


default search action
Computers & Security, Volume 49
Volume 49, March 2015
- Canh Ngo, Yuri Demchenko
, Cees de Laat:
Decision Diagrams for XACML Policy Evaluation and Management. 1-16 - Mohammad Masdari, Sam Jabbehdari
, Jamshid Bagherzadeh
, Ahmad Khadem-Zadeh:
Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks. 17-27 - Daniel Abril
, Guillermo Navarro-Arribas
, Vicenç Torra
:
Spherical microaggregation: Anonymizing sparse vector spaces. 28-44 - Nurul Hidayah Ab Rahman
, Kim-Kwang Raymond Choo
:
A survey of information security incident handling in the cloud. 45-69 - Michael Robinson, Kevin I. Jones, Helge Janicke
:
Cyber warfare: Issues and challenges. 70-94 - Dae Wook Kim
, Peiying Yan, Junjie Zhang:
Detecting fake anti-virus software distribution webpages. 95-106 - Ahmed Patel, Samaher Al-Janabi
, Ibrahim AlShourbaji
, Jens Myrup Pedersen
:
A novel methodology towards a trusted environment in mashup web applications. 107-122 - Giray Kömürcü, Ali Emre Pusane, Günhan Dündar
:
An efficient grouping method and error probability analysis for RO-PUFs. 123-131 - Yixuan Zhang, Jingsha He, Bin Zhao, Zhiqing Huang, Ruohong Liu:
Towards more pro-active access control in computer systems and networks. 132-146 - Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:
SENTINEL: Securing Legacy Firefox Extensions. 147-161 - Adéle da Veiga
, Nico Martins
:
Improving the information security culture through monitoring and implementation actions illustrated through a case study. 162-176 - Jordan Shropshire, Merrill Warkentin
, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. 177-191 - Dimitris Geneiatakis
, Igor Nai Fovino, Ioannis Kounelis, Pasquale Stirparo:
A Permission verification approach for android mobile applications. 192-205 - Ali Ahmadian Ramaki, Morteza Amini
, Reza Ebrahimi Atani
:
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection. 206-219 - Ginés Dólera Tormo, Félix Gómez Mármol
, Gregorio Martínez Pérez
:
Towards privacy-preserving reputation management for hybrid broadcast broadband applications. 220-238 - Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng
:
Privacy leakage analysis in online social networks. 239-254 - Karim O. Elish, Xiaokui Shu, Danfeng (Daphne) Yao
, Barbara G. Ryder, Xuxian Jiang:
Profiling user-trigger dependence for Android malware detection. 255-273 - George Stergiopoulos, Dimitris Gritzalis:
Hacking and Penetration Testing with Low Power Devices. 274-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.