


default search action
Computers & Security, Volume 74
Volume 74, May 2018
- Alberto Bartoli
, Eric Medvet, Filippo Onesti:
Evil twins and WPA2 Enterprise: A coming security disaster? 1-11 - Daniel Conte de Leon
, Christopher E. Goes, Michael A. Haney, Axel W. Krings:
ADLES: Specifying, deploying, and sharing hands-on cyber-exercises. 12-40 - Omar Nakhila
, Muhammad Faisal Amjad, Erich Dondyk, Cliff C. Zou:
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients. 41-54 - Hao Wu
, Zhonghua Wang:
Multi-source fusion-based security detection method for heterogeneous networks. 55-70 - Asma'a Ahmad
, Robin Doss
, Majeed Alajeely, Sarab F. Al Rubeaai, Dua'a Ahmad:
Packet integrity defense mechanism in OppNets. 71-93 - Bhupendra Singh
, Upasna Singh
:
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability. 94-114 - Jana Medková
:
Composition attack against social network data. 115-129 - Valentin J. M. Manès, DaeHee Jang, Chanho Ryu, Brent ByungHoon Kang:
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions. 130-143 - Bander Ali Saleh Al-rimy
, Mohd Aizaini Maarof, Syed Zainudeen Mohd Shaid:
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions. 144-166 - Weixuan Mao, Zhongmin Cai, Yuan Yang
, Xiaohong Shi, Xiaohong Guan:
From big data to knowledge: A spatio-temporal approach to malware detection. 167-183 - Christopher N. Gutierrez
, Eugene H. Spafford
, Saurabh Bagchi, Thomas Yurek:
Reactive redundancy for data destruction protection (R2D2). 184-201 - Kaiyuan Kuang, Zhanyong Tang, Xiaoqing Gong, Dingyi Fang, Xiaojiang Chen, Zheng Wang
:
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling. 202-220 - Jan Stiborek
, Tomás Pevný
, Martin Rehák:
Probabilistic analysis of dynamic malware traces. 221-239 - Daniel Guerrero, Alin A. Carsteanu
, Julio B. Clempner:
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis. 240-257 - Victor Sucasas
, Georgios Mantas, Saud Althunibat
, Leonardo Oliveira, Angelos Antonopoulos
, Ifiok E. Otung
, Jonathan Rodriguez:
A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications. 258-274
- Kim-Kwang Raymond Choo
, Matt Bishop
, William Bradley Glisson
, Kara L. Nance:
Internet- and cloud-of-things cybersecurity research challenges and advances. 275-276 - Franco Callegati
, Saverio Giallorenzo
, Andrea Melis
, Marco Prandini
:
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective. 277-295 - Christopher M. Talbot, Michael A. Temple, Timothy J. Carbino, J. Addison Betances:
Detecting rogue attacks on commercial wireless Insteon home automation systems. 296-307 - Shaikh Shahriar Hassan, Soumik Das Bibon, Md. Shohrab Hossain
, Mohammed Atiquzzaman
:
Security threats in Bluetooth technology. 308-322 - Mansour Alali, Ahmad Almogren
, Mohammad Mehedi Hassan
, Iehab Al Rassan, Md. Zakirul Alam Bhuiyan
:
Improving risk assessment model of cyber security using fuzzy logic inference system. 323-339 - Amandeep Singh Sohal, Rajinder Sandhu, Sandeep K. Sood
, Victor Chang
:
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments. 340-354 - Flora Amato
, Aniello Castiglione
, Aniello De Santo
, Vincenzo Moscato, Antonio Picariello, Fabio Persia
, Giancarlo Sperlì:
Recognizing human behaviours in online social networks. 355-370 - Kosmas Pipyros
, Christos Thraskias, Lilian Mitrou, Dimitris Gritzalis, Theodoros K. Apostolopoulos:
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual. 371-383 - Raffaele Pizzolante, Arcangelo Castiglione
, Bruno Carpentieri, Alfredo De Santis
, Francesco Palmieri, Aniello Castiglione
:
On the protection of consumer genomic data in the Internet of Living Things. 384-400

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.