@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-COMPUT-SECUR = "Computers \& Security"}
@Article{Anonymous:2010:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "iii--iii",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900131X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ea,
author = "Dimitris Gritzalis and Jan Eloff",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "1--2",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001138",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2010:SVE,
author = "Fuwen Liu and Hartmut Koenig",
title = "A survey of video encryption algorithms",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "3--15",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000698",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Basagiannis:2010:IMM,
author = "Stylianos Basagiannis and Panagiotis Katsaros and
Andrew Pombortsis",
title = "An intruder model with message inspection for model
checking security protocols",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "16--34",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spathoulas:2010:RFP,
author = "Georgios P. Spathoulas and Sokratis K. Katsikas",
title = "Reducing false positives in intrusion detection
systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "35--44",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000844",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seewald:2010:DIB,
author = "Alexander K. Seewald and Wilfried N. Gansterer",
title = "On the detection and identification of botnets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "45--58",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shin:2010:AMD,
author = "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
Atluri",
title = "Anonymization models for directional location based
service environments",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "59--73",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Costa:2010:RMN,
author = "Gabriele Costa and Fabio Martinelli and Paolo Mori and
Christian Schaefer and Thomas Walter",
title = "Runtime monitoring for next generation {Java ME}
platform",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "74--87",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000790",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toland:2010:IPM,
author = "Tyrone S. Toland and Csilla Farkas and Caroline M.
Eastman",
title = "The inference problem: Maintaining maximal
availability in the presence of database updates",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "88--103",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000789",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choi:2010:WVE,
author = "Y.-H. Choi and L. Li and P. Liu and G. Kesidis",
title = "Worm virulence estimation for the containment of local
worm outbreak",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "104--123",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000753",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2010:SCA,
author = "Chenfeng Vincent Zhou and Christopher Leckie and
Shanika Karunasekera",
title = "A survey of coordinated attacks and collaborative
intrusion detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "124--140",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900073X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hernandez-Castro:2010:PCD,
author = "Carlos Javier Hernandez-Castro and Arturo Ribagorda",
title = "Pitfalls in {CAPTCHA} design and implementation: the
Math {CAPTCHA}, a case study",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "141--157",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000728",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAa,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "158--158",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001357",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCa,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "159--162",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPa,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "163--164",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900128X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PF,
author = "Anonymous",
title = "Pages 1--164 ({February 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "??--??",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "iii--iii",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Eb,
author = "Dimitris Gritzalis and Sabrina {De Capitani di
Vimercati}",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "165--166",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001424",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ferrer-Gomilla:2010:CEM,
author = "Josep Lluis Ferrer-Gomilla and Jose A. Onieva and
Magdalena Payeras and Javier Lopez",
title = "Certified electronic mail: Properties revisited",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "167--179",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000704",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jarraya:2010:SPP,
author = "Houssem Jarraya and Maryline Laurent",
title = "A secure peer-to-peer backup service keeping great
autonomy while under the supervision of a provider",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "180--195",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001102",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DaVeiga:2010:FAI,
author = "A. {Da Veiga} and J. H. P. Eloff",
title = "A framework and assessment instrument for information
security culture",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "196--207",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000923",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Su:2010:WWA,
author = "Ming-Yang Su",
title = "{WARP}: a wormhole-avoidance routing protocol by
anomaly detection in mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "208--224",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ehlert:2010:SNS,
author = "Sven Ehlert and Dimitris Geneiatakis and Thomas
Magedanz",
title = "Survey of network security systems to counter
{SIP}-based denial-of-service attacks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "225--243",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holbl:2010:TPI,
author = "Marko H{\"o}lbl and Tatjana Welzer and Bostjan
Brumen",
title = "Two proposed identity-based three-party authenticated
key agreement protocols from pairings",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "244--252",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900090X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stakhanova:2010:SSB,
author = "Natalia Stakhanova and Samik Basu and Johnny Wong",
title = "On the symbiosis of specification-based and
anomaly-based detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "253--268",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000893",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chang:2010:EFB,
author = "Chin-Chen Chang and Hao-Chuan Tsai and Yi-Pei Hsieh",
title = "An efficient and fair buyer-seller fingerprinting
scheme for large scale networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "269--277",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000881",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Millan:2010:PBT,
author = "Gabriel L{\'o}pez Mill{\'a}n and Manuel Gil P{\'e}rez
and Gregorio Mart{\'\i}nez P{\'e}rez and Antonio F.
G{\'o}mez Skarmeta",
title = "{PKI}-based trust management in inter-domain
scenarios",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "278--290",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000868",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAb,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "291--291",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001606",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCb,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "292--295",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPb,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "296--296",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPc,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "297--297",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000039",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "ifc--ifc",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PM,
author = "Anonymous",
title = "Pages 165--298 ({March 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "??--??",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCc,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "i--iv",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "iv--iv",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000012X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2010:SIS,
author = "Seok-Won Lee and Mattia Monga",
title = "Special issue on software engineering for secure
systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "299--301",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pironti:2010:PCJ,
author = "Alfredo Pironti and Riccardo Sisto",
title = "Provably correct {Java} implementations of {Spi
Calculus} security protocols specifications",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "302--314",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000832",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bauer:2010:RVC,
author = "Andreas Bauer and Jan J{\"u}rjens",
title = "Runtime verification of cryptographic protocols",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "315--330",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiao:2010:KSM,
author = "Liang Xiao and Bo Hu and Madalina Croitoru and Paul
Lewis and Srinandan Dasmahapatra",
title = "A knowledgeable security model for distributed health
information systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "331--349",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pavlich-Mariscal:2010:FCA,
author = "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
Laurent D. Michel",
title = "A framework of composable access control features:
Preserving separation of access control concerns from
models to code",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "350--379",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAc,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "380--380",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "ifc--ifc",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000009X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "iii--iii",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ec,
author = "Dimitris Gritzalis and Pierangela Samarati",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "381--382",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hilgenstieler:2010:ESP,
author = "Egon Hilgenstieler and Elias P. Duarte and Glenn
Mansfield-Keeni and Norio Shiratori",
title = "Extensions to the source path isolation engine for
precise and efficient log-based {IP} traceback",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "383--392",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rossudowski:2010:SPA,
author = "A. M. Rossudowski and H. S. Venter and J. H. P. Eloff
and D. G. Kourie",
title = "A security privacy aware architecture and protocol for
a single smart card used for multiple services",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "393--409",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001394",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2010:SAS,
author = "Fangwei Wang and Yunkai Zhang and Changguang Wang and
Jianfeng Ma and SangJae Moon",
title = "Stability analysis of a {SEIQV} epidemic model for
rapid spreading worms",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "410--418",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001096",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheneau:2010:SIP,
author = "Tony Cheneau and Aymen Boudguiga and Maryline
Laurent",
title = "Significantly improved performances of the
cryptographically generated addresses thanks to {ECC}
and {GPGPU}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "419--431",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001461",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Albrechtsen:2010:IIS,
author = "Eirik Albrechtsen and Jan Hovden",
title = "Improving information security awareness and behaviour
through dialogue, participation and collective
reflection. {An} intervention study",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "432--445",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001436",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yoon:2010:HSF,
author = "Ji Won Yoon and Hyoungshick Kim and Jun Ho Huh",
title = "Hybrid spam filtering for mobile communication",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "446--459",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001266",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2010:GME,
author = "Christoforos Ntantogian and Christos Xenakis and
Ioannis Stavrakakis",
title = "A generic mechanism for efficient authentication in
B3G networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "460--475",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{VanNiekerk:2010:ISC,
author = "J. F. {Van Niekerk} and R. {Von Solms}",
title = "Information security culture: a management
perspective",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "476--486",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001126",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mander:2010:PSD,
author = "Todd Mander and Richard Cheung and Farhad Nabhani",
title = "Power system {DNP3} data object security using data
sets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "487--500",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001084",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Forne:2010:PAA,
author = "Jordi Forn{\'e} and Francisca Hinarejos and Andr{\'e}s
Mar{\'{\i}}n and Florina Almen{\'a}rez and Javier Lopez
and Jose A. Montenegro and Marc Lacoste and Daniel
D{\'{\i}}az",
title = "Pervasive authentication and authorization
infrastructures for mobile users",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "501--514",
month = jun,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2009.09.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000911",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAd,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "515--515",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000283",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCd,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "516--519",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000295",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PJ,
author = "Anonymous",
title = "Pages 381--520 ({June 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "??--??",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "iv--iv",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000043X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ed,
author = "Dimitris Gritzalis and Javier Lopez",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "521--522",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leitold:2010:RES,
author = "Herbert Leitold and Reinhard Posch and Thomas
R{\"o}ssler",
title = "Reconstruction of electronic signatures from
{eDocument} printouts",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "523--532",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001254",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Blundo:2010:MKH,
author = "Carlo Blundo and Stelvio Cimato and Sabrina {De
Capitani di Vimercati} and Alfredo {De Santis} and Sara
Foresti and Stefano Paraboschi and Pierangela
Samarati",
title = "Managing key hierarchies for access control
enforcement: Heuristic approaches",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "533--547",
month = jul,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2009.12.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001448",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Colantonio:2010:TRM,
author = "Alessandro Colantonio and Roberto {Di Pietro} and
Alberto Ocello and Nino Vincenzo Verde",
title = "Taming role mining complexity in {RBAC}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "548--564",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000027",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pham:2010:TD,
author = "Quan Pham and Jason Reid and Adrian McCullagh and
Edward Dawson",
title = "On a taxonomy of delegation",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "565--579",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolter:2010:CPM,
author = "Jan Kolter and Thomas Kernchen and G{\"u}nther
Pernul",
title = "Collaborative privacy management",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "580--591",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900145X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Farley:2010:RBD,
author = "Ryan Farley and Xinyuan Wang",
title = "Roving bugnet: Distributed surveillance threat and
mitigation",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "592--602",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001400",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Soupionis:2010:ACE,
author = "Yannis Soupionis and Dimitris Gritzalis",
title = "Audio {CAPTCHA}: Existing solutions assessment and a
new implementation for {VoIP} telephony",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "603--618",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sorniotti:2010:PSS,
author = "Alessandro Sorniotti and Refik Molva",
title = "A provably secure secret handshake with dynamic
controlled matching",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "619--627",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001370",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fernandez:2010:NAI,
author = "Marcel Fernandez and Josep Cotrina and Miguel Soriano
and Neus Domingo",
title = "A note about the identifier parent property in
{Reed--Solomon} codes",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "628--635",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAe,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "636--640",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "iii--iii",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000568",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "641--642",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Theoharidou:2010:MLC,
author = "Marianthi Theoharidou and Panayiotis Kotzanikolaou and
Dimitris Gritzalis",
title = "A multi-layer Criticality Assessment methodology based
on interdependencies",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "643--658",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000210",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sommestad:2010:PRM,
author = "Teodor Sommestad and Mathias Ekstedt and Pontus
Johnson",
title = "A probabilistic relational model for security risk
analysis",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "659--679",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kavallaris:2010:DPS,
author = "Theodoros Kavallaris and Vasilios Katos",
title = "On the detection of pod slurping attacks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "680--685",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zi:2010:IPN,
author = "Xiaochao Zi and Lihong Yao and Li Pan and Jianhua Li",
title = "Implementing a passive network covert timing channel",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "686--696",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hinarejos:2010:PEC,
author = "M. Francisca Hinarejos and Jose L. Mu{\~n}oz and Jordi
Forn{\'e} and Oscar Esparza",
title = "{PREON}: an efficient cascade revocation mechanism for
delegation paths",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "697--711",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000222",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tjhai:2010:PTS,
author = "Gina C. Tjhai and Steven M. Furnell and Maria Papadaki
and Nathan L. Clarke",
title = "A preliminary two-stage alarm correlation and
filtering system using {SOM} neural network and
{$K$}-means algorithm",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "712--723",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAf,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "724--728",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000057X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "ifc--ifc",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000532",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PS,
author = "Anonymous",
title = "Pages 641--728 ({September 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "??--??",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "iii--iii",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000672",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "729--730",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000714",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruighaver:2010:EDM,
author = "A. B. Ruighaver and S. B. Maynard and M. Warren",
title = "Ethical decision making: Improving the quality of
acceptable use policies",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "731--736",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000386",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Palmieri:2010:NAD,
author = "Francesco Palmieri and Ugo Fiore",
title = "Network anomaly detection through nonlinear analysis",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "737--755",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000362",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guinde:2010:EHS,
author = "Nitesh B. Guinde and Sotirios G. Ziavras",
title = "Efficient hardware support for pattern matching in
network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "756--769",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000350",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pavlich-Mariscal:2010:FSA,
author = "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
Laurent D. Michel",
title = "A framework for security assurance of access control
enforcement code",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "770--784",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Palmer:2010:ASM,
author = "Anthony J. Palmer",
title = "Approach for selecting the most suitable Automated
Personal Identification Mechanism {(ASMSA)}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "785--806",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000325",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAg,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "807--811",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000726",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBg,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "ifc--ifc",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000647",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PO,
author = "Anonymous",
title = "Pages 729--812 ({October 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "??--??",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "iii--iii",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000969",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:STP,
author = "Eugene H. Spafford",
title = "Security, technology, publishing, and ethics (Part
I)",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "813--814",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000878",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2010:MPT,
author = "Jinpeng Wei and Calton Pu",
title = "Modeling and preventing {TOCTTOU} vulnerabilities in
{Unix}-style file systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "815--830",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000830",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Workman:2010:BPC,
author = "Michael Workman",
title = "A behaviorist perspective on corporate harassment
online: Validation of a theoretical model of
psychological motives",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "831--839",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000829",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kritzinger:2010:CSH,
author = "E. Kritzinger and S. H. von Solms",
title = "Cyber security for home users: a new way of protection
through awareness enforcement",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "840--847",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000775",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ardagna:2010:ACS,
author = "Claudio A. Ardagna and Sabrina {De Capitani di
Vimercati} and Sara Foresti and Tyrone W. Grandison and
Sushil Jajodia and Pierangela Samarati",
title = "Access control for smarter healthcare using policy
spaces",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "848--858",
month = nov,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2010.07.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000623",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kantzavelou:2010:GBI,
author = "Ioanna Kantzavelou and Sokratis Katsikas",
title = "A game-based intrusion detection mechanism to confront
internal attackers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "859--874",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000611",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herranz:2010:CDP,
author = "Javier Herranz and Stan Matwin and Jordi Nin and
Vicen{\c{c}} Torra",
title = "Classifying data from protected statistical datasets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "875--890",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:2010:MFA,
author = "Fred Cohen",
title = "A method for forensic analysis of control",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "891--902",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000374",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAh,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "903--907",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000970",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IIS,
author = "Anonymous",
title = "Invitation to {IFIP} sec 2011",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "908--908",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000101X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBh,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000933",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PN,
author = "Anonymous",
title = "Pages 813--908 ({November 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "??--??",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "iii--iii",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000216",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "1--1",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000115X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:STP,
author = "Eugene H. Spafford",
title = "Security, technology, publishing, and ethics (part
{II})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "2--3",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001161",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sadan:2011:WUS,
author = "Zac Sadan and David Schwartz",
title = "{WhiteScript}: Using social network analysis
parameters to balance between browser usability and
malware exposure",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "4--12",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000842",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gu:2011:SSP,
author = "Qijun Gu and Christopher Ferguson and Rizwan Noorani",
title = "A study of self-propagating mal-packets in sensor
networks: Attacks and defenses",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "13--27",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000854",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2011:ENI,
author = "Hua Guo and Yi Mu and Zhoujun Li and Xiyong Zhang",
title = "An efficient and non-interactive hierarchical key
agreement protocol",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "28--34",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000866",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khan:2011:DCB,
author = "Hassan Khan and Mobin Javed and Syed Ali Khayam and
Fauzan Mirza",
title = "Designing a cluster-based covert channel to evade disk
investigation and forensics",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "35--49",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000088X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Woo:2011:MVD,
author = "Sung-Whan Woo and HyunChul Joh and Omar H. Alhazmi and
Yashwant K. Malaiya",
title = "Modeling vulnerability discovery process in {Apache}
and {IIS HTTP} servers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "50--62",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000908",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2011:CEI,
author = "Christos Xenakis and Christoforos Panos and Ioannis
Stavrakakis",
title = "A comparative evaluation of intrusion detection
architectures for mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "63--80",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000091X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAa,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "81--85",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ICC,
author = "Anonymous",
title = "{IFIPTM 2011} --- Call for Contributions",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "86--86",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000101",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:CMa,
author = "Anonymous",
title = "Call for membership",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "87--87",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:WCP,
author = "Anonymous",
title = "{WISE 7} --- Call for Papers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "88--88",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000125",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "ifc--ifc",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000186",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PJa,
author = "Anonymous",
title = "Pages 1--88 ({January 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "??--??",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzaliz:2011:E,
author = "Dimitris Gritzaliz and James Joshi",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "89--90",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001094",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rao:2011:FGI,
author = "Prathima Rao and Dan Lin and Elisa Bertino and Ninghui
Li and Jorge Lobo",
title = "Fine-grained integration of access control policies",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "91--107",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000891",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carminati:2011:SWB,
author = "Barbara Carminati and Elena Ferrari and Raymond
Heatherly and Murat Kantarcioglu and Bhavani
Thuraisingham",
title = "Semantic web-based social network access control",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "108--115",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000799",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jin:2011:PCA,
author = "Jing Jin and Gail-Joon Ahn and Hongxin Hu and Michael
J. Covington and Xinwen Zhang",
title = "Patient-centric authorization framework for electronic
healthcare services",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "116--127",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000805",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mondal:2011:SAG,
author = "Samrat Mondal and Shamik Sural and Vijayalakshmi
Atluri",
title = "Security analysis of {GTRBAC} and its variants using
model checking",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "128--147",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000817",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stoller:2011:SRA,
author = "Scott D. Stoller and Ping Yang and Mikhail I. Gofman
and C. R. Ramakrishnan",
title = "Symbolic reachability analysis for parameterized
administrative role-based access control",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "148--164",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000787",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAb,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "165--169",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000356",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:HCP,
author = "Anonymous",
title = "{HAISA} --- Call for papers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "170--170",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000393",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "ifc--ifc",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000319",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "iii--iii",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000563",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "171--171",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000496",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ma:2011:UCC,
author = "Xiongfeng Ma and Chi-Hang Fred Fung and Jean-Christian
Boileau and H. F. Chau",
title = "Universally composable and customizable
post-processing for practical quantum key
distribution",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "172--177",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001021",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Breaux:2011:LRS,
author = "Travis D. Breaux and David L. Baumer",
title = "Legally ``reasonable'' security requirements: a
10-year {FTC} retrospective",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "178--193",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001124",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chabot:2011:EEP,
author = "Hugues Chabot and Rapha{\"e}l Khoury and Nadia Tawbi",
title = "Extending the enforcement power of truncation monitors
using static analysis",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "194--207",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001136",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gunson:2011:UPS,
author = "Nancie Gunson and Diarmid Marshall and Hazel Morton
and Mervyn Jack",
title = "User perceptions of security and usability of
single-factor and two-factor authentication in
automated telephone banking",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "208--220",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001148",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ariu:2011:HID,
author = "Davide Ariu and Roberto Tronci and Giorgio Giacinto",
title = "{\em {HMMPayl}}: an intrusion detection system based
on Hidden {Markov} Models",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "221--241",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moller:2011:MBU,
author = "Sebastian M{\"o}ller and Noam Ben-Asher and
Klaus-Peter Engelbrecht and Roman Englert and Joachim
Meyer",
title = "Modeling the behavior of users who are confronted with
security mechanisms",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "242--256",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000423",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Basagiannis:2011:QAC,
author = "S. Basagiannis and S. Petridou and N. Alexiou and G.
Papadimitriou and P. Katsaros",
title = "Quantitative analysis of a certified e-mail protocol
in mobile environments: a probabilistic model checking
approach",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "257--272",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000435",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shih:2011:SMI,
author = "Dong-Her Shih and David C. Yen and Chih-Hung Cheng and
Ming-Hung Shih",
title = "A secure multi-item e-auction mechanism with bid
privacy",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "273--287",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000460",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAc,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "288--292",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000575",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:CMb,
author = "Anonymous",
title = "Call for membership",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "293--293",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000605",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000538",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PJb,
author = "Anonymous",
title = "Pages 171--294 ({June 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "??--??",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "iii--iii",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000782",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiang:2011:EAN,
author = "Yang Xiang and Jiankun Hu and Wanlei Zhou",
title = "Editorial: Advances in network and system security",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "295--296",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000708",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tapiador:2011:MMA,
author = "Juan E. Tapiador and John A. Clark",
title = "Masquerade mimicry attack detection: a randomised
approach",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "297--310",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000654",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:PFB,
author = "Peng Zhang and Jiankun Hu and Cai Li and Mohammed
Bennamoun and Vijayakumar Bhagavatula",
title = "A pitfall in fingerprint bio-cryptographic key
generation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "311--319",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000459",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2011:HAB,
author = "Guojun Wang and Qin Liu and Jie Wu and Minyi Guo",
title = "Hierarchical attribute-based encryption and scalable
user revocation for sharing data in cloud servers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "320--331",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000678",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sun:2011:IPT,
author = "Xiaoxun Sun and Hua Wang and Jiuyong Li and Yanchun
Zhang",
title = "Injecting purpose and trust into data anonymisation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "332--345",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAd,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "346--350",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000757",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ci,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ec,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "351--352",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000733",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Davis:2011:DPA,
author = "Jonathan J. Davis and Andrew J. Clark",
title = "Data preprocessing for anomaly based network intrusion
detection: a review",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "353--375",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000691",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rekhis:2011:LBA,
author = "Slim Rekhis and Noureddine Boudriga",
title = "Logic-based approach for digital forensic
investigation in communication Networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "376--396",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000447",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martinez-Moyano:2011:MBC,
author = "Ignacio J. Martinez-Moyano and Stephen H. Conrad and
David F. Andersen",
title = "Modeling behavioral considerations related to
information security",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "397--409",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000472",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Julisch:2011:CDB,
author = "Klaus Julisch and Christophe Suter and Thomas Woitalla
and Olaf Zimmermann",
title = "Compliance by design --- Bridging the chasm between
auditors and {IT} architects",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "410--426",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000514",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giot:2011:UKD,
author = "Romain Giot and Mohamad El-Abed and Baptiste Hemery
and Christophe Rosenberger",
title = "Unconstrained keystroke dynamics authentication with
shared secret",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "427--445",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000502",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pereniguez:2011:PUP,
author = "F. Pereniguez and R. Marin-Lopez and G. Kambourakis
and S. Gritzalis and A. F. Gomez",
title = "{PrivaKERB}: a user privacy framework for {Kerberos}",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "446--463",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000617",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tauber:2011:SCM,
author = "Arne Tauber",
title = "A survey of certified mail systems provided on the
{Internet}",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "464--485",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000629",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Posey:2011:UMA,
author = "Clay Posey and Rebecca J. Bennett and Tom L. Roberts",
title = "Understanding the mindset of the abusive insider: an
examination of insiders' causal reasoning following
internal security changes",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "486--497",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000630",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sachan:2011:RVD,
author = "Amit Sachan and Sabu Emmanuel",
title = "Rights violation detection in multi-level digital
rights management system",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "498--513",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000642",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yuxin:2011:FRS,
author = "Ding Yuxin and Yuan Xuebing and Zhou Di and Dong Li
and An Zhanchao",
title = "Feature representation and selection in malicious code
detection methods based on static system calls",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "514--524",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100068X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:TCS,
author = "Zonghua Zhang and Farid Na{\"\i}t-Abdesselam and
Pin-Han Ho and Youki Kadobayashi",
title = "Toward cost-sensitive self-optimizing anomaly
detection and response in autonomic networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "525--537",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100071X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2011:CTI,
author = "Jianhua Yang and David Woolbright",
title = "Correlating {TCP\slash IP} Packet contexts to detect
stepping-stone intrusion",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "538--546",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000721",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAe,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "547--551",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000915",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "ifc--ifc",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PSO,
author = "Anonymous",
title = "Pages 351--552 ({September--October 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "??--??",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cj,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "iii--iv",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ef,
author = "Eugene H. Spafford",
title = "Editorial for 30/8",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "553--554",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:DCS,
author = "Da Zhang and Chai Kiat Yeo",
title = "Distributed Court System for intrusion detection in
mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "555--570",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001155",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jaeger:2011:CUC,
author = "Trent Jaeger and Paul C. van Oorschot and Glenn
Wurster",
title = "Countering unauthorized code execution on commodity
kernels: a survey of common interfaces allowing kernel
code modification",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "571--579",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Arnellos:2011:FDS,
author = "Argyris Arnellos and Dimitrios Lekkas and Dimitrios
Zissis and Thomas Spyrou and John Darzentas",
title = "Fair digital signing: the structural reliability of
signed documents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "580--596",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100112X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mallesh:2011:ASD,
author = "Nayantara Mallesh and Matthew Wright",
title = "An analysis of the statistical disclosure attack and
receiver-bound cover",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "597--612",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001118",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gascon:2011:AUD,
author = "Hugo Gascon and Agustin Orfila and Jorge Blasco",
title = "Analysis of update delays in signature-based network
intrusion detection systems",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "613--624",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolias:2011:SII,
author = "C. Kolias and G. Kambourakis and M. Maragoudakis",
title = "Swarm intelligence in intrusion detection: a survey",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "625--642",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100109X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Makri:2011:CRG,
author = "Eleftheria Makri and Elisavet Konstantinou",
title = "Constant round group key agreement protocols: a
comparative study",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "643--678",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001088",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mavrogiannopoulos:2011:TSM,
author = "Nikos Mavrogiannopoulos and Nessim Kisserli and Bart
Preneel",
title = "A taxonomy of self-modifying code for obfuscation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "679--691",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegari:2011:CSW,
author = "C. Callegari and S. Giordano and M. Pagano and T.
Pepe",
title = "Combining sketches and wavelet analysis for multi
time-scale network anomaly detection",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "692--704",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bella:2011:EPC,
author = "Giampaolo Bella and Rosario Giustolisi and Salvatore
Riccobene",
title = "Enforcing privacy in e-commerce by balancing anonymity
and trust",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "705--718",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choo:2011:CTL,
author = "Kim-Kwang Raymond Choo",
title = "The cyber threat landscape: Challenges and future
research directions",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "719--731",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2011:MDU,
author = "Lin Huang and Mark Stamp",
title = "Masquerade detection using profile hidden {Markov}
models",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "732--747",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001003",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fuchs:2011:RIS,
author = "L. Fuchs and G. Pernul and R. Sandhu",
title = "Roles in information security --- a survey and
classification of the research area",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "748--769",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100099X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Okolica:2011:WDM,
author = "James S. Okolica and Gilbert L. Peterson",
title = "{Windows} driver memory analysis: a reverse
engineering methodology",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "770--779",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000988",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2011:EDR,
author = "GuangXu Zhou and Murat Demirer and Coskun Bayrak and
Licheng Wang",
title = "Enable delegation for {RBAC} with Secure Authorization
Certificate",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "780--790",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000976",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rrushi:2011:EBV,
author = "Julian Rrushi and Ehsan Mokhtari and Ali A. Ghorbani",
title = "Estimating botnet virulence within mathematical models
of botnet propagation dynamics",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "791--802",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000964",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martin:2011:CUA,
author = "Nigel Martin and John Rice",
title = "Cybercrime: Understanding and addressing the concerns
of stakeholders",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "803--814",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100085X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Charanek:2011:VEE,
author = "Elias Abou Charanek and Hoseb Dermanilian and Imad
Elhajj and Ayman Kayssi and Ali Chehab",
title = "{$ E^2 $ VoIP$^2$}: Energy efficient voice over {IP}
privacy",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "815--829",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2011:IMS,
author = "Jung-San Lee and Ming-Huang Hsieh",
title = "An interactive mobile {SMS} confirmation method using
secret sharing technique",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "830--839",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000836",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PN,
author = "Anonymous",
title = "Pages 553--840 ({November 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "??--??",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "iii--iii",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100157X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "1--2",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001520",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:AF,
author = "Manuel Leithner and Edgar Weippl",
title = "{Android} forensics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "3--3",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001301",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mana:2012:TNB,
author = "Antonio Ma{\~n}a and Hristo Koshutanski and Ernesto J.
P{\'e}rez",
title = "A trust negotiation based security framework for
service provisioning in load-balancing clusters",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "4--25",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001428",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kulekci:2012:SBW,
author = "M. Oguzhan K{\"u}lekci",
title = "On scrambling the {Burrows--Wheeler} transform to
provide privacy in lossless compression",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "26--32",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001416",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2012:RHA,
author = "Gaobo Yang and Ning Chen and Qin Jiang",
title = "A robust hashing algorithm based on {SURF} for video
copy detection",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "33--39",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bhatnagar:2012:NRA,
author = "Gaurav Bhatnagar and Q. M. Jonathan Wu and
Balasubramanian Raman",
title = "A new robust adjustable logo watermarking scheme",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "40--58",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001398",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2012:TRS,
author = "Xingwen Zhao and Fangguo Zhang",
title = "Tracing and revoking scheme for dynamic privileges
against pirate rebroadcast",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "59--69",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001386",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mou:2012:FEC,
author = "Sheng Mou and Zhiwen Zhao and Sisi Jiang and Zushun Wu
and Jiaojiao Zhu",
title = "Feature extraction and classification algorithm for
detecting complex covert timing channel",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "70--82",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ifinedo:2012:UIS,
author = "Princely Ifinedo",
title = "Understanding information systems security policy
compliance: an integration of the theory of planned
behavior and the protection motivation theory",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "83--95",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rodero-Merino:2012:BSP,
author = "Luis Rodero-Merino and Luis M. Vaquero and Eddy Caron
and Adrian Muresan and Fr{\'e}d{\'e}ric Desprez",
title = "Building safe {PaaS} clouds: a survey on security in
multitenant software platforms",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "96--108",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stefan:2012:RKD,
author = "Deian Stefan and Xiaokui Shu and Danfeng (Daphne)
Yao",
title = "Robustness of keystroke-dynamics based biometrics
against synthetic forgeries",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "109--121",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001179",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lacey:2012:RUR,
author = "T. H. Lacey and R. F. Mills and B. E. Mullins and R.
A. Raines and M. E. Oxley and S. K. Rogers",
title = "{RIPsec} --- Using reputation-based multilayer
security to protect {MANETs}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "122--136",
month = feb,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.09.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001167",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dube:2012:MTR,
author = "T. Dube and R. Raines and G. Peterson and K. Bauer and
M. Grimaila and S. Rogers",
title = "Malware target recognition via static heuristics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "137--147",
month = feb,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.09.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001544",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PF,
author = "Anonymous",
title = "Pages 1--148 ({February 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "??--??",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "iii--iii",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000302",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "149--150",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000168",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Al-Assam:2012:SEB,
author = "Hisham Al-Assam and Sabah Jassim",
title = "Security evaluation of biometric keys",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "151--163",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000065",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holm:2012:PAN,
author = "Hannes Holm",
title = "Performance of automated network vulnerability
scanning at remediating security issues",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "164--175",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001696",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2012:TGD,
author = "Jinpeng Wei and Calton Pu",
title = "Toward a general defense against kernel queue hooking
attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "176--191",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiao:2012:MFR,
author = "Da Xiao and Yan Yang and Wenbin Yao and Chunhua Wu and
Jianyi Liu and Yixian Yang",
title = "Multiple-File Remote Data Checking for cloud storage",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "192--205",
month = mar,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.12.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001489",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liginlal:2012:HPR,
author = "Divakaran Liginlal and Inkook Sim and Lara Khansa and
Paul Fearn",
title = "{HIPAA} Privacy Rule compliance: an interpretive study
using {Norman}'s action theory",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "206--220",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001453",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rhee:2012:UOI,
author = "Hyeun-Suk Rhee and Young U. Ryu and Cheong-Tag Kim",
title = "Unrealistic optimism on information security
management",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "221--232",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chung:2012:HQB,
author = "Yu-Chi Chung and Ming-Chuan Wu and Yih-Chang Chen and
Wen-Kui Chang",
title = "A Hot Query Bank approach to improve detection
performance against {SQL} injection attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "233--248",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100143X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:SRM,
author = "Katina Michael",
title = "Security Risk Management: Building an Information
Security Risk Management Program from the Ground Up",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "249--250",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001660",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:CA,
author = "Jennifer L. Bayuk",
title = "Cyber Attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "251--251",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:CPT,
author = "Manuel Leithner and Edgar Weippl",
title = "Coding for Penetration Testers",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "252--252",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001490",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Macfarlane:2012:FSP,
author = "Richard Macfarlane and William Buchanan and Elias
Ekonomou and Omair Uthmani and Lu Fan and Owen Lo",
title = "Formal security policy implementations in network
firewalls",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "253--270",
month = mar,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.10.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "ifc--ifc",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000272",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PMa,
author = "Anonymous",
title = "Pages 149--270 ({March 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "??--??",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "iii--iii",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200048X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "271--272",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000570",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Molina:2012:OEA,
author = "Maurizio Molina and Ignasi Paredes-Oliva and Wayne
Routly and Pere Barlet-Ros",
title = "Operational experiences with anomaly detection in
backbone networks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "273--285",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000132",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vorakulpipat:2012:PSR,
author = "Chalee Vorakulpipat and Vasaka Visoottiviseth and
Siwaruk Siwamogsatham",
title = "Polite sender: a resource-saving spam email
countermeasure based on sender responsibilities and
recipient justifications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "286--298",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000119",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abramov:2012:MIA,
author = "Jenny Abramov and Omer Anson and Michal Dahan and
Peretz Shoval and Arnon Sturm",
title = "A methodology for integrating access control policies
within database development",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "299--314",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000089",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karadsheh:2012:ASP,
author = "Louay Karadsheh",
title = "Applying security policies and service level agreement
to {IaaS} service model to enhance security and
transition",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "315--326",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000077",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lent:2012:EMB,
author = "Ricardo Lent",
title = "Evaluating a migration-based response to {DoS} attacks
in a system of distributed auctions",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "327--343",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Scholte:2012:TCN,
author = "Theodoor Scholte and Davide Balzarotti and Engin
Kirda",
title = "Have things changed now? {An} empirical study on input
validation vulnerabilities in web applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "344--356",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001684",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shiravi:2012:TDS,
author = "Ali Shiravi and Hadi Shiravi and Mahbod Tavallaee and
Ali A. Ghorbani",
title = "Toward developing a systematic approach to generate
benchmark datasets for intrusion detection",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "357--374",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001672",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "ifc--ifc",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000454",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PMb,
author = "Anonymous",
title = "Pages 271--374 ({May 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "??--??",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:FAI,
author = "Anonymous",
title = "Filler {AD:IFIP}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "i--i",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000764",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "iii--iv",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000739",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Eb,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "375--376",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000685",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zeng:2012:AIB,
author = "Ying Zeng and FenLin Liu and XiangYang Luo and ShiGuo
Lian",
title = "Abstract interpretation-based semantic framework for
software birthmark",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "377--390",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000545",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khan:2012:PAB,
author = "Muhammad Naeem Ahmed Khan",
title = "Performance analysis of {Bayesian} networks and neural
networks in classification of file system activities",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "391--401",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000533",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhi-jun:2012:MBA,
author = "Wu Zhi-jun and Zhang Hai-tao and Wang Ming-hua and Pei
Bao-song",
title = "{MSABMS}-based approach of detecting {LDoS} attack",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "402--417",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000521",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nicholson:2012:SSL,
author = "A. Nicholson and S. Webber and S. Dyer and T. Patel
and H. Janicke",
title = "{SCADA} security in the light of Cyber-Warfare",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "418--436",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000429",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sallam:2012:EBM,
author = "Ahmed I. Sallam and El-Sayed El-Rabaie and Osama S.
