


default search action
Computers & Security, Volume 49
Volume 49, March 2015
- Canh Ngo, Yuri Demchenko

, Cees de Laat:
Decision Diagrams for XACML Policy Evaluation and Management. 1-16 - Mohammad Masdari, Sam Jabbehdari

, Jamshid Bagherzadeh
, Ahmad Khadem-Zadeh:
Towards efficient certificate status validations with E-ADOPT in mobile ad hoc networks. 17-27 - Daniel Abril

, Guillermo Navarro-Arribas
, Vicenç Torra
:
Spherical microaggregation: Anonymizing sparse vector spaces. 28-44 - Nurul Hidayah Ab Rahman

, Kim-Kwang Raymond Choo
:
A survey of information security incident handling in the cloud. 45-69 - Michael Robinson, Kevin I. Jones, Helge Janicke

:
Cyber warfare: Issues and challenges. 70-94 - Dae Wook Kim

, Peiying Yan, Junjie Zhang:
Detecting fake anti-virus software distribution webpages. 95-106 - Ahmed Patel, Samaher Al-Janabi

, Ibrahim AlShourbaji
, Jens Myrup Pedersen
:
A novel methodology towards a trusted environment in mashup web applications. 107-122 - Giray Kömürcü, Ali Emre Pusane, Günhan Dündar

:
An efficient grouping method and error probability analysis for RO-PUFs. 123-131 - Yixuan Zhang, Jingsha He, Bin Zhao, Zhiqing Huang, Ruohong Liu:

Towards more pro-active access control in computer systems and networks. 132-146 - Kaan Onarlioglu, Ahmet Salih Buyukkayhan, William K. Robertson, Engin Kirda:

SENTINEL: Securing Legacy Firefox Extensions. 147-161 - Adéle da Veiga

, Nico Martins
:
Improving the information security culture through monitoring and implementation actions illustrated through a case study. 162-176 - Jordan Shropshire, Merrill Warkentin

, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. 177-191 - Dimitris Geneiatakis

, Igor Nai Fovino, Ioannis Kounelis, Pasquale Stirparo:
A Permission verification approach for android mobile applications. 192-205 - Ali Ahmadian Ramaki, Morteza Amini

, Reza Ebrahimi Atani
:
RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection. 206-219 - Ginés Dólera Tormo, Félix Gómez Mármol

, Gregorio Martínez Pérez
:
Towards privacy-preserving reputation management for hybrid broadcast broadband applications. 220-238 - Yan Li, Yingjiu Li, Qiang Yan, Robert H. Deng

:
Privacy leakage analysis in online social networks. 239-254 - Karim O. Elish

, Xiaokui Shu, Danfeng (Daphne) Yao
, Barbara G. Ryder, Xuxian Jiang:
Profiling user-trigger dependence for Android malware detection. 255-273 - George Stergiopoulos, Dimitris Gritzalis:

Hacking and Penetration Testing with Low Power Devices. 274-275

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














