


default search action
Computers & Security, Volume 86
Volume 86, September 2019
- Erzhou Zhu, Peng Wen, Kanqi Ni, Ruhui Ma:
Implementation of an effective dynamic concolic execution framework for analyzing binary programs. 1-27 - Manmeet Singh
, Maninder Singh
, Sanmeet Kaur
:
Issues and challenges in DNS based botnet detection: A survey. 28-52 - Jie Gu, Lihong Wang, Huiwen Wang, Shanshan Wang
:
A novel approach to intrusion detection using SVM ensemble with feature augmentation. 53-62 - Zyad Elkhadir
, Mohammed Benattou
:
A cyber network attack detection based on GM Median Nearest Neighbors LDA. 63-74 - Matias Dodel
, Gustavo S. Mesch
:
An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices. 75-91 - B. K. S. P. Kumar Raju, G. Geethakumari:
SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment. 92-111
- Yuncong Zhang
, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. 112-131
- Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong
:
Anonymous authentication scheme for smart home environment with provable security. 132-146
- Markus Ring
, Sarah Wunderlich, Deniz Scheuring, Dieter Landes
, Andreas Hotho:
A survey of network-based intrusion detection data sets. 147-167 - Michele Scalas
, Davide Maiorca
, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. 168-182 - Mahendra Pratap Singh, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. 183-205
- Ashish Rajendra Sai, Jim Buckley, Andrew Le Gear
:
Assessing the security implication of Bitcoin exchange rates. 206-222
- Prosanta Gope:
LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. 223-237
- Jen-Wei Hu
, Lo-Yao Yeh
, Shih-Wei Liao, Chu-Sing Yang:
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices. 238-252
- Alex Norta
, Raimundas Matulevicius
, Benjamin Leiding
:
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. 253-269 - Gueltoum Bendiab
, Stavros Shiaeles
, Samia Boucherkha, Bogdan V. Ghita
:
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. 270-290 - Zouhair Chiba
, Noreddine Abghour
, Khalid Moussaid
, Amina El Omri
, Mohamed Rida
:
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. 291-317 - Gauhar Ali
, Naveed Ahmad
, Yue Cao
, Muhammad Asif, Haitham S. Cruickshank, Qazi Ejaz Ali
:
Blockchain based permission delegation and access control in Internet of Things (BACI). 318-334 - Diego F. Aranha
, Pedro Barbosa, Thiago N. C. Cardoso, Caio Lüders Araújo, Paulo Matias
:
The return of software vulnerabilities in the Brazilian voting machine. 335-349 - Ivano Bongiovanni
:
The least secure places in the universe? A systematic literature review on information security management in higher education. 350-357 - Sajjad Haider, Tehsin Kanwal, Adeel Anjum
, Saif Ur Rehman Malik
, Ahmed Khan
, Abid Khan
, Umar Manzoor
:
An efficient privacy preserving protocol for dynamic continuous data collection. 358-371 - Atiye Sadat Hashemi
, Saeed Mozaffari
:
Secure deep neural networks using adversarial image generation and training with Noise-GAN. 372-387 - Wei Bai
, Zhisong Pan
, Shize Guo, Zhe Chen, Shiming Xia:
MDC-Checker: A novel network risk assessment framework for multiple domain configurations. 388-401 - Atif Ahmad
, Jeb Webb, Kevin C. Desouza
, James Boorman:
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. 402-418 - Manuel Huber
, Julian Horsch
, Junaid Ali, Sascha Wessel:
Freeze and Crypt: Linux kernel support for main memory encryption. 420-436 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:
Outsourcing scheme of ABE encryption secure against malicious adversary. 437-452 - Jannik Dreier
, Maxime Puys
, Marie-Laure Potet, Pascal Lafourcade
, Jean-Louis Roch:
Formally and practically verifying flow properties in industrial systems. 453-470 - Alireza Jolfaei
, Krishna Kant:
A lightweight integrity protection scheme for low latency smart grid applications. 471-483 - Diogo Barradas, Tiago Brito
, David Duarte, Nuno Santos
, Luís E. T. Rodrigues:
Forensic analysis of communication records of messaging applications from physical memory. 484-497 - Lake Bu
, Mark G. Karpovsky, Michel A. Kinsy:
Bulwark: Securing implantable medical devices communication channels. 498-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.