Stop the war!
Остановите войну!
for scientists:
default search action
Computers & Security, Volume 48
Volume 48, February 2015
- Mhamed Zineddine:
Vulnerabilities and mitigation techniques toning in the cloud: A cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with Lévy flights. 1-18 - Antoni Lluís Mesquida, Antònia Mas Picahaco:
Implementing information security best practices on software lifecycle processes: The ISO/IEC 15504 Security Extension. 19-34 - Ivo Friedberg, Florian Skopik, Giuseppe Settanni, Roman Fiedler:
Combating advanced persistent threats: From network event correlation to incident detection. 35-57 - David J. Barnes, Julio C. Hernandez-Castro:
On the limits of engine analysis for cheating detection in chess. 58-73 - Quang Do, Ben Martini, Kim-Kwang Raymond Choo:
Exfiltrating data from Android devices. 74-91 - Daniel Díaz López, Ginés Dólera Tormo, Félix Gómez Mármol, Gregorio Martínez Pérez:
Managing XACML systems in distributed environments through Meta-Policies. 92-115 - Jianfeng Lu, James B. D. Joshi, Lei Jin, Yiding Liu:
Towards complexity analysis of User Authorization Query problem in RBAC. 116-130 - Shu-Yuan Shen, Li-Hong Huang:
A data hiding scheme using pixel value differencing and improving exploiting modification directions. 131-141 - Xi Jun Lin, Lin Sun, Haipeng Qu:
Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications. 142-149 - Alexander D. Kent, Lorie M. Liebrock, Joshua C. Neil:
Authentication graphs: Analyzing user behavior within an enterprise network. 150-166 - YoungJae Maeng, Aziz Mohaisen, Mun-Kyu Lee, DaeHun Nyang:
Transaction authentication using complementary colors. 167-181 - R. P. Reece, Bernd Carsten Stahl:
The professionalisation of information security: Perspectives of UK practitioners. 182-195 - Qiang Yan, Jin Han, Yingjiu Li, Jianying Zhou, Robert H. Deng:
Leakage-resilient password entry: Challenges, design, and evaluation. 196-211 - Shahid Alam, R. Nigel Horspool, Issa Traoré, Ibrahim Sogukpinar:
A framework for metamorphic malware analysis and real-time detection. 212-233 - Ilker Özçelik, Richard R. Brooks:
Deceiving entropy based DoS detection. 234-245 - Nir Nissim, Aviad Cohen, Chanan Glezer, Yuval Elovici:
Detection of malicious PDF files and directions for enhancements: A state-of-the art survey. 246-266 - Gustavo Percio Zimmermann Montesdioca, Antônio Carlos Gastaud Maçada:
Measuring user satisfaction with information security practices. 267-280 - Duy Dang-Pham, Siddhi Pittayachawan:
Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: A Protection Motivation Theory approach. 281-297
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.