Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec62.bht:"
@article{DBLP:journals/compsec/BajwaD16, author = {Garima Bajwa and Ram Dantu}, title = {Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms}, journal = {Comput. Secur.}, volume = {62}, pages = {95--113}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.001}, doi = {10.1016/J.COSE.2016.06.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BajwaD16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GhasemiGolTB16, author = {Mohammad GhasemiGol and Hassan Takabi and Abbas Ghaemi Bafghi}, title = {A foresight model for intrusion response management}, journal = {Comput. Secur.}, volume = {62}, pages = {73--94}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.005}, doi = {10.1016/J.COSE.2016.06.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GhasemiGolTB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HassanzadehXSGP16, author = {Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and Guofei Gu and Michalis Polychronakis}, title = {{PRIDE:} {A} practical intrusion detection system for resource constrained wireless mesh networks}, journal = {Comput. Secur.}, volume = {62}, pages = {114--132}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.007}, doi = {10.1016/J.COSE.2016.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HassanzadehXSGP16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HellalR16, author = {Aya Hellal and Lotfi Ben Romdhane}, title = {Minimal contrast frequent pattern mining for malware detection}, journal = {Comput. Secur.}, volume = {62}, pages = {19--32}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.004}, doi = {10.1016/J.COSE.2016.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HellalR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangWBI16, author = {Rui Jiang and Xianglong Wu and Bharat K. Bhargava}, title = {{SDSS-MAC:} Secure data sharing scheme in multi-authority cloud storage systems}, journal = {Comput. Secur.}, volume = {62}, pages = {193--212}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.007}, doi = {10.1016/J.COSE.2016.07.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangWBI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JohnsonGLE16, author = {Pontus Johnson and Dan Gorton and Robert Lagerstr{\"{o}}m and Mathias Ekstedt}, title = {Time between vulnerability disclosures: {A} measure of software product vulnerability}, journal = {Comput. Secur.}, volume = {62}, pages = {278--295}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.004}, doi = {10.1016/J.COSE.2016.08.004}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JohnsonGLE16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKJJBKY16, author = {Yonggon Kim and Ohmin Kwon and Jin Soo Jang and Seongwook Jin and Hyeongboo Baek and Brent ByungHoon Kang and Hyunsoo Yoon}, title = {On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators}, journal = {Comput. Secur.}, volume = {62}, pages = {33--48}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.006}, doi = {10.1016/J.COSE.2016.06.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimKJJBKY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KnowlesBM16, author = {William Knowles and Alistair Baron and Tim McGarr}, title = {The simulated security assessment ecosystem: Does penetration testing need standardisation?}, journal = {Comput. Secur.}, volume = {62}, pages = {296--316}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.002}, doi = {10.1016/J.COSE.2016.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KnowlesBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LangerSSK16, author = {Lucie Langer and Florian Skopik and Paul Smith and Markus Kammerstetter}, title = {From old to new: Assessing cybersecurity risks for an evolving smart grid}, journal = {Comput. Secur.}, volume = {62}, pages = {165--176}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.008}, doi = {10.1016/J.COSE.2016.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LangerSSK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lopriore16, author = {Lanfranco Lopriore}, title = {Access control lists in password capability environments}, journal = {Comput. Secur.}, volume = {62}, pages = {317--327}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.005}, doi = {10.1016/J.COSE.2016.08.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lopriore16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MillerWAG16, author = {Simon Miller and Christian Wagner and Uwe Aickelin and Jonathan M. Garibaldi}, title = {Modelling cyber-security experts' decision making processes using aggregation operators}, journal = {Comput. Secur.}, volume = {62}, pages = {229--245}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.001}, doi = {10.1016/J.COSE.2016.08.001}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MillerWAG16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ModicTTLSS16, author = {Jolanda Modic and Rub{\'{e}}n Trapero and Ahmed Taha and Jesus Luna and Miha Stopar and Neeraj Suri}, title = {Novel efficient techniques for real-time cloud security assessment}, journal = {Comput. Secur.}, volume = {62}, pages = {1--18}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.06.003}, doi = {10.1016/J.COSE.2016.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ModicTTLSS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NeisseSGF16, author = {Ricardo Neisse and Gary Steri and Dimitris Geneiatakis and Igor Nai Fovino}, title = {A privacy enforcing framework for Android applications}, journal = {Comput. Secur.}, volume = {62}, pages = {257--277}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.005}, doi = {10.1016/J.COSE.2016.07.005}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NeisseSGF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NguyenGSV16, author = {Hai Nguyen and Vinod Ganapathy and Abhinav Srivastava and Shivaramakrishnan Vaidyanathan}, title = {Exploring infrastructure support for app-based services on cloud platforms}, journal = {Comput. Secur.}, volume = {62}, pages = {177--192}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.009}, doi = {10.1016/J.COSE.2016.07.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NguyenGSV16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NunezGL16, author = {David Nu{\~{n}}ez and M. Carmen Fern{\'{a}}ndez Gago and Jesus Luna}, title = {Eliciting metrics for accountability of cloud systems}, journal = {Comput. Secur.}, volume = {62}, pages = {149--164}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.003}, doi = {10.1016/J.COSE.2016.07.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NunezGL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RazaqueR16, author = {Abdul Razaque and Syed S. Rizvi}, title = {Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment}, journal = {Comput. Secur.}, volume = {62}, pages = {328--347}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.006}, doi = {10.1016/J.COSE.2016.08.006}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RazaqueR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SaezMCDC16, author = {Jose Sanchez del Rio Saez and Daniela Moctezuma and Cristina Conde and Isaac Mart{\'{\i}}n de Diego and Enrique Cabello}, title = {Automated border control e-gates and facial recognition systems}, journal = {Comput. Secur.}, volume = {62}, pages = {49--72}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.001}, doi = {10.1016/J.COSE.2016.07.001}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SaezMCDC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangLZL16, author = {Zhenjun Tang and Huan Lao and Xianquan Zhang and Kai Liu}, title = {Robust image hashing via {DCT} and {LLE}}, journal = {Comput. Secur.}, volume = {62}, pages = {133--148}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.006}, doi = {10.1016/J.COSE.2016.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangLZL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VarshneyMA16, author = {Gaurav Varshney and Manoj Misra and Pradeep K. Atrey}, title = {A phish detector using lightweight search features}, journal = {Comput. Secur.}, volume = {62}, pages = {213--228}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.08.003}, doi = {10.1016/J.COSE.2016.08.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VarshneyMA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WanZW16, author = {Zhiguo Wan and Wen Tao Zhu and Guilin Wang}, title = {{PRAC:} Efficient privacy protection for vehicle-to-grid communications in the smart grid}, journal = {Comput. Secur.}, volume = {62}, pages = {246--256}, year = {2016}, url = {https://doi.org/10.1016/j.cose.2016.07.004}, doi = {10.1016/J.COSE.2016.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WanZW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.