


default search action
Computers & Security, Volume 42
Volume 42, May 2014
- Christian Rathgeb, Christoph Busch:
Cancelable multi-biometrics: Mixing iris-codes based on adaptive bloom filters. 1-12 - Sebastian Schrittwieser, Stefan Katzenbeisser, Peter Kieseberg
, Markus Huber, Manuel Leithner
, Martin Mulazzani, Edgar R. Weippl:
Covert Computation - Hiding code in code through compile-time obfuscation. 13-26 - Atif Ahmad, Rachelle Bosua, Rens Scheepers:
Protecting organizational competitive advantage: A knowledge leakage perspective. 27-39 - Peter Amthor, Winfried E. Kühnhauser, Anja Pölck:
WorSE: A Workbench for Model-based Security Engineering. 40-55 - Sean Allam
, Stephen Flowerday
, Ethan Flowerday:
Smartphone information security awareness: A victim of operational pressures. 56-65 - Christoforos Ntantogian, Dimitris Apostolopoulos, Giannis Marinakis, Christos Xenakis
:
Evaluating the privacy of Android mobile applications under forensic analysis. 66-76 - Ralph LaBarge
, Thomas A. Mazzuchi, Shahram Sarkani:
An automated system for rapid and secure device sanitization. 77-91 - Katerina Goseva-Popstojanova
, Goce Anastasovski, Ana Dimitrijevikj, Risto Pantev
, Brandon Miller:
Characterization and classification of malicious Web traffic. 92-115 - Joon S. Park, Kevin A. Kwiat, Charles A. Kamhoua, Jonathan White, Sookyung Kim:
Trusted Online Social Network (OSN) services with optimal data management. 116-136 - Taekyoung Kwon, Sarang Na:
TinyLock: Affordable defense against smudge attacks on smartphone pattern lock systems. 137-150 - Xin Dong, Jiadi Yu, Yuan Luo, Yingying Chen, Guangtao Xue, Minglu Li:
Achieving an effective, scalable and privacy-preserving data sharing service in cloud computing. 151-164 - Kathryn Parsons, Agata McCormac, Marcus A. Butavicius, Malcolm Robert Pattinson, Cate Jerram:
Determining employee awareness using the Human Aspects of Information Security Questionnaire (HAIS-Q). 165-176 - Dimitrios Michalopoulos, Ioannis Mavridis
, Marija Jankovic:
GARS: Real-time system for identification, assessment and control of cyber grooming attacks. 177-190 - Nikos Virvilis, Dimitris Gritzalis:
Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks. 191-192

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.