


default search action
Computers & Security, Volume 56
Volume 56, February 2016
- Yulia Cherdantseva
, Pete Burnap
, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart
:
A review of cyber security risk assessment methods for SCADA systems. 1-27 - Fabio Pierazzi
, Sara Casolari, Michele Colajanni
, Mirco Marchetti
:
Exploratory security analytics for anomaly detection. 28-49 - Diego A. López García
:
A flexible e-voting scheme for debate tools. 50-62 - Gurpreet Dhillon
, Romilla Syed, Cristiane Pedron
:
Interpreting information security culture: An organizational transformation case study. 63-69 - Nader Sohrabi Safa
, Rossouw von Solms, Steven Furnell
:
Information security policy compliance model in organizations. 70-82 - Gizem Ögütçü, Özlem Müge Testik
, Oumout Chouseinoglou
:
Analysis of personal information security behavior and awareness. 83-93 - Christian D'Orazio, Kim-Kwang Raymond Choo
:
An adversary model to evaluate DRM protection of video contents on iOS devices. 94-110 - Karanpreet Singh, Paramvir Singh, Krishan Kumar
:
A systematic review of IP traceback schemes for denial of service attacks. 111-139 - Mun-Kyu Lee, Hyeonjin Nam, Dong Kyue Kim:
Secure bimodal PIN-entry method using audio signals. 140-150 - Graeme Horsman:
The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. 151-162

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.