default search action
Computers & Security, Volume 82
Volume 82, May 2019
- Jian Qiu, Heng-Jian Li, Chuan Zhao:
Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. 1-14 - Mordechai Guri, Dima Bykhovsky:
aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR). 15-29 - Jinyan Wang, Chen Liu, Xingcheng Fu, Xudong Luo, Xianxian Li:
A three-phase approach to differentially private crucial patterns mining over data streams. 30-48 - Simon S. Woo:
Design and evaluation of 3D CAPTCHAs. 49-67 - Dong Wang, Zhengquan Xu:
Impact of inaccurate data on Differential Privacy. 68-79 - Krzysztof Opasiak, Wojciech Mazurczyk:
(In)Secure Android Debugging: Security analysis and lessons learned. 80-98 - Idrees Ahmed, Abid Khan, Mansoor Ahmed, Saif Ur Rehman Malik:
Order preserving secure provenance scheme for distributed networks. 99-117 - Deokjin Kim, DaeHee Jang, Minjoon Park, Yunjong Jeong, Jonghwan Kim, Seokjin Choi, Brent ByungHoon Kang:
SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure. 118-139 - Clemens Sauerwein, Irdin Pekaric, Michael Felderer, Ruth Breu:
An analysis and classification of public information security data sources used in research and practice. 140-155 - Markus Ring, Daniel Schlör, Dieter Landes, Andreas Hotho:
Flow-based network traffic generation using Generative Adversarial Networks. 156-172 - Fei Peng, Jing Yang, Zi-Xing Lin, Min Long:
Source identification of 3D printed objects based on inherent equipment distortion. 173-183 - Denglong Lv, Shibing Zhu:
Achieving correlated differential privacy of big data publication. 184-195 - Fady A. M. Ibrahim, Elsayed E. Hemayed:
Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review. 196-226 - Mahdi Daghmehchi Firoozjaei, MinChang Kim, JaeSeung Song, Hyoungshick Kim:
O2TR: Offline OTR messaging system under network disruption. 227-240 - Karen Renaud, Robert F. Otondo, Merrill Warkentin:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? 241-260 - Yun Zhou, Peichao Wang:
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. 261-269 - Jane Henriksen-Bulmer, Shamal Faily, Sheridan Jeary:
Privacy risk assessment in context: A meta-model based on contextual integrity. 270-283 - Jisa David, Ciza Thomas:
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. 284-295 - Nurit Gal-Oz, Yaron Gonen, Ehud Gudes:
Mining meaningful and rare roles from web application usage patterns. 296-313 - Jelena Milosevic, Miroslaw Malek, Alberto Ferrante:
Time, accuracy and power consumption tradeoff in mobile malware detection systems. 314-328
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.