


default search action
Computers & Security, Volume 85
Volume 85, August 2019
- Tahir Musa Ibrahim, Shafii Muhammad Abdulhamid

, Ala Abdulsalam Alarood
, Haruna Chiroma, Mohammed Ali Al-garadi
, Nadim Rana
, Amina Nuhu Muhammad, Adamu I. Abubakar
, Khalid Haruna
, Lubna Abdel Kareim Gabralla
:
Recent advances in mobile touch screen security authentication methods: A systematic literature review. 1-24 - Shikha Badhani

, Sunil Kumar Muttoo:
CENDroid - A cluster-ensemble classifier for detecting malicious Android applications. 25-40 - Bei Ye, Yajun Guo

, Lei Zhang, Xiaowei Guo:
An empirical study of mnemonic password creation tips. 41-50 - Luying Zhou, Huaqun Guo

, Gelei Deng:
A fog computing based approach to DDoS mitigation in IIoT systems. 51-62 - Jing-Lei Tan, Cheng Lei

, Hongqi Zhang, Yu-qiao Cheng:
Optimal strategy selection approach to moving target defense based on Markov robust game. 63-76 - Congyuan Xu, Jizhong Shen, Xin Du:

Detection method of domain names generated by DGAs based on semantic representation and deep neural network. 77-88 - Jinyin Chen, Mengmeng Su, Shijing Shen, Hui Xiong, Haibin Zheng:

POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm. 89-106 - Ping Wang

, Xing He, Yushu Zhang, Wenying Wen, Ming Li:
A robust and secure image sharing scheme with personal identity information embedded. 107-121 - Brijesh Kashyap Chejerla, Sanjay Kumar Madria

:
Information fusion architecture for secure cyber physical systems. 122-137 - Domhnall Carlin

, Philip O'Kane, Sakir Sezer:
A cost analysis of machine learning using dynamic runtime opcodes for malware detection. 138-155 - Matthias Eckhart

, Kristof Meixner
, Dietmar Winkler, Andreas Ekelhart
:
Securing the testing process for industrial automation software. 156-180 - Zhiwen Pan, Salim Hariri, Jesus Pacheco

:
Context aware intrusion detection for building automation systems. 181-201 - Karine Heydemann, Jean-François Lalande

, Pascal Berthomé:
Formally verified software countermeasures for control-flow integrity of smart card C code. 202-224 - Maoyuan Qin

, Wei Hu, Xinmu Wang, Dejun Mu, Baolei Mao
:
Theorem proof based gate level information flow tracking for hardware security verification. 225-239 - Nitzan Farhi, Nir Nissim, Yuval Elovici:

Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis. 240-269 - Michael Heigl

, Laurin Doerr, Nicolas Tiefnig, Dalibor Fiala
, Martin Schramm:
A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection. 270-287 - Rajat Chaudhary, Anish Jindal

, Gagangeet Singh Aujla
, Shubhani Aggarwal
, Neeraj Kumar
, Kim-Kwang Raymond Choo
:
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system. 288-299 - Noura Alomar, Mansour Alsaleh, Abdulrahman Alarifi:

Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts. 300-312 - Dragan Korac

, Dejan Simic:
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment. 313-332 - Murat Yasin Kubilay

, Mehmet Sabir Kiraz
, Haci Ali Mantar:
CertLedger: A new PKI model with Certificate Transparency based on blockchain. 333-352 - Rupeng Yang, Man Ho Au

, Qiuliang Xu, Zuoxia Yu:
Decentralized blacklistable anonymous credentials with reputation. 353-371 - Svetlana N. Yanushkevich

, Kelly W. Sundberg
, Nathan W. Twyman
, Richard M. Guest, Vlad P. Shmerko:
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening. 372-385 - Mohsen Riahi Manesh, Naima Kaabouch:

Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions. 386-401 - Rajendra Patil, Harsha Dudeja, Chirag Modi

:
Designing an efficient security framework for detecting intrusions in virtual network of cloud computing. 402-422 - Yimin Guo, Zhenfeng Zhang, Yajun Guo:

Optiwords: A new password policy for creating memorable and strong passwords. 423-435 - Fabrizio Biondi, Michael A. Enescu, Thomas Given-Wilson

, Axel Legay, Lamine Noureddine, Vivek Verma
:
Effective, efficient, and robust packing detection and classification. 436-451

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