Faragallah",
title = "Encryption-based multilevel model for {DBMS}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "437--446",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shaikh:2012:DRB,
author = "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
title = "Dynamic risk-based decision methods for access control
systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "447--464",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000399",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sun:2012:SBF,
author = "San-Tsai Sun and Kirstie Hawkey and Konstantin
Beznosov",
title = "Systematically breaking and fixing {OpenID} security:
Formal analysis, semi-automated empirical evaluation,
and practical countermeasures",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "465--483",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000387",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2012:PSP,
author = "Hyoungshick Kim and Jun Ho Huh",
title = "{PIN} selection policies: Are they really effective?",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "484--496",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000363",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:2012:CCC,
author = "Youna Jung and James B. D. Joshi",
title = "{CRiBAC}: Community-centric role interaction based
access control model",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "497--523",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000351",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ayuso:2012:FFC,
author = "Pablo Neira Ayuso and Rafael M. Gasca and Laurent
Lefevre",
title = "{FT}-{FW}: a cluster-based fault-tolerant architecture
for stateful firewalls",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "524--539",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000156",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gouglidis:2012:DAC,
author = "Antonios Gouglidis and Ioannis Mavridis",
title = "{domRBAC}: an access control model for modern
collaborative systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "540--556",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000144",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Blasco:2012:BIL,
author = "Jorge Blasco and Julio Cesar Hernandez-Castro and Juan
E. Tapiador and Arturo Ribagorda",
title = "Bypassing information leakage protection with trusted
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "557--568",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000120",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ksiezopolski:2012:QMQ,
author = "Bogdan Ksiezopolski",
title = "{QoP}-{ML}: Quality of protection modelling language
for cryptographic protocols",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "569--596",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pfleeger:2012:LBS,
author = "Shari Lawrence Pfleeger and Deanna D. Caputo",
title = "Leveraging behavioral science to mitigate cyber
security risk",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "597--611",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001659",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{VanGundy:2012:NUR,
author = "Matthew {Van Gundy} and Hao Chen",
title = "{Noncespaces}: Using randomization to defeat
cross-site scripting attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "612--628",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001477",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hudic:2012:PCC,
author = "Aleksandar Hudic and Edgar Weippl",
title = "Private Cloud Computing: Consolidation,
Virtualization, and Service-Oriented Infrastructure",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "629--629",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000612",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cuppens-Boulahia:2012:PTO,
author = "Nora Cuppens-Boulahia",
title = "Penetration Tester's Open Source Toolkit",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "630--632",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000600",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:SCC,
author = "Katina Michael",
title = "Securing the Cloud: Cloud Computer Security Techniques
and Tactics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "633--633",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000569",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:BIS,
author = "Katina Michael",
title = "The Basics of Information Security: Understanding the
Fundamentals of {InfoSec} in Theory and Practice",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "634--635",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weippl:2012:ESE,
author = "Edgar Weippl and Manuel Leithner",
title = "Enterprise Security for the Executive",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "636--636",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200051X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Caelli:2012:CWT,
author = "William J. (Bill) Caelli",
title = "Cyber Warfare --- Techniques, Tactics and Tools for
Security Practitioners",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "637--637",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000430",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:TMS,
author = "Manuel Leithner and Edgar R. Weippl",
title = "{Thor}'s {Microsoft} Security {Bible}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "638--638",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:XFD,
author = "Manuel Leithner and Edgar Weippl",
title = "{XBOX} 360 Forensics: a Digital Forensics Guide to
Examining Artifacts",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "639--639",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000703",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PJa,
author = "Anonymous",
title = "Pages 375--640 ({June 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "??--??",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "iii--iii",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000880",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ec,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "641--642",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000934",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2012:IRT,
author = "Atif Ahmad and Justin Hadgkiss and A. B. Ruighaver",
title = "Incident response teams --- Challenges in supporting
the organisational security function",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "643--652",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000624",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martinez:2012:SAM,
author = "Sergio Mart{\'\i}nez and David S{\'a}nchez and Aida
Valls",
title = "Semantic adaptive microaggregation of categorical
microdata",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "653--672",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000648",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Padayachee:2012:TCI,
author = "Keshnee Padayachee",
title = "Taxonomy of compliant information security behavior",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "673--680",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200065X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2012:SDS,
author = "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
Falkner",
title = "Securing distributed systems using patterns: a
survey",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "681--703",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000661",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2012:SMA,
author = "Diqun Yan and Rangding Wang and Xianmin Yu and Jie
Zhu",
title = "Steganography for {MP3} audio by exploiting the rule
of window switching",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "704--716",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000673",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzun:2012:SLP,
author = "Yasin Uzun and Kemal Bicakci",
title = "A second look at the performance of neural networks
for keystroke dynamics using a publicly available
dataset",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "717--726",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000636",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegari:2012:WCI,
author = "C. Callegari and S. Giordano and M. Pagano and T.
Pepe",
title = "{WAVE}-{CUSUM}: Improving {CUSUM} performance in
network anomaly detection by means of wavelet
analysis",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "727--735",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000788",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:PP,
author = "Jennifer L. Bayuk",
title = "A programmer's perspective",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "736--737",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200079X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:LTH,
author = "Manuel Leithner and Edgar Weippl",
title = "Low Tech Hacking",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "738--738",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000806",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000855",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PJb,
author = "Anonymous",
title = "Pages 641--738 ({July 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "??--??",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "iii--iii",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ed,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "739--740",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001149",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2012:EHA,
author = "Anmin Fu and Yuqing Zhang and Zhenchao Zhu and Qi Jing
and Jingyu Feng",
title = "An efficient handover authentication scheme with
privacy preservation for {IEEE} 802.16m network",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "741--749",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001009",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khansa:2012:IHP,
author = "Lara Khansa and Deborah F. Cook and Tabitha James and
Olga Bruyaka",
title = "Impact of {HIPAA} provisions on the stock market value
of healthcare institutions, and information security
and other information technology firms",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "750--770",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000995",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Castiglione:2012:ESM,
author = "Aniello Castiglione and Giuseppe Cattaneo and Maurizio
Cembalo and Alfredo De Santis and Pompeo Faruolo and
Fabio Petagna and Umberto Ferraro Petrillo",
title = "Engineering a secure mobile messaging framework",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "771--781",
month = sep,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.06.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200096X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shiaeles:2012:RTD,
author = "Stavros N. Shiaeles and Vasilios Katos and Alexandros
S. Karakos and Basil K. Papadopoulos",
title = "Real time {DDoS} detection using fuzzy estimators",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "782--790",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000922",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hsieh:2012:EHF,
author = "Wen-Bin Hsieh and Jenq-Shiou Leu",
title = "Exploiting hash functions to intensify the remote user
authentication scheme",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "791--798",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000910",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:HNG,
author = "Katina Michael",
title = "Hacking: the Next Generation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "799--799",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000971",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wedge:2012:BDF,
author = "Tim Wedge",
title = "The Basics of Digital Forensics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "800--800",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000983",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsoumas:2012:ICW,
author = "Bill Tsoumas and Dimitris Gritzalis",
title = "Inside Cyber Warfare: Mapping the Cyber Underworld",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "801--801",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000831",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2012:PMA,
author = "Alexis Mylonas and Dimitris Gritzalis",
title = "Practical Malware Analysis: the Hands-On Guide to
Dissecting Malicious Software",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "802--803",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000818",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "ifc--ifc",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001083",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PS,
author = "Anonymous",
title = "Pages 739--804 ({September 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "??--??",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "iii--iii",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001290",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:ECS,
author = "Anonymous",
title = "Editorial Computers and Security Special Issue
{IFIP\slash SEC 2010 ``Security and Privacy --- Silver
Linings in the Cloud''}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "805--805",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200137X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Coull:2012:UDR,
author = "Scott E. Coull and Andrew M. White and Ting-Fang Yen
and Fabian Monrose and Michael K. Reiter",
title = "Understanding domain registration abuses",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "806--815",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200082X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hasan:2012:PPF,
author = "Omar Hasan and Lionel Brunie and Elisa Bertino",
title = "Preserving privacy of feedback providers in
decentralized reputation systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "816--826",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001465",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Magazinius:2012:FID,
author = "Jonas Magazinius and Alejandro Russo and Andrei
Sabelfeld",
title = "On-the-fly inlining of dynamic security monitors",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "827--843",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001180",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Colantonio:2012:BDD,
author = "Alessandro Colantonio and Roberto {Di Pietro} and Nino
Vincenzo Verde",
title = "A business-driven decomposition methodology for role
mining",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "844--855",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "ifc--ifc",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001265",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:A,
author = "Anonymous",
title = "Announcement",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "ii--ii",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001575",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "iii--iii",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200154X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:CP,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "iii--iv",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001587",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ee,
author = "Gene Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "857--858",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001691",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Qian:2012:MIS,
author = "Ying Qian and Yulin Fang and Jose J. Gonzalez",
title = "Managing information security risks during new
technology adoption",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "859--869",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001368",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shi:2012:SED,
author = "Jie Shi and Yingjiu Li and Robert H. Deng",
title = "A secure and efficient discovery service system in
{EPCglobal} network",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "870--885",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200123X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2012:FQE,
author = "Yu-Lun Huang and Hsin-Yi Tsai",
title = "A framework for quantitative evaluation of parallel
control-flow obfuscation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "886--896",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001198",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shehab:2012:ACO,
author = "Mohamed Shehab and Anna Squicciarini and Gail-Joon Ahn
and Irini Kokkinou",
title = "Access control for online social networks third party
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "897--911",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001186",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2012:OMS,
author = "Zhi Yang and Lihua Yin and Shuyuan Jin and Xingyuan
Chen",
title = "Optimal mining on security labels for decentralized
information flow control",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "912--924",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001174",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mut-Puigserver:2012:SET,
author = "Maci{\`a} Mut-Puigserver and M. Magdalena
Payeras-Capell{\`a} and Josep-Llu{\'\i}s Ferrer-Gomila
and Arnau Vives-Guasch and Jordi Castell{\`a}-Roca",
title = "A survey of electronic ticketing applied to
transport",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "925--939",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001058",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hjorth:2012:TDS,
author = "Theis Solberg Hjorth and Rune Torbensen",
title = "Trusted Domain: a security platform for home
automation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "940--955",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001046",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alcaraz:2012:SKM,
author = "Cristina Alcaraz and Javier Lopez and Rodrigo Roman
and Hsiao-Hwa Chen",
title = "Selecting key management schemes for {WSN}
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "956--966",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001034",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rekhis:2012:HVT,
author = "Slim Rekhis and Noureddine Boudriga",
title = "A Hierarchical Visibility theory for formal digital
investigation of anti-forensic attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "967--982",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Furnell:2012:PPE,
author = "Steven Furnell and Nathan Clarke",
title = "Power to the people? {The} evolving recognition of
human aspects of security",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "983--988",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001228",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jardi-Cedo:2012:SPS,
author = "Roger Jard{\'\i}-Ced{\'o} and Jordi Pujol-Ahull{\'o}
and Jordi Castell{\`a}-Roca and Alexandre Viejo",
title = "Study on poll-site voting and verification systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "989--1010",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001162",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:WT,
author = "Jennifer L. Bayuk",
title = "Wishful thinking",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "1011--1012",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001241",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:HSC,
author = "Katina Michael",
title = "Handbook on Securing Cyber-Physical Critical
Infrastructure: Foundations and Challenges",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "1013--1013",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001150",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001514",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PN,
author = "Anonymous",
title = "Pages 857--1014 ({November 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "??--??",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "iii--iv",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2013:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "v--v",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000035",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toledo:2013:DFS,
author = "Nerea Toledo and Marivi Higuero and Jasone Astorga and
Marina Aguado and Jean Marie Bonnin",
title = "Design and formal security evaluation of {NeMHIP}: a
new secure and efficient network mobility management
protocol based on the Host Identity Protocol",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "1--18",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001599",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PF,
author = "Anonymous",
title = "Pages 1--270 ({February 2013})",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "1--270",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schmidt:2013:TFV,
author = "Andreas U. Schmidt and Andreas Leicher and Andreas
Brett and Yogendra Shah and Inhyok Cha",
title = "Tree-formed verification data for trusted platforms",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "19--35",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200140X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tan:2013:CRM,
author = "Hailun Tan and Diethelm Ostry and John Zic and Sanjay
Jha",
title = "A confidential and {DoS}-resistant multi-hop code
dissemination protocol for wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "36--55",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001484",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garfinkel:2013:DMT,
author = "Simson L. Garfinkel",
title = "Digital media triage with bulk data analysis and {\em
bulk\_extractor}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "56--72",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001472",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Reddy:2013:ADF,
author = "K. Reddy and H. S. Venter",
title = "The architecture of a digital forensic readiness
management system",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "73--89",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001447",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Crossler:2013:FDB,
author = "Robert E. Crossler and Allen C. Johnston and Paul
Benjamin Lowry and Qing Hu and Merrill Warkentin and
Richard Baskerville",
title = "Future directions for behavioral information security
research",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "90--101",
month = feb,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.09.010",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001460",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Damopoulos:2013:KTT,
author = "D. Damopoulos and G. Kambourakis and S. Gritzalis",
title = "From keyloggers to touchloggers: Take the rough with
the smooth",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "102--114",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001654",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lasc:2013:DDA,
author = "Ioana Lasc and Reiner Dojen and Tom Coffey",
title = "On the detection of desynchronisation attacks against
security protocols that use dynamic shared secrets",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "115--129",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001678",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DeMott:2013:SBF,
author = "Jared D. DeMott and Richard J. Enbody and William F.
Punch",
title = "Systematic bug finding and fault localization enhanced
with input data tracking",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "130--157",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200168X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2013:EAG,
author = "Shuzhen Wang and Zonghua Zhang and Youki Kadobayashi",
title = "Exploring attack graph for cost-benefit security
hardening: a probabilistic approach",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "158--169",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001496",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Joaquim:2013:EEE,
author = "Rui Joaquim and Paulo Ferreira and Carlos Ribeiro",
title = "{EVIV}: an end-to-end verifiable {Internet} voting
system",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "170--191",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001642",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lerch-Hostalot:2013:LMS,
author = "Daniel Lerch-Hostalot and David Meg{\'\i}as",
title = "{LSB} matching steganalysis based on patterns of pixel
differences and random embedding",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "192--206",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001745",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paulin:2013:USF,
author = "Alois Paulin and Tatjana Welzer",
title = "A universal system for fair non-repudiable certified
e-mail without a trusted third party",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "207--218",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001757",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schreuders:2013:SAA,
author = "Z. Cliffe Schreuders and Tanya McGill and Christian
Payne",
title = "The state of the art of application restrictions and
sandboxes: a survey of application-oriented access
controls and their shortfalls",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "219--241",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001435",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2013:SRB,
author = "Ken H. Guo",
title = "Security-related behavior in using information systems
in the workplace: a review and synthesis",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "242--251",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jammalamadaka:2013:MAO,
author = "Ravi Chandra Jammalamadaka and Roberto Gamboni and
Sharad Mehrotra and Kent Seamons and Nalini
Venkatasubramanian",
title = "A middleware approach for outsourcing data securely",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "252--266",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200106X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Soupionis:2013:HV,
author = "Yannis Soupionis and Dimitris Gritzalis",
title = "Hacking {VoIP}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "267--267",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001423",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kandias:2013:MPT,
author = "Miltiadis Kandias and Dimitris Gritzalis",
title = "{Metasploit}: the Penetration Tester's Guide",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "268--269",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001459",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "iii--iii",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000114",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "1--2",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolkowska:2013:OPI,
author = "Ella Kolkowska and Gurpreet Dhillon",
title = "Organizational power and information security rule
compliance",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "3--11",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001010",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abramov:2013:TAS,
author = "Raz Abramov and Amir Herzberg",
title = "{TCP Ack} storm {DoS} attacks",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "12--27",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001411",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montanari:2013:DSP,
author = "Mirko Montanari and Ellick Chan and Kevin Larson and
Wucherl Yoo and Roy H. Campbell",
title = "Distributed security policy conformance",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "28--40",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001770",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2013:AFB,
author = "Alessandro Armando and Roberto Carbone and Luca
Compagna and Jorge Cu{\'e}llar and Giancarlo Pellegrino
and Alessandro Sorniotti",
title = "An authentication flaw in browser-based Single Sign-On
protocols: Impact and remediations",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "41--58",
month = mar,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.08.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001356",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Haenni:2013:GAP,
author = "Rolf Haenni and Reto E. Koenig",
title = "A generic approach to prevent board flooding attacks
in coercion-resistant electronic voting schemes",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "59--69",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001381",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000308",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iii--iii",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:SIT,
author = "Anonymous",
title = "Special issue on trust in cyber, physical and social
computing: Call for papers",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iii--iii",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000448",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2013:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iv--iv",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kussul:2013:AST,
author = "Olga Kussul and Nataliia Kussul and Sergii Skakun",
title = "Assessing security threat scenarios for utility-based
reputation model in grids",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "1--15",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000230",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PM,
author = "Anonymous",
title = "Pages 1--140 ({May 2013})",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "1--140",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2013:OCI,
author = "Amin Hassanzadeh and Radu Stoleru",
title = "On the optimality of cooperative intrusion detection
for resource constrained wireless networks",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "16--35",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cho:2013:CFM,
author = "Gyu-Sang Cho",
title = "A computer forensic method for detecting timestamp
forgery in {NTFS}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "36--46",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001721",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2013:DSU,
author = "Alexios Mylonas and Anastasia Kastania and Dimitris
Gritzalis",
title = "Delegate the smartphone user? {Security} awareness in
smartphone platforms",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "47--66",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001733",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hernandez-Ardieta:2013:TSA,
author = "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
and Jose M. de Fuentes and Benjamin Ramos",
title = "A taxonomy and survey of attacks on digital
signatures",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "67--112",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Salah:2013:ASW,
author = "Khaled Salah and Jose M. Alcaraz Calero and Jorge
Bernal Bernab{\'e} and Juan M. Mar{\'\i}n Perez and
Sherali Zeadally",
title = "Analyzing the security of {Windows 7} and {Linux} for
cloud computing",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "113--122",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001800",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramanathan:2013:PDI,
author = "Venkatesh Ramanathan and Harry Wechsler",
title = "Phishing detection and impersonated entity discovery
using {Conditional Random Field} and {Latent Dirichlet
Allocation}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "123--139",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001812",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "iii--iii",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000643",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ec,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "1--1",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Asghar:2013:EES,
author = "Muhammad Rizwan Asghar and Mihaela Ion and Giovanni
Russello and Bruno Crispo",
title = "{{\em ESPOON$_{\it ERBAC}$}}: Enforcing security
policies in outsourced environments",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "2--24",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001824",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jerschow:2013:MSR,
author = "Yves Igor Jerschow and Martin Mauve",
title = "Modular square root puzzles: Design of
non-parallelizable and non-interactive client puzzles",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "25--36",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001782",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Salim:2013:BAR,
author = "Farzad Salim and Jason Reid and Uwe Dulleck and Ed
Dawson",
title = "Budget-aware Role Based Access Control",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "37--50",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200171X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "iii--iii",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000734",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2013:ALG,
author = "Su Yong Kim and Sungdeok Cha and Doo-Hwan Bae",
title = "Automatic and lightweight grammar generation for fuzz
testing",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "1--11",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000254",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PJ,
author = "Anonymous",
title = "Pages 1--68 ({July 2013})",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "1--68",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choo:2013:NPM,
author = "Kim-Kwang Raymond Choo",
title = "New payment methods: a review of 2010-2012 {FATF}
mutual evaluation reports",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "12--26",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000278",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2013:VSP,
author = "Yulong Fu and Ousmane Kon{\'e}",
title = "Validation of security protocol implementations from
security objectives",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "27--39",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000229",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2013:NIC,
author = "Hegui Zhu and Cheng Zhao and Xiangde Zhang and
Lianping Yang",
title = "A novel iris and chaos-based random number generator",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "40--48",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{James:2013:UNB,
author = "Tabitha L. James and Lara Khansa and Deborah F. Cook
and Olga Bruyaka and Kellie B. Keeling",
title = "Using network-based text analysis to analyze trends in
{Microsoft}'s security innovations",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "49--67",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:IEB,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000709",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "iii--iii",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001041",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ed,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "iv--v",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamedheidari:2013:NAB,
author = "Sina Hamedheidari and Reza Rafeh",
title = "A novel agent-based approach to detect sinkhole
attacks in wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "1--14",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000783",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PS,
author = "Anonymous",
title = "Pages 1--228 ({September 2013})",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "1--228",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jin:2013:MFB,
author = "Lei Jin and James B. D. Joshi and Mohd Anwar",
title = "Mutual-friend based attacks in social network
systems",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "15--30",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000795",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanDeursen:2013:MIS,
author = "Nicole van Deursen and William J. Buchanan and
Alistair Duff",
title = "Monitoring information security risks within health
care",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "31--45",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000813",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Roh:2013:WBC,
author = "Byeong-hee Roh and Ju Wan Kim and Ki-Yeol Ryu and
Jea-Tek Ryu",
title = "A whitelist-based countermeasure scheme using a
{Bloom} filter against {SIP} flooding attacks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "46--61",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000771",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Riley:2013:FPT,
author = "Ryan Riley",
title = "A framework for prototyping and testing data-only
rootkit attacks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "62--71",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000825",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heckman:2013:ACD,
author = "Kristin E. Heckman and Michael J. Walsh and Frank J.
Stech and Todd A. O'Boyle and Stephen R. DiCato and
Audra F. Herber",
title = "Active cyber defense with denial and deception: a
cyber-wargame experiment",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "72--77",
month = sep,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.03.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300076X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Savola:2013:QSM,
author = "Reijo M. Savola",
title = "Quality of security metrics and measurements",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "78--90",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000850",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nakaguro:2013:DLN,
author = "Yoichi Nakaguro and Matthew N. Dailey and Sanparith
Marukatat and Stanislav S. Makhanov",
title = "Defeating line-noise {CAPTCHAs} with multiple
quadratic snakes",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "91--110",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000862",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alcaide:2013:AAP,
author = "Almudena Alcaide and Esther Palomar and Jos{\'e}
Montero-Castillo and Arturo Ribagorda",
title = "Anonymous authentication for privacy-preserving {IoT}
target-driven applications",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "111--123",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000904",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2013:EAF,
author = "Celia Li and Uyen Trang Nguyen and Hoang Lan Nguyen
and Nurul Huda",
title = "Efficient authentication for fast handover in wireless
mesh networks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "124--142",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000916",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abdalaal:2013:PPP,
author = "Ahmed Abdalaal and Mehmet Ercan Nergiz and Yucel
Saygin",
title = "Privacy-preserving publishing of opinion polls",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "143--154",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000539",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2013:STA,
author = "Jennifer L. Bayuk",
title = "Security as a theoretical attribute construct",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "155--175",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spathoulas:2013:EIP,
author = "Georgios P. Spathoulas and Sokratis K. Katsikas",
title = "Enhancing {IDS} performance through comprehensive
alert post-processing",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "176--196",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Castillo-Perez:2013:ORC,
author = "Sergio Castillo-P{\'e}rez and Joaquin Garcia-Alfaro",
title = "Onion routing circuit construction via latency
graphs",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "197--214",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zonouz:2013:SCB,
author = "Saman Zonouz and Amir Houmansadr and Robin Berthier
and Nikita Borisov and William Sanders",
title = "Secloud: a cloud-based comprehensive and lightweight
security solution for smartphones",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "215--227",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300031X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000989",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "iii--iii",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300117X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2013:CDE,
author = "Dimitris Gritzalis and Gurvirender Tejay",
title = "Cybercrime in the Digital Economy --- Editorial",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "1--2",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001120",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ouedraogo:2013:SCS,
author = "Moussa Ouedraogo and Haralambos Mouratidis",
title = "Selecting a Cloud Service Provider in the age of
cybercrime",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "3--13",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lopez:2013:SCO,
author = "Javier Lopez and Cristina Alcaraz and Rodrigo Roman",
title = "Smart control of operational threats in control
substations",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "14--27",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000588",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luo:2013:IPV,
author = "Xin (Robert) Luo and Wei Zhang and Stephen Burd and
Alessandro Seazzu",
title = "Investigating phishing victimization with the
Heuristic-Systematic Model: a theoretical framework and
an exploration",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "28--38",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001927",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spyridopoulos:2013:GTD,
author = "T. Spyridopoulos and G. Karanikas and T. Tryfonas and
G. Oikonomou",
title = "A game theoretic defence framework against {DoS\slash
DDoS} cyber attacks",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "39--50",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300059X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2013:SSD,
author = "Alexios Mylonas and Vasilis Meletiadis and Lilian
Mitrou and Dimitris Gritzalis",
title = "{Smartphone} sensor data as digital evidence",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "51--75",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsigkritis:2013:AGE,
author = "Theocharis Tsigkritis and George Spanoudakis",
title = "Assessing the genuineness of events in runtime
monitoring of cyber systems",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "76--96",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{vonSolms:2013:ISC,
author = "Rossouw von Solms and Johan van Niekerk",
title = "From information security to cyber security",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "97--102",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000801",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kohn:2013:IDF,
author = "M. D. Kohn and M. M. Eloff and J. H. P. Eloff",
title = "Integrated digital forensic process model",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "103--115",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000849",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001144",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "iii--iii",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001508",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ci,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "iii--iv",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:34 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cj,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "iii--iv",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ee,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "1--1",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001454",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2013:BDB,
author = "David Zhao and Issa Traore and Bassam Sayed and Wei Lu
and Sherif Saad and Ali Ghorbani and Dan Garant",
title = "Botnet detection based on traffic behavior analysis
and flow intervals",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "2--16",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.04.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000837",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herrmann:2013:BBT,
author = "Dominik Herrmann and Christian Banse and Hannes
Federrath",
title = "Behavior-based tracking: Exploiting characteristic
patterns in {DNS} traffic",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "17--33",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000576",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rios:2013:CCT,
author = "Ruben Rios and Jose A. Onieva and Javier Lopez",
title = "Covert communications through network configuration
messages",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "34--46",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DeCapitanidiVimercati:2013:EDW,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Sushil Jajodia and Giovanni Livraga and Stefano
Paraboschi and Pierangela Samarati",
title = "Enforcing dynamic write privileges in data
outsourcing",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "47--63",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.01.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000266",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia-Alfaro:2013:MSF,
author = "Joaquin Garcia-Alfaro and Fr{\'e}d{\'e}ric Cuppens and
Nora Cuppens-Boulahia and Salvador Martinez and Jordi
Cabot",
title = "Management of stateful firewall misconfiguration",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "64--85",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000217",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khambhammettu:2013:FRA,
author = "Hemanth Khambhammettu and Sofiene Boulares and Kamel
Adi and Luigi Logrippo",
title = "A framework for risk assessment in access control
systems",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "86--103",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2013:BFA,
author = "Alessandro Armando and Alessio Merlo and Mauro
Migliardi and Luca Verderame",
title = "Breaking and fixing the {Android} Launching Flow",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "104--115",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000540",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Agudo:2013:PAC,
author = "Isaac Agudo and Ruben Rios and Javier Lopez",
title = "A privacy-aware continuous authentication scheme for
proximity-based access control",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "117--126",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000874",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PN,
author = "Anonymous",
title = "Pages 117--502 ({November 2013})",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "117--502",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Crawford:2013:FCT,
author = "Heather Crawford and Karen Renaud and Tim Storer",
title = "A framework for continuous, transparent mobile device
authentication",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "127--136",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000886",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Derawi:2013:GAR,
author = "Mohammad Derawi and Patrick Bours",
title = "Gait and activity recognition using commercial
phones",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "137--144",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000953",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barlow:2013:DME,
author = "Jordan B. Barlow and Merrill Warkentin and Dustin
Ormond and Alan R. Dennis",
title = "Don't make excuses! {Discouraging} neutralization to
reduce {IT} policy violation",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "145--159",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000898",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Trabelsi:2013:DTA,
author = "Zouheir Trabelsi and Liren Zhang and Safaa Zeidan and
Kilani Ghoudi",
title = "Dynamic traffic awareness statistical model for
firewall performance enhancement",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "160--172",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000928",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2013:CSM,
author = "Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang
and Zhijie Shi and Zhe Liu and Jean-Fran{\c{c}}ois
Gallais",
title = "A comprehensive study of multiple deductions-based
algebraic trace driven cache attacks on {AES}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "173--189",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.07.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300093X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zonouz:2013:CPS,
author = "Saman Zonouz and Parisa Haghani",
title = "Cyber-physical security metric inference in smart grid
critical infrastructures based on system
administrators' responsive behavior",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "190--200",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000941",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sharma:2013:AAM,
author = "Manisha Sharma and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "{AMTRAC}: an administrative model for temporal
role-based access control",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "201--218",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000965",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azad:2013:CRD,
author = "Muhammad Ajmal Azad and Ricardo Morla",
title = "{Caller-REP}: Detecting unwanted calls with caller
social strength",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "219--236",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baracaldo:2013:ARM,
author = "Nathalie Baracaldo and James Joshi",
title = "An adaptive risk management and access control
framework to mitigate insider threats",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "237--254",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001119",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2013:EID,
author = "Chun Guo and Ya-Jian Zhou and Yuan Ping and Shou-Shan
Luo and Yu-Ping Lai and Zhong-Kun Zhang",
title = "Efficient intrusion detection using representative
instances",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "255--267",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.08.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300120X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azmi:2013:SSH,
author = "Reza Azmi and Boshra Pishgoo",
title = "{SHADuDT}: Secure hypervisor-based anomaly detection
using danger theory",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "268--288",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001223",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stanekova:2013:ADM,
author = "L'ubica Stanekov{\'a} and Martin Stanek",
title = "Analysis of dictionary methods for {PIN} selection",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "289--298",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001235",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Djamaludin:2013:EIT,
author = "C. I. Djamaludin and E. Foo and P. Corke",
title = "Establishing initial trust in autonomous Delay
Tolerant Networks without centralised {PKI}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "299--314",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001247",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2013:FMD,
author = "Yuxin Ding and Xuebing Yuan and Ke Tang and Xiao Xiao
and Yibin Zhang",
title = "A fast malware detection algorithm based on
objective-oriented association mining",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "315--324",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001259",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Belguechi:2013:IFC,
