Search dblp for Publications

export results for "toc:db/journals/compsec/compsec37.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AbdalaalNS13,
  author       = {Ahmed Abdalaal and
                  Mehmet Ercan Nergiz and
                  Y{\"{u}}cel Saygin},
  title        = {Privacy-preserving publishing of opinion polls},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {143--154},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.008},
  doi          = {10.1016/J.COSE.2013.03.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbdalaalNS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlcaidePMR13,
  author       = {Almudena Alcaide and
                  Esther Palomar and
                  Jos{\'{e}} Montero{-}Castillo and
                  Arturo Ribagorda},
  title        = {Anonymous authentication for privacy-preserving IoT target-driven
                  applications},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {111--123},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.05.007},
  doi          = {10.1016/J.COSE.2013.05.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlcaidePMR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Bayuk13,
  author       = {Jennifer L. Bayuk},
  title        = {Security as a theoretical attribute construct},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {155--175},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.006},
  doi          = {10.1016/J.COSE.2013.03.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Bayuk13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Castillo-PerezG13,
  author       = {Sergio Castillo{-}Perez and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {Onion routing circuit construction via latency graphs},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {197--214},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.003},
  doi          = {10.1016/J.COSE.2013.03.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Castillo-PerezG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DeursenBD13,
  author       = {Nicole van Deursen and
                  William J. Buchanan and
                  Alistair Duff},
  title        = {Monitoring information security risks within health care},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {31--45},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.005},
  doi          = {10.1016/J.COSE.2013.04.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DeursenBD13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamedheidariR13,
  author       = {Sina Hamedheidari and
                  Reza Rafeh},
  title        = {A novel agent-based approach to detect sinkhole attacks in wireless
                  sensor networks},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {1--14},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.002},
  doi          = {10.1016/J.COSE.2013.04.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamedheidariR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeckmanWSODH13,
  author       = {Kristin E. Heckman and
                  Michael J. Walsh and
                  Frank J. Stech and
                  Todd A. O'Boyle and
                  Stephen R. DiCato and
                  Audra F. Herber},
  title        = {Active cyber defense with denial and deception: {A} cyber-wargame
                  experiment},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {72--77},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.015},
  doi          = {10.1016/J.COSE.2013.03.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeckmanWSODH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinJA13,
  author       = {Lei Jin and
                  James B. D. Joshi and
                  Mohd Anwar},
  title        = {Mutual-friend based attacks in social network systems},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {15--30},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.003},
  doi          = {10.1016/J.COSE.2013.04.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinJA13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiNNH13,
  author       = {Celia Li and
                  Uyen Trang Nguyen and
                  Hoang Lan Nguyen and
                  Md. Nurul Huda},
  title        = {Efficient authentication for fast handover in wireless mesh networks},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {124--142},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.06.001},
  doi          = {10.1016/J.COSE.2013.06.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiNNH13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NakaguroDMM13,
  author       = {Yoichi Nakaguro and
                  Matthew N. Dailey and
                  Sanparith Marukatat and
                  Stanislav S. Makhanov},
  title        = {Defeating line-noise CAPTCHAs with multiple quadratic snakes},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {91--110},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.05.003},
  doi          = {10.1016/J.COSE.2013.05.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NakaguroDMM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Riley13,
  author       = {Ryan D. Riley},
  title        = {A framework for prototyping and testing data-only rootkit attacks},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {62--71},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.006},
  doi          = {10.1016/J.COSE.2013.04.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Riley13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RohKRR13,
  author       = {Byeong{-}Hee Roh and
                  Ju Wan Kim and
                  Ki{-}Yeol Ryu and
                  Jea{-}Tek Ryu},
  title        = {A whitelist-based countermeasure scheme using a Bloom filter against
                  {SIP} flooding attacks},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {46--61},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.04.001},
  doi          = {10.1016/J.COSE.2013.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RohKRR13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Savola13,
  author       = {Reijo M. Savola},
  title        = {Quality of security metrics and measurements},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {78--90},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.05.002},
  doi          = {10.1016/J.COSE.2013.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Savola13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SpathoulasK13,
  author       = {Georgios P. Spathoulas and
                  Sokratis K. Katsikas},
  title        = {Enhancing {IDS} performance through comprehensive alert post-processing},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {176--196},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.03.005},
  doi          = {10.1016/J.COSE.2013.03.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SpathoulasK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZonouzHBBS13,
  author       = {Saman A. Zonouz and
                  Amir Houmansadr and
                  Robin Berthier and
                  Nikita Borisov and
                  William H. Sanders},
  title        = {Secloud: {A} cloud-based comprehensive and lightweight security solution
                  for smartphones},
  journal      = {Comput. Secur.},
  volume       = {37},
  pages        = {215--227},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.cose.2013.02.002},
  doi          = {10.1016/J.COSE.2013.02.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZonouzHBBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics