default search action
Computers & Security, Volume 28
Volume 28, Numbers 1-2, February - March 2009
- Stephen D. Wolthusen:
Editorial. 1 - Sergei A. Obiedkov, Derrick G. Kourie, Jan H. P. Eloff:
Building access control models with attribute exploration. 2-7 - Travis D. Breaux, Annie I. Antón, Eugene H. Spafford:
A distributed requirements management framework for legal compliance and accountability. 8-17 - Pedro Garcia-Teodoro, Jesús Esteban Díaz Verdejo, Gabriel Maciá-Fernández, Enrique Vázquez:
Anomaly-based network intrusion detection: Techniques, systems and challenges. 18-28 - Xiaozhuo Gu, Jianzu Yang, Julong Lan, Zhenhuan Cao:
Huffman-based join-exit-tree scheme for contributory key management. 29-39 - Javad Akbari Torkestani, Mohammad Reza Meybodi:
RAID-RMS: A fault tolerant stripped mirroring RAID architecture for distributed systems. 40-46 - Catherine S. Weir, Gary Douglas, Martin Carruthers, Mervyn A. Jack:
User perceptions of security, convenience and usability for ebanking authentication tokens. 47-62 - Amir Herzberg:
Why Johnny can't surf (safely)? Attacks and defenses for web users. 63-71 - Hongxin Zhang, Yuewang Huang, Jianxin Wang, Yinghua Lu, Jinling Zhang:
Recognition of electro-magnetic leakage information from computer radiation with SVM. 72-76 - K. Vimal Kumar:
Securing communication using function extraction technology for malicious code behavior analysis. 77-84 - Seongseob Hwang, Sungzoon Cho, Sunghoon Park:
Keystroke dynamics-based authentication for mobile devices. 85-93 - Jasim A. Ghaeb, Jalel Chebil:
An oblique-matrix technique for data integrity assurance. 94-99
- Song Lin, Biao Wang, Zhoujun Li:
Digital multisignature on the generalized conic curve over Zn. 100-104
Volume 28, Numbers 3-4, May - June 2009
- Albert Levi, Can Berk Güder:
Understanding the limitations of S/MIME digital signatures for e-mails: A GUI based approach. 105-120 - Dimitris Mitropoulos, Diomidis Spinellis:
SDriver: Location-specific signatures prevent SQL injection attacks. 121-129 - Reinhardt A. Botha, Steven Furnell, Nathan L. Clarke:
From desktop to mobile: Examining the security experience. 130-137 - Jen-Ho Yang, Chin-Chen Chang:
An ID-based remote mutual authentication with key agreement scheme for mobile devices on elliptic curve cryptosystem. 138-143 - Kuo-Fong Kao, I-En Liao, Yueh-Chia Li:
Detecting rogue access points using client-side bottleneck bandwidth analysis. 144-152 - Reza Sadoddin, Ali A. Ghorbani:
An incremental frequent structure mining framework for real-time alert correlation. 153-173 - Alessandro Basso, Stefano Sicco:
Preventing massive automated access to web resources. 174-188 - M. T. Dlamini, Jan H. P. Eloff, Mariki M. Eloff:
Information security: The moving target. 189-198 - Mawloud Omar, Yacine Challal, Abdelmadjid Bouabdallah:
Reliable and fully distributed trust model for mobile ad hoc networks. 199-214 - Divakaran Liginlal, Inkook Sim, Lara Khansa:
How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management. 215-228 - P. P. Deepthi, P. S. Sathidevi:
Design, implementation and analysis of hardware efficient stream ciphers using LFSR based hash functions. 229-241
Volume 28, Number 5, July 2009
- Dimitris Gritzalis, Sokratis K. Katsikas:
Editorial. 247 - John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang:
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. 248-259 - Qi Li, Xinwen Zhang, Mingwei Xu, Jianping Wu:
Towards secure dynamic collaborations with group-based RBAC model. 260-275 - Hyunsang Choi, Heejo Lee, Hyogon Kim:
Fast detection and visualization of network attacks on parallel coordinates. 276-288 - Mildrey Carbonell, José María Sierra, Javier López:
Secure multiparty payment with an intermediary entity. 289-300 - Ming-Yang Su, Gwo-Jong Yu, Chun-Yuen Lin:
A real-time network intrusion detection system for large-scale attacks based on an incremental mining approach. 301-309 - Siraj A. Shaikh, Vicky J. Bush, Steve A. Schneider:
Specifying authentication using signal events in CSP. 310-324
Volume 28, Number 6, September 2009
- Dimitris Gritzalis, Javier López:
Editorial. 325-326 - Siddharth Bhatt, Radu Sion, Bogdan Carbunar:
A personal mobile DRM manager for smartphones. 327-340 - Azzam Mourad, Andrei Soeanu, Marc-André Laverdière, Mourad Debbabi:
New aspect-oriented constructs for security hardening concerns. 341-358 - Djamel Fawzi Hadj Sadok, Eduardo Souto, Eduardo Feitosa, Judith Kelner, Lars Westberg:
RIP - A robust IP access architecture. 359-380 - Michael Edward Edge, Pedro R. Falcone Sampaio:
A survey of signature based methods for financial fraud detection. 381-394 - Ibrahim Kamel, Qutaiba Albluwi:
A robust software watermarking for copyright protection. 395-409 - Mohammad Mannan, Paul C. van Oorschot:
Reducing threats from flawed security APIs: The banking PIN case. 410-420 - Joon Son, Jim Alves-Foss:
