


default search action
Computers & Security, Volume 82
Volume 82, May 2019
- Jian Qiu, Heng-Jian Li, Chuan Zhao:

Cancelable palmprint templates based on random measurement and noise data for security and privacy-preserving authentication. 1-14 - Mordechai Guri, Dima Bykhovsky

:
aIR-Jumper: Covert air-gap exfiltration/infiltration via security cameras & infrared (IR). 15-29 - Jinyan Wang, Chen Liu, Xingcheng Fu

, Xudong Luo
, Xianxian Li:
A three-phase approach to differentially private crucial patterns mining over data streams. 30-48 - Simon S. Woo:

Design and evaluation of 3D CAPTCHAs. 49-67 - Dong Wang

, Zhengquan Xu:
Impact of inaccurate data on Differential Privacy. 68-79 - Krzysztof Opasiak, Wojciech Mazurczyk

:
(In)Secure Android Debugging: Security analysis and lessons learned. 80-98 - Idrees Ahmed

, Abid Khan
, Mansoor Ahmed
, Saif Ur Rehman Malik:
Order preserving secure provenance scheme for distributed networks. 99-117 - Deokjin Kim, DaeHee Jang, Minjoon Park, Yunjong Jeong, Jonghwan Kim, Seokjin Choi, Brent ByungHoon Kang:

SGX-LEGO: Fine-grained SGX controlled-channel attack and its countermeasure. 118-139 - Clemens Sauerwein, Irdin Pekaric

, Michael Felderer
, Ruth Breu:
An analysis and classification of public information security data sources used in research and practice. 140-155 - Markus Ring, Daniel Schlör, Dieter Landes

, Andreas Hotho:
Flow-based network traffic generation using Generative Adversarial Networks. 156-172 - Fei Peng

, Jing Yang
, Zi-Xing Lin, Min Long
:
Source identification of 3D printed objects based on inherent equipment distortion. 173-183 - Denglong Lv, Shibing Zhu:

Achieving correlated differential privacy of big data publication. 184-195 - Fady A. M. Ibrahim, Elsayed E. Hemayed

:
Trusted Cloud Computing Architectures for infrastructure as a service: Survey and systematic literature review. 196-226 - Mahdi Daghmehchi Firoozjaei

, MinChang Kim, JaeSeung Song
, Hyoungshick Kim
:
O2TR: Offline OTR messaging system under network disruption. 227-240 - Karen Renaud

, Robert F. Otondo
, Merrill Warkentin
:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? 241-260 - Yun Zhou

, Peichao Wang:
An ensemble learning approach for XSS attack detection with domain knowledge and threat intelligence. 261-269 - Jane Henriksen-Bulmer

, Shamal Faily
, Sheridan Jeary
:
Privacy risk assessment in context: A meta-model based on contextual integrity. 270-283 - Jisa David

, Ciza Thomas:
Efficient DDoS flood attack detection using dynamic thresholding on flow-based network traffic. 284-295 - Nurit Gal-Oz

, Yaron Gonen, Ehud Gudes:
Mining meaningful and rare roles from web application usage patterns. 296-313 - Jelena Milosevic, Miroslaw Malek

, Alberto Ferrante
:
Time, accuracy and power consumption tradeoff in mobile malware detection systems. 314-328

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














