default search action
Computers & Security, Volume 87
Volume 87, November 2019
- Lena Yuryna Connolly, David S. Wall:
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. - Zaheer Masood, Raza Samar, Muhammad Asif Zahoor Raja:
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure. - Juan Enrique Rubio, Cristina Alcaraz, Rodrigo Roman, Javier López:
Current cyber-defense trends in industrial control systems. - Renpeng Zou, Xixiang Lv, Baocang Wang:
Blockchain-based photo forensics with permissible transformations. - Jane E. Klobas, Tanya Jane McGill, Xuequn Wang:
How perceived security risk affects intention to use smart home devices: A reasoned action explanation. - Nayanamana Samarasinghe, Mohammad Mannan:
Towards a global perspective on web tracking. - Long Nguyen-Vu, Jinung Ahn, Souhwan Jung:
Android Fragmentation in Malware Detection. - Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Dongxi Liu, Seyit Ahmet Çamtepe, Ibrahim Khalil:
An efficient and scalable privacy preserving algorithm for big data and data streams. - Laura Genga, Nicola Zannone, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. - Ali Alshawish, Mohamed Amine Abid, Hermann de Meer:
Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games. - Kai Chen, Chen Song, Liming Wang, Zhen Xu:
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. - Karel Horák, Branislav Bosanský, Petr Tomásek, Christopher Kiekintveld, Charles A. Kamhoua:
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. - Edson Floriano, Eduardo Alchieri, Diego F. Aranha, Priscila Solís Barreto:
Building secure protocols for extensible distributed coordination through secure extensions. - Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld, Michal Pechoucek:
Hardening networks against strategic attackers using attack graph games. - Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. - Yuxin Ding, Rui Wu, Xiao Zhang:
Ontology-based knowledge representation for malware individuals and families. - Florian Kammüller:
Attack trees in Isabelle extended with probabilities for quantum cryptography. - Ziyu Wang, Jianwei Liu, Qianhong Wu, Yanting Zhang, Hui Yu, Ziyu Zhou:
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network. - Thomas D. Wagner, Khaled Mahbub, Esther Palomar, Ali E. Abdallah:
Cyber threat intelligence sharing: Survey and research directions. - Bin Yu, Joseph K. Liu, Surya Nepal, Jiangshan Yu, Paul Rimba:
Proof-of-QoS: QoS based blockchain consensus protocol. - Xiaohui Han, Lianhai Wang, Shujiang Xu, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. - Sherly Abraham, InduShobha N. Chengalur-Smith:
Evaluating the effectiveness of learner controlled information security training. - Nicholas Mainardi, Alessandro Barenghi, Gerardo Pelosi:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. - Nir Nissim, Omri Lahav, Aviad Cohen, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. - Aron Laszka, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and mitigation of attacks on transportation networks as a multi-stage security game. - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Neural malware analysis with attention mechanism. - Atin Basuchoudhary, Nicola Searle:
Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets. - Yu Li, Jin Huang, Ademola Ayodeji Ikusan, Milliken Mitchell, Junjie Zhang, Rui Dai:
ShellBreaker: Automatically detecting PHP-based malicious web shells. - Yazdan Movahedi, Michel Cukier, Ilir Gashi:
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. - Sadaf Hina, Dhanapal Durai Dominic, Paul Benjamin Lowry:
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. - Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Online sequential attack detection for ADS-B data based on hierarchical temporal memory. - Sakshyam Panda, Daniel W. Woods, Aron Laszka, Andrew Fielder, Emmanouil Panaousis:
Post-incident audits on cyber insurance discounts. - Olusola Akinrolabu, Jason R. C. Nurse, Andrew P. Martin, Steve New:
Cyber risk assessment in cloud provider environments: Current models and future needs. - Xuewen Dong, Feng Wu, Anter Faree, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. - José Camacho, José Manuel García-Giménez, Noemí Marta Fuentes García, Gabriel Maciá-Fernández:
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle. - Mark Burdon, Lizzie Coles-Kemp:
The significance of securing as a critical component of information security: An Australian narrative. - Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. - Benedikt Putz, Florian Menges, Günther Pernul:
A secure and auditable logging infrastructure based on a permissioned blockchain. - Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage:
A data minimization model for embedding privacy into software systems. - Lotfi Ben Othmane, Doug Jacobson, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. - Eun Hee Park, Jongwoo Kim, Lynn L. Wiles, Young Soon Park:
Factors affecting intention to disclose patients' health information. - Shwadhin Sharma, Merrill Warkentin:
Do I really belong?: Impact of employment status on information security policy compliance. - Hoyul Choi, Jongmin Jeong, Simon S. Woo, Kyungtae Kang, Junbeom Hur:
Password typographical error resilience in honey encryption. - Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
Active authentication using file system decoys and user behavior modeling: results of a large scale study. - Mehdi Gheisari, Guojun Wang, Wazir Zada Khan, Christian Fernández-Campusano:
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking. - Yan Cao, Zhiqiu Huang, Changbo Ke, Jian Xie, Jin Wang:
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.