


default search action
Computers & Security, Volume 62
Volume 62, September 2016
- Jolanda Modic
, Rubén Trapero, Ahmed Taha, Jesus Luna, Miha Stopar, Neeraj Suri
:
Novel efficient techniques for real-time cloud security assessment. 1-18 - Aya Hellal
, Lotfi Ben Romdhane
:
Minimal contrast frequent pattern mining for malware detection. 19-32 - Yonggon Kim, Ohmin Kwon
, Jin Soo Jang
, Seongwook Jin, Hyeongboo Baek, Brent ByungHoon Kang, Hyunsoo Yoon:
On-demand bootstrapping mechanism for isolated cryptographic operations on commodity accelerators. 33-48 - Jose Sanchez del Rio Saez
, Daniela Moctezuma
, Cristina Conde
, Isaac Martín de Diego
, Enrique Cabello
:
Automated border control e-gates and facial recognition systems. 49-72 - Mohammad GhasemiGol
, Hassan Takabi, Abbas Ghaemi Bafghi:
A foresight model for intrusion response management. 73-94 - Garima Bajwa
, Ram Dantu:
Neurokey: Towards a new paradigm of cancelable biometrics-based key generation using electroencephalograms. 95-113 - Amin Hassanzadeh, Zhaoyan Xu, Radu Stoleru, Guofei Gu, Michalis Polychronakis:
PRIDE: A practical intrusion detection system for resource constrained wireless mesh networks. 114-132 - Zhenjun Tang, Huan Lao, Xianquan Zhang, Kai Liu:
Robust image hashing via DCT and LLE. 133-148 - David Nuñez, M. Carmen Fernández Gago, Jesus Luna:
Eliciting metrics for accountability of cloud systems. 149-164 - Lucie Langer, Florian Skopik
, Paul Smith, Markus Kammerstetter:
From old to new: Assessing cybersecurity risks for an evolving smart grid. 165-176 - Hai Nguyen, Vinod Ganapathy, Abhinav Srivastava, Shivaramakrishnan Vaidyanathan:
Exploring infrastructure support for app-based services on cloud platforms. 177-192 - Rui Jiang, Xianglong Wu, Bharat K. Bhargava:
SDSS-MAC: Secure data sharing scheme in multi-authority cloud storage systems. 193-212 - Gaurav Varshney, Manoj Misra, Pradeep K. Atrey:
A phish detector using lightweight search features. 213-228 - Simon Miller, Christian Wagner, Uwe Aickelin
, Jonathan M. Garibaldi
:
Modelling cyber-security experts' decision making processes using aggregation operators. 229-245 - Zhiguo Wan, Wen Tao Zhu, Guilin Wang:
PRAC: Efficient privacy protection for vehicle-to-grid communications in the smart grid. 246-256 - Ricardo Neisse, Gary Steri
, Dimitris Geneiatakis, Igor Nai Fovino:
A privacy enforcing framework for Android applications. 257-277 - Pontus Johnson
, Dan Gorton, Robert Lagerström
, Mathias Ekstedt:
Time between vulnerability disclosures: A measure of software product vulnerability. 278-295 - William Knowles, Alistair Baron
, Tim McGarr:
The simulated security assessment ecosystem: Does penetration testing need standardisation? 296-316 - Lanfranco Lopriore:
Access control lists in password capability environments. 317-327 - Abdul Razaque
, Syed S. Rizvi
:
Triangular data privacy-preserving model for authenticating all key stakeholders in a cloud environment. 328-347

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.