author = "Rima Belguechi and Estelle Cherrier and Christophe
Rosenberger and Samy Ait-Aoudia",
title = "An integrated framework combining Bio-Hashed minutiae
template and {PKCS15} compliant card for a better
secure management of fingerprint cancelable templates",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "325--339",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001260",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2013:IAM,
author = "Ying-Dar Lin and Yuan-Cheng Lai and Chien-Hung Chen
and Hao-Chuan Tsai",
title = "Identifying {Android} malicious repackaged
applications by thread-grained system call sequences",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "340--350",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001272",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{BenSaied:2013:TMS,
author = "Yosra {Ben Saied} and Alexis Olivereau and Djamal
Zeghlache and Maryline Laurent",
title = "Trust management system design for the {Internet of
Things}: a context-aware and multi-service approach",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "351--365",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001302",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2013:AAP,
author = "Dongwon Seo and Heejo Lee and Adrian Perrig",
title = "{APFS}: Adaptive Probabilistic Filter Scheduling
against distributed denial-of-service attacks",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "366--385",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001314",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Silic:2013:DUO,
author = "Mario Silic",
title = "Dual-use open source security software in
organizations --- Dilemma: Help or hinder?",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "386--395",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001326",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ashenden:2013:COC,
author = "Debi Ashenden and Angela Sasse",
title = "{CISOs} and organisational culture: Their own worst
enemy?",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "396--405",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001338",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karopoulos:2013:UCS,
author = "Georgios Karopoulos and Paolo Mori and Fabio
Martinelli",
title = "Usage control in {SIP}-based multimedia delivery",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "406--418",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300134X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2013:DCM,
author = "Younghee Park and Douglas S. Reeves and Mark Stamp",
title = "Deriving common malware behavior through graph
clustering",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "419--430",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001351",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2013:IAA,
author = "Peng Zhou and Xiapu Luo and Rocky K. C. Chang",
title = "Inference attacks against trust-based onion routing:
Trust degree to the rescue",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "431--446",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001363",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2013:UVS,
author = "Lijiao Cheng and Ying Li and Wenli Li and Eric Holm
and Qingguo Zhai",
title = "Understanding the violation of {IS} security policy in
organizations: an integrated model based on social
control and deterrence theory",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "447--459",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001387",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2013:CBW,
author = "Ying-Dar Lin and Yuan-Cheng Lai and Cheng-Yuan Ho and
Wei-Hsuan Tai",
title = "Creditability-based weighted voting for reducing false
positives and negatives in intrusion detection",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "460--474",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001399",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anagnostopoulos:2013:DAA,
author = "Marios Anagnostopoulos and Georgios Kambourakis and
Panagiotis Kopanos and Georgios Louloudakis and
Stefanos Gritzalis",
title = "{DNS} amplification attack revisited",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "475--485",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hocking:2013:COU,
author = "C. G. Hocking and S. M. Furnell and N. L. Clarke and
P. L. Reynolds",
title = "{Co}-operative user identity verification using an
Authentication Aura",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "486--502",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBg,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001478",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBh,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:34 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBi,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "iii--iii",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001752",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "iv--iv",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000042",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PP,
author = "Anonymous",
title = "The passing of a pioneer",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "v--vi",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001788",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2014:MCA,
author = "Alessandro Armando and Serena Elisa Ponta",
title = "Model checking authorization requirements in business
processes",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "1--22",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001429",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PF,
author = "Anonymous",
title = "Pages 1--114 ({February 2014})",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "1--114",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gowtham:2014:CEA,
author = "R. Gowtham and Ilango Krishnamurthi",
title = "A comprehensive and efficacious architecture for
detecting phishing webpages",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "23--37",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001442",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bachlechner:2014:SCC,
author = "Daniel Bachlechner and Stefan Thalmann and Ronald
Maier",
title = "Security and compliance challenges in complex {IT}
outsourcing arrangements: a multi-stakeholder
perspective",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "38--59",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001533",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patsakis:2014:TDS,
author = "Constantinos Patsakis and Kleanthis Dellios and
M{\'e}lanie Bouroche",
title = "Towards a distributed secure in-vehicle communication
architecture for modern vehicles",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "60--74",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300165X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2014:EDN,
author = "Jie Yang and Hai-tao Liu and Zu-ping Zhang and Jian
Dong",
title = "Extended {DMTP}: a new protocol for improved graylist
categorization",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "75--83",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001430",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2014:APT,
author = "Christos Xenakis and Christoforos Ntantogian",
title = "An advanced persistent threat in {3G} networks:
Attacking the home network from roaming networks",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "84--94",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001685",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bhatia:2014:FGR,
author = "Sajal Bhatia and Desmond Schmidt and George Mohay and
Alan Tickle",
title = "A framework for generating realistic traffic for
Distributed Denial-of-Service attacks and Flash
Events",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "95--107",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001673",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Denning:2014:FPA,
author = "Dorothy E. Denning",
title = "Framework and principles for active cyber defense",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "108--113",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001661",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001727",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "iii--iii",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000121",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaswamy:2014:E,
author = "Lakshmish Ramaswamy and Barbara Carminati and Lujo
Bauer and Dongwan Shin and James Joshi and Calton Pu
and Dimitris Gritzalis",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "1--2",
month = mar,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.01.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000078",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Le:2014:CEA,
author = "Meixing Le and Krishna Kant and Sushil Jajodia",
title = "Consistency and enforcement of access rules in
cooperative data sharing environment",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "3--18",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001284",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:2014:CPB,
author = "Youna Jung and James B. D. Joshi",
title = "{CPBAC}: Property-based access control model for
secure cooperation in online social networks",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "19--39",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001211",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Squicciarini:2014:IHS,
author = "Anna Squicciarini and Sushama Karumanchi and Dan Lin
and Nicole DeSisto",
title = "Identifying hidden social circles for advanced privacy
configuration",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "40--51",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gupta:2014:FPM,
author = "Aditi Gupta and Michael S. Kirkpatrick and Elisa
Bertino",
title = "A formal proximity model for {RBAC} systems",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "52--67",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001296",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Allahbakhsh:2014:RQU,
author = "Mohammad Allahbakhsh and Aleksandar Ignjatovic and
Boualem Benatallah and Seyed-Mehdi-Reza Beheshti and
Norman Foo and Elisa Bertino",
title = "Representation and querying of unfair evaluations in
social rating systems",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "68--88",
month = mar,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.09.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000091",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "iii--iii",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400039X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ec,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "iv--v",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400042X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rathgeb:2014:CMB,
author = "C. Rathgeb and C. Busch",
title = "Cancelable multi-biometrics: Mixing iris-codes based
on adaptive {Bloom} filters",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "1--12",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000029",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PM,
author = "Anonymous",
title = "Pages 1--192 ({May 2014})",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "1--192",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schrittwieser:2014:CCH,
author = "Sebastian Schrittwieser and Stefan Katzenbeisser and
Peter Kieseberg and Markus Huber and Manuel Leithner
and Martin Mulazzani and Edgar Weippl",
title = "Covert Computation --- Hiding code in code through
compile-time obfuscation",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "13--26",
month = may,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.12.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000030",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2014:POC,
author = "Atif Ahmad and Rachelle Bosua and Rens Scheepers",
title = "Protecting organizational competitive advantage: a
knowledge leakage perspective",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "27--39",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000054",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Amthor:2014:WWM,
author = "Peter Amthor and Winfried E. K{\"u}hnhauser and Anja
P{\"o}lck",
title = "{WorSE}: a Workbench for Model-based Security
Engineering",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "40--55",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000066",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Allam:2014:SIS,
author = "Sean Allam and Stephen V. Flowerday and Ethan
Flowerday",
title = "{Smartphone} information security awareness: a victim
of operational pressures",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "56--65",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000169",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2014:EPA,
author = "Christoforos Ntantogian and Dimitris Apostolopoulos
and Giannis Marinakis and Christos Xenakis",
title = "Evaluating the privacy of {Android} mobile
applications under forensic analysis",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "66--76",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000157",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{LaBarge:2014:ASR,
author = "Ralph LaBarge and Thomas A. Mazzuchi and Shahram
Sarkani",
title = "An automated system for rapid and secure device
sanitization",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "77--91",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000194",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goseva-Popstojanova:2014:CCM,
author = "Katerina Goseva-Popstojanova and Goce Anastasovski and
Ana Dimitrijevikj and Risto Pantev and Brandon Miller",
title = "Characterization and classification of malicious {Web}
traffic",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "92--115",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000170",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2014:TOS,
author = "Joon S. Park and Kevin A. Kwiat and Charles A. Kamhoua
and Jonathan White and Sookyung Kim",
title = "Trusted Online Social Network {(OSN)} services with
optimal data management",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "116--136",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000236",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kwon:2014:TAD,
author = "Taekyoung Kwon and Sarang Na",
title = "{TinyLock}: Affordable defense against smudge attacks
on smartphone pattern lock systems",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "137--150",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001697",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2014:AES,
author = "Xin Dong and Jiadi Yu and Yuan Luo and Yingying Chen
and Guangtao Xue and Minglu Li",
title = "Achieving an effective, scalable and
privacy-preserving data sharing service in cloud
computing",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "151--164",
month = may,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.12.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001703",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parsons:2014:DEA,
author = "Kathryn Parsons and Agata McCormac and Marcus
Butavicius and Malcolm Pattinson and Cate Jerram",
title = "Determining employee awareness using the Human Aspects
of Information Security Questionnaire {(HAIS-Q)}",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "165--176",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300179X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michalopoulos:2014:GRT,
author = "Dimitrios Michalopoulos and Ioannis Mavridis and
Marija Jankovic",
title = "{GARS}: Real-time system for identification,
assessment and control of cyber grooming attacks",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "177--190",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001806",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Virvilis:2014:ADA,
author = "Nikos Virvilis and Dimitris Gritzalis",
title = "Automatic Defense Against Zero-day Polymorphic Worms
in Communication Networks",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "191--192",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000182",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000364",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "iii--iii",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000674",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2014:E,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "iv--iv",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000704",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shabtai:2014:MMD,
author = "A. Shabtai and L. Tenenboim-Chekina and D. Mimran and
L. Rokach and B. Shapira and Y. Elovici",
title = "Mobile malware detection through analysis of
deviations in application network behavior",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "1--18",
month = jun,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.02.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000285",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PJa,
author = "Anonymous",
title = "Pages 1--218 ({June 2014})",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "1--218",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tamjidyamcholo:2014:EMK,
author = "Alireza Tamjidyamcholo and Mohd Sapiyan Bin Baba and
Nor Liyana Mohd Shuib and Vala Ali Rohani",
title = "Evaluation model for knowledge sharing in information
security professional virtual community",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "19--34",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000297",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bou-Harb:2014:FPA,
author = "Elias Bou-Harb and Mourad Debbabi and Chadi Assi",
title = "On fingerprinting probing activities",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "35--48",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000248",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2014:SAB,
author = "Feng Zhu and Jinpeng Wei",
title = "Static analysis based invariant detection for
commodity operating systems",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "49--63",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000273",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kajzer:2014:EIM,
author = "Mitchell Kajzer and John D'Arcy and Charles R. Crowell
and Aaron Striegel and Dirk {Van Bruggen}",
title = "An exploratory investigation of message-person
congruence in information security awareness
campaigns",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "64--76",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000327",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bailey:2014:UIA,
author = "Kyle O. Bailey and James S. Okolica and Gilbert L.
Peterson",
title = "User identification and authentication using
multi-modal behavioral biometrics",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "77--89",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000340",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flores:2014:ISK,
author = "Waldo Rocha Flores and Egil Antonsen and Mathias
Ekstedt",
title = "Information security knowledge sharing in
organizations: Investigating the effect of behavioral
information security governance and national culture",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "90--110",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000339",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rughinis:2014:NVN,
author = "Cosima Rughinis and Razvan Rughinis",
title = "Nothing ventured, nothing gained. {Profiles} of online
activity, cyber-crime exposure, and security measures
of end-users in {European Union}",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "111--125",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000479",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ugarte-Pedrero:2014:AAD,
author = "Xabier Ugarte-Pedrero and Igor Santos and Iv{\'a}n
Garc{\'{\i}}a-Ferreira and Sergio Huerta and Borja Sanz
and Pablo G. Bringas",
title = "On the adoption of anomaly detection for packed
executable filtering",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "126--144",
month = jun,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.03.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000522",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vrakas:2014:OUI,
author = "Nikos Vrakas and Dimitris Geneiatakis and Costas
Lambrinoudakis",
title = "Obscuring users' identity in {VoIP\slash IMS}
environments",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "145--158",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000510",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gonzalez-Manzano:2014:SEU,
author = "Lorena Gonz{\'a}lez-Manzano and Ana I.
Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
Arturo Ribagorda",
title = "{SoNeUCON$_{\rm ABC}$}, an expressive usage control
model for {Web}-Based Social Networks",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "159--187",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000480",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stergiopoulos:2014:BHD,
author = "George Stergiopoulos and Dimitris Gritzalis",
title = "A Bug {Hunter}'s Diary",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "188--188",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000200",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meng:2014:EEP,
author = "Weizhi Meng and Wenjuan Li and Lam-For Kwok",
title = "{EFM}: Enhancing the performance of signature-based
network intrusion detection systems using enhanced
filter mechanism",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "189--204",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400025X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fang:2014:PBA,
author = "Zheran Fang and Weili Han and Yingjiu Li",
title = "Permission based {Android} security: Issues and
countermeasures",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "205--218",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000261",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000649",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "iii--iii",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000777",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:AVR,
author = "Anonymous",
title = "Is Anti-virus Really Dead?",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "iv--iv",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Webb:2014:SAM,
author = "Jeb Webb and Atif Ahmad and Sean B. Maynard and Graeme
Shanks",
title = "A situation awareness model for information security
risk management",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "1--15",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000571",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PJb,
author = "Anonymous",
title = "Pages 1--118 ({July 2014})",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "1--118",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kortesniemi:2014:SCU,
author = "Yki Kortesniemi and Mikko S{\"a}rel{\"a}",
title = "Survey of certificate usage in distributed access
control",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "16--32",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000534",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shmueli:2014:IDE,
author = "Erez Shmueli and Ronen Vaisenberg and Ehud Gudes and
Yuval Elovici",
title = "Implementing a database encryption solution, design
and implementation issues",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "33--50",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000509",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nergiz:2014:HA,
author = "Mehmet Ercan Nergiz and Muhammed Zahit G{\"o}k",
title = "Hybrid $k$-Anonymity",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "51--63",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000455",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kirchner:2014:SCM,
author = "Martin Kirchner and Edgar Weippl",
title = "Securing Cloud and Mobility",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "64--64",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000224",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2014:CFB,
author = "Yuxin Ding and Wei Dai and Shengli Yan and Yumei
Zhang",
title = "Control flow-based opcode behavior analysis for
Malware detection",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "65--74",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000558",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmadinejad:2014:UDI,
author = "Seyed Hossein Ahmadinejad and Philip W. L. Fong",
title = "Unintended disclosure of information: Inference
attacks by third-party extensions to Social Network
Systems",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "75--91",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400056X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Peng:2014:PMS,
author = "Sancheng Peng and Min Wu and Guojun Wang and Shui Yu",
title = "Propagation model of smartphone worms based on
semi-{Markov} process and social relationship graph",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "92--103",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000583",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2014:DSI,
author = "Young-Su Jang and Jin-Young Choi",
title = "Detecting {SQL} injection attacks using query result
size",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "104--118",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000595",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000741",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "iii--iv",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001126",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shameli-Sendi:2014:TIR,
author = "Alireza Shameli-Sendi and Mohamed Cheriet and
Abdelwahab Hamou-Lhadj",
title = "Taxonomy of intrusion risk assessment and response
system",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "1--16",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000613",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PS,
author = "Anonymous",
title = "Pages 1--306 ({September 2014})",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "1--306",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alenezi:2014:UT,
author = "Mohammed N. Alenezi and Martin J. Reed",
title = "Uniform {DoS} traceback",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "17--26",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000601",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamid:2014:APP,
author = "Isredza Rahmi A. Hamid and Jemal H. Abawajy",
title = "An approach for profiling phishing activities",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "27--41",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000546",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tondel:2014:ISI,
author = "Inger Anne T{\o}ndel and Maria B. Line and Martin
Gilje Jaatun",
title = "Information security incident management: Current
practice as reported in the literature",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "42--57",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lagazio:2014:MLA,
author = "Monica Lagazio and Nazneen Sherif and Mike Cushman",
title = "A multi-level approach to understanding the impact of
cyber crime on the financial sector",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "58--74",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400087X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pieterse:2014:BCC,
author = "Heloise Pieterse and Martin S. Olivier",
title = "{Bluetooth} Command and Control channel",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "75--83",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000881",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2014:STB,
author = "Vu Duc Nguyen and Yang-Wai Chow and Willy Susilo",
title = "On the security of text-based {$3$D CAPTCHAs}",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "84--99",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia:2014:ECB,
author = "S. Garc{\'\i}a and M. Grill and J. Stiborek and A.
