default search action
Computers & Security, Volume 52
Volume 52, July 2015
- Walter Cerroni, Gianluca Moro, Roberto Pasolini, Marco Ramilli:
Decentralized detection of network attacks through P2P data clustering of SNMP data. 1-16 - Christoforos Ntantogian, Stefanos Malliaros, Christos Xenakis:
Gaithashing: A two-factor authentication scheme based on gait features. 17-32 - Aristide Fattori, Andrea Lanzi, Davide Balzarotti, Engin Kirda:
Hypervisor-based malware protection with AccessMiner. 33-50 - Erzhou Zhu, Feng Liu, Zuo Wang, Alei Liang, Yiwen Zhang, Xuejian Li, Xuejun Li:
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs. 51-69 - Mohamed Elyas, Atif Ahmad, Sean B. Maynard, Andrew Lonie:
Digital forensic readiness: Expert perspectives on a theoretical framework. 70-89 - Nikos Virvilis, Alexios Mylonas, Nikolaos Tsalis, Dimitris Gritzalis:
Security Busters: Web browser security vs. rogue sites. 90-105 - Yongzhi Wang, Jinpeng Wei:
Toward protecting control flow confidentiality in cloud-based computation. 106-127 - Aggeliki Tsohou, Maria Karyda, Spyros Kokolakis:
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs. 128-141 - Jennifer Cowley, Frank L. Greitzer, Bronwyn Woods:
Effect of network infrastructure factors on information system risk judgments. 142-158 - Ting Wang, Dongyao Ji:
Comment on "Design and formal security evaluation of NeMHIP". 159-161
- Padmanabhan Krishnan, Kostyantyn Vorobyov:
Enforcement of privacy requirements. 164-177 - Bernd Zwattendorfer, Daniel Slamanig:
Design strategies for a privacy-friendly Austrian eID system in the public cloud. 178-193 - Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram:
The design of phishing studies: Challenges for researchers. 194-206 - Sascha Wessel, Manuel Huber, Frederic Stumpf, Claudia Eckert:
Improving mobile device security with operating system-level virtualization. 207-220 - Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath:
Workload modelling for mix-based anonymity services. 221-233 - Jehyun Lee, Suyeon Lee, Heejo Lee:
Screening smartphone applications using malware family signatures. 234-249
- Jeong Hyun Yi, Kyung Hyune Rhee, Gail-Joon Ahn:
Preface - WISA 2014. 250 - Aziz Mohaisen, Omar Alrawi, Manar Mohaisen:
AMAL: High-fidelity, behavior-based automated malware analysis and classification. 251-266 - Eunhyun Kim, Kyungwon Park, Hyoungshick Kim, Jaeseung Song:
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk. 267-275 - Hwajeong Seo, Zhe Liu, Yasuyuki Nogami, Jongseok Choi, Howon Kim:
Montgomery multiplication and squaring for Optimal Prime Fields. 276-291
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.