![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 70
Volume 70, September 2017
- Mashael AlSabah, Alin Tomescu, Ilia A. Lebedev, Dimitrios N. Serpanos
, Srinivas Devadas:
PriviPK: Certificate-less and secure email communication. 1-15 - Shitharth Selvarajan
, David Prince Winston
:
An enhanced optimization based algorithm for intrusion detection in SCADA network. 16-26 - Emma Osborn
, Andrew Simpson
:
On small-scale IT users' system architectures and cyber security: A UK case study. 27-50 - Hongqi Zhang, Cheng Lei
, Dexian Chang, Yingjie Yang:
Network moving target defense technique based on collaborative mutation. 51-71 - Adéle da Veiga
, Nico Martins:
Defining and identifying dominant information security cultures and subcultures. 72-94 - Monali Mavani
, Krishna Asawa:
Modeling and analyses of IP spoofing attack in 6LoWPAN network. 95-110 - Duy Dang-Pham
, Siddhi Pittayachawan
, Vince Bruno
:
Investigation into the formation of information security influence: Network analysis of an emerging organisation. 111-123 - Awais Yousaf
, Asim Loan, Radu F. Babiceanu, Leandros A. Maglaras
, Onaiza Yousaf:
Architectural and information theoretic perspectives of physical layer intruders for direct sequence spread spectrum systems. 124-143 - Hassina Nacer
, Nabil Djebari
, Hachem Slimani
, Djamil Aïssani
:
A distributed authentication model for composite Web services. 144-178 - Xingjie Yu, Zhan Wang, Yingjiu Li, Liang Li, Wen Tao Zhu, Li Song:
EvoPass: Evolvable graphical password against shoulder-surfing attacks. 179-198 - Mujahid Mohsin, Zahid Anwar
, Farhat Zaman, Ehab Al-Shaer:
IoTChecker: A data-driven framework for security analytics of Internet of Things configurations. 199-223 - Wenhao Fan
, Yaohui Sang, Daishuai Zhang, Ran Sun, Yuan'an Liu:
DroidInjector: A process injection-based dynamic tracking system for runtime behaviors of Android applications. 224-237 - Muhammad Fahad Umer, Muhammad Sher, Yaxin Bi:
Flow-based intrusion detection: Techniques and challenges. 238-254 - Chaouki Khammassi
, Saoussen Krichen
:
A GA-LR wrapper approach for feature selection in network intrusion detection. 255-277 - Brett Eterovic-Soric, Kim-Kwang Raymond Choo
, Helen Ashman
, Sameera Mubarak:
Stalking the stalkers - detecting and deterring stalking behaviours using technology: A review. 278-289 - Changho Choi
, Nohyun Kwak, Jin Soo Jang
, DaeHee Jang, Kuenwhee Oh, Kyungsoo Kwag
, Brent ByungHoon Kang
:
S-OpenSGX: A system-level platform for exploring SGX enclave-based computing. 290-306 - Alma Oracevic, Serkan Akbas
, Suat Ozdemir
:
Secure and reliable object tracking in wireless sensor networks. 307-318 - Pablo Moriano
, Soumya Achar, L. Jean Camp:
Incompetents, criminals, or spies: Macroeconomic analysis of routing anomalies. 319-334 - Nathan L. Clarke
, Fudong Li, Steven Furnell:
A novel privacy preserving user identification approach for network traffic. 335-350 - Christian Callegari
, Stefano Giordano
, Michele Pagano
:
An information-theoretic method for the detection of anomalies in network traffic. 351-365 - Grzegorz Spyra, William J. Buchanan
, Elias Ekonomou:
Sticky policies approach within cloud computing. 366-375 - Nik Thompson, Tanya Jane McGill, Xuequn Wang
:
"Security begins at home": Determinants of home computer and mobile device security behavior. 376-391 - Shweta Bhandari
, Wafa Ben Jaballah, Vineeta Jain
, Vijay Laxmi
, Akka Zemmari
, Manoj Singh Gaur, Mohamed Mosbah
, Mauro Conti:
Android inter-app communication threats and detection techniques. 392-421 - Ángel Manuel Guerrero-Higueras, Noemí DeCastro-García
, Francisco Javier Rodríguez-Lera
, Vicente Matellán
:
Empirical analysis of cyber-attacks to an indoor real time localization system for autonomous robots. 422-435 - Sajid Nazir, Shushma Patel
, Dilip Patel:
Assessing and augmenting SCADA cyber security: A survey of techniques. 436-454 - Vesna S. Ruzicic, Zivadin M. Micic:
Creating a strategic national knowledge architecture: A comparative analysis of knowledge source innovation in the ICS subfields of multimedia and IT security. 455-466 - Allan Cook, Helge Janicke
, Richard Smith, Leandros A. Maglaras
:
The industrial control system cyber defence triage process. 467-481 - Rishikesh Sahay, Gregory Blanc
, Zonghua Zhang
, Hervé Debar
:
ArOMA: An SDN based autonomic DDoS mitigation framework. 482-499 - Fabrizio Biondi, Sébastien Josse, Axel Legay, Thomas Sirvent:
Effectiveness of synthesis in concolic deobfuscation. 500-515 - Xiaolu Zhang, Ibrahim M. Baggili
, Frank Breitinger
:
Breaking into the vault: Privacy, security and forensic analysis of Android vault applications. 516-531 - Abdul Razaque
, Syed S. Rizvi
:
Secure data aggregation using access control and authentication for wireless sensor networks. 532-545 - Adnan Ahmad
, Brian Whitworth, Furkh Zeshan
, Elisa Bertino, Robert S. Friedman:
Extending social networks with delegation. 546-564 - Paulo Henrique Pisani, Norman Poh
, André C. P. L. F. de Carvalho
, Ana Carolina Lorena:
Score normalization applied to adaptive biometric systems. 565-580 - Shuyuan Mary Ho
, Mónica Ocasio Velázquez, Cheryl Booth:
Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption. 581-595 - Seyed Mohammad RezaSaadat Beheshti, Panos Liatsis, Muttukrishnan Rajarajan:
A CAPTCHA model based on visual psychophysics: Using the brain to distinguish between human users and automated computer bots. 596-617 - Khaled Dassouki, Haïdar Safa, Mohamed Nassar
, Abbas Hijazi:
Protecting from Cloud-based SIP flooding attacks by leveraging temporal and structural fingerprints. 618-633 - Rui Zhao, Samantha John
, Stacy Karas, Cara Bussell, Jennifer Roberts
, Daniel Six, Brandon Gavett
, Chuan Yue:
Design and evaluation of the highly insidious extreme phishing attacks. 634-647 - Yulong Fu, Zheng Yan
, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. 648-662 - Duncan Ki-Aries, Shamal Faily
:
Persona-centred information security awareness. 663-674 - Nir Nissim
, Ran Yahalom, Yuval Elovici:
USB-based attacks. 675-688 - Paolo Palumbo, Luiza Sayfullina, Dmitriy Komashinskiy, Emil Eirola
, Juha Karhunen:
A pragmatic android malware detection procedure. 689-701 - David Martínez Rodríguez, Jordi Nin
, Miguel Núñez-del-Prado
:
Towards the adaptation of SDC methods to stream mining. 702-722 - Aleksandar Hudic, Paul Smith, Edgar R. Weippl:
Security assurance assessment methodology for hybrid clouds. 723-743 - Carlos Javier Hernández-Castro, María D. R.-Moreno
, David F. Barrero
, Stuart Gibson:
Using machine learning to identify common flaws in CAPTCHA design: FunCAPTCHA case analysis. 744-756
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.