Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec73.bht:"
@article{DBLP:journals/compsec/AdiHP18, author = {Kamel Adi and Lamia Hamza and Liviu Pene}, title = {Automatic security policy enforcement in computer systems}, journal = {Comput. Secur.}, volume = {73}, pages = {156--171}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.012}, doi = {10.1016/J.COSE.2017.10.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AdiHP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ali-GombeSRXR18, author = {Aisha I. Ali{-}Gombe and Brendan Saltaformaggio and J. Ramanujam and Dongyan Xu and Golden G. Richard III}, title = {Toward a more dependable hybrid analysis of android malware using aspect-oriented programming}, journal = {Comput. Secur.}, volume = {73}, pages = {235--248}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.006}, doi = {10.1016/J.COSE.2017.11.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ali-GombeSRXR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlizadehLFZA18, author = {Mahdi Alizadeh and Xixi Lu and Dirk Fahland and Nicola Zannone and Wil M. P. van der Aalst}, title = {Linking data and process perspectives for conformance analysis}, journal = {Comput. Secur.}, volume = {73}, pages = {172--193}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.010}, doi = {10.1016/J.COSE.2017.10.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlizadehLFZA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlvarengaBMCZ18, author = {Sean Carlisto de Alvarenga and Sylvio Barbon and Rodrigo Sanches Miani and Michel Cukier and Bruno Bogaz Zarpel{\~{a}}o}, title = {Process mining and hierarchical clustering to help intrusion alert visualization}, journal = {Comput. Secur.}, volume = {73}, pages = {474--491}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.021}, doi = {10.1016/J.COSE.2017.11.021}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlvarengaBMCZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AurigemmaM18, author = {Salvatore Aurigemma and Thomas Mattson}, title = {Exploring the effect of uncertainty avoidance on taking voluntary protective security actions}, journal = {Comput. Secur.}, volume = {73}, pages = {219--234}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.001}, doi = {10.1016/J.COSE.2017.11.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AurigemmaM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaseriHC18, author = {Yaser Baseri and Abdelhakim Hafid and Soumaya Cherkaoui}, title = {Privacy preserving fine-grained location-based access control for mobile cloud}, journal = {Comput. Secur.}, volume = {73}, pages = {249--265}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.014}, doi = {10.1016/J.COSE.2017.10.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaseriHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BittonFSPRS18, author = {Ron Bitton and Andrey Finkelshtein and Lior Sidi and Rami Puzis and Lior Rokach and Asaf Shabtai}, title = {Taxonomy of mobile users' security awareness}, journal = {Comput. Secur.}, volume = {73}, pages = {266--293}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.015}, doi = {10.1016/J.COSE.2017.10.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BittonFSPRS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuchlerRMLG18, author = {Norbou Buchler and Prashanth Rajivan and Laura R. Marusich and Lewis Lightner and Cleotilde Gonzalez}, title = {Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition}, journal = {Comput. Secur.}, volume = {73}, pages = {114--136}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.013}, doi = {10.1016/J.COSE.2017.10.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuchlerRMLG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BurnapFTJ18, author = {Pete Burnap and Richard French and Frederick Turner and Kevin Jones}, title = {Malware classification using self organising feature maps and machine activity data}, journal = {Comput. Secur.}, volume = {73}, pages = {399--410}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.016}, doi = {10.1016/J.COSE.2017.11.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BurnapFTJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BushouseR18, author = {Micah Bushouse and Douglas S. Reeves}, title = {Goalkeeper: Comprehensive process enforcement from the hypervisor}, journal = {Comput. Secur.}, volume = {73}, pages = {459--473}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.020}, doi = {10.1016/J.COSE.2017.11.020}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BushouseR18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenXFHXZL18, author = {Sen Chen and Minhui Xue and Lingling Fan and Shuang Hao and Lihua Xu and Haojin Zhu and Bo Li}, title = {Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach}, journal = {Comput. Secur.