default search action
Computers & Security, Volume 61
Volume 61, August 2016
- Gerardo Canfora, Francesco Mercaldo, Corrado Aaron Visaggio:
An HMM and structural entropy based detector for Android malware: An empirical study. 1-18 - Hiep Tran, Enrique Campos-Náñez, Pavel Fomin, James S. Wasek:
Cyber resilience recovery model to combat zero-day malware attacks. 19-31 - Maria Bartnes, Nils Brede Moe, Poul E. Heegaard:
The future of information security incident management training: A case study of electrical power companies. 32-45 - Wayne D. Kearney, Hennie A. Kruger:
Can perceptual differences account for enigmatic information security behaviour in an organisation? 46-58 - Julian L. Rrushi:
NIC displays to thwart malware attacks mounted from within the OS. 59-71 - Vivek Balachandran, Sufatrio, Darell J. J. Tan, Vrizlynn L. L. Thing:
Control flow obfuscation for Android applications. 72-93 - Anton V. Uzunov:
A survey of security solutions for distributed publish/subscribe systems. 94-129 - Chao Shen, Tianwen Yu, Haodi Xu, Gengshan Yang, Xiaohong Guan:
User practice in password security: An empirical study of real-life passwords in the wild. 130-141 - Yazan Boshmaf, Dionysios Logothetis, Georgos Siganos, Jorge Lería, José Lorenzo, Matei Ripeanu, Konstantin Beznosov, Hassan Halawa:
Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. 142-168 - Stephen V. Flowerday, Tite Tuyikeze:
Information security policy development and implementation: The what, how and who. 169-183
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.