


default search action
Computers & Security, Volume 45
Volume 45, September 2014
- Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj
:
Taxonomy of intrusion risk assessment and response system. 1-16 - Mohammed N. Alenezi
, Martin J. Reed:
Uniform DoS traceback. 17-26 - Isredza Rahmi A. Hamid
, Jemal H. Abawajy:
An approach for profiling phishing activities. 27-41 - Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun
:
Information security incident management: Current practice as reported in the literature. 42-57 - Monica Lagazio, Nazneen Sherif, Mike Cushman:
A multi-level approach to understanding the impact of cyber crime on the financial sector. 58-74 - Heloise Pieterse
, Martin S. Olivier
:
Bluetooth Command and Control channel. 75-83 - Vu Duc Nguyen, Yang-Wai Chow
, Willy Susilo
:
On the security of text-based 3D CAPTCHAs. 84-99 - Sebastián García, Martin Grill, Jan Stiborek
, Alejandro Zunino
:
An empirical comparison of botnet detection methods. 100-123 - Abdul Razzaq
, Zahid Anwar, Hafiz Farooq Ahmad
, Khalid Latif
, Rana Faisal Munir:
Ontology for attack detection: An intelligent approach to web application security. 124-146 - Syed Zulkarnain Syed Idrus
, Estelle Cherrier, Christophe Rosenberger
, Patrick Bours:
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords. 147-155 - Chao Shen
, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. 156-171 - Stefan Thalmann
, Daniel Bachlechner, Lukas Demetz, Markus Manhart:
Complexity is dead, long live complexity! How software can help service providers manage security and compliance. 172-185 - José A. Montenegro
, Javier López
:
A practical solution for sealed bid and multi-currency auctions. 186-198 - Aikaterini Mitrokotsa
, Cristina Onete
, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. 199-209 - Hao Zhang, Nenghai Yu, Yonggang Wen, Weiming Zhang:
Towards optimal noise distribution for privacy preserving in data aggregation. 210-230 - Roshan Chitrakar, Chuanhe Huang:
Selection of Candidate Support Vectors in incremental SVM for network intrusion detection. 231-241 - Aditya Oza, Kevin Ross, Richard M. Low, Mark Stamp
:
HTTP attack detection using n-gram analysis. 242-254 - Anca D. Jurcut
, Tom Coffey, Reiner Dojen
:
Design guidelines for security protocols to prevent replay & parallel session attacks. 255-273 - Mario Silic
, Andrea Back:
Shadow IT - A view from behind the curtain. 274-283 - Rennie Archibald, Dipak Ghosal
:
A comparative analysis of detection metrics for covert timing channels. 284-292 - Fred Cohen, Don Cohen:
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations. 293-304 - Nikolaos Tsalis, Dimitris Gritzalis:
Securing cloud and mobility: A practitioner's guide. 305

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.