default search action
Computers & Security, Volume 86
Volume 86, September 2019
- Erzhou Zhu, Peng Wen, Kanqi Ni, Ruhui Ma:
Implementation of an effective dynamic concolic execution framework for analyzing binary programs. 1-27 - Manmeet Singh, Maninder Singh, Sanmeet Kaur:
Issues and challenges in DNS based botnet detection: A survey. 28-52 - Jie Gu, Lihong Wang, Huiwen Wang, Shanshan Wang:
A novel approach to intrusion detection using SVM ensemble with feature augmentation. 53-62 - Zyad Elkhadir, Mohammed Benattou:
A cyber network attack detection based on GM Median Nearest Neighbors LDA. 63-74 - Matias Dodel, Gustavo S. Mesch:
An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices. 75-91 - B. K. S. P. Kumar Raju, G. Geethakumari:
SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment. 92-111
- Yuncong Zhang, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. 112-131
- Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong:
Anonymous authentication scheme for smart home environment with provable security. 132-146
- Markus Ring, Sarah Wunderlich, Deniz Scheuring, Dieter Landes, Andreas Hotho:
A survey of network-based intrusion detection data sets. 147-167 - Michele Scalas, Davide Maiorca, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. 168-182 - Mahendra Pratap Singh, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. 183-205
- Ashish Rajendra Sai, Jim Buckley, Andrew Le Gear:
Assessing the security implication of Bitcoin exchange rates. 206-222
- Prosanta Gope:
LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. 223-237
- Jen-Wei Hu, Lo-Yao Yeh, Shih-Wei Liao, Chu-Sing Yang:
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices. 238-252
- Alex Norta, Raimundas Matulevicius, Benjamin Leiding:
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. 253-269 - Gueltoum Bendiab, Stavros Shiaeles, Samia Boucherkha, Bogdan V. Ghita:
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. 270-290 - Zouhair Chiba, Noreddine Abghour, Khalid Moussaid, Amina El Omri, Mohamed Rida:
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. 291-317 - Gauhar Ali, Naveed Ahmad, Yue Cao, Muhammad Asif, Haitham S. Cruickshank, Qazi Ejaz Ali:
Blockchain based permission delegation and access control in Internet of Things (BACI). 318-334 - Diego F. Aranha, Pedro Barbosa, Thiago N. C. Cardoso, Caio Lüders Araújo, Paulo Matias:
The return of software vulnerabilities in the Brazilian voting machine. 335-349 - Ivano Bongiovanni:
The least secure places in the universe? A systematic literature review on information security management in higher education. 350-357 - Sajjad Haider, Tehsin Kanwal, Adeel Anjum, Saif Ur Rehman Malik, Ahmed Khan, Abid Khan, Umar Manzoor:
An efficient privacy preserving protocol for dynamic continuous data collection. 358-371 - Atiye Sadat Hashemi, Saeed Mozaffari:
Secure deep neural networks using adversarial image generation and training with Noise-GAN. 372-387 - Wei Bai, Zhisong Pan, Shize Guo, Zhe Chen, Shiming Xia:
MDC-Checker: A novel network risk assessment framework for multiple domain configurations. 388-401 - Atif Ahmad, Jeb Webb, Kevin C. Desouza, James Boorman:
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. 402-418 - Manuel Huber, Julian Horsch, Junaid Ali, Sascha Wessel:
Freeze and Crypt: Linux kernel support for main memory encryption. 420-436 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing scheme of ABE encryption secure against malicious adversary. 437-452 - Jannik Dreier, Maxime Puys, Marie-Laure Potet, Pascal Lafourcade, Jean-Louis Roch:
Formally and practically verifying flow properties in industrial systems. 453-470 - Alireza Jolfaei, Krishna Kant:
A lightweight integrity protection scheme for low latency smart grid applications. 471-483 - Diogo Barradas, Tiago Brito, David Duarte, Nuno Santos, Luís E. T. Rodrigues:
Forensic analysis of communication records of messaging applications from physical memory. 484-497 - Lake Bu, Mark G. Karpovsky, Michel A. Kinsy:
Bulwark: Securing implantable medical devices communication channels. 498-511
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.