


default search action
Computers & Security, Volume 62
Volume 62, September 2016
- Jolanda Modic

, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
:
Novel efficient techniques for real-time cloud security assessment. 1-18 - Aya Hellal

, Lotfi Ben Romdhane
:
Minimal contrast frequent pattern mining for malware detection. 19-32 - Yonggon Kim, Ohmin Kwon

, Jin Soo Jang
, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. 33-48 - Jose Sanchez del Rio Saez

, Daniela Moctezuma
, Cristina Conde
, Isaac Martín de Diego
, Enrique Cabello
:
Automated border control e-gates and facial recognition systems. 49-72 - Mohammad GhasemiGol

, Hassan Takabi, Abbas Ghaemi Bafghi:
A foresight model for intrusion response management. 73-94 - Garima Bajwa

, Ram Dantu:
Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. 95-113 - Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:

PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. 114-132 - Zhenjun Tang, Huan Lao, Xianquan Zhang, Kai Liu:

Robust image hashing via DCT and LLE. 133-148 - David Nuñez, M. Carmen Fernández Gago, Jesus Luna:

Eliciting metrics for accountability of cloud systems. 149-164 - Lucie Langer, Florian Skopik

, Paul Smith
, Markus Kammerstetter:
From old to new: Assessing cybersecurity risks for an evolving smart grid. 165-176 - Hai Nguyen, Vinod Ganapathy, Abhinav Srivastava, Shivaramakrishnan Vaidyanathan:

Exploring infrastructure support for app-based services on cloud platforms. 177-192 - Rui Jiang, Xianglong Wu, Bharat K. Bhargava:

SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems. 193-212 - Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:

A phish detector using lightweight search features. 213-228 - Simon Miller, Christian Wagner, Uwe Aickelin

, Jonathan M. Garibaldi
:
Modelling cyber-security experts' decision making processes using aggregation operators. 229-245 - Zhiguo Wan, Wen Tao Zhu, Guilin Wang:

PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. 246-256 - Ricardo Neisse, Gary Steri

, Dimitris Geneiatakis, Igor Nai Fovino:
A privacy enforcing framework for Android applications. 257-277 - Pontus Johnson

, Dan Gorton, Robert Lagerström
, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. 278-295 - William Knowles, Alistair Baron

, Tim McGarr:
The simulated security assessment ecosystem: Does penetration testing need standardisation? 296-316 - Lanfranco Lopriore:

Access control lists in password capability environments. 317-327 - Abdul Razaque

, Syed S. Rizvi
:
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. 328-347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