Zunino",
title = "An empirical comparison of botnet detection methods",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "100--123",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000923",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Razzaq:2014:OAD,
author = "Abdul Razzaq and Zahid Anwar and H. Farooq Ahmad and
Khalid Latif and Faisal Munir",
title = "Ontology for attack detection: an intelligent approach
to web application security",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "124--146",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000868",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Idrus:2014:SBK,
author = "Syed Zulkarnain Syed Idrus and Estelle Cherrier and
Christophe Rosenberger and Patrick Bours",
title = "Soft biometrics for keystroke dynamics: Profiling
individuals while typing passwords",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "147--155",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000893",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2014:PEA,
author = "Chao Shen and Zhongmin Cai and Xiaohong Guan and Roy
Maxion",
title = "Performance evaluation of anomaly-detection algorithms
for mouse dynamics",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "156--171",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thalmann:2014:CDL,
author = "Stefan Thalmann and Daniel Bachlechner and Lukas
Demetz and Markus Manhart",
title = "Complexity is dead, long live complexity! {How}
software can help service providers manage security and
compliance",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "172--185",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000935",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montenegro:2014:PSS,
author = "Jose A. Montenegro and Javier Lopez",
title = "A practical solution for sealed bid and multi-currency
auctions",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "186--198",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000972",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitrokotsa:2014:LLD,
author = "Aikaterini Mitrokotsa and Cristina Onete and Serge
Vaudenay",
title = "Location leakage in distance bounding: Why location
privacy does not work",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "199--209",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000947",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2014:TON,
author = "Hao Zhang and Nenghai Yu and Yonggang Wen and Weiming
Zhang",
title = "Towards optimal noise distribution for privacy
preserving in data aggregation",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "210--230",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400090X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chitrakar:2014:SCS,
author = "Roshan Chitrakar and Chuanhe Huang",
title = "Selection of Candidate Support Vectors in incremental
{SVM} for network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "231--241",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000996",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Oza:2014:HAD,
author = "Aditya Oza and Kevin Ross and Richard M. Low and Mark
Stamp",
title = "{HTTP} attack detection using $n$-gram analysis",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "242--254",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000959",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jurcut:2014:DGS,
author = "Anca D. Jurcut and Tom Coffey and Reiner Dojen",
title = "Design guidelines for security protocols to prevent
replay and parallel session attacks",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "255--273",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000911",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Silic:2014:SIV,
author = "Mario Silic and Andrea Back",
title = "Shadow {IT} --- a view from behind the curtain",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "274--283",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400100X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Archibald:2014:CAD,
author = "Rennie Archibald and Dipak Ghosal",
title = "A comparative analysis of detection metrics for covert
timing channels",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "284--292",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000467",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:2014:TSI,
author = "Fred Cohen and Don Cohen",
title = "Time and space interval record schedule consistency
analysis for atomic items without interactions in open
spaces with stationary locations",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "293--304",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000315",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsalis:2014:SCM,
author = "Nikolaos Tsalis and Dimitris Gritzalis",
title = "Securing cloud and mobility: a practitioner's guide",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "305--305",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000212",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001096",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "iii--iii",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001278",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2014:RTA,
author = "Amin Hassanzadeh and Radu Stoleru and Michalis
Polychronakis and Geoffrey Xie",
title = "{RAPID}: Traffic-agnostic intrusion detection for
resource-constrained wireless mesh networks",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "1--17",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PO,
author = "Anonymous",
title = "Pages 1--174 ({October 2014})",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "1--174",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Franke:2014:CSA,
author = "Ulrik Franke and Joel Brynielsson",
title = "Cyber situational awareness --- a systematic review of
the literature",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "18--31",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001011",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2014:TSU,
author = "Rui Zhao and Chuan Yue",
title = "Toward a secure and usable cloud-based password
manager for web browsers",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "32--47",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001059",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jandel:2014:DSR,
author = "Magnus J{\"a}ndel",
title = "Decision support for releasing anonymised data",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "48--61",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001035",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elhadi:2014:EDM,
author = "Ammar Ahmed E. Elhadi and Mohd Aizaini Maarof and
Bazara I. A. Barry and Hentabli Hamza",
title = "Enhancing the detection of metamorphic malware using
call graphs",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "62--78",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luckner:2014:SWS,
author = "Marcin Luckner and Micha{\l} Gad and Pawe{\l}
Sobkowiak",
title = "Stable web spam detection using features based on
lexical items",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "79--93",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001151",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Almalawi:2014:UAB,
author = "Abdulmohsen Almalawi and Xinghuo Yu and Zahir Tari and
Adil Fahad and Ibrahim Khalil",
title = "An unsupervised anomaly-based detection approach for
integrity attacks on {SCADA} systems",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "94--110",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Diaz:2014:NXB,
author = "Jesus Diaz and David Arroyo and Francisco B.
Rodriguez",
title = "New X.509-based mechanisms for fair anonymity
management",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "111--125",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001023",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Adamsky:2014:SBB,
author = "Florian Adamsky and Syed Ali Khayam and Rudolf
J{\"a}ger and Muttukrishnan Rajarajan",
title = "Stealing bandwidth from {BitTorrent} seeders",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "126--140",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001205",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2014:CCS,
author = "Ilju Seo and Heejo Lee and Seung Chul Han",
title = "Cylindrical Coordinates Security Visualization for
multiple domain command and control botnet detection",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "141--153",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001187",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jha:2014:SAT,
author = "Sadhana Jha and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "Security analysis of temporal {RBAC} under an
administrative model",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "154--172",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001217",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stavrou:2014:ICN,
author = "Vasilis Stavrou and Dimitris Gritzalis",
title = "Introduction to Computer and Network Security:
Navigating Shades of {Gray}",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "173--173",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000303",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBg,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "iii--iii",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2014:ESI,
author = "Zheng Yan and Guojun Wang and Valtteri Niemi and
Robert H. Deng",
title = "Editorial: Special issue on trust in cyber, physical
and social computing",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "1--2",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2014:AAG,
author = "Yue Shen and Zheng Yan and Raimo Kantola",
title = "Analysis on the acceptance of Global Trust Management
for unwanted traffic control based on game theory",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "3--25",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000492",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2014:ECQ,
author = "Liang Cheng and Yang Zhang and Zhihui Han and Yi Deng
and Xiaoshan Sun and Dengguo Feng",
title = "Evaluating and comparing the quality of access control
in different operating systems",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "26--40",
month = nov,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.05.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000716",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gonzalez-Manzano:2014:CCO,
author = "Lorena Gonz{\'a}lez-Manzano and Ana I.
Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
Arturo Ribagorda",
title = "{CooPeD}: {Co}-owned Personal Data management",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "41--65",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000960",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shahriar:2014:EDV,
author = "Hossain Shahriar and Komminist Weldemariam and
Mohammad Zulkernine and Thibaud Lutellier",
title = "Effective detection of vulnerable and malicious
browser extensions",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "66--84",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000984",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2014:HFC,
author = "Yan Dong and Yongna Li and Tingting Sun",
title = "Happy faces considered trustworthy irrespective of
perceiver's mood: Challenges to the mood congruency
effect",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "85--93",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000625",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBh,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "iii--iv",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001758",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zineddine:2015:VMT,
author = "Mhamed Zineddine",
title = "Vulnerabilities and mitigation techniques toning in
the cloud: a cost and vulnerabilities coverage
optimization approach using Cuckoo search algorithm
with {L{\'e}vy} flights",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "1--18",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PF,
author = "Anonymous",
title = "Pages 1--298 ({February 2015})",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "1--298",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mesquida:2015:IIS,
author = "Antoni Llu{\'\i}s Mesquida and Antonia Mas",
title = "Implementing information security best practices on
software lifecycle processes: the {{\em ISO\slash IEC
15504 Security Extension}}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "19--34",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001345",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Friedberg:2015:CAP,
author = "Ivo Friedberg and Florian Skopik and Giuseppe Settanni
and Roman Fiedler",
title = "Combating advanced persistent threats: From network
event correlation to incident detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "35--57",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001461",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barnes:2015:LEA,
author = "David J. Barnes and Julio Hernandez-Castro",
title = "On the limits of engine analysis for cheating
detection in chess",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "58--73",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Do:2015:EDA,
author = "Quang Do and Ben Martini and Kim-Kwang Raymond Choo",
title = "Exfiltrating data from {Android} devices",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "74--91",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400162X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Diaz-Lopez:2015:MXS,
author = "Daniel D{\'\i}az-L{\'o}pez and Gin{\'e}s
D{\'o}lera-Tormo and F{\'e}lix G{\'o}mez-M{\'a}rmol and
Gregorio Mart{\'\i}nez-P{\'e}rez",
title = "Managing {XACML} systems in distributed environments
through Meta-Policies",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "92--115",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lu:2015:TCA,
author = "Jianfeng Lu and James B. D. Joshi and Lei Jin and
Yiding Liu",
title = "Towards complexity analysis of User Authorization
Query problem in {RBAC}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "116--130",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2015:DHS,
author = "Shu-Yuan Shen and Li-Hong Huang",
title = "A data hiding scheme using pixel value differencing
and improving exploiting modification directions",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "131--141",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001199",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2015:IAA,
author = "Xi-Jun Lin and Lin Sun and Haipeng Qu",
title = "Insecurity of an anonymous authentication for
privacy-preserving {IoT} target-driven applications",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "142--149",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001229",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kent:2015:AGA,
author = "Alexander D. Kent and Lorie M. Liebrock and Joshua C.
Neil",
title = "Authentication graphs: Analyzing user behavior within
an enterprise network",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "150--166",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maeng:2015:TAU,
author = "YoungJae Maeng and Aziz Mohaisen and Mun-Kyu Lee and
DaeHun Nyang",
title = "Transaction authentication using complementary
colors",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "167--181",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Reece:2015:PIS,
author = "R. P. Reece and B. C. Stahl",
title = "The professionalisation of information security:
Perspectives of {UK} practitioners",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "182--195",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001539",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2015:LRP,
author = "Qiang Yan and Jin Han and Yingjiu Li and Jianying Zhou
and Robert H. Deng",
title = "Leakage-resilient password entry: Challenges, design,
and evaluation",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "196--211",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001540",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alam:2015:FMM,
author = "Shahid Alam and R. Nigel Horspool and Issa Traore and
Ibrahim Sogukpinar",
title = "A framework for metamorphic malware analysis and
real-time detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "212--233",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001576",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ozcelik:2015:DEB,
author = "Ilker {\"O}z{\c{c}}elik and Richard R. Brooks",
title = "Deceiving entropy based {DoS} detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "234--245",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400159X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nissim:2015:DMP,
author = "Nir Nissim and Aviad Cohen and Chanan Glezer and Yuval
Elovici",
title = "Detection of malicious {PDF} files and directions for
enhancements: a state-of-the art survey",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "246--266",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001606",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montesdioca:2015:MUS,
author = "Gustavo Percio Zimmermann Montesdioca and Ant{\^o}nio
Carlos Gastaud Ma{\c{c}}ada",
title = "Measuring user satisfaction with information security
practices",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "267--280",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dang-Pham:2015:CIA,
author = "Duy Dang-Pham and Siddhi Pittayachawan",
title = "Comparing intention to avoid malware across contexts
in a {BYOD}-enabled {Australian} university: a
Protection Motivation Theory approach",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "281--297",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001643",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001722",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "iii--iii",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000103",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ngo:2015:DDX,
author = "Canh Ngo and Yuri Demchenko and Cees de Laat",
title = "Decision Diagrams for {XACML} Policy Evaluation and
Management",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "1--16",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001655",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PMa,
author = "Anonymous",
title = "Pages 1--276 ({March 2015})",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "1--276",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Masdari:2015:TEC,
author = "Mohammad Masdari and Sam Jabbehdari and Jamshid
Bagherzadeh and Ahmad Khadem-Zadeh",
title = "Towards efficient certificate status validations with
{E-ADOPT} in mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "17--27",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001667",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abril:2015:SMA,
author = "Daniel Abril and Guillermo Navarro-Arribas and
Vicen{\c{c}} Torra",
title = "Spherical microaggregation: Anonymizing sparse vector
spaces",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "28--44",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001679",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rahman:2015:SIS,
author = "Nurul Hidayah Ab Rahman and Kim-Kwang Raymond Choo",
title = "A survey of information security incident handling in
the cloud",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "45--69",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001680",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Robinson:2015:CWI,
author = "Michael Robinson and Kevin Jones and Helge Janicke",
title = "Cyber warfare: Issues and challenges",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "70--94",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001692",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2015:DFA,
author = "Dae Wook Kim and Peiying Yan and Junjie Zhang",
title = "Detecting fake anti-virus software distribution
webpages",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "95--106",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001709",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patel:2015:NMT,
author = "Ahmed Patel and Samaher Al-Janabi and Ibrahim
AlShourbaji and Jens Pedersen",
title = "A novel methodology towards a trusted environment in
mashup web applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "107--122",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Komurcu:2015:EGM,
author = "Giray K{\"o}m{\"u}rc{\"u} and Ali Emre Pusane and
G{\"u}nhan D{\"u}ndar",
title = "An efficient grouping method and error probability
analysis for {RO}-{PUFs}",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "123--131",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001801",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2015:TMP,
author = "Yixuan Zhang and Jingsha He and Bin Zhao and Zhiqing
Huang and Ruohong Liu",
title = "Towards more pro-active access control in computer
systems and networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "132--146",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001813",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Onarlioglu:2015:SSL,
author = "Kaan Onarlioglu and Ahmet Salih Buyukkayhan and
William Robertson and Engin Kirda",
title = "{SENTINEL}: Securing Legacy {Firefox} Extensions",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "147--161",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001825",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{daVeiga:2015:IIS,
author = "Ad{\'e}le da Veiga and Nico Martins",
title = "Improving the information security culture through
monitoring and implementation actions illustrated
through a case study",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "162--176",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001862",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shropshire:2015:PAI,
author = "Jordan Shropshire and Merrill Warkentin and Shwadhin
Sharma",
title = "Personality, attitudes, and intentions: Predicting
initial adoption of information security behavior",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "177--191",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000036",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Geneiatakis:2015:PVA,
author = "Dimitris Geneiatakis and Igor Nai Fovino and Ioannis
Kounelis and Paquale Stirparo",
title = "A Permission verification approach for {Android}
mobile applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "192--205",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaki:2015:RRT,
author = "Ali Ahmadian Ramaki and Morteza Amini and Reza
Ebrahimi Atani",
title = "{RTECA}: Real time episode correlation algorithm for
multi-step attack scenarios detection",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "206--219",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tormo:2015:TPP,
author = "Gin{\'e}s D{\'o}lera Tormo and F{\'e}lix G{\'o}mez
M{\'a}rmol and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Towards privacy-preserving reputation management for
hybrid broadcast broadband applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "220--238",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2015:PLA,
author = "Yan Li and Yingjiu Li and Qiang Yan and Robert H.
Deng",
title = "Privacy leakage analysis in online social networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "239--254",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001588",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elish:2015:PUT,
author = "Karim O. Elish and Xiaokui Shu and Danfeng (Daphne)
Yao and Barbara G. Ryder and Xuxian Jiang",
title = "Profiling user-trigger dependence for {Android}
malware detection",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "255--273",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001631",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stergiopoulos:2015:HPT,
author = "George Stergiopoulos and Dimitris Gritzalis",
title = "Hacking and Penetration Testing with Low Power
Devices",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "274--275",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000024",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000073",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "iii--iii",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000280",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shittu:2015:IAP,
author = "Riyanat Shittu and Alex Healing and Robert
Ghanea-Hercock and Robin Bloomfield and Muttukrishnan
Rajarajan",
title = "Intrusion alert prioritisation and attack detection
using post-correlation analysis",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "1--15",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001837",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PMb,
author = "Anonymous",
title = "Pages 1--106 ({May 2015})",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "1--106",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vigil:2015:IAN,
author = "Mart{\'\i}n Vigil and Johannes Buchmann and Daniel
Cabarcas and Christian Weinert and Alexander
Wiesmaier",
title = "Integrity, authenticity, non-repudiation, and proof of
existence for long-term archiving: a survey",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "16--32",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001849",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bouffard:2015:UCF,
author = "Guillaume Bouffard and Jean-Louis Lanet",
title = "The ultimate control flow transfer in a {Java} based
smart card",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "33--46",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500005X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ibrahim:2015:RJS,
author = "Doaa H. Ibrahim and Emad S. Hassan and Sami A.
El-Dolil",
title = "Relay and jammer selection schemes for improving
physical layer security in two-way cooperative
networks",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "47--59",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000140",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tang:2015:STC,
author = "Changlong Tang and Jiqiang Liu",
title = "Selecting a trusted cloud service provider for your
{SaaS} program",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "60--73",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000139",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2015:DAD,
author = "Xiang Cheng and Sen Su and Shengzhi Xu and Zhengyi
Li",
title = "{DP-Apriori}: a differentially private frequent
itemset mining algorithm based on transaction
splitting",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "74--90",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001850",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2015:SSS,
author = "Xin Dong and Jiadi Yu and Yanmin Zhu and Yingying Chen
and Yuan Luo and Minglu Li",
title = "{SECO}: Secure and scalable data collaboration
services in cloud computing",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "91--105",
month = may,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.01.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000048",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000255",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "iii--iii",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000498",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cui:2015:PLT,
author = "Baojiang Cui and Fuwei Wang and Tao Guo and Guowei
Dong",
title = "A practical off-line taint analysis framework and its
application in reverse engineering of file format",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "1--15",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000218",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PJa,
author = "Anonymous",
title = "Pages 1--62 ({June 2015})",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "1--62",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maiorca:2015:SAE,
author = "Davide Maiorca and Davide Ariu and Igino Corona and
Marco Aresu and Giorgio Giacinto",
title = "Stealth attacks: an extended insight into the
obfuscation effects on {Android} malware",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "16--31",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500022X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Roumani:2015:TSM,
author = "Yaman Roumani and Joseph K. Nwankpa and Yazan F.
Roumani",
title = "Time series modeling of vulnerabilities",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "32--40",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000358",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{benOthmane:2015:IAC,
author = "Lotfi ben Othmane and Rohit Ranchal and Ruchith
Fernando and Bharat Bhargava and Eric Bodden",
title = "Incorporating attacker capabilities in risk estimation
and mitigation",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "41--61",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000334",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000462",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "iii--iv",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000772",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cerroni:2015:DDN,
author = "Walter Cerroni and Gianluca Moro and Roberto Pasolini
and Marco Ramilli",
title = "Decentralized detection of network attacks through
{P2P} data clustering of {SNMP} data",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "1--16",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000383",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PJb,
author = "Anonymous",
title = "Pages 1--292 ({July 2015})",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "1--292",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2015:GTF,
author = "Christoforos Ntantogian and Stefanos Malliaros and
Christos Xenakis",
title = "{Gaithashing}: a two-factor authentication scheme
based on gait features",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "17--32",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000413",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fattori:2015:HBM,
author = "Aristide Fattori and Andrea Lanzi and Davide
Balzarotti and Engin Kirda",
title = "Hypervisor-based malware protection with
{AccessMiner}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "33--50",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000395",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2015:DIN,
author = "Erzhou Zhu and Feng Liu and Zuo Wang and Alei Liang
and Yiwen Zhang and Xuejian Li and Xuejun Li",
title = "{Dytaint}: the implementation of a novel lightweight
3-state dynamic taint analysis framework for x86 binary
programs",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "51--69",
month = jul,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.03.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000401",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elyas:2015:DFR,
author = "Mohamed Elyas and Atif Ahmad and Sean B. Maynard and
Andrew Lonie",
title = "Digital forensic readiness: Expert perspectives on a
theoretical framework",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "70--89",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000449",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Virvilis:2015:SBW,
author = "Nikos Virvilis and Alexios Mylonas and Nikolaos Tsalis
and Dimitris Gritzalis",
title = "Security Busters: {Web} browser security vs. rogue
sites",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "90--105",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000590",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:TPC,
author = "Yongzhi Wang and Jinpeng Wei",
title = "Toward protecting control flow confidentiality in
cloud-based computation",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "106--127",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000553",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsohou:2015:ARC,
author = "Aggeliki Tsohou and Maria Karyda and Spyros
Kokolakis",
title = "Analyzing the role of cognitive and cultural biases in
the internalization of information security policies:
Recommendations for information security awareness
programs",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "128--141",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000565",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cowley:2015:ENI,
author = "Jennifer A. Cowley and Frank L. Greitzer and Bronwyn
Woods",
title = "Effect of network infrastructure factors on
information system risk judgments",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "142--158",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000619",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:CDF,
author = "Ting Wang and Dongyao Ji",
title = "Comment on {``Design and formal security evaluation of
NeMHIP''}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "159--161",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000345",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EIT,
author = "Anonymous",
title = "Editorial --- {28th IFIP TC-11 International
Information Security and Privacy Conference}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "162--163",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000711",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Krishnan:2015:EPR,
author = "Padmanabhan Krishnan and Kostyantyn Vorobyov",
title = "Enforcement of privacy requirements",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "164--177",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500036X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zwattendorfer:2015:DSP,
author = "Bernd Zwattendorfer and Daniel Slamanig",
title = "Design strategies for a privacy-friendly {Austrian
eID} system in the public cloud",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "178--193",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000346",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parsons:2015:DPS,
author = "Kathryn Parsons and Agata McCormac and Malcolm
Pattinson and Marcus Butavicius and Cate Jerram",
title = "The design of phishing studies: Challenges for
researchers",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "194--206",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000231",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wessel:2015:IMD,
author = "Sascha Wessel and Manuel Huber and Frederic Stumpf and
Claudia Eckert",
title = "Improving mobile device security with operating
system-level virtualization",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "207--220",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000206",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fuchs:2015:WMM,
author = "Karl-Peter Fuchs and Dominik Herrmann and Hannes
Federrath",
title = "Workload modelling for mix-based anonymity services",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "221--233",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500019X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2015:SSA,
author = "Jehyun Lee and Suyeon Lee and Heejo Lee",
title = "Screening smartphone applications using malware family
signatures",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "234--249",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000188",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yi:2015:PW,
author = "Jeong Hyun Yi and Kyung-Hyune Rhee and Gail-Joon Ahn",
title = "Preface --- {WISA} 2014",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "250--250",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000723",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mohaisen:2015:AHF,
author = "Aziz Mohaisen and Omar Alrawi and Manar Mohaisen",
title = "{AMAL}: High-fidelity, behavior-based automated
malware analysis and classification",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "251--266",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000425",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2015:DAE,
author = "Eunhyun Kim and Kyungwon Park and Hyoungshick Kim and
Jaeseung Song",
title = "Design and analysis of enumeration attacks on finding
friends with phone numbers: a case study with
{KakaoTalk}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "267--275",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000589",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2015:MMS,
author = "Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and
Jongseok Choi and Howon Kim",
title = "{Montgomery} multiplication and squaring for Optimal
Prime Fields",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "276--291",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/fparith.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000371",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000747",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "iii--iv",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001066",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heurix:2015:TPE,
author = "Johannes Heurix and Peter Zimmermann and Thomas
Neubauer and Stefan Fenz",
title = "A taxonomy for privacy enhancing technologies",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "1--17",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000668",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PS,
author = "Anonymous",
title = "Pages 1--246 ({September 2015})",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "1--246",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holm:2015:EBI,
author = "Hannes Holm and Khalid Khan Afridi",
title = "An expert-based investigation of the Common
Vulnerability Scoring System",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "18--30",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000620",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Serwadda:2015:WMD,
author = "Abdul Serwadda and Vir V. Phoha",
title = "When Mice devour the Elephants: a {DDoS} attack
against size-based scheduling schemes in the
{Internet}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "31--43",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000644",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:SDB,
author = "Yongge Wang and Tony Nicol",
title = "On statistical distance based testing of pseudo random
sequences and experiments with {PHP} and {Debian
OpenSSL}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "44--64",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000693",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Safa:2015:ISC,
author = "Nader Sohrabi Safa and Mehdi Sookhak and Rossouw Von
Solms and Steven Furnell and Norjihan Abdul Ghani and
Tutut Herawan",
title = "Information security conscious care behaviour
formation in organizations",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "65--78",
month = sep,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.05.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000863",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alsmadi:2015:SSD,
author = "Izzat Alsmadi and Dianxiang Xu",
title = "Security of Software Defined Networks: a survey",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "79--108",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500070X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Trabelsi:2015:SDS,
author = "Zouheir Trabelsi and Safaa Zeidan and Mohammad M.
Masud and Kilani Ghoudi",
title = "Statistical dynamic splay tree filters towards
multilevel firewall packet filtering enhancement",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "109--131",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500084X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ngoqo:2015:ISB,
author = "Bukelwa Ngoqo and Stephen V. Flowerday",
title = "Information Security Behaviour Profiling Framework
{(ISBPF)} for student mobile phone users",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "132--142",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000851",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2015:IEM,
author = "Chao Shen and Shichao Pei and Zhenyu Yang and Xiaohong
Guan",
title = "Input extraction via motion-sensor behavior analysis
on smartphones",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "143--155",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000991",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vavilis:2015:AAF,
author = "Sokratis Vavilis and Alexandru Egner and Milan
Petkovi{\'c} and Nicola Zannone",
title = "An anomaly analysis framework for database systems",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "156--173",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000905",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:ESS,
author = "Anonymous",
title = "Editorial --- {SEC'14} special issue on {ICT} systems
security and privacy protection",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "174--174",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001157",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carminati:2015:BDS,
author = "Michele Carminati and Roberto Caron and Federico Maggi
and Ilenia Epifani and Stefano Zanero",
title = "{BankSealer}: a decision support system for online
banking fraud analysis and investigation",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "175--186",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000437",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bal:2015:SPR,
author = "G{\"o}khan Bal and Kai Rannenberg and Jason I. Hong",
title = "{Styx}: Privacy risk communication for the {Android}
smartphone platform based on apps' data-access behavior
patterns",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "187--202",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000541",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Atighehchi:2015:NME,
author = "Kevin Atighehchi and Alexis Bonnecaze and Gabriel
Risterucci",
title = "New models for efficient authenticated dictionaries",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "203--214",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000607",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shahandashti:2015:RUP,
author = "Siamak F. Shahandashti and Reihaneh Safavi-Naini and
Nashad Ahmed Safa",
title = "Reconciling user privacy and implicit authentication
for mobile devices",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "215--233",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000838",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Saevanee:2015:CUA,
author = "Hataichanok Saevanee and Nathan Clarke and Steven
Furnell and Valerio Biscione",
title = "Continuous user authentication using multi-modal
biometrics",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "234--246",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000875",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001030",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "iii--iii",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001352",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IA,
author = "Anonymous",
title = "Introduction --- {ARES} 2014",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "1--1",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001558",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maier:2015:GDM,
author = "Dominik Maier and Mykola Protsenko and Tilo
M{\"u}ller",
title = "A game of Droid and Mouse: the threat of
split-personality malware on {Android}",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "2--15",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000656",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chiew:2015:UWL,
author = "Kang Leng Chiew and Ee Hung Chang and San Nah Sze and
Wei King Tiong",
title = "Utilisation of website logo for phishing detection",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "16--26",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001145",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Scanlon:2015:NIM,
author = "Mark Scanlon and Jason Farina and M-Tahar Kechadi",
title = "Network investigation methodology for {BitTorrent}
Sync: a Peer-to-Peer based file synchronisation
service",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "27--43",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500067X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pang:2015:NAC,
author = "Jun Pang and Yang Zhang",
title = "A new access control scheme for {Facebook}-style
social networks",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "44--59",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000632",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Neisse:2015:SMB,
author = "Ricardo Neisse and Gary Steri and Igor Nai Fovino and
Gianmarco Baldini",
title = "{SecKit}: a Model-based Security Toolkit for the
{Internet of Things}",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "60--76",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000887",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bouabana-Tebibel:2015:PSE,
author = "Thouraya Bouabana-Tebibel and Abdellah Kaci",
title = "Parallel search over encrypted data under attribute
based encryption on the Cloud Computing",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "77--91",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000577",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001327",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "iii--iii",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001455",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruohonen:2015:SGO,
author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville
Lepp{\"a}nen",
title = "The sigmoidal growth of operating system security
vulnerabilities: an empirical revisit",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "1--20",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001005",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PN,
author = "Anonymous",
title = "Pages 1--280 ({November 2015})",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "1--280",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{El-Emam:2015:NDH,
author = "Nameer N. El-Emam",
title = "New data-hiding algorithm based on adaptive neural
networks with modified particle swarm optimization",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "21--45",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500098X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giot:2015:RPB,
author = "Romain Giot and Bernadette Dorizzi and Christophe
Rosenberger",
title = "A review on the public benchmark databases for static
keystroke dynamics",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "46--61",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000942",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jia:2015:MBC,
author = "Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek
Saxena and Jian Mao and Zhenkai Liang",
title = "Man-in-the-browser-cache: Persisting {HTTPS} attacks
via browser cache poisoning",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "62--80",
month = nov,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.07.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001121",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zahadat:2015:BSE,
author = "Nima Zahadat and Paul Blessner and Timothy Blackburn
and Bill A. Olson",
title = "{BYOD} security engineering: a framework and its
analysis",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "81--99",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000978",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Solic:2015:ISS,
author = "Kresimir Solic and Hrvoje Ocevcic and Marin Golub",
title = "The information systems' security level assessment
model based on an ontology and evidential reasoning
approach",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "100--112",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001212",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsalis:2015:BRH,
author = "Nikolaos Tsalis and Dimitris Gritzalis",
title = "Book Review: {{\booktitle{Hacking Web Intelligence:
Open Source Intelligence and Web Reconnaissance
Concepts and Techniques}}, Sudhanshu Chauhan, Nutan
Kumar Panda, Elsevier Publications, USA (2015)}",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "113--113",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001236",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mouton:2015:NES,
author = "Francois Mouton and Mercia M. Malan and Kai K. Kimppa
and H. S. Venter",
title = "Necessity for ethics in social engineering research",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "114--127",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001224",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stavrou:2015:BRI,
author = "Vasilis Stavrou and Dimitris Gritzalis",
title = "Book Review: {{\booktitle{Introduction to Social Media
Investigation --- a hands-on Approach}}, Jennifer
Golbeck, Elsevier Publications, USA (2015)}",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "128--129",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001194",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yin:2015:DSC,
author = "Ting Yin and Gaobo Yang and Leida Li and Dengyong
Zhang and Xingming Sun",
title = "Detecting seam carving based image resizing using
local binary patterns",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "130--141",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001248",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stevanovic:2015:GTP,
author = "Matija Stevanovic and Jens Myrup Pedersen and
Alessandro D'Alconzo and Stefan Ruehrup and Andreas
Berger",
title = "On the ground truth problem of malicious {DNS} traffic
analysis",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "142--158",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500125X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia-Teodoro:2015:AGH,
author = "P. Garcia-Teodoro and J. E. Diaz-Verdejo and J. E.
