Search dblp for Publications

export results for "toc:db/journals/compsec/compsec48.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlamHTS15,
  author       = {Shahid Alam and
                  R. Nigel Horspool and
                  Issa Traor{\'{e}} and
                  Ibrahim Sogukpinar},
  title        = {A framework for metamorphic malware analysis and real-time detection},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {212--233},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.011},
  doi          = {10.1016/J.COSE.2014.10.011},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlamHTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarnesH15,
  author       = {David J. Barnes and
                  Julio C. Hernandez{-}Castro},
  title        = {On the limits of engine analysis for cheating detection in chess},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {58--73},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.002},
  doi          = {10.1016/J.COSE.2014.10.002},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarnesH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Dang-PhamP15,
  author       = {Duy Dang{-}Pham and
                  Siddhi Pittayachawan},
  title        = {Comparing intention to avoid malware across contexts in a BYOD-enabled
                  Australian university: {A} Protection Motivation Theory approach},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {281--297},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.11.002},
  doi          = {10.1016/J.COSE.2014.11.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Dang-PhamP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoMC15,
  author       = {Quang Do and
                  Ben Martini and
                  Kim{-}Kwang Raymond Choo},
  title        = {Exfiltrating data from Android devices},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {74--91},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.016},
  doi          = {10.1016/J.COSE.2014.10.016},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoMC15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FriedbergSSF15,
  author       = {Ivo Friedberg and
                  Florian Skopik and
                  Giuseppe Settanni and
                  Roman Fiedler},
  title        = {Combating advanced persistent threats: From network event correlation
                  to incident detection},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {35--57},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.09.006},
  doi          = {10.1016/J.COSE.2014.09.006},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FriedbergSSF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KentLN15,
  author       = {Alexander D. Kent and
                  Lorie M. Liebrock and
                  Joshua C. Neil},
  title        = {Authentication graphs: Analyzing user behavior within an enterprise
                  network},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {150--166},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.09.001},
  doi          = {10.1016/J.COSE.2014.09.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KentLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinSQ15,
  author       = {Xi Jun Lin and
                  Lin Sun and
                  Haipeng Qu},
  title        = {Insecurity of an anonymous authentication for privacy-preserving IoT
                  target-driven applications},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {142--149},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.08.002},
  doi          = {10.1016/J.COSE.2014.08.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinSQ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopezTMP15,
  author       = {Daniel D{\'{\i}}az L{\'{o}}pez and
                  Gin{\'{e}}s D{\'{o}}lera Tormo and
                  F{\'{e}}lix G{\'{o}}mez M{\'{a}}rmol and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Managing {XACML} systems in distributed environments through Meta-Policies},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {92--115},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.004},
  doi          = {10.1016/J.COSE.2014.10.004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LopezTMP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuJJL15,
  author       = {Jianfeng Lu and
                  James B. D. Joshi and
                  Lei Jin and
                  Yiding Liu},
  title        = {Towards complexity analysis of User Authorization Query problem in
                  {RBAC}},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {116--130},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.003},
  doi          = {10.1016/J.COSE.2014.10.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuJJL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaengMLN15,
  author       = {YoungJae Maeng and
                  Aziz Mohaisen and
                  Mun{-}Kyu Lee and
                  DaeHun Nyang},
  title        = {Transaction authentication using complementary colors},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {167--181},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.001},
  doi          = {10.1016/J.COSE.2014.10.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaengMLN15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MesquidaP15,
  author       = {Antoni Llu{\'{\i}}s Mesquida and
                  Ant{\`{o}}nia Mas Picahaco},
  title        = {Implementing information security best practices on software lifecycle
                  processes: The {ISO/IEC} 15504 Security Extension},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {19--34},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.09.003},
  doi          = {10.1016/J.COSE.2014.09.003},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MesquidaP15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MontesdiocaM15,
  author       = {Gustavo Percio Zimmermann Montesdioca and
                  Ant{\^{o}}nio Carlos Gastaud Ma{\c{c}}ada},
  title        = {Measuring user satisfaction with information security practices},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {267--280},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.015},
  doi          = {10.1016/J.COSE.2014.10.015},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MontesdiocaM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NissimCGE15,
  author       = {Nir Nissim and
                  Aviad Cohen and
                  Chanan Glezer and
                  Yuval Elovici},
  title        = {Detection of malicious {PDF} files and directions for enhancements:
                  {A} state-of-the art survey},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {246--266},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.014},
  doi          = {10.1016/J.COSE.2014.10.014},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NissimCGE15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OzcelikB15,
  author       = {Ilker {\"{O}}z{\c{c}}elik and
                  Richard R. Brooks},
  title        = {Deceiving entropy based DoS detection},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {234--245},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.013},
  doi          = {10.1016/J.COSE.2014.10.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OzcelikB15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ReeceS15,
  author       = {R. P. Reece and
                  Bernd Carsten Stahl},
  title        = {The professionalisation of information security: Perspectives of {UK}
                  practitioners},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {182--195},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.007},
  doi          = {10.1016/J.COSE.2014.10.007},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ReeceS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenH15,
  author       = {Shu{-}Yuan Shen and
                  Li{-}Hong Huang},
  title        = {A data hiding scheme using pixel value differencing and improving
                  exploiting modification directions},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {131--141},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.07.008},
  doi          = {10.1016/J.COSE.2014.07.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenH15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YanHLZD15,
  author       = {Qiang Yan and
                  Jin Han and
                  Yingjiu Li and
                  Jianying Zhou and
                  Robert H. Deng},
  title        = {Leakage-resilient password entry: Challenges, design, and evaluation},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {196--211},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.10.008},
  doi          = {10.1016/J.COSE.2014.10.008},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YanHLZD15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zineddine15,
  author       = {Mhamed Zineddine},
  title        = {Vulnerabilities and mitigation techniques toning in the cloud: {A}
                  cost and vulnerabilities coverage optimization approach using Cuckoo
                  search algorithm with L{\'{e}}vy flights},
  journal      = {Comput. Secur.},
  volume       = {48},
  pages        = {1--18},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.cose.2014.09.002},
  doi          = {10.1016/J.COSE.2014.09.002},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Zineddine15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics