Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec55.bht:"
@article{DBLP:journals/compsec/CazorlaAL15, author = {Lorena Cazorla and Cristina Alcaraz and Javier L{\'{o}}pez}, title = {A three-stage analysis of {IDS} for critical infrastructures}, journal = {Comput. Secur.}, volume = {55}, pages = {235--250}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.07.005}, doi = {10.1016/J.COSE.2015.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CazorlaAL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChengSXTL15, author = {Xiang Cheng and Sen Su and Shengzhi Xu and Peng Tang and Zhengyi Li}, title = {Differentially private maximal frequent sequence mining}, journal = {Comput. Secur.}, volume = {55}, pages = {175--192}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.08.005}, doi = {10.1016/J.COSE.2015.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChengSXTL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/El-Emam15, author = {Nameer N. El{-}Emam}, title = {New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization}, journal = {Comput. Secur.}, volume = {55}, pages = {21--45}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.06.012}, doi = {10.1016/J.COSE.2015.06.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/El-Emam15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-TeodoroD15, author = {Pedro Garc{\'{\i}}a{-}Teodoro and Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Juan E. Tapiador and Rolando Salazar{-}Hern{\'{a}}ndez}, title = {Automatic generation of {HTTP} intrusion signatures by selective identification of anomalies}, journal = {Comput. Secur.}, volume = {55}, pages = {159--174}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.007}, doi = {10.1016/J.COSE.2015.09.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GiotDR15, author = {Romain Giot and Bernadette Dorizzi and Christophe Rosenberger}, title = {A review on the public benchmark databases for static keystroke dynamics}, journal = {Comput. Secur.}, volume = {55}, pages = {46--61}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.06.008}, doi = {10.1016/J.COSE.2015.06.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GiotDR15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GopeH15, author = {Prosanta Gope and Tzonelih Hwang}, title = {A realistic lightweight authentication protocol preserving strong anonymity for securing {RFID} system}, journal = {Comput. Secur.}, volume = {55}, pages = {271--280}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.05.004}, doi = {10.1016/J.COSE.2015.05.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GopeH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaCDSML15, author = {Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek Saxena and Jian Mao and Zhenkai Liang}, title = {Man-in-the-browser-cache: Persisting {HTTPS} attacks via browser cache poisoning}, journal = {Comput. Secur.}, volume = {55}, pages = {62--80}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.07.004}, doi = {10.1016/J.COSE.2015.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiaCDSML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuC15, author = {Bing Liu and Chao{-}Hsien Chu}, title = {Relationship-based federated access control model for {EPC} Discovery Service}, journal = {Comput. Secur.}, volume = {55}, pages = {251--270}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.06.003}, doi = {10.1016/J.COSE.2015.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoutonMKV15, author = {Francois Mouton and Mercia M. Malan and Kai K. Kimppa and H. S. Venter}, title = {Necessity for ethics in social engineering research}, journal = {Comput. Secur.}, volume = {55}, pages = {114--127}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.001}, doi = {10.1016/J.COSE.2015.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoutonMKV15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RuohonenHL15, author = {Jukka Ruohonen and Sami Hyrynsalmi and Ville Lepp{\"{a}}nen}, title = {The sigmoidal growth of operating system security vulnerabilities: An empirical revisit}, journal = {Comput. Secur.}, volume = {55}, pages = {1--20}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.07.001}, doi = {10.1016/J.COSE.2015.07.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RuohonenHL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolicOG15, author = {Kresimir Solic and Hrvoje Ocevcic and Marin Golub}, title = {The information systems' security level assessment model based on an ontology and evidential reasoning approach}, journal = {Comput. Secur.}, volume = {55}, pages = {100--112}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.08.004}, doi = {10.1016/J.COSE.2015.08.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolicOG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StavrouG15, author = {Vasilis Stavrou and Dimitris Gritzalis}, title = {Introduction to Social Media Investigation - {A} hands-on Approach, Jennifer Golbeck, Elsevier Publications, {USA} {(2015)}}, journal = {Comput. Secur.}, volume = {55}, pages = {128--129}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.08.002}, doi = {10.1016/J.COSE.2015.08.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/StavrouG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StevanovicPDRB15, author = {Matija Stevanovic and Jens Myrup Pedersen and Alessandro D'Alconzo and Stefan Ruehrup and Andreas Berger}, title = {On the ground truth problem of malicious {DNS} traffic analysis}, journal = {Comput. Secur.}, volume = {55}, pages = {142--158}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.004}, doi = {10.1016/J.COSE.2015.09.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StevanovicPDRB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsalisG15, author = {Nikolaos Tsalis and Dimitris Gritzalis}, title = {Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, {USA} {(2015)}}, journal = {Comput. Secur.}, volume = {55}, pages = {113}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.002}, doi = {10.1016/J.COSE.2015.09.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TsalisG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UzunovFF15, author = {Anton V. Uzunov and Eduardo B. Fern{\'{a}}ndez and Katrina Falkner}, title = {Security solution frames and security patterns for authorization in distributed, collaborative systems}, journal = {Comput. Secur.}, volume = {55}, pages = {193--234}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.08.003}, doi = {10.1016/J.COSE.2015.08.003}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UzunovFF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinYLZS15, author = {Ting Yin and Gaobo Yang and Leida Li and Dengyong Zhang and Xingming Sun}, title = {Detecting seam carving based image resizing using local binary patterns}, journal = {Comput. Secur.}, volume = {55}, pages = {130--141}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.09.003}, doi = {10.1016/J.COSE.2015.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinYLZS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZahadatBBO15, author = {Nima Zahadat and Paul Blessner and Timothy D. Blackburn and Bill A. Olson}, title = {{BYOD} security engineering: {A} framework and its analysis}, journal = {Comput. Secur.}, volume = {55}, pages = {81--99}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2015.06.011}, doi = {10.1016/J.COSE.2015.06.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZahadatBBO15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.