


default search action
Computers & Security, Volume 80
Volume 80, January 2019
- Nayanamana Samarasinghe, Mohammad Mannan

:
Another look at TLS ecosystems in networked devices vs. Web servers. 1-13 - Lu Zhou, Jiageng Chen

, Yidan Zhang, Chunhua Su, Marino Anthony James:
Security analysis and new models on the intelligent symmetric key encryption. 14-24 - Kent Marett, Ali Vedadi, Alexandra Durcikova:

A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. 25-35 - Asaf Nadler, Avi Aminov, Asaf Shabtai

:
Detection of malicious and low throughput data exfiltration over the DNS protocol. 36-53 - Chamila Wijayarathna

, Nalin Asanka Gamagedara Arachchilage
:
Why Johnny can't develop a secure application? A usability analysis of Java Secure Socket Extension API. 54-73 - Mark Glenn Evans

, Ying He
, Leandros A. Maglaras
, Helge Janicke
:
HEART-IS: A novel technique for evaluating human error-related information security incidents. 74-89 - Ximing Liu, Yingjiu Li, Robert H. Deng

, Bing Chang, Shujun Li:
When Human cognitive modeling meets PINs: User-independent inter-keystroke timing attacks. 90-107 - Mario Silic

:
Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context. 108-119 - Li Zhang, Vrizlynn L. L. Thing, Yao Cheng:

A scalable and extensible framework for android malware detection and family attribution. 120-133 - Dong Li, Huaqun Guo

, Jianying Zhou
, Luying Zhou, Jun Wen Wong
:
SCADAWall: A CPI-enabled firewall model for SCADA security. 134-154 - Nicolae Paladi, Christian Gehrmann:

SDN Access Control for the Masses. 155-172 - Jaemin Park

, Sungjin Park
, Brent ByungHoon Kang, Kwangjo Kim:
eMotion: An SGX extension for migrating enclaves. 173-185 - Manuel Cheminod, Luca Durante

, Lucia Seno, Fulvio Valenza
, Adriano Valenzano:
A comprehensive approach to the automatic refinement and verification of access control policies. 186-199 - Jianping Zeng, Jiangjiao Duan, Chengrong Wu:

Empirical study on lexical sentiment in passwords from Chinese websites. 200-210 - Majed Rajab, Ali Eydgahi

:
Evaluating the explanatory power of theoretical frameworks on intention to comply with information security policies in higher education. 211-223 - Visvanathan Naicker, M. Mafaiti:

The establishment of collaboration in managing information security through multisourcing. 224-237 - Lorena González-Manzano

, José María de Fuentes
:
Design recommendations for online cybersecurity courses. 238-256 - Zhushou Tang, Minhui Xue

, Guozhu Meng
, Chengguo Ying, Yugeng Liu, Jianan He, Haojin Zhu
, Yang Liu
:
Securing android applications via edge assistant third-party library detection. 257-272 - Jie Zhang

, Zhanyong Tang, Meng Li, Dingyi Fang, Xiaojiang Chen, Zheng Wang
:
Find me a safe zone: A countermeasure for channel state information based attacks. 273-290 - Chong Guan, Kun Sun, Lingguang Lei, Pingjian Wang, Yuewu Wang, Wei Chen:

DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5. 291-305 - Margaret Gratian, Darshan Bhansali, Michel Cukier, Josiah Dykstra

:
Identifying infected users via network traffic. 306-316 - Thang Bui, Scott D. Stoller

, Jiajie Li:
Greedy and evolutionary algorithms for mining relationship-based access control policies. 317-333

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














