default search action
Computers & Security, Volume 94
Volume 94, July 2020
- Nadjate Saidani, Kamel Adi, Mohand Saïd Allili:
A semantic-based classification approach for an enhanced spam detection. 101716 - Antonio Robles-González, Javier Parra-Arnau, Jordi Forné:
A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes. 101755 - Xinwen Hu, Yi Zhuang:
PHRiMA: A permission-based hybrid risk management framework for android apps. 101791 - Yimin Guo, Zhenfeng Zhang, Yajun Guo, Xiaowei Guo:
Nudging personalized password policies by understanding users' personality. 101801 - B. S. Radhika, N. V. Narendra Kumar, R. K. Shyamasundar, Parjanya Vyas:
Consistency analysis and flow secure enforcement of SELinux policies. 101816 - Blake D. Bryant, Hossein Saiedian:
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model. 101817 - Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang:
Compile-time code virtualization for android applications. 101821 - Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Duplicitous social media and data surveillance: An evaluation of privacy risk. 101822 - Keiichiro Oishi, Yuichi Sei, Yasuyuki Tahara, Akihiko Ohsuga:
Semantic diversity: Privacy considering distance between values of sensitive attribute. 101823 - Ye Dong, Xiaojun Chen, Liyan Shen, Dakui Wang:
EaSTFLy: Efficient and secure ternary federated learning. 101824 - Hyerean Jang, Moon Chan Park, Dong Hoon Lee:
IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision. 101828 - Martin Trnecka, Marketa Trneckova:
An incremental algorithm for the role mining problem. 101830 - Peter Matthew, Susan Canning:
An algorithmic approach for optimising biometric systems using liveness and coercion detection. 101831 - Eyasu Getahun Chekole, Sudipta Chattopadhyay, Martín Ochoa, Huaqun Guo, Unnikrishnan Cheramangalath:
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems. 101832 - Shawn Knox, Steven Moghadam, Kenny Patrick, Anh Phan, Kim-Kwang Raymond Choo:
What's really 'Happning'? A forensic analysis of Android and iOS Happn dating apps. 101833 - Pallavi Kaliyar, Wafa Ben Jaballah, Mauro Conti, Chhagan Lal:
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks. 101849 - Shahroz Tariq, Sangyup Lee, Huy Kang Kim, Simon S. Woo:
CAN-ADF: The controller area network attack detection framework. 101857 - Edwin Donald Frauenstein, Stephen Flowerday:
Susceptibility to phishing on social network sites: A personality information processing model. 101862 - Muhammad Shafiq, Zhihong Tian, Ali Kashif Bashir, Xiaojiang Du, Mohsen Guizani:
IoT malicious traffic identification using wrapper-based feature selection mechanisms. 101863 - Kexin Hu, Zhenfeng Zhang, Kaiwen Guo:
Corrigendum to "Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications" [Computers & Security, Volume 87, 2019, 101585]. 101878 - Yimin Guo, Zhenfeng Zhang:
Corrigendum to "LPSE: Lightweight password-strength estimation for password meters" [Computers & Security, Volume 73, 2018, Pages 507-518]. 101879 - Yimin Guo, Zhenfeng Zhang, Yajun Guo:
Corrigendum to "Optiwords: A new password policy for creating memorable and strong password" [Computers & Security, Volume 85, 2019, Pages 423-435]. 101880
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.