default search action
Computers & Security, Volume 83
Volume 83, June 2019
- Leon Böck, Emmanouil Vasilomanolakis, Jan Helge Wolf, Max Mühlhäuser:
Autonomously detecting sensors in fully distributed botnets. 1-13 - Ram Mahesh Yadav:
Effective analysis of malware detection in cloud computing. 14-21 - George Tsakalidis, Kostas Vergidis, Sophia G. Petridou, Maro Vlachopoulou:
A cybercrime incident architecture with adaptive response policy. 22-37 - Alberto Urueña-López, Fernando Mateo, Julio Navío-Marco, José María Martínez-Martínez, Juan Gómez-Sanchís, Joan Vila-Francés, Antonio José Serrano-López:
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps. 38-51 - Erhan Sindiren, Bünyamin Ciylan:
Application model for privileged account access control system in enterprise networks. 52-67 - Karim Akilal, Hachem Slimani, Mawloud Omar:
A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. 68-78 - Jinsoo Jang, Brent ByungHoon Kang:
Securing a communication channel for the trusted execution environment. 79-92 - Parisa Kaghazgaran, Hassan Takabi, Flannery Hope Currin, Armando Soriano:
Communication-efficient private distance calculation based on oblivious transfer extensions. 93-105 - Feng Yu, Qiang Liu, Shu Wu, Liang Wang, Tieniu Tan:
Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. 106-121 - Sandeep Gupta, Attaullah Buriro, Bruno Crispo:
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. 122-139 - Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel word-independent gesture-typing continuous authentication scheme for mobile devices. 140-150 - Abir Mhenni, Estelle Cherrier, Christophe Rosenberger, Najoua Essoukri Ben Amara:
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. 151-166 - DaeHee Jang, Yunjong Jeong, Sungman Lee, Minjoon Park, Kuenhwan Kwak, Donguk Kim, Brent ByungHoon Kang:
Rethinking anti-emulation techniques for large-scale software deployment. 182-200 - Seow Wooi Liew, Nor Fazlida Mohd Sani, Mohd Taufik Abdullah, Razali Yaakob, Mohd Yunus Sharum:
An effective security alert mechanism for real-time phishing tweet detection on Twitter. 201-207 - Weijie Han, Jingfeng Xue, Yong Wang, Lu Huang, Zixiao Kong, Limin Mao:
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. 208-233 - Florian Gottwalt, Elizabeth Chang, Tharam S. Dillon:
CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques. 234-245 - Routhu Srinivasa Rao, Alwyn Roshan Pais:
Jail-Phish: An improved search engine based phishing detection system. 246-267 - Nikos Chondros, Bingsheng Zhang, Thomas Zacharias, Panos Diamantopoulos, Stathis Maneas, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. 268-299 - Vanga Odelu, Sourav Saha, Rajendra Prasath, Lakshminarayana Sadineni, Mauro Conti, Minho Jo:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. 300-312 - Morta Vitunskaite, Ying He, Thomas Brandstetter, Helge Janicke:
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. 313-331 - Majid Hatamian, Jetzabel M. Serna, Kai Rannenberg:
Revealing the unrevealed: Mining smartphone users privacy perception on app markets. 332-353 - Joseph M. Hatfield:
Virtuous human hacking: The ethics of social engineering in penetration-testing. 354-366 - Louise Axon, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. 367-388 - Vineeta Jain, Vijay Laxmi, Manoj Singh Gaur, Mohamed Mosbah:
ETGuard: Detecting D2D attacks using wireless Evil Twins. 389-405
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.