


default search action
Computers & Security, Volume 59
Volume 59, June 2016
- Sofia-Anna Menesidou
, Dimitrios Vardalis, Vasilios Katos
:
Automated key exchange protocol evaluation in delay tolerant networks. 1-8 - Kevin A. Barton
, Gurvirender P. Tejay, Michael Lane
, Steve Terrell:
Information system security commitment: A study of external influences on senior management. 9-25 - Waldo Rocha Flores, Mathias Ekstedt:
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. 26-44 - Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:
Secure, efficient and revocable multi-authority access control system in cloud storage. 45-59 - Chunghun Lee, Choong C. Lee, Suhyun Kim:
Understanding information security stress: Focusing on the type of information security compliance activity. 60-70 - Kamran Morovati
, Sanjay Kadam
, Ali A. Ghorbani:
A network based document management model to prevent data extrusion. 71-91 - Mohsin Junaid
, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models. 92-117 - José Camacho
, Alejandro Pérez-Villegas, Pedro García-Teodoro, Gabriel Maciá-Fernández
:
PCA-based multivariate statistical network monitoring for anomaly detection. 118-137 - Hsin-Yi Sandy Tsai, Mengtian Jiang
, Saleem Alhabash, Robert LaRose, Nora J. Rifon, Shelia R. Cotten:
Understanding online safety behaviors: A protection motivation theory perspective. 138-150 - Wassim El-Hajj, Ghassen Ben Brahim
, Hazem M. Hajj, Haïdar Safa, Ralph Adaimy:
Security-by-construction in web applications development via database annotations. 151-165 - Jonathan J. Davis, Ernest Foo
:
Automated feature engineering for HTTP tunnel detection. 166-185 - Francois Mouton
, Louise Leenen, H. S. Venter
:
Social engineering attack examples, templates and scenarios. 186-209 - Pin Shen Teh
, Ning Zhang, Andrew Beng Jin Teoh
, Ke Chen:
A survey on touch dynamics authentication in mobile devices. 210-235 - Liliana Pasquale, Sorren Hanvey, Mark Mcgloin, Bashar Nuseibeh
:
Adaptive evidence collection in the cloud using attack scenarios. 236-254

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.