Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec37.bht:"
@article{DBLP:journals/compsec/AbdalaalNS13, author = {Ahmed Abdalaal and Mehmet Ercan Nergiz and Y{\"{u}}cel Saygin}, title = {Privacy-preserving publishing of opinion polls}, journal = {Comput. Secur.}, volume = {37}, pages = {143--154}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.008}, doi = {10.1016/J.COSE.2013.03.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbdalaalNS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlcaidePMR13, author = {Almudena Alcaide and Esther Palomar and Jos{\'{e}} Montero{-}Castillo and Arturo Ribagorda}, title = {Anonymous authentication for privacy-preserving IoT target-driven applications}, journal = {Comput. Secur.}, volume = {37}, pages = {111--123}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.05.007}, doi = {10.1016/J.COSE.2013.05.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlcaidePMR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Bayuk13, author = {Jennifer L. Bayuk}, title = {Security as a theoretical attribute construct}, journal = {Comput. Secur.}, volume = {37}, pages = {155--175}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.006}, doi = {10.1016/J.COSE.2013.03.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Bayuk13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Castillo-PerezG13, author = {Sergio Castillo{-}Perez and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {Onion routing circuit construction via latency graphs}, journal = {Comput. Secur.}, volume = {37}, pages = {197--214}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.003}, doi = {10.1016/J.COSE.2013.03.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Castillo-PerezG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DeursenBD13, author = {Nicole van Deursen and William J. Buchanan and Alistair Duff}, title = {Monitoring information security risks within health care}, journal = {Comput. Secur.}, volume = {37}, pages = {31--45}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.005}, doi = {10.1016/J.COSE.2013.04.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DeursenBD13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamedheidariR13, author = {Sina Hamedheidari and Reza Rafeh}, title = {A novel agent-based approach to detect sinkhole attacks in wireless sensor networks}, journal = {Comput. Secur.}, volume = {37}, pages = {1--14}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.002}, doi = {10.1016/J.COSE.2013.04.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamedheidariR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeckmanWSODH13, author = {Kristin E. Heckman and Michael J. Walsh and Frank J. Stech and Todd A. O'Boyle and Stephen R. DiCato and Audra F. Herber}, title = {Active cyber defense with denial and deception: {A} cyber-wargame experiment}, journal = {Comput. Secur.}, volume = {37}, pages = {72--77}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.015}, doi = {10.1016/J.COSE.2013.03.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeckmanWSODH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinJA13, author = {Lei Jin and James B. D. Joshi and Mohd Anwar}, title = {Mutual-friend based attacks in social network systems}, journal = {Comput. Secur.}, volume = {37}, pages = {15--30}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.003}, doi = {10.1016/J.COSE.2013.04.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinJA13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiNNH13, author = {Celia Li and Uyen Trang Nguyen and Hoang Lan Nguyen and Md. Nurul Huda}, title = {Efficient authentication for fast handover in wireless mesh networks}, journal = {Comput. Secur.}, volume = {37}, pages = {124--142}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.06.001}, doi = {10.1016/J.COSE.2013.06.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiNNH13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NakaguroDMM13, author = {Yoichi Nakaguro and Matthew N. Dailey and Sanparith Marukatat and Stanislav S. Makhanov}, title = {Defeating line-noise CAPTCHAs with multiple quadratic snakes}, journal = {Comput. Secur.}, volume = {37}, pages = {91--110}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.05.003}, doi = {10.1016/J.COSE.2013.05.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NakaguroDMM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Riley13, author = {Ryan D. Riley}, title = {A framework for prototyping and testing data-only rootkit attacks}, journal = {Comput. Secur.}, volume = {37}, pages = {62--71}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.006}, doi = {10.1016/J.COSE.2013.04.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Riley13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RohKRR13, author = {Byeong{-}Hee Roh and Ju Wan Kim and Ki{-}Yeol Ryu and Jea{-}Tek Ryu}, title = {A whitelist-based countermeasure scheme using a Bloom filter against {SIP} flooding attacks}, journal = {Comput. Secur.}, volume = {37}, pages = {46--61}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.04.001}, doi = {10.1016/J.COSE.2013.04.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RohKRR13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Savola13, author = {Reijo M. Savola}, title = {Quality of security metrics and measurements}, journal = {Comput. Secur.}, volume = {37}, pages = {78--90}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.05.002}, doi = {10.1016/J.COSE.2013.05.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Savola13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SpathoulasK13, author = {Georgios P. Spathoulas and Sokratis K. Katsikas}, title = {Enhancing {IDS} performance through comprehensive alert post-processing}, journal = {Comput. Secur.}, volume = {37}, pages = {176--196}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.03.005}, doi = {10.1016/J.COSE.2013.03.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SpathoulasK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZonouzHBBS13, author = {Saman A. Zonouz and Amir Houmansadr and Robin Berthier and Nikita Borisov and William H. Sanders}, title = {Secloud: {A} cloud-based comprehensive and lightweight security solution for smartphones}, journal = {Comput. Secur.}, volume = {37}, pages = {215--227}, year = {2013}, url = {https://doi.org/10.1016/j.cose.2013.02.002}, doi = {10.1016/J.COSE.2013.02.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZonouzHBBS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.