}, volume = {73}, pages = {326--344}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.007}, doi = {10.1016/J.COSE.2017.11.007}, timestamp = {Fri, 29 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenXFHXZL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoulterP18, author = {Rory Coulter and Lei Pan}, title = {Intelligent agents defending for an IoT world: {A} review}, journal = {Comput. Secur.}, volume = {73}, pages = {439--458}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.014}, doi = {10.1016/J.COSE.2017.11.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CoulterP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DasCCLZ18, author = {Sanjeev Das and Bihuan Chen and Mahinthan Chandramohan and Yang Liu and Wei Zhang}, title = {ROPSentry: Runtime defense against {ROP} attacks using hardware performance counters}, journal = {Comput. Secur.}, volume = {73}, pages = {374--388}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.011}, doi = {10.1016/J.COSE.2017.11.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DasCCLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DingXCL18, author = {Yuxin Ding and Xiaoling Xia and Sheng Chen and Ye Li}, title = {A malware detection method based on family behavior graph}, journal = {Comput. Secur.}, volume = {73}, pages = {73--86}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.007}, doi = {10.1016/J.COSE.2017.10.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DingXCL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GanesanMS18, author = {Vennila Ganesan and M. S. K. Manikandan and M. N. Suresh}, title = {Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network}, journal = {Comput. Secur.}, volume = {73}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.003}, doi = {10.1016/J.COSE.2017.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GanesanMS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GoelJ18, author = {Diksha Goel and Ankit Kumar Jain}, title = {Mobile phishing attacks and defence mechanisms: State of art and open research challenges}, journal = {Comput. Secur.}, volume = {73}, pages = {519--544}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.006}, doi = {10.1016/J.COSE.2017.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GoelJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Gomez-Hernandez18, author = {Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and L. {\'{A}}lvarez{-}Gonz{\'{a}}lez and Pedro Garc{\'{\i}}a{-}Teodoro}, title = {R-Locker: Thwarting ransomware action through a honeyfile-based approach}, journal = {Comput. Secur.}, volume = {73}, pages = {389--398}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.019}, doi = {10.1016/J.COSE.2017.11.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Gomez-Hernandez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GratianBCDG18, author = {Margaret Gratian and Sruthi Bandi and Michel Cukier and Josiah Dykstra and Amy Ginther}, title = {Correlating human traits and cyber security behavior intentions}, journal = {Comput. Secur.}, volume = {73}, pages = {345--358}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.015}, doi = {10.1016/J.COSE.2017.11.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GratianBCDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoZ18, author = {Yimin Guo and Zhenfeng Zhang}, title = {{LPSE:} Lightweight password-strength estimation for password meters}, journal = {Comput. Secur.}, volume = {73}, pages = {507--518}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.07.012}, doi = {10.1016/J.COSE.2017.07.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamedDK18, author = {Tarfa Hamed and Rozita Dara and Stefan C. Kremer}, title = {Network intrusion detection system based on recursive feature addition and bigram technique}, journal = {Comput. Secur.}, volume = {73}, pages = {137--155}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.011}, doi = {10.1016/J.COSE.2017.10.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamedDK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Hatfield18, author = {Joseph M. Hatfield}, title = {Social engineering in cybersecurity: The evolution of a concept}, journal = {Comput. Secur.}, volume = {73}, pages = {102--113}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.008}, doi = {10.1016/J.COSE.2017.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Hatfield18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Horsman18, author = {Graeme Horsman}, title = {Framework for Reliable Experimental Design {(FRED):} {A} research framework to ensure the dependable interpretation of digital data for digital forensics}, journal = {Comput. Secur.}, volume = {73}, pages = {294--306}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.009}, doi = {10.1016/J.COSE.2017.11.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Horsman18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JamilKAAJJ18, author = {Fuzel Jamil and Abid Khan and Adeel Anjum and Mansoor Ahmed and Farhana Jabeen and Nadeem Javaid}, title = {Secure provenance using an authenticated data structure approach}, journal = {Comput. Secur.}, volume = {73}, pages = {34--56}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.005}, doi = {10.1016/J.COSE.2017.10.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JamilKAAJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaropoulosNX18, author = {Georgios Karopoulos and Christoforos Ntantogian and Christos Xenakis}, title = {{MASKER:} Masking for privacy-preserving aggregation in the smart grid ecosystem}, journal = {Comput. Secur.}, volume = {73}, pages = {307--325}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.008}, doi = {10.1016/J.COSE.2017.11.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaropoulosNX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinPL18, author = {Chih{-}Hung Lin and Hsing{-}Kuo Pao and Jian{-}Wei Liao}, title = {Efficient dynamic malware analysis using virtual time control mechanics}, journal = {Comput. Secur.}, volume = {73}, pages = {359--373}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.010}, doi = {10.1016/J.COSE.2017.11.010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinPL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuoXHWF18, author = {Yuchuan Luo and Ming Xu and Kai Huang and Dongsheng Wang and Shaojing Fu}, title = {Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing}, journal = {Comput. Secur.}, volume = {73}, pages = {492--506}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.12.004}, doi = {10.1016/J.COSE.2017.12.004}, timestamp = {Thu, 25 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LuoXHWF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Macia-Fernandez18, author = {Gabriel Maci{\'{a}}{-}Fern{\'{a}}ndez and Jos{\'{e}} Camacho and Roberto Mag{\'{a}}n{-}Carri{\'{o}}n and Pedro Garc{\'{\i}}a{-}Teodoro and Roberto Ther{\'{o}}n}, title = {UGR'16: {A} new dataset for the evaluation of cyclostationarity-based network IDSs}, journal = {Comput. Secur.}, volume = {73}, pages = {411--424}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.004}, doi = {10.1016/J.COSE.2017.11.004}, timestamp = {Thu, 30 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Macia-Fernandez18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoZZXZ18, author = {Yunlong Mao and Yuan Zhang and Xiaoyan Zhang and Fengyuan Xu and Sheng Zhong}, title = {Location privacy in public access points positioning: An optimization and geometry approach}, journal = {Comput. Secur.}, volume = {73}, pages = {425--438}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.005}, doi = {10.1016/J.COSE.2017.11.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoZZXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengesP18, author = {Florian Menges and G{\"{u}}nther Pernul}, title = {A comparative analysis of incident reporting formats}, journal = {Comput. Secur.}, volume = {73}, pages = {87--101}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.009}, doi = {10.1016/J.COSE.2017.10.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MengesP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatsakisCPMP18, author = {Constantinos Patsakis and Athanasios Charemis and Achilleas Papageorgiou and Dimitrios Mermigas and Sotirios Pirounias}, title = {The market's response toward privacy and mass surveillance: The Snowden aftermath}, journal = {Comput. Secur.}, volume = {73}, pages = {194--206}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.002}, doi = {10.1016/J.COSE.2017.11.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatsakisCPMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SepczukK18, author = {Mariusz Sepczuk and Zbigniew Kotulski}, title = {A new risk-based authentication management model oriented on user's experience}, journal = {Comput. Secur.}, volume = {73}, pages = {17--33}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.002}, doi = {10.1016/J.COSE.2017.10.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SepczukK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeiHZQZZ18, author = {Hang Wei and Guan{-}Yu Hu and Zhi{-}Jie Zhou and Peili Qiao and Zhiguo Zhou and Youmin Zhang}, title = {A new {BRB} model for security-state assessment of cloud computing based on the impact of external and internal environments}, journal = {Comput. Secur.}, volume = {73}, pages = {207--218}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.003}, doi = {10.1016/J.COSE.2017.11.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WeiHZQZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zhuang18, author = {Yan Zhuang}, title = {The performance cost of software obfuscation for Android applications}, journal = {Comput. Secur.}, volume = {73}, pages = {57--72}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.10.004}, doi = {10.1016/J.COSE.2017.10.004}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zhuang18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.