Search dblp for Publications

export results for "toc:db/journals/compsec/compsec62.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BajwaD16,
  author       = {Garima Bajwa and
                  Ram Dantu},
  title        = {Neurokey: Towards a new paradigm of cancelable biometrics-based key
                  generation using electroencephalograms},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {95--113},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.001},
  doi          = {10.1016/J.COSE.2016.06.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BajwaD16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GhasemiGolTB16,
  author       = {Mohammad GhasemiGol and
                  Hassan Takabi and
                  Abbas Ghaemi Bafghi},
  title        = {A foresight model for intrusion response management},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {73--94},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.005},
  doi          = {10.1016/J.COSE.2016.06.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GhasemiGolTB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HassanzadehXSGP16,
  author       = {Amin Hassanzadeh and
                  Zhaoyan Xu and
                  Radu Stoleru and
                  Guofei Gu and
                  Michalis Polychronakis},
  title        = {{PRIDE:} {A} practical intrusion detection system for resource constrained
                  wireless mesh networks},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {114--132},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.007},
  doi          = {10.1016/J.COSE.2016.06.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HellalR16,
  author       = {Aya Hellal and
                  Lotfi Ben Romdhane},
  title        = {Minimal contrast frequent pattern mining for malware detection},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {19--32},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.004},
  doi          = {10.1016/J.COSE.2016.06.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HellalR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangWBI16,
  author       = {Rui Jiang and
                  Xianglong Wu and
                  Bharat K. Bhargava},
  title        = {{SDSS-MAC:} Secure data sharing scheme in multi-authority cloud storage
                  systems},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {193--212},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.007},
  doi          = {10.1016/J.COSE.2016.07.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangWBI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JohnsonGLE16,
  author       = {Pontus Johnson and
                  Dan Gorton and
                  Robert Lagerstr{\"{o}}m and
                  Mathias Ekstedt},
  title        = {Time between vulnerability disclosures: {A} measure of software product
                  vulnerability},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {278--295},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.004},
  doi          = {10.1016/J.COSE.2016.08.004},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JohnsonGLE16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKJJBKY16,
  author       = {Yonggon Kim and
                  Ohmin Kwon and
                  Jin Soo Jang and
                  Seongwook Jin and
                  Hyeongboo Baek and
                  Brent ByungHoon Kang and
                  Hyunsoo Yoon},
  title        = {On-demand bootstrapping mechanism for isolated cryptographic operations
                  on commodity accelerators},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {33--48},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.006},
  doi          = {10.1016/J.COSE.2016.06.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKJJBKY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KnowlesBM16,
  author       = {William Knowles and
                  Alistair Baron and
                  Tim McGarr},
  title        = {The simulated security assessment ecosystem: Does penetration testing
                  need standardisation?},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {296--316},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.002},
  doi          = {10.1016/J.COSE.2016.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KnowlesBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LangerSSK16,
  author       = {Lucie Langer and
                  Florian Skopik and
                  Paul Smith and
                  Markus Kammerstetter},
  title        = {From old to new: Assessing cybersecurity risks for an evolving smart
                  grid},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {165--176},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.008},
  doi          = {10.1016/J.COSE.2016.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LangerSSK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lopriore16,
  author       = {Lanfranco Lopriore},
  title        = {Access control lists in password capability environments},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {317--327},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.005},
  doi          = {10.1016/J.COSE.2016.08.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lopriore16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillerWAG16,
  author       = {Simon Miller and
                  Christian Wagner and
                  Uwe Aickelin and
                  Jonathan M. Garibaldi},
  title        = {Modelling cyber-security experts' decision making processes using
                  aggregation operators},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {229--245},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.001},
  doi          = {10.1016/J.COSE.2016.08.001},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MillerWAG16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ModicTTLSS16,
  author       = {Jolanda Modic and
                  Rub{\'{e}}n Trapero and
                  Ahmed Taha and
                  Jesus Luna and
                  Miha Stopar and
                  Neeraj Suri},
  title        = {Novel efficient techniques for real-time cloud security assessment},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {1--18},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.06.003},
  doi          = {10.1016/J.COSE.2016.06.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ModicTTLSS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NeisseSGF16,
  author       = {Ricardo Neisse and
                  Gary Steri and
                  Dimitris Geneiatakis and
                  Igor Nai Fovino},
  title        = {A privacy enforcing framework for Android applications},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {257--277},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.005},
  doi          = {10.1016/J.COSE.2016.07.005},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NeisseSGF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NguyenGSV16,
  author       = {Hai Nguyen and
                  Vinod Ganapathy and
                  Abhinav Srivastava and
                  Shivaramakrishnan Vaidyanathan},
  title        = {Exploring infrastructure support for app-based services on cloud platforms},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {177--192},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.009},
  doi          = {10.1016/J.COSE.2016.07.009},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NguyenGSV16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NunezGL16,
  author       = {David Nu{\~{n}}ez and
                  M. Carmen Fern{\'{a}}ndez Gago and
                  Jesus Luna},
  title        = {Eliciting metrics for accountability of cloud systems},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {149--164},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.003},
  doi          = {10.1016/J.COSE.2016.07.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NunezGL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RazaqueR16,
  author       = {Abdul Razaque and
                  Syed S. Rizvi},
  title        = {Triangular data privacy-preserving model for authenticating all key
                  stakeholders in a cloud environment},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {328--347},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.006},
  doi          = {10.1016/J.COSE.2016.08.006},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RazaqueR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SaezMCDC16,
  author       = {Jose Sanchez del Rio Saez and
                  Daniela Moctezuma and
                  Cristina Conde and
                  Isaac Mart{\'{\i}}n de Diego and
                  Enrique Cabello},
  title        = {Automated border control e-gates and facial recognition systems},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {49--72},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.001},
  doi          = {10.1016/J.COSE.2016.07.001},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SaezMCDC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangLZL16,
  author       = {Zhenjun Tang and
                  Huan Lao and
                  Xianquan Zhang and
                  Kai Liu},
  title        = {Robust image hashing via {DCT} and {LLE}},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {133--148},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.006},
  doi          = {10.1016/J.COSE.2016.07.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangLZL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VarshneyMA16,
  author       = {Gaurav Varshney and
                  Manoj Misra and
                  Pradeep K. Atrey},
  title        = {A phish detector using lightweight search features},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {213--228},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.08.003},
  doi          = {10.1016/J.COSE.2016.08.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VarshneyMA16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WanZW16,
  author       = {Zhiguo Wan and
                  Wen Tao Zhu and
                  Guilin Wang},
  title        = {{PRAC:} Efficient privacy protection for vehicle-to-grid communications
                  in the smart grid},
  journal      = {Comput. Secur.},
  volume       = {62},
  pages        = {246--256},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.cose.2016.07.004},
  doi          = {10.1016/J.COSE.2016.07.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WanZW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics