default search action
Computers & Security, Volume 39
Volume 39, November 2013
- David Zhao, Issa Traoré, Bassam Sayed, Wei Lu, Sherif Saad, Ali A. Ghorbani, Daniel Garant:
Botnet detection based on traffic behavior analysis and flow intervals. 2-16 - Dominik Herrmann, Christian Banse, Hannes Federrath:
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic. 17-33 - Ruben Rios, Jose Antonio Onieva, Javier López:
Covert communications through network configuration messages. 34-46 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Enforcing dynamic write privileges in data outsourcing. 47-63 - Joaquín García-Alfaro, Frédéric Cuppens, Nora Cuppens-Boulahia, Salvador Martínez Perez, Jordi Cabot:
Management of stateful firewall misconfiguration. 64-85 - Hemanth Khambhammettu, Sofiene Boulares, Kamel Adi, Luigi Logrippo:
A framework for risk assessment in access control systems. 86-103 - Alessandro Armando, Alessio Merlo, Mauro Migliardi, Luca Verderame:
Breaking and fixing the Android Launching Flow. 104-115
- Isaac Agudo, Ruben Rios, Javier López:
A privacy-aware continuous authentication scheme for proximity-based access control. 117-126 - Heather Crawford, Karen Renaud, Tim Storer:
A framework for continuous, transparent mobile device authentication. 127-136 - Mohammad Omar Derawi, Patrick Bours:
Gait and activity recognition using commercial phones. 137-144
- Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't make excuses! Discouraging neutralization to reduce IT policy violation. 145-159 - Zouheir Trabelsi, Liren Zhang, Safaa Zeidan, Kilani Ghoudi:
Dynamic traffic awareness statistical model for firewall performance enhancement. 160-172 - Xinjie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Zhe Liu, Jean-François Gallais:
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES. 173-189 - Saman A. Zonouz, Parisa Haghani:
Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior. 190-200 - Manisha Sharma, Shamik Sural, Jaideep Vaidya, Vijayalakshmi Atluri:
AMTRAC: An administrative model for temporal role-based access control. 201-218 - M. Ajmal Azad, Ricardo Morla:
Caller-REP: Detecting unwanted calls with caller social strength. 219-236 - Nathalie Baracaldo, James Joshi:
An adaptive risk management and access control framework to mitigate insider threats. 237-254 - Chun Guo, Yajian Zhou, Yuan Ping, Shoushan Luo, Yu-Ping Lai, Zhongkun Zhang:
Efficient intrusion detection using representative instances. 255-267 - Reza Azmi, Boshra Pishgoo:
SHADuDT: Secure hypervisor-based anomaly detection using danger theory. 268-288 - Lubica Staneková, Martin Stanek:
Analysis of dictionary methods for PIN selection. 289-298 - Chris I. Djamaludin, Ernest Foo, Peter I. Corke:
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI. 299-314 - Yuxin Ding, Xuebing Yuan, Ke Tang, Xiao Xiao, Yibin Zhang:
A fast malware detection algorithm based on objective-oriented association mining. 315-324 - Rima Belguechi, Estelle Cherrier, Christophe Rosenberger, Samy Ait-Aoudia:
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates. 325-339 - Ying-Dar Lin, Yuan-Cheng Lai, Chien-Hung Chen, Hao-Chuan Tsai:
Identifying android malicious repackaged applications by thread-grained system call sequences. 340-350 - Yosra Ben Saied, Alexis Olivereau, Djamal Zeghlache, Maryline Laurent:
Trust management system design for the Internet of Things: A context-aware and multi-service approach. 351-365 - Dongwon Seo, Heejo Lee, Adrian Perrig:
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks. 366-385 - Mario Silic:
Dual-use open source security software in organizations - Dilemma: Help or hinder? 386-395 - Debi Ashenden, M. Angela Sasse:
CISOs and organisational culture: Their own worst enemy? 396-405 - Georgios Karopoulos, Paolo Mori, Fabio Martinelli:
Usage control in SIP-based multimedia delivery. 406-418 - Young Hee Park, Douglas S. Reeves, Mark Stamp:
Deriving common malware behavior through graph clustering. 419-430 - Peng Zhou, Xiapu Luo, Rocky K. C. Chang:
Inference attacks against trust-based onion routing: Trust degree to the rescue. 431-446 - Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai:
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. 447-459 - Ying-Dar Lin, Yuan-Cheng Lai, Cheng-Yuan Ho, Wei-Hsuan Tai:
Creditability-based weighted voting for reducing false positives and negatives in intrusion detection. 460-474 - Marios Anagnostopoulos, Georgios Kambourakis, Panagiotis Kopanos, Georgios Louloudakis, Stefanos Gritzalis:
DNS amplification attack revisited. 475-485 - Chris G. Hocking, Steven M. Furnell, Nathan L. Clarke, Paul L. Reynolds:
Co-operative user identity verification using an Authentication Aura. 486-502
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.