Jian Dong
:
Extended DMTP: A new protocol for improved graylist categorization. 75-83 - Christos Xenakis
, Christoforos Ntantogian:
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. 84-94 - Sajal Bhatia
, Desmond Allan Schmidt, George M. Mohay, Alan Tickle:
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events. 95-107 - Dorothy E. Denning:
Framework and principles for active cyber defense. 108-113

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.