


default search action
Computers & Security, Volume 70
Volume 70, September 2017
- Mashael AlSabah, Alin Tomescu, Ilia A. Lebedev, Dimitrios N. Serpanos

, Srinivas Devadas:
PriviPK: Certificate-less and secure email communication. 1-15 - Shitharth Selvarajan

, David Prince Winston
:
An enhanced optimization based algorithm for intrusion detection in SCADA network. 16-26 - Emma Osborn

, Andrew Simpson
:
On small-scale IT users' system architectures and cyber security: A UK case study. 27-50 - Hongqi Zhang, Cheng Lei

, Dexian Chang, Yingjie Yang:
Network moving target defense technique based on collaborative mutation. 51-71 - Adéle da Veiga

, Nico Martins:
Defining and identifying dominant information security cultures and subcultures. 72-94 - Monali Mavani

, Krishna Asawa:
Modeling and analyses of IP spoofing attack in 6LoWPAN network. 95-110 - Duy Dang-Pham

, Siddhi Pittayachawan
, Vince Bruno
:
Investigation into the formation of information security influence: Network analysis of an emerging organisation. 111-123 - Awais Yousaf

, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras
, Onaiza Yousaf:
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. 124-143 - Hassina Nacer

, Nabil Djebari
, Hachem Slimani
, Djamil Aïssani
:
A distributed authentication model for composite Web services. 144-178 - Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:

EvoPass: Evolvable graphical password against shoulder-surfing attacks. 179-198 - Mujahid Mohsin, Zahid Anwar

, Farhat Zaman, Ehab Al-Shaer:
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. 199-223 - Wenhao Fan

, Yaohui Sang, Daishuai Zhang, Ran Sun, Yuan'an Liu:
DroidInjector: A process injection-based dynamic tracking system for runtime behaviors of Android applications. 224-237 - Muhammad Fahad Umer, Muhammad Sher, Yaxin Bi:

Flow-based intrusion detection: Techniques and challenges. 238-254 - Chaouki Khammassi

, Saoussen Krichen
:
A GA-LR wrapper approach for feature selection in network intrusion detection. 255-277 - Brett Eterovic-Soric, Kim-Kwang Raymond Choo

, Helen Ashman
, Sameera Mubarak:
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. 278-289 - Changho Choi

, Nohyun Kwak, Jin Soo Jang
, DaeHee Jang, Kuenwhee Oh, Kyungsoo Kwag
, Brent ByungHoon Kang
:
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing. 290-306 - Alma Oracevic

, Serkan Akbas
, Suat Ozdemir
:
Secure and reliable object tracking in wireless sensor networks. 307-318 - Pablo Moriano

, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. 319-334 - Nathan L. Clarke

, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. 335-350 - Christian Callegari

, Stefano Giordano
, Michele Pagano
:
An information-theoretic method for the detection of anomalies in network traffic. 351-365 - Grzegorz Spyra, William J. Buchanan

, Elias Ekonomou:
Sticky policies approach within cloud computing. 366-375 - Nik Thompson, Tanya Jane McGill

, Xuequn Wang
:
"Security begins at home": Determinants of home computer and mobile device security behavior. 376-391 - Shweta Bhandari

, Wafa Ben Jaballah, Vineeta Jain
, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur, Mohamed Mosbah
, Mauro Conti:
Android inter-app communication threats and detection techniques. 392-421 - Ángel Manuel Guerrero-Higueras, Noemí DeCastro-García

, Francisco Javier Rodríguez-Lera
, Vicente Matellán
:
Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. 422-435 - Sajid Nazir, Shushma Patel

, Dilip Patel:
Assessing and augmenting SCADA cyber security: A survey of techniques. 436-454 - Vesna S. Ruzicic, Zivadin M. Micic:

Creating a strategic national knowledge architecture: A comparative analysis of knowledge source innovation in the ICS subfields of multimedia and IT security. 455-466 - Allan Cook, Helge Janicke

, Richard Smith, Leandros A. Maglaras
:
The industrial control system cyber defence triage process. 467-481 - Rishikesh Sahay

, Gregory Blanc
, Zonghua Zhang
, Hervé Debar
:
ArOMA: An SDN based autonomic DDoS mitigation framework. 482-499 - Fabrizio Biondi, Sébastien Josse, Axel Legay, Thomas Sirvent:

Effectiveness of synthesis in concolic deobfuscation. 500-515 - Xiaolu Zhang, Ibrahim M. Baggili

, Frank Breitinger
:
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. 516-531 - Abdul Razaque

, Syed S. Rizvi
:
Secure data aggregation using access control and authentication for wireless sensor networks. 532-545 - Adnan Ahmad

, Brian Whitworth, Furkh Zeshan
, Elisa Bertino, Robert S. Friedman:
Extending social networks with delegation. 546-564 - Paulo Henrique Pisani, Norman Poh

, André C. P. L. F. de Carvalho
, Ana Carolina Lorena:
Score normalization applied to adaptive biometric systems. 565-580 - Shuyuan Mary Ho

, Mónica Ocasio Velázquez, Cheryl Booth:
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption. 581-595 - Seyed Mohammad RezaSaadat Beheshti, Panos Liatsis, Muttukrishnan Rajarajan:

A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. 596-617 - Khaled Dassouki, Haïdar Safa, Mohamed Nassar

, Abbas Hijazi:
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. 618-633 - Rui Zhao, Samantha John

, Stacy Karas, Cara Bussell, Jennifer Roberts
, Daniel Six, Brandon Gavett
, Chuan Yue:
Design and evaluation of the highly insidious extreme phishing attacks. 634-647 - Yulong Fu, Zheng Yan

, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. 648-662 - Duncan Ki-Aries, Shamal Faily

:
Persona-centred information security awareness. 663-674 - Nir Nissim

, Ran Yahalom, Yuval Elovici:
USB-based attacks. 675-688 - Paolo Palumbo, Luiza Sayfullina, Dmitriy Komashinskiy, Emil Eirola

, Juha Karhunen:
A pragmatic android malware detection procedure. 689-701 - David Martínez Rodríguez, Jordi Nin

, Miguel Núñez-del-Prado
:
Towards the adaptation of SDC methods to stream mining. 702-722 - Aleksandar Hudic, Paul Smith

, Edgar R. Weippl:
Security assurance assessment methodology for hybrid clouds. 723-743 - Carlos Javier Hernández-Castro, María D. R.-Moreno

, David F. Barrero
, Stuart Gibson:
Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysis. 744-756

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














