default search action
Computers & Security, Volume 45
Volume 45, September 2014
- Alireza Shameli-Sendi, Mohamed Cheriet, Abdelwahab Hamou-Lhadj:
Taxonomy of intrusion risk assessment and response system. 1-16 - Mohammed N. Alenezi, Martin J. Reed:
Uniform DoS traceback. 17-26 - Isredza Rahmi A. Hamid, Jemal H. Abawajy:
An approach for profiling phishing activities. 27-41 - Inger Anne Tøndel, Maria B. Line, Martin Gilje Jaatun:
Information security incident management: Current practice as reported in the literature. 42-57 - Monica Lagazio, Nazneen Sherif, Mike Cushman:
A multi-level approach to understanding the impact of cyber crime on the financial sector. 58-74 - Heloise Pieterse, Martin S. Olivier:
Bluetooth Command and Control channel. 75-83 - Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo:
On the security of text-based 3D CAPTCHAs. 84-99 - Sebastián García, Martin Grill, Jan Stiborek, Alejandro Zunino:
An empirical comparison of botnet detection methods. 100-123 - Abdul Razzaq, Zahid Anwar, Hafiz Farooq Ahmad, Khalid Latif, Rana Faisal Munir:
Ontology for attack detection: An intelligent approach to web application security. 124-146 - Syed Zulkarnain Syed Idrus, Estelle Cherrier, Christophe Rosenberger, Patrick Bours:
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords. 147-155 - Chao Shen, Zhongmin Cai, Xiaohong Guan, Roy A. Maxion:
Performance evaluation of anomaly-detection algorithms for mouse dynamics. 156-171 - Stefan Thalmann, Daniel Bachlechner, Lukas Demetz, Markus Manhart:
Complexity is dead, long live complexity! How software can help service providers manage security and compliance. 172-185 - José A. Montenegro, Javier López:
A practical solution for sealed bid and multi-currency auctions. 186-198 - Aikaterini Mitrokotsa, Cristina Onete, Serge Vaudenay:
Location leakage in distance bounding: Why location privacy does not work. 199-209 - Hao Zhang, Nenghai Yu, Yonggang Wen, Weiming Zhang:
Towards optimal noise distribution for privacy preserving in data aggregation. 210-230 - Roshan Chitrakar, Chuanhe Huang:
Selection of Candidate Support Vectors in incremental SVM for network intrusion detection. 231-241 - Aditya Oza, Kevin Ross, Richard M. Low, Mark Stamp:
HTTP attack detection using n-gram analysis. 242-254 - Anca D. Jurcut, Tom Coffey, Reiner Dojen:
Design guidelines for security protocols to prevent replay & parallel session attacks. 255-273 - Mario Silic, Andrea Back:
Shadow IT - A view from behind the curtain. 274-283 - Rennie Archibald, Dipak Ghosal:
A comparative analysis of detection metrics for covert timing channels. 284-292 - Fred Cohen, Don Cohen:
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations. 293-304 - Nikolaos Tsalis, Dimitris Gritzalis:
Securing cloud and mobility: A practitioner's guide. 305
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.