


default search action
Computers & Security, Volume 78
Volume 78, September 2018
- DaeHun Nyang, Hyoungshick Kim

, Woojoo Lee, Sung-bae Kang, Geumhwan Cho
, Mun-Kyu Lee
, Aziz Mohaisen
:
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks. 1-15 - Eduardo Viegas

, Altair Olivo Santin
, Luiz Oliveira, André França, Ricardo P. Jasinski, Volnei A. Pedroni:
A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems. 16-32 - Bruno Lopes Dalmazo

, João P. Vilela, Marília Curado
:
Triple-Similarity Mechanism for alarm management in the cloud. 33-42 - Razvan Beuran, Dat Tang, Cuong Pham, Ken-ichi Chinen, Yasuo Tan, Yoichi Shinoda:

Integrated framework for hands-on cybersecurity training: CyTrONE. 43-59 - Huu Hiep Nguyen:

Privacy-preserving mechanisms for k-modes clustering. 60-75 - Estée van der Walt

, Jan H. P. Eloff, Jacomine Grobler
:
Cyber-security: Identity deception detection on social media platforms. 76-89 - Pedro Moreno-Sanchez

, Uzair Mahmood, Aniket Kate:
ClearChart: Ensuring integrity of consumer ratings in online marketplaces. 90-102 - David Myers

, Suriadi Suriadi
, Kenneth Radke, Ernest Foo
:
Anomaly detection for industrial control systems using process mining. 103-125 - Mohamed Tahar Hammi, Badis Hammi, Patrick Bellot, Ahmed Serhrouchni:

Bubbles of Trust: A decentralized blockchain-based authentication system for IoT. 126-142 - Isis Chong, Huangyi Ge, Ninghui Li, Robert W. Proctor:

Influence of privacy priming and security framing on mobile app selection. 143-154 - Edan Habler, Asaf Shabtai:

Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages. 155-173 - Toan Nguyen, Nasir D. Memon

:
Tap-based user authentication for smartwatches. 174-186 - Rafael San-Miguel Carrasco, Miguel-Ángel Sicilia

:
Unsupervised intrusion detection through skip-gram models of network behavior. 187-197 - Karen Renaud

, Stephen Flowerday
, Merrill Warkentin
, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? 198-211 - Lei Jin, Chao Li

, Balaji Palanisamy, James Joshi:
k-Trustee: Location injection attack-resilient anonymization for location privacy. 212-230 - Zezhi Wu

, Xingyuan Chen
, Xuehui Du, Zhi Yang:
CDroid: practically implementation a formal-analyzed CIFC model on Android. 231-244 - Erfan A. Shams

, Ahmet Rizaner
, Ali Hakan Ulusoy
:
Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks. 245-254 - Meriem Guerar

, Alessio Merlo
, Mauro Migliardi
, Francesco Palmieri
:
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT. 255-266 - Lixiang Shen, Dejun Mu, Guo Cao, Maoyuan Qin, Jeremy Blackstone, Ryan Kastner

:
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection. 267-280 - Qiao Hu, Jingyi Zhang, Aikaterini Mitrokotsa

, Gerhard P. Hancke
:
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context. 281-300 - P. Geetha, V. S. Jayanthi, A. N. Jayanthi:

Optimal visual cryptographic scheme with multiple share creation for multimedia applications. 301-320 - Bata Krishna Tripathy, Debi Prasad Das, Swagat Kumar Jena

, Padmalochan Bera:
Risk based Security Enforcement in Software Defined Network. 321-335 - Mei-Ling Yao, Ming-Chuen Chuang, Chun-Cheng Hsu

:
The Kano model analysis of features for mobile security applications. 336-346 - Irfan Ul Haq

, Sergio Chica
, Juan Caballero, Somesh Jha:
Malware lineage in the wild. 347-363 - Thiago Alves, Thomas H. Morris

:
OpenPLC: An IEC 61, 131-3 compliant open source industrial controller for cyber security research. 364-379 - Hyun Kwon

, Yongchul Kim, Ki-Woong Park
, Hyunsoo Yoon, Daeseon Choi
:
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier. 380-397 - Ryan Heartfield

, George Loukas
, Sanja Budimir
, Anatolij Bezemskij, Johnny R. J. Fontaine, Avgoustinos Filippoupolitis, Etienne B. Roesch
:
A taxonomy of cyber-physical threats and impact in the smart home. 398-428 - Mirko Bottarelli, Gregory Epiphaniou

, Dhouha Kbaier Ben Ismail
, Petros Karadimas
, Haider M. Al-Khateeb
:
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research. 454-476 - Eirini Anthi

, Shazaib Ahmad, Omer F. Rana
, George Theodorakopoulos, Pete Burnap:
EclipseIoT: A secure and adaptive hub for the Internet of Things. 477-490

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














