Search dblp for Publications

export results for "toc:db/journals/compsec/compsec75.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AveryW18,
  author    = {Jeffrey Avery and
               John Ross Wallrabenstein},
  title     = {Formally modeling deceptive patches using a game-based approach},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {182--190},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.02.009},
  doi       = {10.1016/j.cose.2018.02.009},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/AveryW18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CabajDKR18,
  author    = {Krzysztof Cabaj and
               Dulce Domingos and
               Zbigniew Kotulski and
               Ana Resp{\'{\i}}cio},
  title     = {Cybersecurity education: Evolution of the discipline and analysis
               of master programs},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {24--35},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.015},
  doi       = {10.1016/j.cose.2018.01.015},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/CabajDKR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenCMWGL18,
  author    = {Chen Chen and
               Baojiang Cui and
               Jinxin Ma and
               Runpu Wu and
               Jianchao Guo and
               Wenqian Liu},
  title     = {A systematic review of fuzzing techniques},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {118--137},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.02.002},
  doi       = {10.1016/j.cose.2018.02.002},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ChenCMWGL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChibaAMOR18,
  author    = {Zouhair Chiba and
               Noureddine Abghour and
               Khalid Moussaid and
               Amina El Omri and
               Mohamed Rida},
  title     = {A novel architecture combined with optimal parameters for back propagation
               neural networks applied to anomaly network intrusion detection},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {36--58},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.023},
  doi       = {10.1016/j.cose.2018.01.023},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ChibaAMOR18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuXC18,
  author    = {Bo Fu and
               Yang Xiao and
               Hui Chen},
  title     = {{FNF:} Flow-net based fingerprinting and its applications},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {167--181},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.02.005},
  doi       = {10.1016/j.cose.2018.02.005},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/FuXC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FurnellKEYL18,
  author    = {Steven Furnell and
               Warut Khern{-}am{-}nuai and
               Rawan Esmael and
               Weining Yang and
               Ninghui Li},
  title     = {Enhancing security behaviour by supporting the user},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {1--9},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.016},
  doi       = {10.1016/j.cose.2018.01.016},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/FurnellKEYL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HalabiB18,
  author    = {Talal Halabi and
               Martine Bella{\"{\i}}che},
  title     = {A broker-based framework for standardization and management of Cloud
               Security-SLAs},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {59--71},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.019},
  doi       = {10.1016/j.cose.2018.01.019},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/HalabiB18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HussainAZZKIIA18,
  author    = {Muzammil Hussain and
               Ahmed Al{-}Haiqi and
               A. A. Zaidan and
               B. B. Zaidan and
               Miss Laiha Mat Kiah and
               Salman Iqbal and
               Shaukat Iqbal and
               Mohamed Abdulnabi},
  title     = {A security framework for mHealth apps on Android platform},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {191--217},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.02.003},
  doi       = {10.1016/j.cose.2018.02.003},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/HussainAZZKIIA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MenardWL18,
  author    = {Philip Menard and
               Merrill Warkentin and
               Paul Benjamin Lowry},
  title     = {The impact of collectivism and psychological ownership on protection
               motivation: {A} cross-cultural examination},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {147--166},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.020},
  doi       = {10.1016/j.cose.2018.01.020},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/MenardWL18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillerGYC18,
  author    = {Daniel Bradford Miller and
               William Bradley Glisson and
               Mark Yampolskiy and
               Kim{-}Kwang Raymond Choo},
  title     = {Identifying 3D printer residual data via open-source documentation},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {10--23},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.011},
  doi       = {10.1016/j.cose.2018.01.011},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/MillerGYC18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Park18,
  author    = {Chang{-}Seop Park},
  title     = {One-time password based on hash chain without shared secret and re-registration},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {138--146},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.02.010},
  doi       = {10.1016/j.cose.2018.02.010},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/Park18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SayedTA18,
  author    = {Bassam Sayed and
               Issa Traor{\'{e}} and
               Amany Abdelhalim},
  title     = {If-transpiler: Inlining of hybrid flow-sensitive security monitor
               for JavaScript},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {92--117},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.017},
  doi       = {10.1016/j.cose.2018.01.017},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/SayedTA18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZangenehS18,
  author    = {Vahid Zangeneh and
               Mehdi Shajari},
  title     = {A cost-sensitive move selection strategy for moving target defense},
  journal   = {Comput. Secur.},
  volume    = {75},
  pages     = {72--91},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2017.12.013},
  doi       = {10.1016/j.cose.2017.12.013},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/compsec/ZangenehS18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics