![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec42.bht:"
@article{DBLP:journals/compsec/0001YLCXL14, author = {Xin Dong and Jiadi Yu and Yuan Luo and Yingying Chen and Guangtao Xue and Minglu Li}, title = {Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing}, journal = {Comput. Secur.}, volume = {42}, pages = {151--164}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.002}, doi = {10.1016/J.COSE.2013.12.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0001YLCXL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadBS14, author = {Atif Ahmad and Rachelle Bosua and Rens Scheepers}, title = {Protecting organizational competitive advantage: {A} knowledge leakage perspective}, journal = {Comput. Secur.}, volume = {42}, pages = {27--39}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.001}, doi = {10.1016/J.COSE.2014.01.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadBS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AllamFF14, author = {Sean Allam and Stephen Flowerday and Ethan Flowerday}, title = {Smartphone information security awareness: {A} victim of operational pressures}, journal = {Comput. Secur.}, volume = {42}, pages = {56--65}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.005}, doi = {10.1016/J.COSE.2014.01.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AllamFF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AmthorKP14, author = {Peter Amthor and Winfried E. K{\"{u}}hnhauser and Anja P{\"{o}}lck}, title = {WorSE: {A} Workbench for Model-based Security Engineering}, journal = {Comput. Secur.}, volume = {42}, pages = {40--55}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.002}, doi = {10.1016/J.COSE.2014.01.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AmthorKP14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Goseva-PopstojanovaADPM14, author = {Katerina Goseva{-}Popstojanova and Goce Anastasovski and Ana Dimitrijevikj and Risto Pantev and Brandon Miller}, title = {Characterization and classification of malicious Web traffic}, journal = {Comput. Secur.}, volume = {42}, pages = {92--115}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.006}, doi = {10.1016/J.COSE.2014.01.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Goseva-PopstojanovaADPM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KwonN14, author = {Taekyoung Kwon and Sarang Na}, title = {TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems}, journal = {Comput. Secur.}, volume = {42}, pages = {137--150}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.001}, doi = {10.1016/J.COSE.2013.12.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KwonN14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaBargeMS14, author = {Ralph LaBarge and Thomas A. Mazzuchi and Shahram Sarkani}, title = {An automated system for rapid and secure device sanitization}, journal = {Comput. Secur.}, volume = {42}, pages = {77--91}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.008}, doi = {10.1016/J.COSE.2014.01.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaBargeMS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MichalopoulosMJ14, author = {Dimitrios Michalopoulos and Ioannis Mavridis and Marija Jankovic}, title = {{GARS:} Real-time system for identification, assessment and control of cyber grooming attacks}, journal = {Comput. Secur.}, volume = {42}, pages = {177--190}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.004}, doi = {10.1016/J.COSE.2013.12.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MichalopoulosMJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NtantogianAMX14, author = {Christoforos Ntantogian and Dimitris Apostolopoulos and Giannis Marinakis and Christos Xenakis}, title = {Evaluating the privacy of Android mobile applications under forensic analysis}, journal = {Comput. Secur.}, volume = {42}, pages = {66--76}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.004}, doi = {10.1016/J.COSE.2014.01.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkKKWK14, author = {Joon S. Park and Kevin A. Kwiat and Charles A. Kamhoua and Jonathan White and Sookyung Kim}, title = {Trusted Online Social Network {(OSN)} services with optimal data management}, journal = {Comput. Secur.}, volume = {42}, pages = {116--136}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.02.004}, doi = {10.1016/J.COSE.2014.02.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkKKWK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParsonsMBPJ14, author = {Kathryn Parsons and Agata McCormac and Marcus A. Butavicius and Malcolm Robert Pattinson and Cate Jerram}, title = {Determining employee awareness using the Human Aspects of Information Security Questionnaire {(HAIS-Q)}}, journal = {Comput. Secur.}, volume = {42}, pages = {165--176}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.003}, doi = {10.1016/J.COSE.2013.12.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParsonsMBPJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RathgebB14, author = {Christian Rathgeb and Christoph Busch}, title = {Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters}, journal = {Comput. Secur.}, volume = {42}, pages = {1--12}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.005}, doi = {10.1016/J.COSE.2013.12.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RathgebB14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchrittwieserKKHLMW14, author = {Sebastian Schrittwieser and Stefan Katzenbeisser and Peter Kieseberg and Markus Huber and Manuel Leithner and Martin Mulazzani and Edgar R. Weippl}, title = {Covert Computation - Hiding code in code through compile-time obfuscation}, journal = {Comput. Secur.}, volume = {42}, pages = {13--26}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2013.12.006}, doi = {10.1016/J.COSE.2013.12.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VirvilisG14, author = {Nikos Virvilis and Dimitris Gritzalis}, title = {Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks}, journal = {Comput. Secur.}, volume = {42}, pages = {191--192}, year = {2014}, url = {https://doi.org/10.1016/j.cose.2014.01.007}, doi = {10.1016/J.COSE.2014.01.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VirvilisG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.