


default search action
Computers & Security, Volume 61
Volume 61, August 2016
- Gerardo Canfora

, Francesco Mercaldo, Corrado Aaron Visaggio:
An HMM and structural entropy based detector for Android malware: An empirical study. 1-18 - Hiep Tran

, Enrique Campos-Náñez, Pavel Fomin, James S. Wasek:
Cyber resilience recovery model to combat zero-day malware attacks. 19-31 - Maria Bartnes, Nils Brede Moe

, Poul E. Heegaard
:
The future of information security incident management training: A case study of electrical power companies. 32-45 - Wayne D. Kearney, Hennie A. Kruger

:
Can perceptual differences account for enigmatic information security behaviour in an organisation? 46-58 - Julian L. Rrushi:

NIC displays to thwart malware attacks mounted from within the OS. 59-71 - Vivek Balachandran, Sufatrio, Darell J. J. Tan, Vrizlynn L. L. Thing:

Control flow obfuscation for Android applications. 72-93 - Anton V. Uzunov:

A survey of security solutions for distributed publish/subscribe systems. 94-129 - Chao Shen

, Tianwen Yu, Haodi Xu, Gengshan Yang, Xiaohong Guan:
User practice in password security: An empirical study of real-life passwords in the wild. 130-141 - Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov, Hassan Halawa:

Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. 142-168 - Stephen V. Flowerday

, Tite Tuyikeze
:
Information security policy development and implementation: The what, how and who. 169-183

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














