default search action
Computers & Security, Volume 68
Volume 68, July 2017
- Duy Dang-Pham, Siddhi Pittayachawan, Vince Bruno:
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis. 1-15 - Ruan de Clercq, Johannes Götzfried, David Übler, Pieter Maene, Ingrid Verbauwhede:
SOFIA: Software and control flow integrity architecture. 16-35 - Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen, Yogachandran Rahulamathavan:
PIndroid: A novel Android malware detection system using ensemble learning methods. 36-46 - Weixuan Mao, Zhongmin Cai, Don Towsley, Qian Feng, Xiaohong Guan:
Security importance assessment for system objects and malware detection. 47-68 - J. D. Ultra, Susan Pancho-Festin:
A simple model of separation of duty for access control models. 69-80 - Yosef Ashibani, Qusay H. Mahmoud:
Cyber physical systems security: Analysis, challenges and solutions. 81-97 - Ting Dai, Xiaolei Li, Behnaz Hassanshahi, Roland H. C. Yap, Zhenkai Liang:
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication. 98-111 - Christopher W. Badenhop, Scott R. Graham, Benjamin W. P. Ramsey, Barry E. Mullins, Logan O. Mailloux:
The Z-Wave routing protocol and its security implications. 112-129 - Ulrik Franke:
The cyber insurance market in Sweden. 130-144 - Stefan Bauer, Edward W. N. Bernroider, Katharina Chudzikowski:
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. 145-159 - Ahmed Aleroud, Lina Zhou:
Phishing environments, techniques, and countermeasures: A survey. 160-196
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.