


default search action
Computers & Security, Volume 87
Volume 87, November 2019
- Lena Yuryna Connolly

, David S. Wall
:
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. - Zaheer Masood, Raza Samar, Muhammad Asif Zahoor Raja

:
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure. - Juan Enrique Rubio

, Cristina Alcaraz
, Rodrigo Roman, Javier López:
Current cyber-defense trends in industrial control systems. - Renpeng Zou

, Xixiang Lv, Baocang Wang:
Blockchain-based photo forensics with permissible transformations. - Jane E. Klobas

, Tanya Jane McGill
, Xuequn Wang
:
How perceived security risk affects intention to use smart home devices: A reasoned action explanation. - Nayanamana Samarasinghe, Mohammad Mannan:

Towards a global perspective on web tracking. - Long Nguyen-Vu

, Jinung Ahn, Souhwan Jung:
Android Fragmentation in Malware Detection. - Mahawaga Arachchige Pathum Chamikara

, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
An efficient and scalable privacy preserving algorithm for big data and data streams. - Laura Genga

, Nicola Zannone
, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. - Ali Alshawish

, Mohamed Amine Abid, Hermann de Meer:
Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games. - Kai Chen

, Chen Song, Liming Wang, Zhen Xu:
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. - Karel Horák, Branislav Bosanský, Petr Tomásek

, Christopher Kiekintveld, Charles A. Kamhoua:
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. - Edson Floriano, Eduardo Alchieri

, Diego F. Aranha
, Priscila Solís Barreto
:
Building secure protocols for extensible distributed coordination through secure extensions. - Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld, Michal Pechoucek

:
Hardening networks against strategic attackers using attack graph games. - Kexin Hu

, Zhenfeng Zhang, Kaiwen Guo:
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. - Yuxin Ding, Rui Wu, Xiao Zhang:

Ontology-based knowledge representation for malware individuals and families. - Florian Kammüller

:
Attack trees in Isabelle extended with probabilities for quantum cryptography. - Ziyu Wang, Jianwei Liu

, Qianhong Wu, Yanting Zhang, Hui Yu, Ziyu Zhou:
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network. - Thomas D. Wagner

, Khaled Mahbub, Esther Palomar
, Ali E. Abdallah:
Cyber threat intelligence sharing: Survey and research directions. - Bin Yu, Joseph K. Liu, Surya Nepal

, Jiangshan Yu
, Paul Rimba:
Proof-of-QoS: QoS based blockchain consensus protocol. - Xiaohui Han

, Lianhai Wang, Shujiang Xu
, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. - Sherly Abraham, InduShobha N. Chengalur-Smith:

Evaluating the effectiveness of learner controlled information security training. - Nicholas Mainardi

, Alessandro Barenghi
, Gerardo Pelosi
:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. - Nir Nissim, Omri Lahav, Aviad Cohen

, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. - Aron Laszka

, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and mitigation of attacks on transportation networks as a multi-stage security game. - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:

Neural malware analysis with attention mechanism. - Atin Basuchoudhary

, Nicola Searle
:
Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets. - Yu Li

, Jin Huang, Ademola Ayodeji Ikusan, Milliken Mitchell, Junjie Zhang
, Rui Dai:
ShellBreaker: Automatically detecting PHP-based malicious web shells. - Yazdan Movahedi

, Michel Cukier, Ilir Gashi
:
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. - Sadaf Hina

, Dhanapal Durai Dominic, Paul Benjamin Lowry
:
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. - Tengyao Li

, Buhong Wang, Fute Shang, Jiwei Tian
, Kunrui Cao:
Online sequential attack detection for ADS-B data based on hierarchical temporal memory. - Sakshyam Panda

, Daniel W. Woods
, Aron Laszka
, Andrew Fielder, Emmanouil Panaousis
:
Post-incident audits on cyber insurance discounts. - Olusola Akinrolabu

, Jason R. C. Nurse, Andrew P. Martin, Steve New:
Cyber risk assessment in cloud provider environments: Current models and future needs. - Xuewen Dong, Feng Wu, Anter Faree

, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. - José Camacho

, José Manuel García-Giménez, Noemí Marta Fuentes García
, Gabriel Maciá-Fernández
:
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle. - Mark Burdon

, Lizzie Coles-Kemp:
The significance of securing as a critical component of information security: An Australian narrative. - Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn

, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. - Benedikt Putz

, Florian Menges, Günther Pernul:
A secure and auditable logging infrastructure based on a permissioned blockchain. - Awanthika Senarath

, Nalin Asanka Gamagedara Arachchilage
:
A data minimization model for embedding privacy into software systems. - Lotfi Ben Othmane, Doug Jacobson

, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. - Eun Hee Park, Jongwoo Kim, Lynn L. Wiles, Young Soon Park:

Factors affecting intention to disclose patients' health information. - Shwadhin Sharma, Merrill Warkentin:

Do I really belong?: Impact of employment status on information security policy compliance. - Hoyul Choi, Jongmin Jeong, Simon S. Woo, Kyungtae Kang, Junbeom Hur

:
Password typographical error resilience in honey encryption. - Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:

Active authentication using file system decoys and user behavior modeling: results of a large scale study. - Mehdi Gheisari

, Guojun Wang, Wazir Zada Khan
, Christian Fernández-Campusano
:
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking. - Yan Cao, Zhiqiu Huang, Changbo Ke

, Jian Xie, Jin Wang:
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














