


default search action
Computers & Security, Volume 86
Volume 86, September 2019
- Erzhou Zhu, Peng Wen, Kanqi Ni, Ruhui Ma:

Implementation of an effective dynamic concolic execution framework for analyzing binary programs. 1-27 - Manmeet Singh

, Maninder Singh
, Sanmeet Kaur
:
Issues and challenges in DNS based botnet detection: A survey. 28-52 - Jie Gu, Lihong Wang, Huiwen Wang, Shanshan Wang

:
A novel approach to intrusion detection using SVM ensemble with feature augmentation. 53-62 - Zyad Elkhadir

, Mohammed Benattou
:
A cyber network attack detection based on GM Median Nearest Neighbors LDA. 63-74 - Matias Dodel

, Gustavo S. Mesch
:
An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices. 75-91 - B. K. S. P. Kumar Raju, G. Geethakumari:

SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment. 92-111
- Yuncong Zhang

, Yu Long, Zhen Liu, Zhiqiang Liu, Dawu Gu:
Z-Channel: Scalable and efficient scheme in Zerocash. 112-131
- Mengxia Shuai, Nenghai Yu, Hongxia Wang, Ling Xiong

:
Anonymous authentication scheme for smart home environment with provable security. 132-146
- Markus Ring

, Sarah Wunderlich, Deniz Scheuring, Dieter Landes
, Andreas Hotho:
A survey of network-based intrusion detection data sets. 147-167 - Michele Scalas

, Davide Maiorca
, Francesco Mercaldo, Corrado Aaron Visaggio, Fabio Martinelli, Giorgio Giacinto:
On the effectiveness of system API-related information for Android ransomware detection. 168-182 - Mahendra Pratap Singh, Shamik Sural

, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database. 183-205
- Ashish Rajendra Sai, Jim Buckley, Andrew Le Gear

:
Assessing the security implication of Bitcoin exchange rates. 206-222
- Prosanta Gope:

LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm. 223-237
- Jen-Wei Hu

, Lo-Yao Yeh
, Shih-Wei Liao, Chu-Sing Yang:
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices. 238-252
- Alex Norta

, Raimundas Matulevicius
, Benjamin Leiding
:
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns. 253-269 - Gueltoum Bendiab

, Stavros Shiaeles
, Samia Boucherkha, Bogdan V. Ghita
:
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management. 270-290 - Zouhair Chiba

, Noreddine Abghour
, Khalid Moussaid
, Amina El Omri
, Mohamed Rida
:
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms. 291-317 - Gauhar Ali

, Naveed Ahmad
, Yue Cao
, Muhammad Asif, Haitham S. Cruickshank, Qazi Ejaz Ali
:
Blockchain based permission delegation and access control in Internet of Things (BACI). 318-334 - Diego F. Aranha

, Pedro Barbosa, Thiago N. C. Cardoso, Caio Lüders Araújo, Paulo Matias
:
The return of software vulnerabilities in the Brazilian voting machine. 335-349 - Ivano Bongiovanni

:
The least secure places in the universe? A systematic literature review on information security management in higher education. 350-357 - Sajjad Haider, Tehsin Kanwal, Adeel Anjum

, Saif Ur Rehman Malik
, Ahmed Khan
, Abid Khan
, Umar Manzoor
:
An efficient privacy preserving protocol for dynamic continuous data collection. 358-371 - Atiye Sadat Hashemi

, Saeed Mozaffari
:
Secure deep neural networks using adversarial image generation and training with Noise-GAN. 372-387 - Wei Bai

, Zhisong Pan
, Shize Guo, Zhe Chen, Shiming Xia:
MDC-Checker: A novel network risk assessment framework for multiple domain configurations. 388-401 - Atif Ahmad

, Jeb Webb, Kevin C. Desouza
, James Boorman
:
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack. 402-418 - Manuel Huber

, Julian Horsch
, Junaid Ali, Sascha Wessel:
Freeze and Crypt: Linux kernel support for main memory encryption. 420-436 - Go Ohtake, Reihaneh Safavi-Naini, Liang Feng Zhang:

Outsourcing scheme of ABE encryption secure against malicious adversary. 437-452 - Jannik Dreier

, Maxime Puys
, Marie-Laure Potet, Pascal Lafourcade
, Jean-Louis Roch:
Formally and practically verifying flow properties in industrial systems. 453-470 - Alireza Jolfaei

, Krishna Kant:
A lightweight integrity protection scheme for low latency smart grid applications. 471-483 - Diogo Barradas, Tiago Brito

, David Duarte, Nuno Santos
, Luís E. T. Rodrigues:
Forensic analysis of communication records of messaging applications from physical memory. 484-497 - Lake Bu

, Mark G. Karpovsky, Michel A. Kinsy:
Bulwark: Securing implantable medical devices communication channels. 498-511

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














