Search dblp for Publications

export results for "toc:db/journals/compsec/compsec59.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BartonTLT16,
  author       = {Kevin A. Barton and
                  Gurvirender P. Tejay and
                  Michael Lane and
                  Steve Terrell},
  title        = {Information system security commitment: {A} study of external influences
                  on senior management},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {9--25},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.007},
  doi          = {10.1016/J.COSE.2016.02.007},
  timestamp    = {Tue, 21 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BartonTLT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CamachoPGM16,
  author       = {Jos{\'{e}} Camacho and
                  Alejandro P{\'{e}}rez{-}Villegas and
                  Pedro Garc{\'{\i}}a{-}Teodoro and
                  Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez},
  title        = {PCA-based multivariate statistical network monitoring for anomaly
                  detection},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {118--137},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.008},
  doi          = {10.1016/J.COSE.2016.02.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CamachoPGM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DavisF16,
  author       = {Jonathan J. Davis and
                  Ernest Foo},
  title        = {Automated feature engineering for {HTTP} tunnel detection},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {166--185},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.01.006},
  doi          = {10.1016/J.COSE.2016.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DavisF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/El-HajjBHSA16,
  author       = {Wassim El{-}Hajj and
                  Ghassen Ben Brahim and
                  Hazem M. Hajj and
                  Ha{\"{\i}}dar Safa and
                  Ralph Adaimy},
  title        = {Security-by-construction in web applications development via database
                  annotations},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {151--165},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2015.12.004},
  doi          = {10.1016/J.COSE.2015.12.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/El-HajjBHSA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FloresE16,
  author       = {Waldo Rocha Flores and
                  Mathias Ekstedt},
  title        = {Shaping intention to resist social engineering through transformational
                  leadership, information security culture and awareness},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {26--44},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.01.004},
  doi          = {10.1016/J.COSE.2016.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FloresE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JunaidLK16,
  author       = {Mohsin Junaid and
                  Donggang Liu and
                  David Chenho Kung},
  title        = {Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered
                  life cycle models},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {92--117},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.01.008},
  doi          = {10.1016/J.COSE.2016.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JunaidLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeLK16,
  author       = {Chunghun Lee and
                  Choong C. Lee and
                  Suhyun Kim},
  title        = {Understanding information security stress: Focusing on the type of
                  information security compliance activity},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {60--70},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.004},
  doi          = {10.1016/J.COSE.2016.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeLK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiMLLXC16,
  author       = {Qi Li and
                  Jianfeng Ma and
                  Rui Li and
                  Ximeng Liu and
                  Jinbo Xiong and
                  Danwei Chen},
  title        = {Secure, efficient and revocable multi-authority access control system
                  in cloud storage},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {45--59},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.002},
  doi          = {10.1016/J.COSE.2016.02.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiMLLXC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MenesidouVK16,
  author       = {Sofia{-}Anna Menesidou and
                  Dimitrios Vardalis and
                  Vasilios Katos},
  title        = {Automated key exchange protocol evaluation in delay tolerant networks},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {1--8},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.006},
  doi          = {10.1016/J.COSE.2016.02.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MenesidouVK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MorovatiKG16,
  author       = {Kamran Morovati and
                  Sanjay Kadam and
                  Ali A. Ghorbani},
  title        = {A network based document management model to prevent data extrusion},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {71--91},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.003},
  doi          = {10.1016/J.COSE.2016.02.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MorovatiKG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoutonLV16,
  author       = {Francois Mouton and
                  Louise Leenen and
                  H. S. Venter},
  title        = {Social engineering attack examples, templates and scenarios},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {186--209},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.03.004},
  doi          = {10.1016/J.COSE.2016.03.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoutonLV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PasqualeHMN16,
  author       = {Liliana Pasquale and
                  Sorren Hanvey and
                  Mark Mcgloin and
                  Bashar Nuseibeh},
  title        = {Adaptive evidence collection in the cloud using attack scenarios},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {236--254},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.03.001},
  doi          = {10.1016/J.COSE.2016.03.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PasqualeHMN16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TehZTC16,
  author       = {Pin Shen Teh and
                  Ning Zhang and
                  Andrew Beng Jin Teoh and
                  Ke Chen},
  title        = {A survey on touch dynamics authentication in mobile devices},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {210--235},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.03.003},
  doi          = {10.1016/J.COSE.2016.03.003},
  timestamp    = {Thu, 16 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TehZTC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsaiJALRC16,
  author       = {Hsin{-}Yi Sandy Tsai and
                  Mengtian Jiang and
                  Saleem Alhabash and
                  Robert LaRose and
                  Nora J. Rifon and
                  Shelia R. Cotten},
  title        = {Understanding online safety behaviors: {A} protection motivation theory
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {59},
  pages        = {138--150},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.02.009},
  doi          = {10.1016/J.COSE.2016.02.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsaiJALRC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}