default search action
Computers & Security, Volume 59
Volume 59, June 2016
- Sofia-Anna Menesidou, Dimitrios Vardalis, Vasilios Katos:
Automated key exchange protocol evaluation in delay tolerant networks. 1-8 - Kevin A. Barton, Gurvirender P. Tejay, Michael Lane, Steve Terrell:
Information system security commitment: A study of external influences on senior management. 9-25 - Waldo Rocha Flores, Mathias Ekstedt:
Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. 26-44 - Qi Li, Jianfeng Ma, Rui Li, Ximeng Liu, Jinbo Xiong, Danwei Chen:
Secure, efficient and revocable multi-authority access control system in cloud storage. 45-59 - Chunghun Lee, Choong C. Lee, Suhyun Kim:
Understanding information security stress: Focusing on the type of information security compliance activity. 60-70 - Kamran Morovati, Sanjay Kadam, Ali A. Ghorbani:
A network based document management model to prevent data extrusion. 71-91 - Mohsin Junaid, Donggang Liu, David Chenho Kung:
Dexteroid: Detecting malicious behaviors in Android apps using reverse-engineered life cycle models. 92-117 - José Camacho, Alejandro Pérez-Villegas, Pedro García-Teodoro, Gabriel Maciá-Fernández:
PCA-based multivariate statistical network monitoring for anomaly detection. 118-137 - Hsin-Yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, Robert LaRose, Nora J. Rifon, Shelia R. Cotten:
Understanding online safety behaviors: A protection motivation theory perspective. 138-150 - Wassim El-Hajj, Ghassen Ben Brahim, Hazem M. Hajj, Haïdar Safa, Ralph Adaimy:
Security-by-construction in web applications development via database annotations. 151-165 - Jonathan J. Davis, Ernest Foo:
Automated feature engineering for HTTP tunnel detection. 166-185 - Francois Mouton, Louise Leenen, H. S. Venter:
Social engineering attack examples, templates and scenarios. 186-209 - Pin Shen Teh, Ning Zhang, Andrew Beng Jin Teoh, Ke Chen:
A survey on touch dynamics authentication in mobile devices. 210-235 - Liliana Pasquale, Sorren Hanvey, Mark Mcgloin, Bashar Nuseibeh:
Adaptive evidence collection in the cloud using attack scenarios. 236-254
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.