default search action
Computers & Security, Volume 30
Volume 30, Number 1, January 2011
- Eugene H. Spafford:
Editorial. 1 - Eugene H. Spafford:
Security, technology, publishing, and ethics (part II). 2-3 - Zac Sadan, David G. Schwartz:
WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure. 4-12 - Qijun Gu, Christopher Ferguson, Rizwan Noorani:
A study of self-propagating mal-packets in sensor networks: Attacks and defenses. 13-27 - Hua Guo, Yi Mu, Zhoujun Li, Xiyong Zhang:
An efficient and non-interactive hierarchical key agreement protocol. 28-34 - Hassan Khan, Mobin Javed, Syed Ali Khayam, Fauzan Mirza:
Designing a cluster-based covert channel to evade disk investigation and forensics. 35-49 - Sung-Whan Woo, HyunChul Joh, Omar Hussain Alhazmi, Yashwant K. Malaiya:
Modeling vulnerability discovery process in Apache and IIS HTTP servers. 50-62 - Christos Xenakis, Christoforos Panos, Ioannis Stavrakakis:
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks. 63-80
Volume 30, Numbers 2-3, March - May 2011
- Dimitris Gritzalis, James Joshi:
Editorial. 89-90 - Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. 91-107 - Barbara Carminati, Elena Ferrari, Raymond Heatherly, Murat Kantarcioglu, Bhavani Thuraisingham:
Semantic web-based social network access control. 108-115 - Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. 116-127 - Samrat Mondal, Shamik Sural, Vijayalakshmi Atluri:
Security analysis of GTRBAC and its variants using model checking. 128-147 - Scott D. Stoller, Ping Yang, Mikhail I. Gofman, C. R. Ramakrishnan:
Symbolic reachability analysis for parameterized administrative role-based access control. 148-164
Volume 30, Number 4, June 2011
- Eugene H. Spafford:
Editorial. 171 - Xiongfeng Ma, Chi-Hang Fred Fung, Jean-Christian Boileau, H. F. Chau:
Universally composable and customizable post-processing for practical quantum key distribution. 172-177 - Travis D. Breaux, David L. Baumer:
Legally "reasonable" security requirements: A 10-year FTC retrospective. 178-193 - Hugues Chabot, Raphaël Khoury, Nadia Tawbi:
Extending the enforcement power of truncation monitors using static analysis. 194-207 - Nancie Gunson, Diarmid Marshall, Hazel Morton, Mervyn A. Jack:
User perceptions of security and usability of single-factor and two-factor authentication in automated telephone banking. 208-220 - Davide Ariu, Roberto Tronci, Giorgio Giacinto:
HMMPayl: An intrusion detection system based on Hidden Markov Models. 221-241 - Sebastian Möller, Noam Ben-Asher, Klaus-Peter Engelbrecht, Roman Englert, Joachim Meyer:
Modeling the behavior of users who are confronted with security mechanisms. 242-256 - Stylianos Basagiannis, Sophia G. Petridou, Nikolaos Alexiou, Georgios I. Papadimitriou, Panagiotis Katsaros:
Quantitative analysis of a certified e-mail protocol in mobile environments: A probabilistic model checking approach. 257-272 - Dong-Her Shih, David C. Yen, Chih-Hung Cheng, Ming-Hung Shih:
A secure multi-item e-auction mechanism with bid privacy. 273-287
Volume 30, Number 5, July 2011
- Yang Xiang, Jiankun Hu, Wanlei Zhou:
Editorial: Advances in network and system security. 295-296 - Juan E. Tapiador, John A. Clark:
Masquerade mimicry attack detection: A randomised approach. 297-310 - Peng Zhang, Jiankun Hu, Cai Li, Mohammed Bennamoun, Vijayakumar Bhagavatula:
A pitfall in fingerprint bio-cryptographic key generation. 311-319 - Guojun Wang, Qin Liu, Jie Wu, Minyi Guo:
Hierarchical attribute-based encryption and scalable user revocation for sharing data in cloud servers. 320-331 - Xiaoxun Sun, Hua Wang, Jiuyong Li, Yanchun Zhang:
Injecting purpose and trust into data anonymisation. 332-345
Volume 30, Numbers 6-7, September - October 2011
- Eugene H. Spafford:
Editorial. 351-352
- Jonathan J. Davis, Andrew J. Clark:
Data preprocessing for anomaly based network intrusion detection: A review. 353-375
- Slim Rekhis, Noureddine Boudriga:
Logic-based approach for digital forensic investigation in communication Networks. 376-396 - Ignacio J. Martinez-Moyano, Stephen H. Conrad, David F. Andersen:
Modeling behavioral considerations related to information security. 397-409 - Klaus Julisch, Christophe Suter, Thomas Woitalla, Olaf Zimmermann:
Compliance by design - Bridging the chasm between auditors and IT architects. 410-426 - Romain Giot, Mohamad El-Abed, Baptiste Hemery, Christophe Rosenberger:
Unconstrained keystroke dynamics authentication with shared secret. 427-445 - Fernando Pereñíguez-Garcia, Rafael Marín López, Georgios Kambourakis, Stefanos Gritzalis, Antonio Fernandez Gómez-Skarmeta:
PrivaKERB: A user privacy framework for Kerberos. 446-463 - Arne Tauber:
A survey of certified mail systems provided on the Internet. 464-485 - Clay Posey, Rebecca J. Bennett, Tom L. Roberts:
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes. 486-497 - Amit Sachan, Sabu Emmanuel:
Rights violation detection in multi-level digital rights management system. 498-513 - Yuxin Ding, Xuebing Yuan, Di Zhou, Li Dong, Zhanchao An:
Feature representation and selection in malicious code detection methods based on static system calls. 514-524 - Zonghua Zhang, Farid Naït-Abdesselam, Pin-Han Ho, Youki Kadobayashi:
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks. 525-537 - Jianhua Yang, David Woolbright:
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion. 538-546
Volume 30, Number 8, November 2011
- Eugene H. Spafford:
Editorial for 30/8. 553-554
- Da Zhang, Chai Kiat Yeo:
Distributed Court System for intrusion detection in mobile ad hoc networks. 555-570 - Trent Jaeger, Paul C. van Oorschot, Glenn Wurster:
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification. 571-579 - Argyris Arnellos, Dimitrios Lekkas, Dimitrios Zissis, Thomas Spyrou, John Darzentas:
Fair digital signing: The structural reliability of signed documents. 580-596 - Nayantara Mallesh, Matthew K. Wright:
An analysis of the statistical disclosure attack and receiver-bound cover. 597-612 - Hugo Gascon, Agustín Orfila, Jorge Blasco Alís:
Analysis of update delays in signature-based network intrusion detection systems. 613-624 - Constantinos Kolias, Georgios Kambourakis, Manolis Maragoudakis:
Swarm intelligence in intrusion detection: A survey. 625-642 - Eleftheria Makri, Elisavet Konstantinou:
Constant round group key agreement protocols: A comparative study. 643-678 - Nikos Mavrogiannopoulos, Nessim Kisserli, Bart Preneel:
A taxonomy of self-modifying code for obfuscation. 679-691 - Christian Callegari, Stefano Giordano, Michele Pagano, Teresa Pepe:
Combining sketches and wavelet analysis for multi time-scale network anomaly detection. 692-704 - Giampaolo Bella, Rosario Giustolisi, Salvatore Riccobene:
Enforcing privacy in e-commerce by balancing anonymity and trust. 705-718 - Kim-Kwang Raymond Choo:
The cyber threat landscape: Challenges and future research directions. 719-731 - Lin Huang, Mark Stamp:
Masquerade detection using profile hidden Markov models. 732-747 - Ludwig Fuchs, Günther Pernul, Ravi S. Sandhu:
Roles in information security - A survey and classification of the research area. 748-769 - James S. Okolica, Gilbert L. Peterson:
Windows driver memory analysis: A reverse engineering methodology. 770-779 - GuangXu Zhou, Rustu Murat Demirer, Coskun Bayrak, Licheng Wang:
Enable delegation for RBAC with Secure Authorization Certificate. 780-790 - Julian L. Rrushi, Ehsan Mokhtari, Ali A. Ghorbani:
Estimating botnet virulence within mathematical models of botnet propagation dynamics. 791-802 - Nigel J. Martin, John L. Rice:
Cybercrime: Understanding and addressing the concerns of stakeholders. 803-814 - Elias Abou Charanek, Hoseb Dermanilian, Imad H. Elhajj, Ayman I. Kayssi, Ali Chehab:
E2VoIP2: Energy efficient voice over IP privacy. 815-829 - Jung-San Lee, Ming-Huang Hsieh:
An interactive mobile SMS confirmation method using secret sharing technique. 830-839
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.