


default search action
Computers & Security, Volume 65
Volume 65, March 2017
- Marko Niemimaa:
Information systems continuity process: Conceptual foundations for the study of the "social". 1-13 - Hossein Siadati
, Toan Nguyen
, Payas Gupta, Markus Jakobsson, Nasir D. Memon
:
Mind your SMSes: Mitigating social engineering in second factor authentication. 14-28 - Faheem Zafar, Abid Khan
, Saif Ur Rehman Malik
, Mansoor Ahmed
, Adeel Anjum, Majid Iqbal Khan, Nadeem Javed, Masoom Alam, Fuzel Jamil:
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends. 29-49 - Razieh Nokhbeh Zaeem
, Monisha Manoharan, Yongpeng Yang, K. Suzanne Barber:
Modeling and analysis of identity threat behaviors through text mining of identity theft stories. 50-63 - Eun Hee Park, Jongwoo Kim, Young Soon Park:
The role of information security learning and individual factors in disclosing patients' health information. 64-76 - Keyun Ruan:
Introducing cybernomics: A unifying economic framework for measuring cyber risk. 77-89 - Bahman Rashidi
, Carol J. Fung, Elisa Bertino:
Android resource usage risk assessment using hidden Markov model and online learning. 90-107 - June-ho Bang, Young-Jong Cho, Kyungran Kang:
Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model. 108-120 - Ali Feizollah
, Nor Badrul Anuar
, Rosli Salleh
, Guillermo Suarez-Tangil
, Steven Furnell
:
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection. 121-134 - Abdulla Amin Aburomman
, Mamun Bin Ibne Reaz
:
A survey of intrusion detection systems based on ensemble and hybrid classifiers. 135-152 - Masooda N. Bashir
, Colin Wee, Nasir D. Memon
, Boyi Guo
:
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool. 153-165 - Alexander Motzek, Ralf Möller
:
Context- and bias-free probabilistic mission impact assessment. 166-186 - Wenlin Han, Yang Xiao
:
NFD: Non-technical loss fraud detection in Smart Grid. 187-201 - Mingxu Yi, Jinxia Wei, Lingwei Song:
Efficient integrity verification of replicated data in cloud computing system. 202-212 - Weizhi Meng
, Wenjuan Li
, Lam-for Kwok
, Kim-Kwang Raymond Choo
:
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones. 213-229 - Shahid Alam
, Zhengyang Qu, Ryan D. Riley
, Yan Chen, Vaibhav Rastogi:
DroidNative: Automating and optimizing detection of Android native code malware variants. 230-246 - Haribabu Kandi, Deepak Mishra, Gorthi R. K. Sai Subrahmanyam
:
Exploring the learning capabilities of convolutional neural networks for robust image watermarking. 247-268 - Majeed Alajeely
, Robin Doss
, Asma'a Ahmad, Vicky H. Mak-Hau
:
Defense against packet collusion attacks in opportunistic networks. 269-282 - Hatem Ismail, Daniel Germanus, Neeraj Suri
:
P2P routing table poisoning: A quorum-based sanitizing approach. 283-299 - Jan Meszaros, Alena Buchalcevová
:
Introducing OSSF: A framework for online service cybersecurity risk management. 300-313 - Zhaomin Chen
, Chai Kiat Yeo
, Bu-Sung Lee, Chiew Tong Lau:
Detection of network anomalies using Improved-MSPCA with sketches. 314-328 - Hongliang Liang, Mingyu Li, Jian Xu, Wenying Hu, Xiaoxiao Pei, Xiaodong Jia, Yan Song:
vmOS: A virtualization-based, secure desktop system. 329-343 - Karanpreet Singh, Paramvir Singh, Krishan Kumar
:
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges. 344-372 - Rudresh Dwivedi, Somnath Dey, Ramveer Singh, Aditya Prasad:
A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping. 373-386 - Neminath Hubballi, Nikhil Tripathi
:
A closer look into DHCP starvation attack in wireless networks. 387-404 - Naipeng Dong
, Hugo L. Jonker
, Jun Pang:
Formal modelling and analysis of receipt-free auction protocols in applied pi. 405-432

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.