default search action
Computers & Security, Volume 31
Volume 31, Number 1, February 2012
- Eugene H. Spafford:
Editorial. 1-2
- Manuel Leithner, Edgar R. Weippl:
Android forensics. 3
- Antonio Maña, Hristo Koshutanski, Ernesto J. Pérez:
A trust negotiation based security framework for service provisioning in load-balancing clusters. 4-25 - M. Oguzhan Külekci:
On scrambling the Burrows-Wheeler transform to provide privacy in lossless compression. 26-32 - Gaobo Yang, Ning Chen, Qin Jiang:
A robust hashing algorithm based on SURF for video copy detection. 33-39 - Gaurav Bhatnagar, Q. M. Jonathan Wu, Balasubramanian Raman:
A new robust adjustable logo watermarking scheme. 40-58 - Xingwen Zhao, Fangguo Zhang:
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast. 59-69 - Sheng Mou, Zhiwen Zhao, Sisi Jiang, Zushun Wu, Jiaojiao Zhu:
Feature extraction and classification algorithm for detecting complex covert timing channel. 70-82 - Princely Ifinedo:
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory. 83-95 - Luis Rodero-Merino, Luis Miguel Vaquero, Eddy Caron, Adrian Muresan, Frédéric Desprez:
Building safe PaaS clouds: A survey on security in multitenant software platforms. 96-108 - Deian Stefan, Xiaokui Shu, Danfeng (Daphne) Yao:
Robustness of keystroke-dynamics based biometrics against synthetic forgeries. 109-121 - Timothy H. Lacey, Robert F. Mills, Barry E. Mullins, Richard A. Raines, Mark E. Oxley, Steven K. Rogers:
RIPsec - Using reputation-based multilayer security to protect MANETs. 122-136 - Thomas E. Dube, Richard A. Raines, Gilbert L. Peterson, Kenneth W. Bauer Jr., Michael R. Grimaila, Steven K. Rogers:
Malware target recognition via static heuristics. 137-147
Volume 31, Number 2, March 2012
- Eugene H. Spafford:
Editorial. 149-150 - Hisham Al-Assam, Sabah Jassim:
Security evaluation of biometric keys. 151-163 - Hannes Holm:
Performance of automated network vulnerability scanning at remediating security issues. 164-175 - Jinpeng Wei, Calton Pu:
Toward a general defense against kernel queue hooking attacks. 176-191 - Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang:
Multiple-File Remote Data Checking for cloud storage. 192-205 - Divakaran Liginlal, Inkook Sim, Lara Khansa, Paul Fearn:
HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory. 206-220 - Hyeun-Suk Rhee, Young U. Ryu, Cheong-Tag Kim:
Unrealistic optimism on information security management. 221-232 - Yu-Chi Chung, Ming-Chuan Wu, Yih-Chang Chen, Wen-Kui Chang:
A Hot Query Bank approach to improve detection performance against SQL injection attacks. 233-248
- Katina Michael:
Security Risk Management: Building an Information Security Risk Management Program from the Ground Up. 249-250 - Jennifer L. Bayuk:
Cyber Attacks. 251 - Manuel Leithner, Edgar R. Weippl:
Coding for Penetration Testers. 252
- Richard Macfarlane, William J. Buchanan, Elias Ekonomou, Omair Uthmani, Lu Fan, Owen Lo:
Formal security policy implementations in network firewalls. 253-270
Volume 31, Number 3, May 2012
- Maurizio Molina, Ignasi Paredes-Oliva, Wayne Routly, Pere Barlet-Ros:
Operational experiences with anomaly detection in backbone networks. 273-285 - Chalee Vorakulpipat, Vasaka Visoottiviseth, Siwaruk Siwamogsatham:
Polite sender: A resource-saving spam email countermeasure based on sender responsibilities and recipient justifications. 286-298 - Jenny Abramov, Omer Anson, Michal Dahan, Peretz Shoval, Arnon Sturm:
A methodology for integrating access control policies within database development. 299-314 - Louay Karadsheh:
Applying security policies and service level agreement to IaaS service model to enhance security and transition. 315-326 - Ricardo Lent:
Evaluating a migration-based response to DoS attacks in a system of distributed auctions. 327-343 - Theodoor Scholte, Davide Balzarotti, Engin Kirda:
Have things changed now? An empirical study on input validation vulnerabilities in web applications. 344-356 - Ali Shiravi, Hadi Shiravi, Mahbod Tavallaee, Ali A. Ghorbani:
Toward developing a systematic approach to generate benchmark datasets for intrusion detection. 357-374
Volume 31, Number 4, June 2012
- Ying Zeng, Fenlin Liu, Xiangyang Luo, Shiguo Lian:
Abstract interpretation-based semantic framework for software birthmark. 377-390 - Muhammed Naeem Ahmed Khan:
Performance analysis of Bayesian networks and neural networks in classification of file system activities. 391-401 - Zhijun Wu, Haitao Zhang, Minghua Wang, Bao-song Pei:
MSABMS-based approach of detecting LDoS attack. 402-417 - Andrew Nicholson, Stuart Webber, Shaun Dyer, Tanuja Patel, Helge Janicke:
SCADA security in the light of Cyber-Warfare. 418-436 - Ahmed I. Sallam, El-Sayed El-Rabaie, Osama S. Faragallah:
Encryption-based multilevel model for DBMS. 437-446 - Riaz Ahmed Shaikh, Kamel Adi, Luigi Logrippo:
Dynamic risk-based decision methods for access control systems. 447-464 - San-Tsai Sun, Kirstie Hawkey, Konstantin Beznosov:
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures. 465-483 - Hyoungshick Kim, Jun Ho Huh:
PIN selection policies: Are they really effective? 484-496 - Youna Jung, James B. D. Joshi:
CRiBAC: Community-centric role interaction based access control model. 497-523 - Pablo Neira Ayuso, Rafael M. Gasca, Laurent Lefèvre:
FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls. 524-539 - Antonios Gouglidis, Ioannis Mavridis:
domRBAC: An access control model for modern collaborative systems. 540-556 - Jorge Blasco Alís, Julio César Hernández Castro, Juan E. Tapiador, Arturo Ribagorda:
Bypassing information leakage protection with trusted applications. 557-568 - Bogdan Ksiezopolski:
QoP-ML: Quality of protection modelling language for cryptographic protocols. 569-596 - Shari Lawrence Pfleeger, Deanna D. Caputo:
Leveraging behavioral science to mitigate cyber security risk. 597-611 - Matthew Van Gundy, Hao Chen:
Noncespaces: Using randomization to defeat cross-site scripting attacks. 612-628 - Aleksandar Hudic, Edgar R. Weippl:
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure. 629 - Nora Cuppens-Boulahia:
Penetration Tester's Open Source Toolkit. 630-632 - Katina Michael:
Securing the Cloud: Cloud Computer Security Techniques and Tactics. 633 - Katina Michael:
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice. 634-635 - Edgar R. Weippl, Manuel Leithner:
Enterprise Security for the Executive. 636 - William J. Caelli:
Cyber Warfare - Techniques, Tactics and Tools for Security Practitioners. 637 - Manuel Leithner, Edgar R. Weippl:
Thor's Microsoft Security Bible. 638 - Manuel Leithner, Edgar R. Weippl:
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts. 639
Volume 31, Number 5, July 2012
- Eugene H. Spafford:
Editorial. 641-642 - Atif Ahmad, Justin Hadgkiss, Anthonie B. Ruighaver:
Incident response teams - Challenges in supporting the organisational security function. 643-652 - Sergio Martínez, David Sánchez, Aïda Valls:
Semantic adaptive microaggregation of categorical microdata. 653-672 - Keshnee Padayachee:
Taxonomy of compliant information security behavior. 673-680 - Anton V. Uzunov, Eduardo B. Fernández, Katrina Falkner:
Securing distributed systems using patterns: A survey. 681-703 - Diqun Yan, Rangding Wang, Xianmin Yu, Jie Zhu:
Steganography for MP3 audio by exploiting the rule of window switching. 704-716 - Yasin Uzun, Kemal Bicakci:
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset. 717-726 - Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis. 727-735 - Jennifer L. Bayuk:
A programmer's perspective. 736-737 - Manuel Leithner, Edgar R. Weippl:
Low Tech Hacking. 738
Volume 31, Number 6, September 2012
- Eugene H. Spafford:
Editorial. 739-740 - Anmin Fu, Yuqing Zhang, Zhenchao Zhu, Qi Jing, Jingyu Feng:
An efficient handover authentication scheme with privacy preservation for IEEE 802.16m network. 741-749 - Lara Khansa, Deborah F. Cook, Tabitha L. James, Olga Bruyaka:
Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms. 750-770 - Aniello Castiglione, Giuseppe Cattaneo, Maurizio Cembalo, Alfredo De Santis, Pompeo Faruolo, Fabio Petagna, Umberto Ferraro Petrillo:
Engineering a secure mobile messaging framework. 771-781 - Stavros N. Shiaeles, Vasilios Katos, Alexandros S. Karakos, Basil K. Papadopoulos:
Real time DDoS detection using fuzzy estimators. 782-790 - WenBin Hsieh, Jenq-Shiou Leu:
Exploiting hash functions to intensify the remote user authentication scheme. 791-798 - Katina Michael:
Hacking: The Next Generation. 799 - Tim Wedge:
The Basics of Digital Forensics. 800 - Bill Tsoumas, Dimitris Gritzalis:
Inside Cyber Warfare: Mapping the Cyber Underworld. 801 - Alexios Mylonas, Dimitris Gritzalis:
Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software. 802-803
Volume 31, Number 7, October 2012
- Scott E. Coull, Andrew M. White, Ting-Fang Yen, Fabian Monrose, Michael K. Reiter:
Understanding domain registration abuses. 806-815 - Omar Hasan, Lionel Brunie, Elisa Bertino:
Preserving privacy of feedback providers in decentralized reputation systems. 816-826 - Jonas Magazinius, Alejandro Russo, Andrei Sabelfeld:
On-the-fly inlining of dynamic security monitors. 827-843 - Alessandro Colantonio, Roberto Di Pietro, Nino Vincenzo Verde:
A business-driven decomposition methodology for role mining. 844-855
Volume 31, Number 8, November 2012
- Gene Spafford:
Editorial. 857-858 - Ying Qian, Yulin Fang, Jose J. Gonzalez:
Managing information security risks during new technology adoption. 859-869 - Jie Shi, Yingjiu Li, Robert H. Deng:
A secure and efficient discovery service system in EPCglobal network. 870-885 - Yu-Lun Huang, Hsin-Yi Tsai:
A framework for quantitative evaluation of parallel control-flow obfuscation. 886-896 - Mohamed Shehab, Anna Cinzia Squicciarini, Gail-Joon Ahn, Irini Kokkinou:
Access control for online social networks third party applications. 897-911 - Zhi Yang, Lihua Yin, Shuyuan Jin, Xingyuan Chen:
Optimal mining on security labels for decentralized information flow control. 912-924 - Macià Mut Puigserver, Magdalena Payeras-Capellà, Josep Lluís Ferrer-Gomila, Arnau Vives-Guasch, Jordi Castellà-Roca:
A survey of electronic ticketing applied to transport. 925-939 - Theis Solberg Hjorth, Rune Torbensen:
Trusted Domain: A security platform for home automation. 940-955 - Cristina Alcaraz, Javier López, Rodrigo Roman, Hsiao-Hwa Chen:
Selecting key management schemes for WSN applications. 956-966 - Slim Rekhis, Noureddine Boudriga:
A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks. 967-982 - Steven Furnell, Nathan L. Clarke:
Power to the people? The evolving recognition of human aspects of security. 983-988 - Roger Jardí-Cedó, Jordi Pujol Ahulló, Jordi Castellà-Roca, Alexandre Viejo:
Study on poll-site voting and verification systems. 989-1010 - Jennifer L. Bayuk:
Wishful thinking. 1011-1012 - Katina Michael:
Handbook on Securing Cyber-Physical Critical Infrastructure: Foundations and Challenges. 1013
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.