default search action
Computers & Security, Volume 67
Volume 67, June 2017
- Markus Wagner, Alexander Rind, Niklas Thür, Wolfgang Aigner:
A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS. 1-15 - Andrey Sapegin, David Jaeger, Feng Cheng, Christoph Meinel:
Towards a system for complex analysis of security events in large-scale networks. 16-34 - Sara Qamar, Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, Bei-tseng Chu:
Data-driven analytics for cyber-threat intelligence and information sharing. 35-58 - Debanjan Sadhya, Sanjay Kumar Singh:
Providing robust security measures to Bloom filter based biometric template protection schemes. 59-72 - Santosh Chandrasekhar, Ahmed Ibrahim, Mukesh Singhal:
A novel access control protocol using proxy signatures for cloud-based health information exchange. 73-88 - Jaehyun Park, Jiseong Noh, Myungchul Kim, Brent ByungHoon Kang:
Invi-server: Reducing the attack surfaces by making protected server invisible on networks. 89-106 - Kristian Skracic, Predrag Pale, Zvonko Kostanjcar:
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets. 107-121 - Assadarat Khurat, Boontawee Suntisrivaraporn, Dieter Gollmann:
Privacy policies verification in composite services using OWL. 122-141 - Shuo Wang, Richard O. Sinnott:
Protecting personal trajectories of social media users through differential privacy. 142-163 - Yizheng Chen, Panagiotis Kintis, Manos Antonakakis, Yacin Nadji, David Dagon, Michael Farrell:
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet. 164-180 - Nikolaos Tsalis, Alexios Mylonas, Antonia Nisioti, Dimitris Gritzalis, Vasilios Katos:
Exploring the protection of private browsing in desktop browsers. 181-197 - Blake D. Bryant, Hossein Saiedian:
A novel kill-chain framework for remote security log analysis with SIEM software. 198-210 - Ragib Hasan, Rasib Khan:
Unified authentication factors and fuzzy service access using interaction provenance. 211-231 - Zeqing Guo, Weili Han, Liangxing Liu, Wenyuan Xu, Minyue Ni, Yunlei Zhao, Xiaoyang Sean Wang:
Socialized policy administration. 232-243 - Hyo Shin Choi, Won Sang Lee, So Young Sohn:
Analyzing research trends in personal information privacy using topic modeling. 244-253 - Zareef A. Mohammed, Gurvirender P. Tejay:
Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology. 254-265
- Dominik Herrmann, Hannes Federrath:
Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015). 266 - Fredrik Karlsson, Karin Hedström, Göran Goldkuhl:
Practice-based discourse analysis of information security policies. 267-279 - Maria Bartnes, Nils Brede Moe:
Challenges in IT security preparedness exercises: A case study. 280-290 - Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan:
Trustworthy exams without trusted parties. 291-307 - Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers:
Fast revocation of attribute-based credentials for both users and verifiers. 308-323 - Asahiko Yamada, Tatsuro Ikeda:
Enhanced PKI authentication with trusted product at claimant. 324-334 - Quoc Huy Do, Richard Bubel, Reiner Hähnle:
Automatic detection and demonstrator generation for information flow leaks in object-oriented programs. 335-349 - Dang Vinh Pham, Dogan Kesdogan:
Towards a causality based analysis of anonymity protection in indeterministic mix systems. 350-368
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.