Stop the war!
Остановите войну!
for scientists:
default search action
Computers & Security, Volume 40
Volume 40, February 2014
- Alessandro Armando, Serena Elisa Ponta:
Model checking authorization requirements in business processes. 1-22 - Gowtham Ramesh, Ilango Krishnamurthi:
A comprehensive and efficacious architecture for detecting phishing webpages. 23-37 - Daniel Bachlechner, Stefan Thalmann, Ronald Maier:
Security and compliance challenges in complex IT outsourcing arrangements: A multi-stakeholder perspective. 38-59 - Constantinos Patsakis, Kleanthis Dellios, Mélanie Bouroche:
Towards a distributed secure in-vehicle communication architecture for modern vehicles. 60-74 - Jie Yang, Haitao Liu, Zuping Zhang, Jian Dong:
Extended DMTP: A new protocol for improved graylist categorization. 75-83 - Christos Xenakis, Christoforos Ntantogian:
An advanced persistent threat in 3G networks: Attacking the home network from roaming networks. 84-94 - Sajal Bhatia, Desmond Allan Schmidt, George M. Mohay, Alan Tickle:
A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events. 95-107 - Dorothy E. Denning:
Framework and principles for active cyber defense. 108-113
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.