Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec48.bht:"
@article{DBLP:journals/compsec/AlamHTS15, author = {Shahid Alam and R. Nigel Horspool and Issa Traor{\'{e}} and Ibrahim Sogukpinar}, title = {A framework for metamorphic malware analysis and real-time detection}, journal = {Comput. Secur.}, volume = {48}, pages = {212--233}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.011}, doi = {10.1016/J.COSE.2014.10.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlamHTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarnesH15, author = {David J. Barnes and Julio C. Hernandez{-}Castro}, title = {On the limits of engine analysis for cheating detection in chess}, journal = {Comput. Secur.}, volume = {48}, pages = {58--73}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.002}, doi = {10.1016/J.COSE.2014.10.002}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarnesH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Dang-PhamP15, author = {Duy Dang{-}Pham and Siddhi Pittayachawan}, title = {Comparing intention to avoid malware across contexts in a BYOD-enabled Australian university: {A} Protection Motivation Theory approach}, journal = {Comput. Secur.}, volume = {48}, pages = {281--297}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.11.002}, doi = {10.1016/J.COSE.2014.11.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Dang-PhamP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoMC15, author = {Quang Do and Ben Martini and Kim{-}Kwang Raymond Choo}, title = {Exfiltrating data from Android devices}, journal = {Comput. Secur.}, volume = {48}, pages = {74--91}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.016}, doi = {10.1016/J.COSE.2014.10.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoMC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FriedbergSSF15, author = {Ivo Friedberg and Florian Skopik and Giuseppe Settanni and Roman Fiedler}, title = {Combating advanced persistent threats: From network event correlation to incident detection}, journal = {Comput. Secur.}, volume = {48}, pages = {35--57}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.09.006}, doi = {10.1016/J.COSE.2014.09.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FriedbergSSF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KentLN15, author = {Alexander D. Kent and Lorie M. Liebrock and Joshua C. Neil}, title = {Authentication graphs: Analyzing user behavior within an enterprise network}, journal = {Comput. Secur.}, volume = {48}, pages = {150--166}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.09.001}, doi = {10.1016/J.COSE.2014.09.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KentLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinSQ15, author = {Xi Jun Lin and Lin Sun and Haipeng Qu}, title = {Insecurity of an anonymous authentication for privacy-preserving IoT target-driven applications}, journal = {Comput. Secur.}, volume = {48}, pages = {142--149}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.08.002}, doi = {10.1016/J.COSE.2014.08.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinSQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopezTMP15, author = {Daniel D{\'{\i}}az L{\'{o}}pez and Gin{\'{e}}s D{\'{o}}lera Tormo and F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Managing {XACML} systems in distributed environments through Meta-Policies}, journal = {Comput. Secur.}, volume = {48}, pages = {92--115}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.004}, doi = {10.1016/J.COSE.2014.10.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LopezTMP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuJJL15, author = {Jianfeng Lu and James B. D. Joshi and Lei Jin and Yiding Liu}, title = {Towards complexity analysis of User Authorization Query problem in {RBAC}}, journal = {Comput. Secur.}, volume = {48}, pages = {116--130}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.003}, doi = {10.1016/J.COSE.2014.10.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuJJL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaengMLN15, author = {YoungJae Maeng and Aziz Mohaisen and Mun{-}Kyu Lee and DaeHun Nyang}, title = {Transaction authentication using complementary colors}, journal = {Comput. Secur.}, volume = {48}, pages = {167--181}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.001}, doi = {10.1016/J.COSE.2014.10.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaengMLN15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MesquidaP15, author = {Antoni Llu{\'{\i}}s Mesquida and Ant{\`{o}}nia Mas Picahaco}, title = {Implementing information security best practices on software lifecycle processes: The {ISO/IEC} 15504 Security Extension}, journal = {Comput. Secur.}, volume = {48}, pages = {19--34}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.09.003}, doi = {10.1016/J.COSE.2014.09.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MesquidaP15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MontesdiocaM15, author = {Gustavo Percio Zimmermann Montesdioca and Ant{\^{o}}nio Carlos Gastaud Ma{\c{c}}ada}, title = {Measuring user satisfaction with information security practices}, journal = {Comput. Secur.}, volume = {48}, pages = {267--280}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.015}, doi = {10.1016/J.COSE.2014.10.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MontesdiocaM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NissimCGE15, author = {Nir Nissim and Aviad Cohen and Chanan Glezer and Yuval Elovici}, title = {Detection of malicious {PDF} files and directions for enhancements: {A} state-of-the art survey}, journal = {Comput. Secur.}, volume = {48}, pages = {246--266}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.014}, doi = {10.1016/J.COSE.2014.10.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NissimCGE15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OzcelikB15, author = {Ilker {\"{O}}z{\c{c}}elik and Richard R. Brooks}, title = {Deceiving entropy based DoS detection}, journal = {Comput. Secur.}, volume = {48}, pages = {234--245}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.013}, doi = {10.1016/J.COSE.2014.10.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OzcelikB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ReeceS15, author = {R. P. Reece and Bernd Carsten Stahl}, title = {The professionalisation of information security: Perspectives of {UK} practitioners}, journal = {Comput. Secur.}, volume = {48}, pages = {182--195}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.007}, doi = {10.1016/J.COSE.2014.10.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ReeceS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenH15, author = {Shu{-}Yuan Shen and Li{-}Hong Huang}, title = {A data hiding scheme using pixel value differencing and improving exploiting modification directions}, journal = {Comput. Secur.}, volume = {48}, pages = {131--141}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.07.008}, doi = {10.1016/J.COSE.2014.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YanHLZD15, author = {Qiang Yan and Jin Han and Yingjiu Li and Jianying Zhou and Robert H. Deng}, title = {Leakage-resilient password entry: Challenges, design, and evaluation}, journal = {Comput. Secur.}, volume = {48}, pages = {196--211}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.10.008}, doi = {10.1016/J.COSE.2014.10.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YanHLZD15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zineddine15, author = {Mhamed Zineddine}, title = {Vulnerabilities and mitigation techniques toning in the cloud: {A} cost and vulnerabilities coverage optimization approach using Cuckoo search algorithm with L{\'{e}}vy flights}, journal = {Comput. Secur.}, volume = {48}, pages = {1--18}, year = {2015}, url = {https://doi.org/10.1016/j.cose.2014.09.002}, doi = {10.1016/J.COSE.2014.09.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Zineddine15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.