![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 88
Volume 88, January 2020
- Agne Brilingaite
, Linas Bukauskas
, Ausrius Juozapavicius
:
A framework for competence development and assessment in hybrid cybersecurity exercises. - Kevin C. Desouza
, Atif Ahmad
, Humza Naseer
, Munish Sharma:
Weaponizing information systems for political disruption: The Actor, Lever, Effects, and Response Taxonomy (ALERT). - Hanna Paananen
, Michael Lapke, Mikko T. Siponen:
State of the art in information security policy development. - Constantinos Patsakis, Fran Casino
, Vasilios Katos
:
Encrypted and covert DNS queries for botnets: Challenges and countermeasures. - Carlo Marcelo Revoredo da Silva
, Eduardo Luzeiro Feitosa
, Vinicius Cardoso Garcia
:
Heuristic-based strategy for Phishing prediction: A survey of URL-based approach. - Emrah Yasasin, Julian Prester
, Gerit Wagner
, Guido Schryen:
Forecasting IT security vulnerabilities - An empirical analysis. - Xinwen Hu
, Yi Zhuang
, Fuyuan Zhang:
A security modeling and verification method of embedded software based on Z and MARTE. - Lotfi Ben Othmane, Doug Jacobson
, Edgar R. Weippl:
Editorial: Special issue on security and privacy in smart cyber-physical systems. - Guangquan Xu, Bingjiang Guo, Chunhua Su, Xi Zheng
, Kaitai Liang
, Duncan S. Wong, Hao Wang
:
Am I eclipsed? A smart detector of eclipse attacks for Ethereum. - Pedro Tubío Figueira
, Cristina López-Bravo
, José Luis Rivas López:
Improving information security risk analysis by including threat-occurrence predictive models. - Qian Lu
, Ruobing Jiang
, Yuzhan Ouyang, Haipeng Qu
, Jiahui Zhang:
BiRe: A client-side Bi-directional SYN Reflection mechanism against multi-model evil twin attacks. - James Obert
, Adrian R. Chavez, Jay Johnson
:
Distributed renewable energy resource trust metrics and secure routing. - Jiaqing Dong
, Kai Wang
, Wei Quan, Hao Yin:
InterestFence: Simple but efficient way to counter interest flooding attack. - Abbas Yazdinejad
, Reza M. Parizi, Ali Dehghantanha, Kim-Kwang Raymond Choo
:
P4-to-blockchain: A secure blockchain-enabled packet parser for software defined networking. - Ding Wang
, Xizhe Zhang, Zijian Zhang, Ping Wang:
Understanding security failures of multi-factor authentication schemes for multi-server environments. - Ahto Buldas, Olga Gadyatskaya
, Aleksandr Lenin
, Sjouke Mauw, Rolando Trujillo-Rasua
:
Attribute evaluation on attack trees with incomplete information. - Mikko T. Siponen
, Petri Puhakainen, Anthony Vance
:
Can individuals' neutralization techniques be overcome? A field experiment on password policy. - Jun Zhou
, Meng Zheng, Zhenfu Cao
, Xiaolei Dong:
PVIDM: Privacy-preserving verifiable shape context based image denoising and matching with efficient outsourcing in the malicious setting. - Meng Wang
, Yiqin Lu, Jiancheng Qin
:
A dynamic MLP-based DDoS attack detection method using feature selection and feedback. - Muhammad Mudassar Yamin, Basel Katt, Vasileios Gkioulos:
Cyber ranges and security testbeds: Scenarios, functions, tools and architecture. - Frank Breitinger
, Ryan Tully-Doyle, Courtney Hassenfeldt:
A survey on smartphone user's security choices, awareness and education. - Fatmah H. Alqahtani
, Fawaz A. Alsulaiman:
Is image-based CAPTCHA secure against attacks based on machine learning? An experimental study. - Nikita Y. Lovyagin
, George A. Chernishev, Kirill Smirnov, Roman Yu. Dayneko:
FGACFS: A fine-grained access control for *nix userspace file system. - Hamza Djelouat, Abbes Amira, Faycal Bensaali
, Issam Boukhennoufa
:
Secure compressive sensing for ECG monitoring. - Abdulaziz Aldribi
, Issa Traoré
, Belaid Moa, Onyekachi Nwamuo:
Hypervisor-based cloud intrusion detection through online multivariate statistical change tracking. - Cosimo Anglano
, Massimo Canonico
, Marco Guazzone
:
The Android Forensics Automator (AnForA): A tool for the Automated Forensic Analysis of Android Applications. - Imran Makhdoom
, Ian Zhou
, Mehran Abolhasan
, Justin Lipman
, Wei Ni
:
PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. - Lyuye Zhang, Maode Ma:
FKR: An efficient authentication scheme for IEEE 802.11ah networks. - Eleni Philippou, Sylvain Frey, Awais Rashid
:
Contextualising and aligning security metrics and business objectives: A GQM-based methodology. - Mauro Conti
, Chhagan Lal
:
Context-based Co-presence detection techniques: A survey. - Ashleigh Wiley, Agata McCormac, Dragana Calic
:
More than the individual: Examining the relationship between culture and Information Security Awareness. - Omnia Abu Waraga, Meriem Bettayeb
, Qassim Nasir
, Manar AbuTalib:
Design and implementation of automated IoT security testbed. - Amritraj Singh, Reza M. Parizi, Qi Zhang, Kim-Kwang Raymond Choo
, Ali Dehghantanha:
Blockchain smart contracts formalization: Approaches and challenges to address vulnerabilities. - Na Ruan
, Ruoyu Deng
, Chunhua Su:
GADM: Manual fake review detection for O2O commercial platforms. - Amel Arfaoui, Omar Rafik Merad Boudia
, Ali Kribeche, Sidi-Mohammed Senouci, Mohamed Hamdi:
Context-aware access control and anonymous authentication in WBAN. - Ramiro Alvarez, Mehrdad Nojoumian:
Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. - Yang Hu, Mingshen Sun, John C. S. Lui:
Exploiting non-uniform program execution time to evade record/replay forensic analysis. - Xiaodong Zhu
, Yi Zhang, Liehui Jiang, Rui Chang:
Determining the base address of MIPS firmware based on absolute address statistics and string reference matching. - François Menet, Paul Berthier, Michel Gagnon, José M. Fernandez
:
Spartan Networks: Self-feature-squeezing neural networks for increased robustness in adversarial settings. - Ruishan Xin, Yidong Yuan, Jiaji He
, Shuai Zhen, Yiqiang Zhao:
Random active shield generation based on modified artificial fish-swarm algorithm. - Haibin Zheng, Qianhong Wu, Jan Xie
, Zhenyu Guan, Bo Qin, Zhiqiang Gu:
An organization-friendly blockchain system.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.