


default search action
Computers & Security, Volume 60
Volume 60, July 2016
- Nikolaos Alexiou, Stylianos Basagiannis
, Sophia G. Petridou
:
Formal security analysis of near field communication using model checking. 1-14 - Chris I. Djamaludin, Ernest Foo
, Seyit Ahmet Çamtepe
, Peter Corke
:
Revocation and update of trust in autonomous delay tolerant networks. 15-36 - Justin Scott Giboney
, Jeffrey Gainer Proudfoot, Sanjay Goel, Joseph S. Valacich
:
The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise. 37-51 - Gang Liu
, Runnan Zhang, Huimin Song, Can Wang, Jinhui Liu
, Aijun Liu:
Ts-RBAC: A RBAC model with transformation. 52-61 - Christos Xenakis
, Christoforos Ntantogian, Orestis Panos:
(U)SimMonitor: A mobile application for security evaluation of cellular networks. 62-78 - Barsha Mitra, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Mining temporal roles using many-valued concepts. 79-94 - Guido Schryen, Gerit Wagner
, Alexander Schlegel
:
Development of two novel face-recognition CAPTCHAs: A security and usability study. 95-116 - Jose M. Such, Antonios Gouglidis
, William Knowles, Gaurav Misra, Awais Rashid
:
Information assurance techniques: Perceived cost effectiveness. 117-133 - Paulo Henrique Pisani, Romain Giot
, André C. P. L. F. de Carvalho
, Ana Carolina Lorena:
Enhanced template update: Application to keystroke dynamics. 134-153 - Florian Skopik
, Giuseppe Settanni, Roman Fiedler:
A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing. 154-176 - Wenjuan Li
, Weizhi Meng
, Xiapu Luo
, Lam-for Kwok
:
MVPSys: Toward practical multi-view based false alarm reduction system in network intrusion detection. 177-192 - Victor Sucasas
, Georgios Mantas
, Firooz B. Saghezchi
, Ayman Radwan
, Jonathan Rodriguez:
An autonomous privacy-preserving authentication scheme for intelligent transportation systems. 193-205 - Debabrata Kar
, Suvasini Panigrahi, Srikanth Sundararajan:
SQLiGoT: Detecting SQL injection attacks using graph of tokens and SVM. 206-225

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.