default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec59.bht:"
@article{DBLP:journals/compsec/BartonTLT16, author = {Kevin A. Barton and Gurvirender P. Tejay and Michael Lane and Steve Terrell}, title = {Information system security commitment: {A} study of external influences on senior management}, journal = {Comput. Secur.}, volume = {59}, pages = {9--25}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.007}, doi = {10.1016/J.COSE.2016.02.007}, timestamp = {Tue, 21 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BartonTLT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CamachoPGM16, author = {Jos{\'{e}} Camacho and Alejandro P{\'{e}}rez{-}Villegas and Pedro Garc{\'{\i}}a{-}Teodoro and Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez}, title = {PCA-based multivariate statistical network monitoring for anomaly detection}, journal = {Comput. Secur.}, volume = {59}, pages = {118--137}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.008}, doi = {10.1016/J.COSE.2016.02.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CamachoPGM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DavisF16, author = {Jonathan J. Davis and Ernest Foo}, title = {Automated feature engineering for {HTTP} tunnel detection}, journal = {Comput. Secur.}, volume = {59}, pages = {166--185}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.01.006}, doi = {10.1016/J.COSE.2016.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DavisF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/El-HajjBHSA16, author = {Wassim El{-}Hajj and Ghassen Ben Brahim and Hazem M. Hajj and Ha{\"{\i}}dar Safa and Ralph Adaimy}, title = {Security-by-construction in web applications development via database annotations}, journal = {Comput. Secur.}, volume = {59}, pages = {151--165}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2015.12.004}, doi = {10.1016/J.COSE.2015.12.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/El-HajjBHSA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FloresE16, author = {Waldo Rocha Flores and Mathias Ekstedt}, title = {Shaping intention to resist social engineering through transformational leadership, information security culture and awareness}, journal = {Comput. Secur.}, volume = {59}, pages = {26--44}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.01.004}, doi = {10.1016/J.COSE.2016.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FloresE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JunaidLK16, author = {Mohsin Junaid and Donggang Liu and David Chenho Kung}, title = {Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models}, journal = {Comput. Secur.}, volume = {59}, pages = {92--117}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.01.008}, doi = {10.1016/J.COSE.2016.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JunaidLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeLK16, author = {Chunghun Lee and Choong C. Lee and Suhyun Kim}, title = {Understanding information security stress: Focusing on the type of information security compliance activity}, journal = {Comput. Secur.}, volume = {59}, pages = {60--70}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.004}, doi = {10.1016/J.COSE.2016.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeLK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiMLLXC16, author = {Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and Jinbo Xiong and Danwei Chen}, title = {Secure, efficient and revocable multi-authority access control system in cloud storage}, journal = {Comput. Secur.}, volume = {59}, pages = {45--59}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.002}, doi = {10.1016/J.COSE.2016.02.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiMLLXC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MenesidouVK16, author = {Sofia{-}Anna Menesidou and Dimitrios Vardalis and Vasilios Katos}, title = {Automated key exchange protocol evaluation in delay tolerant networks}, journal = {Comput. Secur.}, volume = {59}, pages = {1--8}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.006}, doi = {10.1016/J.COSE.2016.02.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MenesidouVK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MorovatiKG16, author = {Kamran Morovati and Sanjay Kadam and Ali A. Ghorbani}, title = {A network based document management model to prevent data extrusion}, journal = {Comput. Secur.}, volume = {59}, pages = {71--91}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.003}, doi = {10.1016/J.COSE.2016.02.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MorovatiKG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoutonLV16, author = {Francois Mouton and Louise Leenen and H. S. Venter}, title = {Social engineering attack examples, templates and scenarios}, journal = {Comput. Secur.}, volume = {59}, pages = {186--209}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.03.004}, doi = {10.1016/J.COSE.2016.03.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoutonLV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PasqualeHMN16, author = {Liliana Pasquale and Sorren Hanvey and Mark Mcgloin and Bashar Nuseibeh}, title = {Adaptive evidence collection in the cloud using attack scenarios}, journal = {Comput. Secur.}, volume = {59}, pages = {236--254}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.03.001}, doi = {10.1016/J.COSE.2016.03.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PasqualeHMN16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TehZTC16, author = {Pin Shen Teh and Ning Zhang and Andrew Beng Jin Teoh and Ke Chen}, title = {A survey on touch dynamics authentication in mobile devices}, journal = {Comput. Secur.}, volume = {59}, pages = {210--235}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.03.003}, doi = {10.1016/J.COSE.2016.03.003}, timestamp = {Thu, 16 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TehZTC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsaiJALRC16, author = {Hsin{-}Yi Sandy Tsai and Mengtian Jiang and Saleem Alhabash and Robert LaRose and Nora J. Rifon and Shelia R. Cotten}, title = {Understanding online safety behaviors: {A} protection motivation theory perspective}, journal = {Comput. Secur.}, volume = {59}, pages = {138--150}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.02.009}, doi = {10.1016/J.COSE.2016.02.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsaiJALRC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.