default search action
Computers & Security, Volume 80
Volume 80, January 2019
- Nayanamana Samarasinghe, Mohammad Mannan:
Another look at TLS ecosystems in networked devices vs. Web servers. 1-13 - Lu Zhou, Jiageng Chen, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. 14-24 - Kent Marett, Ali Vedadi, Alexandra Durcikova:
A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. 25-35 - Asaf Nadler, Avi Aminov, Asaf Shabtai:
Detection of malicious and low throughput data exfiltration over the DNS protocol. 36-53 - Chamila Wijayarathna, Nalin Asanka Gamagedara Arachchilage:
Why Johnny can't develop a secure application? A usability analysis of Java Secure Socket Extension API. 54-73 - Mark Glenn Evans, Ying He, Leandros A. Maglaras, Helge Janicke:
HEART-IS: A novel technique for evaluating human error-related information security incidents. 74-89 - Ximing Liu, Yingjiu Li, Robert H. Deng, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. 90-107 - Mario Silic:
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. 108-119 - Li Zhang, Vrizlynn L. L. Thing, Yao Cheng:
A scalable and extensible framework for android malware detection and family attribution. 120-133 - Dong Li, Huaqun Guo, Jianying Zhou, Luying Zhou, Jun Wen Wong:
SCADAWall: A CPI-enabled firewall model for SCADA security. 134-154 - Nicolae Paladi, Christian Gehrmann:
SDN Access Control for the Masses. 155-172 - Jaemin Park, Sungjin Park, Brent ByungHoon Kang, Kwangjo Kim:
eMotion: An SGX extension for migrating enclaves. 173-185 - Manuel Cheminod, Luca Durante, Lucia Seno, Fulvio Valenza, Adriano Valenzano:
A comprehensive approach to the automatic refinement and verification of access control policies. 186-199 - Jianping Zeng, Jiangjiao Duan, Chengrong Wu:
Empirical study on lexical sentiment in passwords from Chinese websites. 200-210 - Majed Rajab, Ali Eydgahi:
Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. 211-223 - Visvanathan Naicker, M. Mafaiti:
The establishment of collaboration in managing information security through multisourcing. 224-237 - Lorena González-Manzano, José María de Fuentes:
Design recommendations for online cybersecurity courses. 238-256 - Zhushou Tang, Minhui Xue, Guozhu Meng, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu, Yang Liu:
Securing android applications via edge assistant third-party library detection. 257-272 - Jie Zhang, Zhanyong Tang, Meng Li, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Find me a safe zone: A countermeasure for channel state information based attacks. 273-290 - Chong Guan, Kun Sun, Lingguang Lei, Pingjian Wang, Yuewu Wang, Wei Chen:
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5. 291-305 - Margaret Gratian, Darshan Bhansali, Michel Cukier, Josiah Dykstra:
Identifying infected users via network traffic. 306-316 - Thang Bui, Scott D. Stoller, Jiajie Li:
Greedy and evolutionary algorithms for mining relationship-based access control policies. 317-333
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.