


default search action
Computers & Security, Volume 58
Volume 58, May 2016
- Xiao-Fan Chen, Shun-Zheng Yu:
CIPA: A collaborative intrusion prevention architecture for programmable network and SDN. 1-19 - José Miguel Horcas
, Mónica Pinto
, Lidia Fuentes
, Wissam Mallouli, Edgardo Montes de Oca:
An approach for deploying and monitoring dynamic security policies. 20-38 - Christian Konradt, Andreas Schilling, Brigitte Werners
:
Phishing: An economic analysis of cybercrime perpetrators. 39-46 - Cheng Huang, Jiayong Liu, Yong Fang
, Zheng Zuo:
A study on Web security incidents in China by analyzing vulnerability disclosure platforms. 47-62 - Hira Asghar, Zahid Anwar
, Khalid Latif
:
A deliberately insecure RDF-based Semantic Web application framework for teaching SPARQL/SPARUL injection attacks and defense mechanisms. 63-82 - Mohammad GhasemiGol
, Abbas Ghaemi Bafghi, Hassan Takabi:
A comprehensive approach for network attack forecasting. 83-105 - James Obert
, Inna Pivkina, Hong Huang, Huiping Cao:
Proactively applied encryption in multipath networks. 106-124 - Jae-wook Jang, Hyun-Jae Kang, Jiyoung Woo, Aziz Mohaisen, Huy Kang Kim
:
Andro-Dumpsys: Anti-malware system based on the similarity of malware creator and malware centric information. 125-138 - Farzaneh Abazari
, Morteza Analoui
, Hassan Takabi:
Effect of anti-malware software on infectious nodes in cloud environment. 139-148 - Weize Li, Lun Xie, Zulan Deng, Zhiliang Wang:
False sequential logic attack on SCADA system and its physical impact analysis. 149-159 - Debanjan Sadhya, Sanjay Kumar Singh
:
Privacy preservation for soft biometrics based multimodal recognition system. 160-179 - Hao Zhang
, Danfeng (Daphne) Yao
, Naren Ramakrishnan
, Zhibin Zhang:
Causality reasoning about network events for detecting stealthy malware activities. 180-198 - Siru Ni, Yi Zhuang, Jingjing Gu, Ying Huo:
A formal model and risk assessment method for security-critical real-time embedded systems. 199-215 - Georgios Spanos
, Lefteris Angelis:
The impact of information security events to the stock market: A systematic literature review. 216-229 - Yuede Ji
, Yukun He, Xinyang Jiang, Jian Cao, Qiang Li
:
Combating the evasion mechanisms of social bots. 230-249 - Cihan Ulas, Ulas Asik, Cantürk Karadeniz:
Analysis and reconstruction of laser printer information leakages in the media of electromagnetic radiation, power, and signal lines. 250-267 - Paolo Farina
, Enrico Cambiaso
, Gianluca Papaleo
, Maurizio Aiello
:
Are mobile botnets a possible threat? The case of SlowBot Net. 268-283

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.