default search action
Computers & Security, Volume 56
Volume 56, February 2016
- Yulia Cherdantseva, Pete Burnap, Andrew Blyth, Peter Eden, Kevin Jones, Hugh Soulsby, Kristan Stoddart:
A review of cyber security risk assessment methods for SCADA systems. 1-27 - Fabio Pierazzi, Sara Casolari, Michele Colajanni, Mirco Marchetti:
Exploratory security analytics for anomaly detection. 28-49 - Diego A. López García:
A flexible e-voting scheme for debate tools. 50-62 - Gurpreet Dhillon, Romilla Syed, Cristiane Pedron:
Interpreting information security culture: An organizational transformation case study. 63-69 - Nader Sohrabi Safa, Rossouw von Solms, Steven Furnell:
Information security policy compliance model in organizations. 70-82 - Gizem Ögütçü, Özlem Müge Testik, Oumout Chouseinoglou:
Analysis of personal information security behavior and awareness. 83-93 - Christian D'Orazio, Kim-Kwang Raymond Choo:
An adversary model to evaluate DRM protection of video contents on iOS devices. 94-110 - Karanpreet Singh, Paramvir Singh, Krishan Kumar:
A systematic review of IP traceback schemes for denial of service attacks. 111-139 - Mun-Kyu Lee, Hyeonjin Nam, Dong Kyue Kim:
Secure bimodal PIN-entry method using audio signals. 140-150 - Graeme Horsman:
The challenges surrounding the regulation of anonymous communication provision in the United Kingdom. 151-162
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.