


default search action
Computers & Security, Volume 94
Volume 94, July 2020
- Nadjate Saidani, Kamel Adi

, Mohand Saïd Allili:
A semantic-based classification approach for an enhanced spam detection. 101716 - Antonio Robles-González, Javier Parra-Arnau, Jordi Forné

:
A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes. 101755 - Xinwen Hu

, Yi Zhuang
:
PHRiMA: A permission-based hybrid risk management framework for android apps. 101791 - Yimin Guo

, Zhenfeng Zhang, Yajun Guo, Xiaowei Guo:
Nudging personalized password policies by understanding users' personality. 101801 - B. S. Radhika

, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. 101816 - Blake D. Bryant, Hossein Saiedian

:
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model. 101817 - Yujie Zhao

, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang
:
Compile-time code virtualization for android applications. 101821 - Karl van der Schyff

, Stephen Flowerday
, Steven Furnell:
Duplicitous social media and data surveillance: An evaluation of privacy risk. 101822 - Keiichiro Oishi, Yuichi Sei

, Yasuyuki Tahara, Akihiko Ohsuga:
Semantic diversity: Privacy considering distance between values of sensitive attribute. 101823 - Ye Dong

, Xiaojun Chen, Liyan Shen, Dakui Wang:
EaSTFLy: Efficient and secure ternary federated learning. 101824 - Hyerean Jang

, Moon Chan Park
, Dong Hoon Lee:
IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision. 101828 - Martin Trnecka

, Marketa Trneckova:
An incremental algorithm for the role mining problem. 101830 - Peter Matthew

, Susan Canning
:
An algorithmic approach for optimising biometric systems using liveness and coercion detection. 101831 - Eyasu Getahun Chekole

, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo
, Unnikrishnan Cheramangalath
:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. 101832 - Shawn Knox, Steven Moghadam, Kenny Patrick, Anh Phan, Kim-Kwang Raymond Choo

:
What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps. 101833 - Pallavi Kaliyar

, Wafa Ben Jaballah, Mauro Conti
, Chhagan Lal
:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. 101849 - Shahroz Tariq

, Sangyup Lee, Huy Kang Kim
, Simon S. Woo:
CAN-ADF: The controller area network attack detection framework. 101857 - Edwin Donald Frauenstein

, Stephen Flowerday
:
Susceptibility to phishing on social network sites: A personality information processing model. 101862 - Muhammad Shafiq

, Zhihong Tian
, Ali Kashif Bashir
, Xiaojiang Du, Mohsen Guizani
:
IoT malicious traffic identification using wrapper-based feature selection mechanisms. 101863 - Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:

Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585]. 101878 - Yimin Guo, Zhenfeng Zhang:

Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518]. 101879 - Yimin Guo, Zhenfeng Zhang, Yajun Guo:

Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435]. 101880

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














