Search dblp for Publications

export results for "toc:db/journals/compsec/compsec42.bht:"

 download as .bib file

@article{DBLP:journals/compsec/0001YLCXL14,
  author       = {Xin Dong and
                  Jiadi Yu and
                  Yuan Luo and
                  Yingying Chen and
                  Guangtao Xue and
                  Minglu Li},
  title        = {Achieving an effective, scalable and privacy-preserving data sharing
                  service in cloud computing},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {151--164},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.002},
  doi          = {10.1016/J.COSE.2013.12.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0001YLCXL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadBS14,
  author       = {Atif Ahmad and
                  Rachelle Bosua and
                  Rens Scheepers},
  title        = {Protecting organizational competitive advantage: {A} knowledge leakage
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {27--39},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.001},
  doi          = {10.1016/J.COSE.2014.01.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadBS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AllamFF14,
  author       = {Sean Allam and
                  Stephen Flowerday and
                  Ethan Flowerday},
  title        = {Smartphone information security awareness: {A} victim of operational
                  pressures},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {56--65},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.005},
  doi          = {10.1016/J.COSE.2014.01.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AllamFF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AmthorKP14,
  author       = {Peter Amthor and
                  Winfried E. K{\"{u}}hnhauser and
                  Anja P{\"{o}}lck},
  title        = {WorSE: {A} Workbench for Model-based Security Engineering},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {40--55},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.002},
  doi          = {10.1016/J.COSE.2014.01.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AmthorKP14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Goseva-PopstojanovaADPM14,
  author       = {Katerina Goseva{-}Popstojanova and
                  Goce Anastasovski and
                  Ana Dimitrijevikj and
                  Risto Pantev and
                  Brandon Miller},
  title        = {Characterization and classification of malicious Web traffic},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {92--115},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.006},
  doi          = {10.1016/J.COSE.2014.01.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Goseva-PopstojanovaADPM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KwonN14,
  author       = {Taekyoung Kwon and
                  Sarang Na},
  title        = {TinyLock: Affordable defense against smudge attacks on smartphone
                  pattern lock systems},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {137--150},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.001},
  doi          = {10.1016/J.COSE.2013.12.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KwonN14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaBargeMS14,
  author       = {Ralph LaBarge and
                  Thomas A. Mazzuchi and
                  Shahram Sarkani},
  title        = {An automated system for rapid and secure device sanitization},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {77--91},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.008},
  doi          = {10.1016/J.COSE.2014.01.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaBargeMS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MichalopoulosMJ14,
  author       = {Dimitrios Michalopoulos and
                  Ioannis Mavridis and
                  Marija Jankovic},
  title        = {{GARS:} Real-time system for identification, assessment and control
                  of cyber grooming attacks},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {177--190},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.004},
  doi          = {10.1016/J.COSE.2013.12.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MichalopoulosMJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NtantogianAMX14,
  author       = {Christoforos Ntantogian and
                  Dimitris Apostolopoulos and
                  Giannis Marinakis and
                  Christos Xenakis},
  title        = {Evaluating the privacy of Android mobile applications under forensic
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {66--76},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.004},
  doi          = {10.1016/J.COSE.2014.01.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NtantogianAMX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkKKWK14,
  author       = {Joon S. Park and
                  Kevin A. Kwiat and
                  Charles A. Kamhoua and
                  Jonathan White and
                  Sookyung Kim},
  title        = {Trusted Online Social Network {(OSN)} services with optimal data management},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {116--136},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.02.004},
  doi          = {10.1016/J.COSE.2014.02.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkKKWK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParsonsMBPJ14,
  author       = {Kathryn Parsons and
                  Agata McCormac and
                  Marcus A. Butavicius and
                  Malcolm Robert Pattinson and
                  Cate Jerram},
  title        = {Determining employee awareness using the Human Aspects of Information
                  Security Questionnaire {(HAIS-Q)}},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {165--176},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.003},
  doi          = {10.1016/J.COSE.2013.12.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParsonsMBPJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RathgebB14,
  author       = {Christian Rathgeb and
                  Christoph Busch},
  title        = {Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom
                  filters},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {1--12},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.005},
  doi          = {10.1016/J.COSE.2013.12.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RathgebB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchrittwieserKKHLMW14,
  author       = {Sebastian Schrittwieser and
                  Stefan Katzenbeisser and
                  Peter Kieseberg and
                  Markus Huber and
                  Manuel Leithner and
                  Martin Mulazzani and
                  Edgar R. Weippl},
  title        = {Covert Computation - Hiding code in code through compile-time obfuscation},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {13--26},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2013.12.006},
  doi          = {10.1016/J.COSE.2013.12.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchrittwieserKKHLMW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VirvilisG14,
  author       = {Nikos Virvilis and
                  Dimitris Gritzalis},
  title        = {Automatic Defense Against Zero-day Polymorphic Worms in Communication
                  Networks},
  journal      = {Comput. Secur.},
  volume       = {42},
  pages        = {191--192},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.cose.2014.01.007},
  doi          = {10.1016/J.COSE.2014.01.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VirvilisG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics