![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 90
Volume 90, March 2020
- Paul van Schaik
, Karen Renaud
, Christopher J. Wilson
, Jurjen Jansen, Joseph A. Onibokun:
Risk as affect: The affect heuristic in cybersecurity. 101651 - Christopher Schmitz, Sebastian Pape
:
LiSRA: Lightweight Security Risk Assessment for decision support in information security. 101656 - J. Christopher Westland
:
The information content of Sarbanes-Oxley in predicting security breaches. 101687 - Jyoti Gajrani
, Umang Agarwal, Vijay Laxmi
, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi
, Akka Zemmari
:
EspyDroid+: Precise reflection analysis of android apps. 101688 - Amit Kumar Trivedi
, Dalton Meitei Thounaojam
, Shyamosree Pal:
Non-Invertible cancellable fingerprint template for fingerprint biometric. 101690 - Mario G. C. A. Cimino
, Nicoletta De Francesco, Francesco Mercaldo
, Antonella Santone, Gigliola Vaglini:
Model checking for malicious family detection and phylogenetic analysis in mobile environment. 101691 - Yizhi Ren, Qi Zhou, Zhen Wang
, Ting Wu, Guohua Wu, Kim-Kwang Raymond Choo
:
Query-efficient label-only attacks against black-box machine learning models. 101698 - Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
Distributed K-Means clustering guaranteeing local differential privacy. 101699 - Marta Gomez-Barrero
, Javier Galbally
:
Reversing the irreversible: A survey on inverse biometrics. 101700 - Dong Li, Xiaofeng Liao, Tao Xiang
, Jiahui Wu
, Junqing Le:
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. 101701 - Milad Taleby Ahvanooey
, Qianmu Li
, Mark Xuefang Zhu, Mamoun Alazab
, Jing Zhang
:
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media. 101702 - Yurong Chen
, Hongfa Xue, Tian Lan, Guru Venkataramani:
CHOP: Bypassing runtime bounds checking through convex hull Optimization. 101708 - Edyta Karolina Szczepaniuk
, Hubert Szczepaniuk
, Tomasz Rokicki
, Bogdan Klepacki
:
Information security assessment in public administration. 101709 - Vimala Balakrishnan
, Shahzaib Khan, Hamid R. Arabnia
:
Improving cyberbullying detection using Twitter users' psychological features and machine learning. 101710 - Mallikarjun Reddy Dorsala
, V. N. Sastry, Sudhakar Chapram:
Fair payments for verifiable cloud services using smart contracts. 101712 - Ajish S
, K. S. Anil Kumar:
Security and performance enhancement of fingerprint biometric template using symmetric hashing. 101714
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.