default search action
Computers & Security, Volume 43
Volume 43, June 2014
- Eugene H. Spafford:
Editorial. iv - Asaf Shabtai, Lena Tenenboim-Chekina, Dudu Mimran, Lior Rokach, Bracha Shapira, Yuval Elovici:
Mobile malware detection through analysis of deviations in application network behavior. 1-18 - Alireza Tamjidyamcholo, Mohd Sapiyan Bin Baba, Nor Liyana Mohd Shuib, Vala Ali Rohani:
Evaluation model for knowledge sharing in information security professional virtual community. 19-34 - Elias Bou-Harb, Mourad Debbabi, Chadi Assi:
On fingerprinting probing activities. 35-48 - Feng Zhu, Jinpeng Wei:
Static analysis based invariant detection for commodity operating systems. 49-63 - Mitchell Kajzer, John D'Arcy, Charles R. Crowell, Aaron Striegel, Dirk Van Bruggen:
An exploratory investigation of message-person congruence in information security awareness campaigns. 64-76 - Kyle O. Bailey, James S. Okolica, Gilbert L. Peterson:
User identification and authentication using multi-modal behavioral biometrics. 77-89 - Waldo Rocha Flores, Egil Antonsen, Mathias Ekstedt:
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture. 90-110 - Cosima Rughinis, Razvan Rughinis:
Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union. 111-125 - Xabier Ugarte-Pedrero, Igor Santos, Iván García-Ferreira, Sergio Huerta, Borja Sanz, Pablo García Bringas:
On the adoption of anomaly detection for packed executable filtering. 126-144 - Nikos Vrakas, Dimitris Geneiatakis, Costas Lambrinoudakis:
Obscuring users' identity in VoIP/IMS environments. 145-158 - Lorena González-Manzano, Ana Isabel González-Tablas Ferreres, José María de Fuentes, Arturo Ribagorda:
SoNeUCONABC, an expressive usage control model for Web-Based Social Networks. 159-187 - George Stergiopoulos, Dimitris Gritzalis:
A Bug Hunter's Diary. 188 - Weizhi Meng, Wenjuan Li, Lam-for Kwok:
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism. 189-204 - Zheran Fang, Weili Han, Yingjiu Li:
Permission based Android security: Issues and countermeasures. 205-218
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.