A formal framework for real-time information flow analysis. 421-432 - Francesco Palmieri, Ugo Fiore:
Providing true end-to-end security in converged voice over IP infrastructures. 433-449 - Stylianos Basagiannis, Panagiotis Katsaros, Andrew Pombortsis, Nikolaos Alexiou:
Probabilistic model checking for the quantification of DoS security threats. 450-465 - Yang Li, Jun-Li Wang, Zhihong Tian, Tianbo Lu, Chen Young:
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms. 466-475 - Eirik Albrechtsen, Jan Hovden:
The information security digital divide between information security managers and users. 476-490
Volume 28, Number 7, October 2009
- Dimitris Gritzalis, Steven Furnell:
Editorial. 491-492 - Kenneth J. Knapp, R. Franklin Morris Jr., Thomas E. Marshall, Terry Anthony Byrd:
Information security policy: An organizational-level process model. 493-508 - Sara Kraemer, Pascale Carayon, John Clem:
Human and organizational factors in computer and information security: Pathways to vulnerabilities. 509-520 - Howard Chivers, John A. Clark, Pau-Chen Cheng:
Risk profiles and distributed risk assessment. 521-535 - Keshnee Padayachee, Jan H. P. Eloff:
Adapting usage control as a deterrent to address the inadequacies of access controls. 536-544 - Félix Gómez Mármol, Gregorio Martínez Pérez:
Security threats scenarios in trust and reputation models for distributed systems. 545-556 - Hongwei Lu, Bailing Liu:
DFANS: A highly efficient strategy for automated trust negotiation. 557-565 - Nicola Dragoni, Fabio Massacci, Thomas Walter, Christian Schaefer:
What the heck is this application doing? - A security-by-contract architecture for pervasive services. 566-577 - Dimitris Geneiatakis, Nikos Vrakas, Costas Lambrinoudakis:
Utilizing bloom filters for detecting flooding attacks against SIP based services. 578-591 - Engin Kirda, Nenad Jovanovic, Christopher Kruegel, Giovanni Vigna:
Client-side cross-site scripting protection. 592-604 - Zonghua Zhang, Pin-Han Ho, Liwen He:
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach. 605-614 - Gerhard P. Hancke, Keith Mayes, Konstantinos Markantonakis:
Confidence in smart token proximity: Relay attacks revisited. 615-627 - Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Defending passive worms in unstructured P2P networks based on healthy file dissemination. 628-636 - Scott E. Coull, Boleslaw K. Szymanski:
On the development of an internetwork-centric defense for scanning worms. 637-647 - Suleyman Kondakci:
A concise cost analysis of Internet malware. 648-659 - Gedare Bloom, Bhagirath Narahari, Rahul Simha, Joseph Zambreno:
Providing secure execution environments with a last line of defense against Trojan circuit attacks. 660-669 - Özdemir Çetin, Ahmet Turan Özcerit:
A new steganography algorithm based on color histograms for data embedding into raw video streams. 670-682 - S. Geetha, Siva S. Sivatha Sindhu, N. Kamaraj:
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system. 683-697 - Ibrahim Kamel:
A schema for protecting the integrity of databases. 698-709 - Refik Samet:
Design and implementation of highly reliable dual-computer systems. 710-722
Volume 28, Number 8, November 2009
- Dimitris Gritzalis, Tom Karygiannis:
Editorial. 729-730 - Amir Herzberg:
DNS-based email sender authentication mechanisms: A critical review. 731-742 - Ram Dantu, Sonia Fahmy, Henning Schulzrinne, João W. Cangussu:
Issues and challenges in securing VoIP. 743-753 - Srdjan Pudar, G. Manimaran, Chen-Ching Liu:
PENET: A practical method and tool for integrated modeling of security attacks and countermeasures. 754-771 - Juan Pedro Muñoz-Gea, Josemaria Malgosa-Sanahuja, Pilar Manzanares-Lopez, Juan Carlos Sánchez-Aarnoutse, Joan García-Haro:
Proposal, design and evaluation of a mechanism to limit the length of anonymous overlay network paths. 772-784 - Lihong Yao, Xiaochao Zi, Li Pan, Jianhua Li:
A study of on/off timing channel based on packet delay distribution. 785-794 - Junsup Lee, Sung Deok Cha, Dongkun Lee, Hyungkyu Lee:
Classification of web robots: An empirical study based on over one billion requests. 795-802 - Yu-Lun Huang, P. H. Lu, J. Doug Tygar, Anthony D. Joseph:
OSNP: Secure wireless authentication protocol using one-time key. 803-815 - Hyeun-Suk Rhee, Cheong-Tag Kim, Young U. Ryu:
Self-efficacy in information security: Its influence on end users' information security practice behavior. 816-826 - Yong Tang, Bin Xiao, Xicheng Lu:
Using a bioinformatics approach to generate accurate exploit-based signatures for polymorphic worms. 827-842 - Jorge Fontenla González, Manuel Caeiro Rodríguez, Martín Llamas Nistal, Luis E. Anido-Rifón:
Reverse OAuth: A solution to achieve delegated authorizations in single sign-on e-learning systems. 843-856
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.