default search action
Computers & Security, Volume 85
Volume 85, August 2019
- Tahir Musa Ibrahim, Shafii Muhammad Abdulhamid, Ala Abdulsalam Alarood, Haruna Chiroma, Mohammed Ali Al-garadi, Nadim Rana, Amina Nuhu Muhammad, Adamu I. Abubakar, Khalid Haruna, Lubna Abdel Kareim Gabralla:
Recent advances in mobile touch screen security authentication methods: A systematic literature review. 1-24 - Shikha Badhani, Sunil Kumar Muttoo:
CENDroid - A cluster-ensemble classifier for detecting malicious Android applications. 25-40 - Bei Ye, Yajun Guo, Lei Zhang, Xiaowei Guo:
An empirical study of mnemonic password creation tips. 41-50 - Luying Zhou, Huaqun Guo, Gelei Deng:
A fog computing based approach to DDoS mitigation in IIoT systems. 51-62 - Jing-Lei Tan, Cheng Lei, Hongqi Zhang, Yu-qiao Cheng:
Optimal strategy selection approach to moving target defense based on Markov robust game. 63-76 - Congyuan Xu, Jizhong Shen, Xin Du:
Detection method of domain names generated by DGAs based on semantic representation and deep neural network. 77-88 - Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm. 89-106 - Ping Wang, Xing He, Yushu Zhang, Wenying Wen, Ming Li:
A robust and secure image sharing scheme with personal identity information embedded. 107-121 - Brijesh Kashyap Chejerla, Sanjay Kumar Madria:
Information fusion architecture for secure cyber physical systems. 122-137 - Domhnall Carlin, Philip O'Kane, Sakir Sezer:
A cost analysis of machine learning using dynamic runtime opcodes for malware detection. 138-155 - Matthias Eckhart, Kristof Meixner, Dietmar Winkler, Andreas Ekelhart:
Securing the testing process for industrial automation software. 156-180 - Zhiwen Pan, Salim Hariri, Jesus Pacheco:
Context aware intrusion detection for building automation systems. 181-201 - Karine Heydemann, Jean-François Lalande, Pascal Berthomé:
Formally verified software countermeasures for control-flow integrity of smart card C code. 202-224 - Maoyuan Qin, Wei Hu, Xinmu Wang, Dejun Mu, Baolei Mao:
Theorem proof based gate level information flow tracking for hardware security verification. 225-239 - Nitzan Farhi, Nir Nissim, Yuval Elovici:
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis. 240-269 - Michael Heigl, Laurin Doerr, Nicolas Tiefnig, Dalibor Fiala, Martin Schramm:
A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection. 270-287 - Rajat Chaudhary, Anish Jindal, Gagangeet Singh Aujla, Shubhani Aggarwal, Neeraj Kumar, Kim-Kwang Raymond Choo:
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. 288-299 - Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts. 300-312 - Dragan Korac, Dejan Simic:
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. 313-332 - Murat Yasin Kubilay, Mehmet Sabir Kiraz, Haci Ali Mantar:
CertLedger: A new PKI model with Certificate Transparency based on blockchain. 333-352 - Rupeng Yang, Man Ho Au, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. 353-371 - Svetlana N. Yanushkevich, Kelly W. Sundberg, Nathan W. Twyman, Richard M. Guest, Vlad P. Shmerko:
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening. 372-385 - Mohsen Riahi Manesh, Naima Kaabouch:
Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions. 386-401 - Rajendra Patil, Harsha Dudeja, Chirag Modi:
Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. 402-422 - Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Optiwords: A new password policy for creating memorable and strong passwords. 423-435 - Fabrizio Biondi, Michael A. Enescu, Thomas Given-Wilson, Axel Legay, Lamine Noureddine, Vivek Verma:
Effective, efficient, and robust packing detection and classification. 436-451
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.