Search dblp for Publications

export results for "toc:db/journals/compsec/compsec61.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BalachandranSTT16,
  author       = {Vivek Balachandran and
                  Sufatrio and
                  Darell J. J. Tan and
                  Vrizlynn L. L. Thing},
  title        = {Control flow obfuscation for Android applications},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {72--93},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.003},
  doi          = {10.1016/J.COSE.2016.05.003},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BalachandranSTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoshmafLSLLRBH16,
  author       = {Yazan Boshmaf and
                  Dionysios Logothetis and
                  Georgos Siganos and
                  Jorge Ler{\'{\i}}a and
                  Jos{\'{e}} Lorenzo and
                  Matei Ripeanu and
                  Konstantin Beznosov and
                  Hassan Halawa},
  title        = {{\'{I}}ntegro: Leveraging victim prediction for robust fake account
                  detection in large scale OSNs},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {142--168},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.005},
  doi          = {10.1016/J.COSE.2016.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoshmafLSLLRBH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CanforaMV16,
  author       = {Gerardo Canfora and
                  Francesco Mercaldo and
                  Corrado Aaron Visaggio},
  title        = {An {HMM} and structural entropy based detector for Android malware:
                  An empirical study},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {1--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.04.009},
  doi          = {10.1016/J.COSE.2016.04.009},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CanforaMV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FlowerdayT16,
  author       = {Stephen V. Flowerday and
                  Tite Tuyikeze},
  title        = {Information security policy development and implementation: The what,
                  how and who},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {169--183},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.002},
  doi          = {10.1016/J.COSE.2016.06.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FlowerdayT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KearneyK16,
  author       = {Wayne D. Kearney and
                  Hennie A. Kruger},
  title        = {Can perceptual differences account for enigmatic information security
                  behaviour in an organisation?},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {46--58},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.006},
  doi          = {10.1016/J.COSE.2016.05.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KearneyK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LineMH16,
  author       = {Maria Bartnes and
                  Nils Brede Moe and
                  Poul E. Heegaard},
  title        = {The future of information security incident management training: {A}
                  case study of electrical power companies},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {32--45},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.004},
  doi          = {10.1016/J.COSE.2016.05.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LineMH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Rrushi16,
  author       = {Julian L. Rrushi},
  title        = {{NIC} displays to thwart malware attacks mounted from within the {OS}},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {59--71},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.002},
  doi          = {10.1016/J.COSE.2016.05.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Rrushi16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenYXYG16,
  author       = {Chao Shen and
                  Tianwen Yu and
                  Haodi Xu and
                  Gengshan Yang and
                  Xiaohong Guan},
  title        = {User practice in password security: An empirical study of real-life
                  passwords in the wild},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {130--141},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.007},
  doi          = {10.1016/J.COSE.2016.05.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenYXYG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TranCFW16,
  author       = {Hiep Tran and
                  Enrique Campos{-}N{\'{a}}{\~{n}}ez and
                  Pavel Fomin and
                  James S. Wasek},
  title        = {Cyber resilience recovery model to combat zero-day malware attacks},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {19--31},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.05.001},
  doi          = {10.1016/J.COSE.2016.05.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TranCFW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Uzunov16,
  author       = {Anton V. Uzunov},
  title        = {A survey of security solutions for distributed publish/subscribe systems},
  journal      = {Comput. Secur.},
  volume       = {61},
  pages        = {94--129},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.04.008},
  doi          = {10.1016/J.COSE.2016.04.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Uzunov16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics