![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 83
Volume 83, June 2019
- Leon Böck, Emmanouil Vasilomanolakis
, Jan Helge Wolf, Max Mühlhäuser:
Autonomously detecting sensors in fully distributed botnets. 1-13 - Ram Mahesh Yadav:
Effective analysis of malware detection in cloud computing. 14-21 - George Tsakalidis
, Kostas Vergidis
, Sophia G. Petridou
, Maro Vlachopoulou:
A cybercrime incident architecture with adaptive response policy. 22-37 - Alberto Urueña-López, Fernando Mateo, Julio Navío-Marco
, José María Martínez-Martínez
, Juan Gómez-Sanchís
, Joan Vila-Francés
, Antonio José Serrano-López
:
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps. 38-51 - Erhan Sindiren, Bünyamin Ciylan
:
Application model for privileged account access control system in enterprise networks. 52-67 - Karim Akilal, Hachem Slimani
, Mawloud Omar:
A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity. 68-78 - Jinsoo Jang
, Brent ByungHoon Kang:
Securing a communication channel for the trusted execution environment. 79-92 - Parisa Kaghazgaran, Hassan Takabi, Flannery Hope Currin, Armando Soriano
:
Communication-efficient private distance calculation based on oblivious transfer extensions. 93-105 - Feng Yu, Qiang Liu
, Shu Wu, Liang Wang, Tieniu Tan:
Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts. 106-121 - Sandeep Gupta
, Attaullah Buriro
, Bruno Crispo
:
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms. 122-139 - Max Smith-Creasey, Muttukrishnan Rajarajan:
A novel word-independent gesture-typing continuous authentication scheme for mobile devices. 140-150 - Abir Mhenni
, Estelle Cherrier, Christophe Rosenberger
, Najoua Essoukri Ben Amara:
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password. 151-166 - DaeHee Jang, Yunjong Jeong, Sungman Lee, Minjoon Park, Kuenhwan Kwak, Donguk Kim
, Brent ByungHoon Kang:
Rethinking anti-emulation techniques for large-scale software deployment. 182-200 - Seow Wooi Liew, Nor Fazlida Mohd Sani
, Mohd Taufik Abdullah, Razali Yaakob, Mohd Yunus Sharum:
An effective security alert mechanism for real-time phishing tweet detection on Twitter. 201-207 - Weijie Han
, Jingfeng Xue, Yong Wang
, Lu Huang, Zixiao Kong, Limin Mao:
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics. 208-233 - Florian Gottwalt
, Elizabeth Chang
, Tharam S. Dillon:
CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques. 234-245 - Routhu Srinivasa Rao
, Alwyn Roshan Pais
:
Jail-Phish: An improved search engine based phishing detection system. 246-267 - Nikos Chondros
, Bingsheng Zhang
, Thomas Zacharias
, Panos Diamantopoulos
, Stathis Maneas
, Christos Patsonakis, Alex Delis, Aggelos Kiayias, Mema Roussopoulos:
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems. 268-299 - Vanga Odelu
, Sourav Saha
, Rajendra Prasath
, Lakshminarayana Sadineni
, Mauro Conti
, Minho Jo
:
Efficient privacy preserving device authentication in WBANs for industrial e-health applications. 300-312 - Morta Vitunskaite, Ying He
, Thomas Brandstetter
, Helge Janicke
:
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership. 313-331 - Majid Hatamian, Jetzabel M. Serna, Kai Rannenberg:
Revealing the unrevealed: Mining smartphone users privacy perception on app markets. 332-353 - Joseph M. Hatfield
:
Virtuous human hacking: The ethics of social engineering in penetration-testing. 354-366 - Louise Axon
, Jassim Happa, Michael Goldsmith, Sadie Creese:
Hearing attacks in network data: An effectiveness study. 367-388 - Vineeta Jain
, Vijay Laxmi
, Manoj Singh Gaur
, Mohamed Mosbah
:
ETGuard: Detecting D2D attacks using wireless Evil Twins. 389-405
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.