


default search action
Computers & Security, Volume 55
Volume 55, November 2015
- Jukka Ruohonen
, Sami Hyrynsalmi
, Ville Leppänen
:
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit. 1-20 - Nameer N. El-Emam
:
New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization. 21-45 - Romain Giot, Bernadette Dorizzi, Christophe Rosenberger
:
A review on the public benchmark databases for static keystroke dynamics. 46-61 - Yaoqi Jia, Yue Chen, Xinshu Dong, Prateek Saxena, Jian Mao, Zhenkai Liang
:
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning. 62-80 - Nima Zahadat
, Paul Blessner, Timothy D. Blackburn, Bill A. Olson:
BYOD security engineering: A framework and its analysis. 81-99 - Kresimir Solic, Hrvoje Ocevcic, Marin Golub:
The information systems' security level assessment model based on an ontology and evidential reasoning approach. 100-112 - Nikolaos Tsalis, Dimitris Gritzalis:
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques, Sudhanshu Chauhan, Nutan Kumar Panda, Elsevier Publications, USA (2015). 113 - Francois Mouton, Mercia M. Malan, Kai K. Kimppa
, H. S. Venter
:
Necessity for ethics in social engineering research. 114-127 - Vasilis Stavrou, Dimitris Gritzalis:
Introduction to Social Media Investigation - A hands-on Approach, Jennifer Golbeck, Elsevier Publications, USA (2015). 128-129 - Ting Yin, Gaobo Yang, Leida Li, Dengyong Zhang, Xingming Sun:
Detecting seam carving based image resizing using local binary patterns. 130-141 - Matija Stevanovic
, Jens Myrup Pedersen
, Alessandro D'Alconzo, Stefan Ruehrup, Andreas Berger:
On the ground truth problem of malicious DNS traffic analysis. 142-158 - Pedro García-Teodoro, Jesús Esteban Díaz Verdejo, Juan E. Tapiador
, Rolando Salazar-Hernández
:
Automatic generation of HTTP intrusion signatures by selective identification of anomalies. 159-174 - Xiang Cheng, Sen Su, Shengzhi Xu, Peng Tang, Zhengyi Li:
Differentially private maximal frequent sequence mining. 175-192
- Anton V. Uzunov, Eduardo B. Fernández
, Katrina Falkner
:
Security solution frames and security patterns for authorization in distributed, collaborative systems. 193-234 - Lorena Cazorla
, Cristina Alcaraz
, Javier López
:
A three-stage analysis of IDS for critical infrastructures. 235-250 - Bing Liu, Chao-Hsien Chu
:
Relationship-based federated access control model for EPC Discovery Service. 251-270 - Prosanta Gope, Tzonelih Hwang:
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system. 271-280

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.