


default search action
Computers & Security, Volume 69
Volume 69, August 2017
- Xinyi Huang, Joseph K. Liu, Javier López:
Editorial: Special issue on security data science and cyber threat management. 1-2 - Miltiadis Kandias, Dimitris Gritzalis, Vasilis Stavrou, Kostas Nikoloulis
:
Stress level detection via OSN usage pattern and chronicity analysis: An OSINT threat intelligence module. 3-17 - Matthew Edwards
, Robert Larson, Benjamin Green, Awais Rashid
, Alistair Baron
:
Panning for gold: Automatically analysing online social engineering attack surfaces. 18-34 - Shigang Liu, Yu Wang
, Jun Zhang
, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. 35-49 - Peng Jiang, Yi Mu, Fuchun Guo
, Qiaoyan Wen:
Secure-channel free keyword search with authorization in manager-centric databases. 50-64 - Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou
, Tsuyoshi Takagi:
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. 65-83 - Lu Zhou, Youwen Zhu, Aniello Castiglione
:
Efficient k-NN query over encrypted data in cloud with limited key-disclosure and offline data owner. 84-96 - Zhe Liu
, Kim-Kwang Raymond Choo
, Minghao Zhao:
Practical-oriented protocols for privacy-preserving outsourced big data analysis: Challenges and future research directions. 97-113 - Guowen Xu
, Hongwei Li, Chen Tan, Dongxiao Liu, Yuanshun Dai, Kan Yang
:
Achieving efficient and privacy-preserving truth discovery in crowd sensing systems. 114-126 - José María de Fuentes
, Lorena González-Manzano
, Juan E. Tapiador
, Pedro Peris-Lopez
:
PRACIS: Privacy-preserving and aggregatable cybersecurity information sharing. 127-141 - Min Cherng Lee
, Robin Mitra
, Emmanuel Lazaridis, An Chow Lai, Yong Kheng Goh
, Wun-She Yap
:
Data privacy preserving scheme using generalised linear models. 142-154 - Mitsuaki Akiyama
, Takeshi Yagi, Takeshi Yada, Tatsuya Mori
, Youki Kadobayashi:
Analyzing the ecosystem of malicious URL redirection through longitudinal observation from honeypots. 155-173

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.