default search action
Computers & Security, Volume 78
Volume 78, September 2018
- DaeHun Nyang, Hyoungshick Kim, Woojoo Lee, Sung-bae Kang, Geumhwan Cho, Mun-Kyu Lee, Aziz Mohaisen:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. 1-15 - Eduardo Viegas, Altair Olivo Santin, Luiz Oliveira, André França, Ricardo P. Jasinski, Volnei A. Pedroni:
A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. 16-32 - Bruno Lopes Dalmazo, João P. Vilela, Marília Curado:
Triple-Similarity Mechanism for alarm management in the cloud. 33-42 - Razvan Beuran, Dat Tang, Cuong Pham, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:
Integrated framework for hands-on cybersecurity training: CyTrONE. 43-59 - Huu Hiep Nguyen:
Privacy-preserving mechanisms for k-modes clustering. 60-75 - Estée van der Walt, Jan H. P. Eloff, Jacomine Grobler:
Cyber-security: Identity deception detection on social media platforms. 76-89 - Pedro Moreno-Sanchez, Uzair Mahmood, Aniket Kate:
ClearChart: Ensuring integrity of consumer ratings in online marketplaces. 90-102 - David Myers, Suriadi Suriadi, Kenneth Radke, Ernest Foo:
Anomaly detection for industrial control systems using process mining. 103-125 - Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni:
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. 126-142 - Isis Chong, Huangyi Ge, Ninghui Li, Robert W. Proctor:
Influence of privacy priming and security framing on mobile app selection. 143-154 - Edan Habler, Asaf Shabtai:
Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. 155-173 - Toan Nguyen, Nasir D. Memon:
Tap-based user authentication for smartwatches. 174-186 - Rafael San-Miguel Carrasco, Miguel-Ángel Sicilia:
Unsupervised intrusion detection through skip-gram models of network behavior. 187-197 - Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? 198-211 - Lei Jin, Chao Li, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. 212-230 - Zezhi Wu, Xingyuan Chen, Xuehui Du, Zhi Yang:
CDroid: practically implementation a formal-analyzed CIFC model on Android. 231-244 - Erfan A. Shams, Ahmet Rizaner, Ali Hakan Ulusoy:
Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. 245-254 - Meriem Guerar, Alessio Merlo, Mauro Migliardi, Francesco Palmieri:
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT. 255-266 - Lixiang Shen, Dejun Mu, Guo Cao, Maoyuan Qin, Jeremy Blackstone, Ryan Kastner:
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection. 267-280 - Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa, Gerhard P. Hancke:
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. 281-300 - P. Geetha, V. S. Jayanthi, A. N. Jayanthi:
Optimal visual cryptographic scheme with multiple share creation for multimedia applications. 301-320 - Bata Krishna Tripathy, Debi Prasad Das, Swagat Kumar Jena, Padmalochan Bera:
Risk based Security Enforcement in Software Defined Network. 321-335 - Mei-Ling Yao, Ming-Chuen Chuang, Chun-Cheng Hsu:
The Kano model analysis of features for mobile security applications. 336-346 - Irfan Ul Haq, Sergio Chica, Juan Caballero, Somesh Jha:
Malware lineage in the wild. 347-363 - Thiago Alves, Thomas H. Morris:
OpenPLC: An IEC 61, 131-3 compliant open source industrial controller for cyber security research. 364-379 - Hyun Kwon, Yongchul Kim, Ki-Woong Park, Hyunsoo Yoon, Daeseon Choi:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. 380-397 - Ryan Heartfield, George Loukas, Sanja Budimir, Anatolij Bezemskij, Johnny R. J. Fontaine, Avgoustinos Filippoupolitis, Etienne B. Roesch:
A taxonomy of cyber-physical threats and impact in the smart home. 398-428 - Mirko Bottarelli, Gregory Epiphaniou, Dhouha Kbaier Ben Ismail, Petros Karadimas, Haider M. Al-Khateeb:
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. 454-476 - Eirini Anthi, Shazaib Ahmad, Omer F. Rana, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. 477-490
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.