


default search action
Computers & Security, Volume 68
Volume 68, July 2017
- Duy Dang-Pham
, Siddhi Pittayachawan
, Vince Bruno
:
Applications of social network analysis in behavioural information security research: Concepts and empirical analysis. 1-15 - Ruan de Clercq, Johannes Götzfried, David Übler, Pieter Maene
, Ingrid Verbauwhede
:
SOFIA: Software and control flow integrity architecture. 16-35 - Fauzia Idrees, Muttukrishnan Rajarajan, Mauro Conti, Thomas M. Chen
, Yogachandran Rahulamathavan
:
PIndroid: A novel Android malware detection system using ensemble learning methods. 36-46 - Weixuan Mao, Zhongmin Cai, Don Towsley
, Qian Feng, Xiaohong Guan:
Security importance assessment for system objects and malware detection. 47-68 - J. D. Ultra, Susan Pancho-Festin:
A simple model of separation of duty for access control models. 69-80 - Yosef Ashibani
, Qusay H. Mahmoud:
Cyber physical systems security: Analysis, challenges and solutions. 81-97 - Ting Dai
, Xiaolei Li, Behnaz Hassanshahi, Roland H. C. Yap, Zhenkai Liang
:
RoppDroid: Robust permission re-delegation prevention in Android inter-component communication. 98-111 - Christopher W. Badenhop, Scott R. Graham
, Benjamin W. P. Ramsey, Barry E. Mullins, Logan O. Mailloux:
The Z-Wave routing protocol and its security implications. 112-129 - Ulrik Franke
:
The cyber insurance market in Sweden. 130-144 - Stefan Bauer, Edward W. N. Bernroider
, Katharina Chudzikowski:
Prevention is better than cure! Designing information security awareness programs to overcome users' non-compliance with information security policies in banks. 145-159 - Ahmed Aleroud, Lina Zhou:
Phishing environments, techniques, and countermeasures: A survey. 160-196

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.