default search action
Computers & Security, Volume 53
Volume 53, September 2015
- Johannes Heurix, Peter Zimmermann, Thomas Neubauer, Stefan Fenz:
A taxonomy for privacy enhancing technologies. 1-17 - Hannes Holm, Khalid Khan Afridi:
An expert-based investigation of the Common Vulnerability Scoring System. 18-30 - Abdul Serwadda, Vir V. Phoha:
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet. 31-43 - Yongge Wang, Tony Nicol:
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL. 44-64 - Nader Sohrabi Safa, Mehdi Sookhak, Rossouw von Solms, Steven Furnell, Norjihan Binti Abdul Ghani, Tutut Herawan:
Information security conscious care behaviour formation in organizations. 65-78 - Izzat Alsmadi, Dianxiang Xu:
Security of Software Defined Networks: A survey. 79-108 - Zouheir Trabelsi, Safaa Zeidan, Mohammad M. Masud, Kilani Ghoudi:
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement. 109-131 - Bukelwa Ngoqo, Stephen V. Flowerday:
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users. 132-142 - Chao Shen, Shichao Pei, Zhenyu Yang, Xiaohong Guan:
Input extraction via motion-sensor behavior analysis on smartphones. 143-155 - Sokratis Vavilis, Alexandru Ionut Egner, Milan Petkovic, Nicola Zannone:
An anomaly analysis framework for database systems. 156-173
- Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero:
BankSealer: A decision support system for online banking fraud analysis and investigation. 175-186 - Gökhan Bal, Kai Rannenberg, Jason I. Hong:
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns. 187-202 - Kevin Atighehchi, Alexis Bonnecaze, Gabriel Risterucci:
New models for efficient authenticated dictionaries. 203-214 - Siamak Fayyaz Shahandashti, Reihaneh Safavi-Naini, Nashad Ahmed Safa:
Reconciling user privacy and implicit authentication for mobile devices. 215-233 - Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione:
Continuous user authentication using multi-modal biometrics. 234-246
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.