


default search action
Computers & Security, Volume 42
Volume 42, May 2014
- Christian Rathgeb, Christoph Busch:

Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. 1-12 - Sebastian Schrittwieser

, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. 13-26 - Atif Ahmad, Rachelle Bosua, Rens Scheepers:

Protecting organizational competitive advantage: A knowledge leakage perspective. 27-39 - Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:

WorSE: A Workbench for Model-based Security Engineering. 40-55 - Sean Allam

, Stephen Flowerday
, Ethan Flowerday:
Smartphone information security awareness: A victim of operational pressures. 56-65 - Christoforos Ntantogian

, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis
:
Evaluating the privacy of Android mobile applications under forensic analysis. 66-76 - Ralph LaBarge

, Thomas A. Mazzuchi, Shahram Sarkani:
An automated system for rapid and secure device sanitization. 77-91 - Katerina Goseva-Popstojanova

, Goce Anastasovski, Ana Dimitrijevikj, Risto Pantev
, Brandon Miller:
Characterization and classification of malicious Web traffic. 92-115 - Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:

Trusted Online Social Network (OSN) services with optimal data management. 116-136 - Taekyoung Kwon, Sarang Na:

TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. 137-150 - Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li:

Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. 151-164 - Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm Robert Pattinson, Cate Jerram:

Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). 165-176 - Dimitrios Michalopoulos, Ioannis Mavridis

, Marija Jankovic:
GARS: Real-time system for identification, assessment and control of cyber grooming attacks. 177-190 - Nikos Virvilis, Dimitris Gritzalis:

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. 191-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














