


default search action
Computers & Security, Volume 44
Volume 44, July 2014
- Jeb Webb, Atif Ahmad
, Sean B. Maynard
, Graeme G. Shanks
:
A situation awareness model for information security risk management. 1-15 - Yki Kortesniemi, Mikko Särelä:
Survey of certificate usage in distributed access control. 16-32 - Erez Shmueli, Ronen Vaisenberg, Ehud Gudes, Yuval Elovici:
Implementing a database encryption solution, design and implementation issues. 33-50 - Mehmet Ercan Nergiz, Muhammed Zahit Gök:
Hybrid k-Anonymity. 51-63 - Martin Kirchner, Edgar R. Weippl
:
Securing Cloud and Mobility. 64 - Yuxin Ding, Wei Dai, Shengli Yan, Yumei Zhang:
Control flow-based opcode behavior analysis for Malware detection. 65-74 - Seyed Hossein Ahmadinejad, Philip W. L. Fong:
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems. 75-91 - Sancheng Peng, Min Wu, Guojun Wang, Shui Yu
:
Propagation model of smartphone worms based on semi-Markov process and social relationship graph. 92-103 - Young-Su Jang, Jin-Young Choi
:
Detecting SQL injection attacks using query result size. 104-118

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.