


default search action
Computers & Security, Volume 34
Volume 34, May 2013
- Eugene H. Spafford

:
Editorial. iv - Olga Kussul, Nataliia Kussul

, Sergii Skakun
:
Assessing security threat scenarios for utility-based reputation model in grids. 1-15 - Amin Hassanzadeh, Radu Stoleru:

On the optimality of cooperative intrusion detection for resource constrained wireless networks. 16-35 - Gyu-Sang Cho:

A computer forensic method for detecting timestamp forgery in NTFS. 36-46 - Alexios Mylonas

, Anastasia Kastania, Dimitris Gritzalis:
Delegate the smartphone user? Security awareness in smartphone platforms. 47-66 - Jorge L. Hernandez-Ardieta, Ana Isabel González-Tablas Ferreres

, José María de Fuentes
, Benjamín Ramos:
A taxonomy and survey of attacks on digital signatures. 67-112 - Khaled Salah

, José M. Alcaraz Calero
, Jorge Bernal Bernabé
, Juan Manuel Marín Pérez, Sherali Zeadally:
Analyzing the security of Windows 7 and Linux for cloud computing. 113-122 - Venkatesh Ramanathan, Harry Wechsler:

Phishing detection and impersonated entity discovery using Conditional Random Field and Latent Dirichlet Allocation. 123-139

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














