default search action
Computers & Security, Volume 72
Volume 72, January 2018
- Jin Li, Yinghui Zhang, Xiaofeng Chen, Yang Xiang:
Secure attribute-based data sharing for resource-limited users in cloud computing. 1-12 - Abdullah Yasin Nur, Mehmet Engin Tozal:
Record route IP traceback: Combating DoS attacks and the variants. 13-25 - Antoine Lemay, Joan Calvet, François Menet, José M. Fernandez:
Survey of publicly available reports on advanced persistent threat actors. 26-59 - Qiang Fu, Bo Feng, Dong Guo, Qiang Li:
Combating the evolving spammers in online social networks. 60-73 - Saad A. Abdelhameed, Sherin M. Moussa, Mohamed E. Khalifa:
Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud. 74-95 - Wangtong Liu, Senlin Luo, Yu Liu, Limin Pan, Qamas Gul Khan Safi:
A kernel stack protection model against attacks from kernel execution units. 96-106 - Marek Klonowski, Ania M. Piotrowska:
Light-weight and secure aggregation protocols based on Bloom filters✰. 107-121 - Li-e Wang, Xianxian Li:
A graph-based multifold model for anonymizing data with attributes of multiple types. 122-135 - A. Vijayalakshmi Venugopal:
Inadvertent disclosures of inventions in social media affecting patent rights. 136-144 - Dong Shen, Zhoujun Li, Xiaojing Su, Jinxin Ma, Robert Huijie Deng:
TinyVisor: An extensible secure framework on android platforms. 145-162 - Bing Chang, Yao Cheng, Bo Chen, Fengwei Zhang, Wen Tao Zhu, Yingjiu Li, Zhan Wang:
User-friendly deniable storage for mobile devices. 163-174 - Houssein Abdo, Mohamad Kaouk, Jean-Marie Flaus, François Massé:
A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie - combining new version of attack tree with bowtie analysis. 175-195 - Adeel Anjum, Saif Ur Rehman Malik, Kim-Kwang Raymond Choo, Abid Khan, Asma Haroon, Sangeen Khan, Samee U. Khan, Naveed Ahmad, Basit Raza:
An efficient privacy mechanism for electronic health records. 196-211 - Wiem Tounsi, Helmi Rais:
A survey on technical threat intelligence in the age of sophisticated cyber attacks. 212-233 - Marco Anisetti, Claudio A. Ardagna, Ernesto Damiani, Nabil El Ioini, Filippo Gaudenzi:
Modeling time, probability, and configuration constraints for continuous cloud service certification. 234-254 - Nikhil Tripathi, Neminath Hubballi:
Slow rate denial of service attacks against HTTP/2 and detection. 255-272
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.