- Di Lu
, Ruidong Han
, Yue Wang, Yongzhi Wang, Xuewen Dong
, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. Comput. Secur. 97: 101922 (2020) - Masood Mansoori
, Ian Welch:
How do they find us? A study of geolocation tracking techniques of malicious web sites. Comput. Secur. 97: 101948 (2020) - Vasileios Mavroeidis, Joe Brule:
A nonproprietary language for the command and control of cyber defenses - OpenC2. Comput. Secur. 97: 101999 (2020) - Yair Meidan
, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai
:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. Comput. Secur. 97: 101968 (2020) - Mohamed Mejri, Hamdi Yahyaoui
, Azzam Mourad
, Mohamad Chehab:
A rewriting system for the assessment of XACML policies relationship. Comput. Secur. 97: 101957 (2020) - Shunmei Meng
, Zijian Gao, Qianmu Li
, Hao Wang
, Hong-Ning Dai
, Lianyong Qi
:
Security-Driven hybrid collaborative recommendation method for cloud-based iot services. Comput. Secur. 97: 101950 (2020) - Joachim Meyer
, Omer Dembinsky, Tal Raviv:
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation. Comput. Secur. 97: 101944 (2020) - Tianyue Mi
, Mengke Gou, Guangyu Zhou
, Yiqun Gan, Ralf Schwarzer
:
Effects of planning and action control on smartphone security behavior. Comput. Secur. 97: 101954 (2020) - Shravya Paruchuri, Andrew Case
, Golden G. Richard III
:
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools. Comput. Secur. 97: 101986 (2020) - Akash Suresh Patil, Rafik Hamza
, Alzubair Hassan, Nan Jiang
, Hongyang Yan, Jin Li:
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. Comput. Secur. 97: 101958 (2020) - Rizwan Ur Rahman, Deepak Singh Tomar:
New biostatistics features for detecting web bot activity on web applications. Comput. Secur. 97: 102001 (2020) - Jianguo Ren
, Chunming Zhang:
A differential game method against attacks in heterogeneous honeynet. Comput. Secur. 97: 101870 (2020) - Thiago S. Rocha
, Eduardo Souto, Khalil El-Khatib
:
Functionality-based mobile application recommendation system with security and privacy awareness. Comput. Secur. 97: 101972 (2020) - Ajish S
, K. S. Anil Kumar:
Iris template protection using double bloom filter based feature transformation. Comput. Secur. 97: 101985 (2020) - Xiuyan Shao
, Mikko T. Siponen
, Fufan Liu:
Shall we follow? Impact of reputation concern on information security managers' investment decisions. Comput. Secur. 97: 101961 (2020) - Shuyun Shi, Debiao He
, Li Li, Neeraj Kumar
, Muhammad Khurram Khan
, Kim-Kwang Raymond Choo
:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. Comput. Secur. 97: 101966 (2020) - Qizhang Sun
, Martijn C. Willemsen
, Bart P. Knijnenburg:
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing. Comput. Secur. 97: 101924 (2020) - Fei Tang, Boyang Ma
, Jinku Li, Fengwei Zhang, Jipeng Su, Jianfeng Ma:
RansomSpector: An introspection-based approach to detect crypto ransomware. Comput. Secur. 97: 101997 (2020) - Ngoc Hong Tran
, Nhien-An Le-Khac
, M. Tahar Kechadi
:
Lightweight privacy-Preserving data classification. Comput. Secur. 97: 101835 (2020) - Vinita Verma, Sunil Kumar Muttoo, V. B. Singh
:
Multiclass malware classification via first- and second-order texture statistics. Comput. Secur. 97: 101895 (2020) - Nana Wang, Mohan S. Kankanhalli:
Protecting sensitive place visits in privacy-preserving trajectory publishing. Comput. Secur. 97: 101949 (2020) - Zhijun Wu
, Wenzhi Feng, Meng Yue, Xinran Xu, Liang Liu:
Mitigation measures of collusive interest flooding attacks in named data networking. Comput. Secur. 97: 101971 (2020) - Runkai Yang
, Xiaolin Chang
, Jelena V. Misic, Vojislav B. Misic:
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. Comput. Secur. 97: 101956 (2020) - Chunyong Yin
, Bo Li
, Zhichao Yin:
A distributed sensing data anomaly detection scheme. Comput. Secur. 97: 101960 (2020) - Wenjing Zhang, Bo Jiang, Ming Li
, Ravi Tandon, Qiao Liu, Hui Li:
Aggregation-based location privacy: An information theoretic approach. Comput. Secur. 97: 101953 (2020) - Chuan Zhang, Chang Xu
, Liehuang Zhu
, Yanwei Li, Can Zhang, Huishu Wu:
An efficient and privacy-preserving truth discovery scheme in crowdsensing applications. Comput. Secur. 97: 101848 (2020) - Yuyang Zhou
, Guang Cheng, Shanqing Jiang
, Yuyu Zhao, Zihan Chen
:
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes. Comput. Secur. 97: 101976 (2020)