default search action
Computers & Security, Volume 76
Volume 76, July 2018
- Steve Muller, Jean Lancrenon, Carlo Harpes, Yves Le Traon
, Sylvain Gombault, Jean-Marie Bonnin:
A training-resistant anomaly detection system. 1-11 - Chen Zhong
, Tao Lin, Peng Liu, John Yen, Kai Chen:
A cyber security data triage operation retrieval system. 12-31 - T. Divya Sai Keerthi
, Pallapa Venkataram:
Confirmation of wormhole attack in MANETs using honeypot. 32-49 - Alexander Amigud
, Joan Arnedo-Moreno, Thanasis Daradoumis
, Ana-Elena Guerrero-Roldán
:
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives. 50-70 - Huasong Meng
, Vrizlynn L. L. Thing, Yao Cheng, Zhongmin Dai, Li Zhang:
A survey of Android exploits in the wild. 71-91 - Vlasta Stavova, Lenka Dedkova
, Vashek Matyas, Mike Just
, David Smahel
, Martin Ukrop
:
Experimental large-scale review of attractors for detection of potentially unwanted applications. 92-100 - Ryan Heartfield
, George Loukas
:
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework. 101-127 - Minh Hai Nguyen, Dung Le Nguyen, Xuan Mao Nguyen, Tho Thanh Quan:
Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning. 128-155 - Myria Bouhaddi
, Mohammed Said Radjef
, Kamel Adi:
An efficient intrusion detection in resource-constrained mobile ad-hoc networks. 156-177 - Valentin Tudor, Magnus Almgren
, Marina Papatriantafilou:
The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure. 178-196 - Shane Murnion
, William J. Buchanan
, Adrian Smales, Gordon Russell
:
Machine learning and semantic analysis of in-game chat for cyberbullying. 197-213
- Elisa Bertino, Valentina Casola
, Aniello Castiglione
, Willy Susilo
:
Editorial: Security and privacy protection vs sustainable development. 250-251 - Weizhi Meng
, Lijun Jiang, Yu Wang
, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. 252-264 - Tingmin Wu
, Sheng Wen
, Yang Xiang, Wanlei Zhou
:
Twitter spam detection: Survey of new approaches and comparative study. 265-284 - Andeep S. Toor, Harry Wechsler, Michele Nappi, Kim-Kwang Raymond Choo
:
Visual Question Authentication Protocol (VQAP). 285-294 - Davide Polverini
, Fulvio Ardente, Ignacio Sánchez, Fabrice Mathieux, Paolo Tecchio, Laurent Beslay:
Resource efficiency, privacy and security by design: A first experience on enterprise servers and data storage products triggered by a policy process. 295-310 - Sherenaz W. Al-Haj Baddar
, Alessio Merlo
, Mauro Migliardi
, Francesco Palmieri
:
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition. 311-326 - Georgia Lykou, Despina Mentzelioti, Dimitris Gritzalis:
A new methodology toward effectively assessing data center sustainability. 327-340 - Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan
, Qingqi Pei, Yajuan Xie, Jian Weng
:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. 341-353 - Mihai Varga
, Alina Petrescu-Nita, Florin Pop:
Deadline scheduling algorithm for sustainable computing in Hadoop environment. 354-366
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.