default search action
Computers & Security, Volume 77
Volume 77, August 2018
- Muhammad Ajmal Azad, Ricardo Morla, Khaled Salah:
Systems and methods for SPIT detection in VoIP: Survey and future directions. 1-20 - Barnana Baruah, Subhasish Dhal:
A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System. 21-35 - Bodhi Chakraborty, Shekhar Verma, Krishna Pratap Singh:
Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks. 36-48 - Tianchong Gao, Feng Li:
Studying the utility preservation in social network anonymization via persistent homology. 49-64 - Eric J. E. Molin, Kirsten Meeuwisse, Wolter Pieters, Caspar G. Chorus:
Secure or usable computers? Revealing employees' perceptions and trade-offs by means of a discrete choice experiment. 65-78 - Peng Xun, Peidong Zhu, Sabita Maharjan, Pengshuai Cui:
Successive direct load altering attack in smart grid. 79-93 - Ercan Nurcan Yilmaz, Serkan Gönen:
Attack detection/prevention system against cyber attack in industrial control systems. 94-105 - Josep Lluís Ferrer-Gomila, M. Francisca Hinarejos, Llorenç Huguet i Rotger:
A survey on electronic coupons. 106-127 - Kylie Molinaro, Matthew L. Bolton:
Evaluating the applicability of the double system lens model to the analysis of phishing email judgments. 128-137 - Daiki Chiba, Mitsuaki Akiyama, Takeshi Yagi, Kunio Hato, Tatsuya Mori, Shigeki Goto:
DomainChroma: Building actionable threat intelligence from malicious domain names. 138-161 - Oyindamola Oluwatimi, Maria Luisa Damiani, Elisa Bertino:
A context-aware system to secure enterprise content: Incorporating reliability specifiers. 162-178 - Iraklis Symeonidis, Gergely Biczók, Fatemeh Shirazi, Cristina Pérez-Solà, Jessica Schroers, Bart Preneel:
Collateral damage of Facebook third-party applications: a comprehensive study. 179-208 - Alberto Geniola, Markku Antikainen, Tuomas Aura:
Automated analysis of freeware installers promoted by download portals. 209-225 - Nina Gerber, Paul Gerber, Melanie Volkamer:
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior. 226-261 - Rafal Leszczyna:
A review of standards with cybersecurity requirements for smart grid. 262-276 - Vinu Sundararaj, Selvi Muthukumar, R. S. Kumar:
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks. 277-288 - Rabah AlShboul, Fadi A. Thabtah, Neda Abdelhamid, Mofleh Al-Diabat:
A visualization cybersecurity method based on features' dissimilarity. 289-303 - R. Vijayanand, D. Devaraj, Kannapiran Balasubramanian:
Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection. 304-314 - Brahim Hamid, Donatus Weber:
Engineering secure systems: Models, patterns and empirical validation. 315-348 - Urvashi Garg, Geeta Sikka, Lalit Kumar Awasthi:
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities. 349-359 - Madeline Cheah, Siraj A. Shaikh, Jeremy W. Bryans, Paul Wooderson:
Building an automotive security assurance case using systematic security evaluations. 360-379 - Pelin Angin, Bharat K. Bhargava, Rohit Ranchal:
A self-protecting agents based model for high-performance mobile-cloud computing. 380-396 - Gábor Lencse, Youki Kadobayashi:
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64. 397-411 - Tianqiang Huang, Xueli Zhang, Wei Huang, Lingpeng Lin, Weifeng Su:
A multi-channel approach through fusion of audio for detecting video inter-frame forgery. 412-426 - Mashael AlSabah, Gabriele Oligeri, Ryan Riley:
Your culture is in your password: An analysis of a demographically-diverse password dataset. 427-441 - Waqar Khalid, Zahid Ullah, Naveed Ahmed, Yue Cao, Muhammad Khalid, Muhammad Arshad, Farhan Ahmad, Haitham S. Cruickshank:
A taxonomy on misbehaving nodes in delay tolerant networks. 442-471 - Christos Lyvas, Costas Lambrinoudakis, Dimitris Geneiatakis:
Dypermin: Dynamic permission mining framework for android platform. 472-487 - Zhaowei Hu, Jing Yang, Jianpei Zhang:
Trajectory privacy protection method based on the time interval divided. 488-499 - Lukas Malina, Petr Dzurenda, Jan Hajny, Zdenek Martinasek:
Secure and efficient two-factor zero-knowledge authentication solution for access control systems. 500-513 - Samiran Bag, Muhammad Ajmal Azad, Feng Hao:
A privacy-aware decentralized and personalized reputation system. 514-530 - Thiago Alves, Rishabh Das, Aaron Werth, Thomas H. Morris:
Virtualization of SCADA testbeds for cybersecurity research: A modular approach. 531-546 - Xiaofang Xia, Yang Xiao, Wei Liang, Meng Zheng:
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid. 547-564 - Nadher Al-Safwani, Yousef Fazea, Huda Ibrahim:
ISCP: In-depth model for selecting critical security controls. 565-577 - Matilda Rhode, Pete Burnap, Kevin Jones:
Early-stage malware prediction using recurrent neural networks. 578-594 - Marta Beltrán:
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things. 595-611 - Li Yang, Teng Wei, Fengwei Zhang, Jianfeng Ma:
SADUS: Secure data deletion in user space for mobile devices. 612-626 - Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan:
UFace: Your universal password that no one can see. 627-641 - Jun Jiang, Bowei Xi, Murat Kantarcioglu:
Spatial counts under differential privacy mechanism on changing spatial scales. 642-652 - Koray Mancuhan, Chris Clifton:
Support vector classification with ℓ-diversity. 653-665 - Javad Darivandpour, Mikhail J. Atallah:
Efficient and secure pattern matching with wildcards using lightweight cryptography. 666-674 - Padma Polash Paul, Madeena Sultana, Sorin Adam Matei, Marina L. Gavrilova:
Authorship disambiguation in a collaborative editing environment. 675-693 - Christian Grothoff, Matthias Wachs, Monika Ermert, Jacob Appelbaum:
Toward secure name resolution on the internet. 694-708 - Hu Chun, Kui Ren, Wei Jiang:
Privacy-preserving power usage and supply control in smart grid. 709-719 - Seulbae Kim, Heejo Lee:
Software systems at risk: An empirical study of cloned vulnerabilities in practice. 720-736 - Zhongshu Gu, Brendan Saltaformaggio, Xiangyu Zhang, Dongyan Xu:
Gemini: Guest-transparent honey files via hypervisor-level access redirection. 737-744 - Reham Abdellatif Abouhogail, Mohammed S. Gadelrab:
A new secure and privacy preserved protocol for IEEE802.11s networks. 745-755 - Paul Black, Iqbal Gondal, Robert Layton:
A survey of similarities in banking malware behaviours. 756-772 - Ruben Rios, M. Carmen Fernández Gago, Javier López:
Modelling privacy-aware trust negotiations. 773-789 - Sungjin Kim, Jinkook Kim, Brent ByungHoon Kang:
Malicious URL protection based on attackers' habitual behavioral analysis. 790-806 - Eva Weishäupl, Emrah Yasasin, Guido Schryen:
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning. 807-823 - Hojoon Lee, Minsu Kim, Yunheung Paek, Brent ByungHoon Kang:
A dynamic per-context verification of kernel address integrity from external monitors. 824-837 - Kholood Al Tabash, Jassim Happa:
Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles. 838-859 - Silas Formunyuy Verkijika:
Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret. 860-870 - Sang Ni, Quan Qian, Rui Zhang:
Malware identification using visualization images and deep learning. 871-885
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.