![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 82
Volume 82, May 2019
- Jian Qiu, Heng-Jian Li, Chuan Zhao:
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. 1-14 - Mordechai Guri, Dima Bykhovsky
:
aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR). 15-29 - Jinyan Wang, Chen Liu, Xingcheng Fu
, Xudong Luo, Xianxian Li:
A three-phase approach to differentially private crucial patterns mining over data streams. 30-48 - Simon S. Woo:
Design and evaluation of 3D CAPTCHAs. 49-67 - Dong Wang
, Zhengquan Xu:
Impact of inaccurate data on Differential Privacy. 68-79 - Krzysztof Opasiak, Wojciech Mazurczyk:
(In)Secure Android Debugging: Security analysis and lessons learned. 80-98 - Idrees Ahmed
, Abid Khan
, Mansoor Ahmed
, Saif Ur Rehman Malik:
Order preserving secure provenance scheme for distributed networks. 99-117 - Deokjin Kim, DaeHee Jang, Minjoon Park, Yunjong Jeong, Jonghwan Kim, Seokjin Choi, Brent ByungHoon Kang:
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure. 118-139 - Clemens Sauerwein, Irdin Pekaric
, Michael Felderer, Ruth Breu:
An analysis and classification of public information security data sources used in research and practice. 140-155 - Markus Ring, Daniel Schlör, Dieter Landes
, Andreas Hotho:
Flow-based network traffic generation using Generative Adversarial Networks. 156-172 - Fei Peng
, Jing Yang
, Zi-Xing Lin, Min Long
:
Source identification of 3D printed objects based on inherent equipment distortion. 173-183 - Denglong Lv, Shibing Zhu:
Achieving correlated differential privacy of big data publication. 184-195 - Fady A. M. Ibrahim, Elsayed E. Hemayed
:
Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review. 196-226 - Mahdi Daghmehchi Firoozjaei
, MinChang Kim, JaeSeung Song, Hyoungshick Kim
:
O2TR: Offline OTR messaging system under network disruption. 227-240 - Karen Renaud
, Robert F. Otondo
, Merrill Warkentin
:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? 241-260 - Yun Zhou
, Peichao Wang:
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. 261-269 - Jane Henriksen-Bulmer
, Shamal Faily
, Sheridan Jeary
:
Privacy risk assessment in context: A meta-model based on contextual integrity. 270-283 - Jisa David, Ciza Thomas:
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. 284-295 - Nurit Gal-Oz
, Yaron Gonen, Ehud Gudes:
Mining meaningful and rare roles from web application usage patterns. 296-313 - Jelena Milosevic, Miroslaw Malek
, Alberto Ferrante:
Time, accuracy and power consumption tradeoff in mobile malware detection systems. 314-328
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.