Search dblp for Publications

export results for "toc:db/journals/compsec/compsec55.bht:"

 download as .bib file

@article{DBLP:journals/compsec/CazorlaAL15,
  author       = {Lorena Cazorla and
                  Cristina Alcaraz and
                  Javier L{\'{o}}pez},
  title        = {A three-stage analysis of {IDS} for critical infrastructures},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {235--250},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.07.005},
  doi          = {10.1016/J.COSE.2015.07.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CazorlaAL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChengSXTL15,
  author       = {Xiang Cheng and
                  Sen Su and
                  Shengzhi Xu and
                  Peng Tang and
                  Zhengyi Li},
  title        = {Differentially private maximal frequent sequence mining},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {175--192},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.08.005},
  doi          = {10.1016/J.COSE.2015.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChengSXTL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/El-Emam15,
  author       = {Nameer N. El{-}Emam},
  title        = {New data-hiding algorithm based on adaptive neural networks with modified
                  particle swarm optimization},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {21--45},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.06.012},
  doi          = {10.1016/J.COSE.2015.06.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/El-Emam15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Garcia-TeodoroD15,
  author       = {Pedro Garc{\'{\i}}a{-}Teodoro and
                  Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Juan E. Tapiador and
                  Rolando Salazar{-}Hern{\'{a}}ndez},
  title        = {Automatic generation of {HTTP} intrusion signatures by selective identification
                  of anomalies},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {159--174},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.007},
  doi          = {10.1016/J.COSE.2015.09.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GiotDR15,
  author       = {Romain Giot and
                  Bernadette Dorizzi and
                  Christophe Rosenberger},
  title        = {A review on the public benchmark databases for static keystroke dynamics},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {46--61},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.06.008},
  doi          = {10.1016/J.COSE.2015.06.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GiotDR15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GopeH15,
  author       = {Prosanta Gope and
                  Tzonelih Hwang},
  title        = {A realistic lightweight authentication protocol preserving strong
                  anonymity for securing {RFID} system},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {271--280},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.05.004},
  doi          = {10.1016/J.COSE.2015.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GopeH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaCDSML15,
  author       = {Yaoqi Jia and
                  Yue Chen and
                  Xinshu Dong and
                  Prateek Saxena and
                  Jian Mao and
                  Zhenkai Liang},
  title        = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache
                  poisoning},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {62--80},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.07.004},
  doi          = {10.1016/J.COSE.2015.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuC15,
  author       = {Bing Liu and
                  Chao{-}Hsien Chu},
  title        = {Relationship-based federated access control model for {EPC} Discovery
                  Service},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {251--270},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.06.003},
  doi          = {10.1016/J.COSE.2015.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoutonMKV15,
  author       = {Francois Mouton and
                  Mercia M. Malan and
                  Kai K. Kimppa and
                  H. S. Venter},
  title        = {Necessity for ethics in social engineering research},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {114--127},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.001},
  doi          = {10.1016/J.COSE.2015.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoutonMKV15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RuohonenHL15,
  author       = {Jukka Ruohonen and
                  Sami Hyrynsalmi and
                  Ville Lepp{\"{a}}nen},
  title        = {The sigmoidal growth of operating system security vulnerabilities:
                  An empirical revisit},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {1--20},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.07.001},
  doi          = {10.1016/J.COSE.2015.07.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RuohonenHL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolicOG15,
  author       = {Kresimir Solic and
                  Hrvoje Ocevcic and
                  Marin Golub},
  title        = {The information systems' security level assessment model based on
                  an ontology and evidential reasoning approach},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {100--112},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.08.004},
  doi          = {10.1016/J.COSE.2015.08.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolicOG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StavrouG15,
  author       = {Vasilis Stavrou and
                  Dimitris Gritzalis},
  title        = {Introduction to Social Media Investigation - {A} hands-on Approach,
                  Jennifer Golbeck, Elsevier Publications, {USA} {(2015)}},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {128--129},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.08.002},
  doi          = {10.1016/J.COSE.2015.08.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/StavrouG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StevanovicPDRB15,
  author       = {Matija Stevanovic and
                  Jens Myrup Pedersen and
                  Alessandro D'Alconzo and
                  Stefan Ruehrup and
                  Andreas Berger},
  title        = {On the ground truth problem of malicious {DNS} traffic analysis},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {142--158},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.004},
  doi          = {10.1016/J.COSE.2015.09.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StevanovicPDRB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsalisG15,
  author       = {Nikolaos Tsalis and
                  Dimitris Gritzalis},
  title        = {Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance
                  Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier
                  Publications, {USA} {(2015)}},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {113},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.002},
  doi          = {10.1016/J.COSE.2015.09.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TsalisG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UzunovFF15,
  author       = {Anton V. Uzunov and
                  Eduardo B. Fern{\'{a}}ndez and
                  Katrina Falkner},
  title        = {Security solution frames and security patterns for authorization in
                  distributed, collaborative systems},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {193--234},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.08.003},
  doi          = {10.1016/J.COSE.2015.08.003},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UzunovFF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinYLZS15,
  author       = {Ting Yin and
                  Gaobo Yang and
                  Leida Li and
                  Dengyong Zhang and
                  Xingming Sun},
  title        = {Detecting seam carving based image resizing using local binary patterns},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {130--141},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.09.003},
  doi          = {10.1016/J.COSE.2015.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinYLZS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZahadatBBO15,
  author       = {Nima Zahadat and
                  Paul Blessner and
                  Timothy D. Blackburn and
                  Bill A. Olson},
  title        = {{BYOD} security engineering: {A} framework and its analysis},
  journal      = {Comput. Secur.},
  volume       = {55},
  pages        = {81--99},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2015.06.011},
  doi          = {10.1016/J.COSE.2015.06.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZahadatBBO15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics