default search action
Computers & Security, Volume 87
Volume 87, November 2019
- Lena Yuryna Connolly
, David S. Wall
:
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures. - Zaheer Masood, Raza Samar, Muhammad Asif Zahoor Raja
:
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure. - Juan Enrique Rubio, Cristina Alcaraz
, Rodrigo Roman, Javier López:
Current cyber-defense trends in industrial control systems. - Renpeng Zou
, Xixiang Lv, Baocang Wang:
Blockchain-based photo forensics with permissible transformations. - Jane E. Klobas
, Tanya Jane McGill, Xuequn Wang
:
How perceived security risk affects intention to use smart home devices: A reasoned action explanation. - Nayanamana Samarasinghe, Mohammad Mannan:
Towards a global perspective on web tracking. - Long Nguyen-Vu
, Jinung Ahn, Souhwan Jung:
Android Fragmentation in Malware Detection. - Mahawaga Arachchige Pathum Chamikara
, Peter Bertók
, Dongxi Liu, Seyit Ahmet Çamtepe
, Ibrahim Khalil
:
An efficient and scalable privacy preserving algorithm for big data and data streams. - Laura Genga
, Nicola Zannone
, Anna Cinzia Squicciarini:
Discovering reliable evidence of data misuse by exploiting rule redundancy. - Ali Alshawish
, Mohamed Amine Abid, Hermann de Meer:
Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games. - Kai Chen
, Chen Song, Liming Wang, Zhen Xu:
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS. - Karel Horák, Branislav Bosanský, Petr Tomásek
, Christopher Kiekintveld, Charles A. Kamhoua:
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games. - Edson Floriano, Eduardo Alchieri
, Diego F. Aranha
, Priscila Solís Barreto
:
Building secure protocols for extensible distributed coordination through secure extensions. - Karel Durkota, Viliam Lisý, Branislav Bosanský, Christopher Kiekintveld, Michal Pechoucek
:
Hardening networks against strategic attackers using attack graph games. - Kexin Hu
, Zhenfeng Zhang, Kaiwen Guo:
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications. - Yuxin Ding, Rui Wu, Xiao Zhang:
Ontology-based knowledge representation for malware individuals and families. - Florian Kammüller
:
Attack trees in Isabelle extended with probabilities for quantum cryptography. - Ziyu Wang, Jianwei Liu
, Qianhong Wu, Yanting Zhang, Hui Yu, Ziyu Zhou:
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network. - Thomas D. Wagner
, Khaled Mahbub, Esther Palomar
, Ali E. Abdallah:
Cyber threat intelligence sharing: Survey and research directions. - Bin Yu, Joseph K. Liu, Surya Nepal
, Jiangshan Yu
, Paul Rimba:
Proof-of-QoS: QoS based blockchain consensus protocol. - Xiaohui Han
, Lianhai Wang, Shujiang Xu
, Dawei Zhao, Guangqi Liu:
Recognizing roles of online illegal gambling participants: An ensemble learning approach. - Sherly Abraham, InduShobha N. Chengalur-Smith:
Evaluating the effectiveness of learner controlled information security training. - Nicholas Mainardi
, Alessandro Barenghi
, Gerardo Pelosi
:
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes. - Nir Nissim, Omri Lahav, Aviad Cohen
, Yuval Elovici, Lior Rokach:
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud. - Aron Laszka
, Waseem Abbas, Yevgeniy Vorobeychik, Xenofon D. Koutsoukos:
Detection and mitigation of attacks on transportation networks as a multi-stage security game. - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Neural malware analysis with attention mechanism. - Atin Basuchoudhary
, Nicola Searle
:
Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets. - Yu Li
, Jin Huang, Ademola Ayodeji Ikusan, Milliken Mitchell, Junjie Zhang, Rui Dai:
ShellBreaker: Automatically detecting PHP-based malicious web shells. - Yazdan Movahedi
, Michel Cukier, Ilir Gashi
:
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models. - Sadaf Hina
, Dhanapal Durai Dominic, Paul Benjamin Lowry
:
Institutional governance and protection motivation: Theoretical insights into shaping employees' security compliance behavior in higher education institutions in the developing world. - Tengyao Li
, Buhong Wang, Fute Shang, Jiwei Tian
, Kunrui Cao:
Online sequential attack detection for ADS-B data based on hierarchical temporal memory. - Sakshyam Panda
, Daniel W. Woods
, Aron Laszka
, Andrew Fielder, Emmanouil Panaousis
:
Post-incident audits on cyber insurance discounts. - Olusola Akinrolabu
, Jason R. C. Nurse, Andrew P. Martin, Steve New:
Cyber risk assessment in cloud provider environments: Current models and future needs. - Xuewen Dong, Feng Wu, Anter Faree
, Deke Guo, Yulong Shen, Jianfeng Ma:
Selfholding: A combined attack model using selfish mining with block withholding attack. - José Camacho
, José Manuel García-Giménez, Noemí Marta Fuentes García
, Gabriel Maciá-Fernández
:
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle. - Mark Burdon
, Lizzie Coles-Kemp:
The significance of securing as a critical component of information security: An Australian narrative. - Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn
, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. - Benedikt Putz
, Florian Menges, Günther Pernul:
A secure and auditable logging infrastructure based on a permissioned blockchain. - Awanthika Senarath
, Nalin Asanka Gamagedara Arachchilage
:
A data minimization model for embedding privacy into software systems. - Lotfi Ben Othmane, Doug Jacobson
, Edgar R. Weippl:
Special Issue on Security and Privacy in Smart Cyber-physical Systems. - Eun Hee Park, Jongwoo Kim, Lynn L. Wiles, Young Soon Park:
Factors affecting intention to disclose patients' health information. - Shwadhin Sharma, Merrill Warkentin:
Do I really belong?: Impact of employment status on information security policy compliance. - Hoyul Choi, Jongmin Jeong, Simon S. Woo, Kyungtae Kang, Junbeom Hur
:
Password typographical error resilience in honey encryption. - Jonathan Voris, Yingbo Song, Malek Ben Salem, Shlomo Hershkop, Salvatore J. Stolfo:
Active authentication using file system decoys and user behavior modeling: results of a large scale study. - Mehdi Gheisari
, Guojun Wang, Wazir Zada Khan
, Christian Fernández-Campusano
:
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking. - Yan Cao, Zhiqiu Huang, Changbo Ke
, Jian Xie, Jin Wang:
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.