default search action
Computers & Security, Volume 90
Volume 90, March 2020
- Paul van Schaik, Karen Renaud, Christopher J. Wilson, Jurjen Jansen, Joseph A. Onibokun:
Risk as affect: The affect heuristic in cybersecurity. 101651 - Christopher Schmitz, Sebastian Pape:
LiSRA: Lightweight Security Risk Assessment for decision support in information security. 101656 - J. Christopher Westland:
The information content of Sarbanes-Oxley in predicting security breaches. 101687 - Jyoti Gajrani, Umang Agarwal, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur, Meenakshi Tripathi, Akka Zemmari:
EspyDroid+: Precise reflection analysis of android apps. 101688 - Amit Kumar Trivedi, Dalton Meitei Thounaojam, Shyamosree Pal:
Non-Invertible cancellable fingerprint template for fingerprint biometric. 101690 - Mario G. C. A. Cimino, Nicoletta De Francesco, Francesco Mercaldo, Antonella Santone, Gigliola Vaglini:
Model checking for malicious family detection and phylogenetic analysis in mobile environment. 101691 - Yizhi Ren, Qi Zhou, Zhen Wang, Ting Wu, Guohua Wu, Kim-Kwang Raymond Choo:
Query-efficient label-only attacks against black-box machine learning models. 101698 - Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
Distributed K-Means clustering guaranteeing local differential privacy. 101699 - Marta Gomez-Barrero, Javier Galbally:
Reversing the irreversible: A survey on inverse biometrics. 101700 - Dong Li, Xiaofeng Liao, Tao Xiang, Jiahui Wu, Junqing Le:
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation. 101701 - Milad Taleby Ahvanooey, Qianmu Li, Mark Xuefang Zhu, Mamoun Alazab, Jing Zhang:
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media. 101702 - Yurong Chen, Hongfa Xue, Tian Lan, Guru Venkataramani:
CHOP: Bypassing runtime bounds checking through convex hull Optimization. 101708 - Edyta Karolina Szczepaniuk, Hubert Szczepaniuk, Tomasz Rokicki, Bogdan Klepacki:
Information security assessment in public administration. 101709 - Vimala Balakrishnan, Shahzaib Khan, Hamid R. Arabnia:
Improving cyberbullying detection using Twitter users' psychological features and machine learning. 101710 - Mallikarjun Reddy Dorsala, V. N. Sastry, Sudhakar Chapram:
Fair payments for verifiable cloud services using smart contracts. 101712 - Ajish S, K. S. Anil Kumar:
Security and performance enhancement of fingerprint biometric template using symmetric hashing. 101714
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.