Tapiador and R. Salazar-Hernandez",
title = "Automatic generation of {HTTP} intrusion signatures by
selective identification of anomalies",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "159--174",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001297",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2015:DPM,
author = "Xiang Cheng and Sen Su and Shengzhi Xu and Peng Tang
and Zhengyi Li",
title = "Differentially private maximal frequent sequence
mining",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "175--192",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001273",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2015:SSF,
author = "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
Falkner",
title = "Security solution frames and security patterns for
authorization in distributed, collaborative systems",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "193--234",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001200",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cazorla:2015:TSA,
author = "Lorena Cazorla and Cristina Alcaraz and Javier Lopez",
title = "A three-stage analysis of {IDS} for critical
infrastructures",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "235--250",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001133",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2015:RBF,
author = "Bing Liu and Chao-Hsien Chu",
title = "Relationship-based federated access control model for
{EPC} Discovery Service",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "251--270",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000899",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gope:2015:RLA,
author = "Prosanta Gope and Tzonelih Hwang",
title = "A realistic lightweight authentication protocol
preserving strong anonymity for securing {RFID}
system",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "271--280",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000681",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "CO2",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500142X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "iii--iii",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001728",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cherdantseva:2016:RCS,
author = "Yulia Cherdantseva and Pete Burnap and Andrew Blyth
and Peter Eden and Kevin Jones and Hugh Soulsby and
Kristan Stoddart",
title = "A review of cyber security risk assessment methods for
{SCADA} systems",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "1--27",
month = feb,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.09.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001388",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PF,
author = "Anonymous",
title = "Pages 1--162 ({February 2016})",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "1--162",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pierazzi:2016:ESA,
author = "Fabio Pierazzi and Sara Casolari and Michele Colajanni
and Mirco Marchetti",
title = "Exploratory security analytics for anomaly detection",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "28--49",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001480",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia:2016:FVS,
author = "D. A. L{\'o}pez Garc{\'\i}a",
title = "A flexible e-voting scheme for debate tools",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "50--62",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001546",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dhillon:2016:IIS,
author = "Gurpreet Dhillon and Romilla Syed and Cristiane
Pedron",
title = "Interpreting information security culture: an
organizational transformation case study",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "63--69",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500139X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Safa:2016:ISP,
author = "Nader Sohrabi Safa and Rossouw {Von Solms} and Steven
Furnell",
title = "Information security policy compliance model in
organizations",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "70--82",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001583",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ogutcu:2016:API,
author = "Gizem {\"O}g{\"u}t{\c{c}}{\"u} and {\"O}zlem M{\"u}ge
Testik and Oumout Chouseinoglou",
title = "Analysis of personal information security behavior and
awareness",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "83--93",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001406",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DOrazio:2016:AME,
author = "Christian D'Orazio and Kim-Kwang Raymond Choo",
title = "An adversary model to evaluate {DRM} protection of
video contents on {iOS} devices",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "94--110",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000954",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2016:SRI,
author = "Karanpreet Singh and Paramvir Singh and Krishan
Kumar",
title = "A systematic review of {IP} traceback schemes for
denial of service attacks",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "111--139",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000930",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2016:SBP,
author = "Mun-Kyu Lee and Hyeonjin Nam and Dong Kyue Kim",
title = "Secure bimodal {PIN}-entry method using audio
signals",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "140--150",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000929",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horsman:2016:CSR,
author = "Graeme Horsman",
title = "The challenges surrounding the regulation of anonymous
communication provision in the {United Kingdom}",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "151--162",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000917",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "CO2",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001698",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "iii--iii",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500190X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Harichandran:2016:CFN,
author = "Vikram S. Harichandran and Frank Breitinger and
Ibrahim Baggili and Andrew Marrington",
title = "A cyber forensics needs analysis survey: Revisiting
the domain's needs a decade later",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "1--13",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001595",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PMa,
author = "Anonymous",
title = "Pages 1--106 ({March 2016})",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "1--106",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shameli-Sendi:2016:TIS,
author = "Alireza Shameli-Sendi and Rouzbeh Aghababaei-Barzegar
and Mohamed Cheriet",
title = "Taxonomy of information security risk assessment
{(ISRA)}",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "14--30",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001650",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Awan:2016:ICR,
author = "Malik Shahzad Kaleem Awan and Pete Burnap and Omer
Rana",
title = "Identifying cyber risk hotspots: a framework for
measuring temporal variance in computer network risk",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "31--46",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001674",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{West:2016:IFF,
author = "Jarrod West and Maumita Bhattacharya",
title = "Intelligent financial fraud detection: a comprehensive
review",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "47--66",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001261",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sieklik:2016:ETD,
author = "Boris Sieklik and Richard Macfarlane and William J.
Buchanan",
title = "Evaluation of {TFTP DDoS} amplification attack",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "67--92",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001285",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faria:2016:IPK,
author = "Gerson de Souza Faria and Hae Yong Kim",
title = "Identification of pressed keys by time difference of
arrivals of mechanical vibrations",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "93--105",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001662",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "CO2",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500187X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "iii--iv",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2016:CCI,
author = "Xiao-Fan Chen and Shun-Zheng Yu",
title = "{CIPA}: a collaborative intrusion prevention
architecture for programmable network and {SDN}",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "1--19",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PMb,
author = "Anonymous",
title = "Pages 1--284 ({May 2016})",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "1--284",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horcas:2016:ADM,
author = "Jose-Miguel Horcas and M{\'o}nica Pinto and Lidia
Fuentes and Wissam Mallouli and Edgardo Montes de Oca",
title = "An approach for deploying and monitoring dynamic
security policies",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "20--38",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001832",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Konradt:2016:PEA,
author = "Christian Konradt and Andreas Schilling and Brigitte
Werners",
title = "Phishing: an economic analysis of cybercrime
perpetrators",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "39--46",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001844",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2016:SWS,
author = "Cheng Huang and JiaYong Liu and Yong Fang and Zheng
Zuo",
title = "A study on {Web} security incidents in {China} by
analyzing vulnerability disclosure platforms",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "47--62",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Asghar:2016:DIR,
author = "Hira Asghar and Zahid Anwar and Khalid Latif",
title = "A deliberately insecure {RDF}-based {Semantic Web}
application framework for teaching {SPARQL\slash
SPARUL} injection attacks and defense mechanisms",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "63--82",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{GhasemiGol:2016:CAN,
author = "Mohammad GhasemiGol and Abbas Ghaemi-Bafghi and Hassan
Takabi",
title = "A comprehensive approach for network attack
forecasting",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "83--105",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Obert:2016:PAE,
author = "James Obert and Inna Pivkina and Hong Huang and
Huiping Cao",
title = "Proactively applied encryption in multipath networks",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "106--124",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001960",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2016:ADA,
author = "Jae-wook Jang and Hyunjae Kang and Jiyoung Woo and
Aziz Mohaisen and Huy Kang Kim",
title = "{Andro-Dumpsys}: Anti-malware system based on the
similarity of malware creator and malware centric
information",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "125--138",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481600002X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abazari:2016:EAM,
author = "Farzaneh Abazari and Morteza Analoui and Hassan
Takabi",
title = "Effect of anti-malware software on infectious nodes in
cloud environment",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "139--148",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001959",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:FSL,
author = "Weize Li and Lun Xie and Zulan Deng and Zhiliang
Wang",
title = "False sequential logic attack on {SCADA} system and
its physical impact analysis",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "149--159",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000031",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sadhya:2016:PPS,
author = "Debanjan Sadhya and Sanjay Kumar Singh",
title = "Privacy preservation for soft biometrics based
multimodal recognition system",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "160--179",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000055",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2016:CRA,
author = "Hao Zhang and Danfeng (Daphne) Yao and Naren
Ramakrishnan and Zhibin Zhang",
title = "Causality reasoning about network events for detecting
stealthy malware activities",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "180--198",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000043",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ni:2016:FMR,
author = "Siru Ni and Yi Zhuang and Jingjing Gu and Ying Huo",
title = "A formal model and risk assessment method for
security-critical real-time embedded systems",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "199--215",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000079",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spanos:2016:IIS,
author = "Georgios Spanos and Lefteris Angelis",
title = "The impact of information security events to the stock
market: a systematic literature review",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "216--229",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300013",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ji:2016:CEM,
author = "Yuede Ji and Yukun He and Xinyang Jiang and Jian Cao
and Qiang Li",
title = "Combating the evasion mechanisms of social bots",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "230--249",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300025",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ulas:2016:ARL,
author = "Cihan Ulas and Ulas Asik and Cant{\"u}rk Karadeniz",
title = "Analysis and reconstruction of laser printer
information leakages in the media of electromagnetic
radiation, power, and signal lines",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "250--267",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300049",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Farina:2016:MBP,
author = "Paolo Farina and Enrico Cambiaso and Gianluca Papaleo
and Maurizio Aiello",
title = "Are mobile botnets a possible threat? {The} case of
{SlowBot Net}",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "268--283",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300086",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "CO2",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630013X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "iii--iii",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menesidou:2016:AKE,
author = "Sofia Anna Menesidou and Dimitrios Vardalis and
Vasilios Katos",
title = "Automated key exchange protocol evaluation in delay
tolerant networks",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "1--8",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300098",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PJa,
author = "Anonymous",
title = "Pages 1--254 ({June 2016})",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "1--254",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barton:2016:ISS,
author = "Kevin A. Barton and Gurvirender Tejay and Michael Lane
and Steve Terrell",
title = "Information system security commitment: a study of
external influences on senior management",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "9--25",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300104",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flores:2016:SIR,
author = "Waldo Rocha Flores and Mathias Ekstedt",
title = "Shaping intention to resist social engineering through
transformational leadership, information security
culture and awareness",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "26--44",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000067",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:SER,
author = "Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and
Jinbo Xiong and Danwei Chen",
title = "Secure, efficient and revocable multi-authority access
control system in cloud storage",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "45--59",
month = jun,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.02.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300050",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2016:UIS,
author = "Chunghun Lee and Choong C. Lee and Suhyun Kim",
title = "Understanding information security stress: Focusing on
the type of information security compliance activity",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "60--70",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300074",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Morovati:2016:NBD,
author = "Kamran Morovati and Sanjay Kadam and Ali Ghorbani",
title = "A network based document management model to prevent
data extrusion",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "71--91",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300062",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Junaid:2016:DDM,
author = "Mohsin Junaid and Donggang Liu and David Kung",
title = "{Dexteroid}: Detecting malicious behaviors in
{Android} apps using reverse-engineered life cycle
models",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "92--117",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300037",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Camacho:2016:PBM,
author = "Jos{\'e} Camacho and Alejandro P{\'e}rez-Villegas and
Pedro Garc{\'\i}a-Teodoro and Gabriel
Maci{\'a}-Fern{\'a}ndez",
title = "{PCA}-based multivariate statistical network
monitoring for anomaly detection",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "118--137",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300116",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsai:2016:UOS,
author = "Hsin-yi Sandy Tsai and Mengtian Jiang and Saleem
Alhabash and Robert LaRose and Nora J. Rifon and Shelia
R. Cotten",
title = "Understanding online safety behaviors: a protection
motivation theory perspective",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "138--150",
month = jun,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.02.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300190",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{El-Hajj:2016:SCW,
author = "Wassim El-Hajj and Ghassen {Ben Brahim} and Hazem Hajj
and Haidar Safa and Ralph Adaimy",
title = "Security-by-construction in web applications
development via database annotations",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "151--165",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001972",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Davis:2016:AFE,
author = "Jonathan J. Davis and Ernest Foo",
title = "Automated feature engineering for {HTTP} tunnel
detection",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "166--185",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000080",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mouton:2016:SEA,
author = "Francois Mouton and Louise Leenen and H. S. Venter",
title = "Social engineering attack examples, templates and
scenarios",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "186--209",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Teh:2016:STD,
author = "Pin Shen Teh and Ning Zhang and Andrew Beng Jin Teoh
and Ke Chen",
title = "A survey on touch dynamics authentication in mobile
devices",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "210--235",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300256",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pasquale:2016:AEC,
author = "Liliana Pasquale and Sorren Hanvey and Mark Mcgloin
and Bashar Nuseibeh",
title = "Adaptive evidence collection in the cloud using attack
scenarios",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "236--254",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300232",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "CO2",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300360",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "iii--iii",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630058X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alexiou:2016:FSA,
author = "Nikolaos Alexiou and Stylianos Basagiannis and Sophia
Petridou",
title = "Formal security analysis of near field communication
using model checking",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "1--14",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300244",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PJb,
author = "Anonymous",
title = "Pages 1--226 ({July 2016})",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "1--226",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Djamaludin:2016:RUT,
author = "C. I. Djamaludin and E. Foo and S. Camtepe and P.
Corke",
title = "Revocation and update of trust in autonomous delay
tolerant networks",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "15--36",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630030X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giboney:2016:SEA,
author = "Justin Scott Giboney and Jeffrey Gainer Proudfoot and
Sanjay Goel and Joseph S. Valacich",
title = "The Security Expertise Assessment Measure {(SEAM)}:
Developing a scale for hacker expertise",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "37--51",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300323",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2016:TRR,
author = "Gang Liu and Runnan Zhang and Huimin Song and Can Wang
and Jinhui Liu and Aijun Liu",
title = "{Ts-RBAC}: a {RBAC} model with transformation",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "52--61",
month = jul,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.03.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300281",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2016:USM,
author = "Christos Xenakis and Christoforos Ntantogian and
Orestis Panos",
title = "{(U)SimMonitor}: a mobile application for security
evaluation of cellular networks",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "62--78",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630027X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitra:2016:MTR,
author = "Barsha Mitra and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "Mining temporal roles using many-valued concepts",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "79--94",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300335",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schryen:2016:DTN,
author = "Guido Schryen and Gerit Wagner and Alexander
Schlegel",
title = "Development of two novel face-recognition {CAPTCHAs}:
a security and usability study",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "95--116",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300293",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Such:2016:IAT,
author = "Jose M. Such and Antonios Gouglidis and William
Knowles and Gaurav Misra and Awais Rashid",
title = "Information assurance techniques: Perceived cost
effectiveness",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "117--133",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pisani:2016:ETU,
author = "Paulo Henrique Pisani and Romain Giot and Andr{\'e} C.
P. L. F. de Carvalho and Ana Carolina Lorena",
title = "Enhanced template update: Application to keystroke
dynamics",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "134--153",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630044X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Skopik:2016:PSP,
author = "Florian Skopik and Giuseppe Settanni and Roman
Fiedler",
title = "A problem shared is a problem halved: a survey on the
dimensions of collective cyber defense through security
information sharing",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "154--176",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300347",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:MTP,
author = "Wenjuan Li and Weizhi Meng and Xiapu Luo and Lam For
Kwok",
title = "{\em {MVPSys}}: Toward practical multi-view based
false alarm reduction system in network intrusion
detection",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "177--192",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300475",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sucasas:2016:APP,
author = "Victor Sucasas and Georgios Mantas and Firooz B.
Saghezchi and Ayman Radwan and Jonathan Rodriguez",
title = "An autonomous privacy-preserving authentication scheme
for intelligent transportation systems",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "193--205",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300463",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kar:2016:SDS,
author = "Debabrata Kar and Suvasini Panigrahi and Srikanth
Sundararajan",
title = "{SQLiGoT}: Detecting {SQL} injection attacks using
graph of tokens and {SVM}",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "206--225",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300451",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "CO2",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300554",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "iii--iii",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300815",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Canfora:2016:HSE,
author = "Gerardo Canfora and Francesco Mercaldo and Corrado
Aaron Visaggio",
title = "An {HMM} and structural entropy based detector for
{Android} malware: an empirical study",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "1--18",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PA,
author = "Anonymous",
title = "Pages 1--184 ({August 2016})",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "1--184",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tran:2016:CRR,
author = "Hiep Tran and Enrique Campos-Nanez and Pavel Fomin and
James Wasek",
title = "Cyber resilience recovery model to combat zero-day
malware attacks",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "19--31",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bartnes:2016:FIS,
author = "Maria Bartnes and Nils Brede Moe and Poul E.
Heegaard",
title = "The future of information security incident management
training: a case study of electrical power companies",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "32--45",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300530",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kearney:2016:CPD,
author = "W. D. Kearney and H. A. Kruger",
title = "Can perceptual differences account for enigmatic
information security behaviour in an organisation?",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "46--58",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300645",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rrushi:2016:NDT,
author = "Julian L. Rrushi",
title = "{NIC} displays to thwart malware attacks mounted from
within the {OS}",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "59--71",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300517",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Balachandran:2016:CFO,
author = "Vivek Balachandran and Sufatrio and Darell J. J. Tan
and Vrizlynn L. L. Thing",
title = "Control flow obfuscation for {Android} applications",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "72--93",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300529",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2016:SSS,
author = "Anton V. Uzunov",
title = "A survey of security solutions for distributed
publish\slash subscribe systems",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "94--129",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2016:UPP,
author = "Chao Shen and Tianwen Yu and Haodi Xu and Gengshan
Yang and Xiaohong Guan",
title = "User practice in password security: an empirical study
of real-life passwords in the wild",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "130--141",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300657",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Boshmaf:2016:ILV,
author = "Yazan Boshmaf and Dionysios Logothetis and Georgos
Siganos and Jorge Ler{\'{\i}}a and Jose Lorenzo and
Matei Ripeanu and Konstantin Beznosov and Hassan
Halawa",
title = "{{\'I}}ntegro: Leveraging victim prediction for robust
fake account detection in large scale {OSNs}",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "142--168",
month = aug,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.05.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300633",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flowerday:2016:ISP,
author = "Stephen V. Flowerday and Tite Tuyikeze",
title = "Information security policy development and
implementation: the what, how and who",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "169--183",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300670",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "CO2",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300785",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "iii--iii",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301092",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Modic:2016:NET,
author = "Jolanda Modic and Ruben Trapero and Ahmed Taha and
Jesus Luna and Miha Stopar and Neeraj Suri",
title = "Novel efficient techniques for real-time cloud
security assessment",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "1--18",
month = sep,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.06.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300682",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PS,
author = "Anonymous",
title = "Pages 1--348 ({September 2016})",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "1--348",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hellal:2016:MCF,
author = "Aya Hellal and Lotfi {Ben Romdhane}",
title = "Minimal contrast frequent pattern mining for malware
detection",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "19--32",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300694",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2016:DBM,
author = "Yonggon Kim and Ohmin Kwon and Jinsoo Jang and
Seongwook Jin and Hyeongboo Baek and Brent Byunghoon
Kang and Hyunsoo Yoon",
title = "On-demand bootstrapping mechanism for isolated
cryptographic operations on commodity accelerators",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "33--48",
month = sep,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.06.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300712",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{delRio:2016:ABC,
author = "Jose Sanchez del Rio and Daniela Moctezuma and
Cristina Conde and Isaac Martin de Diego and Enrique
Cabello",
title = "Automated border control e-gates and facial
recognition systems",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "49--72",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300736",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{GhasemiGol:2016:FMI,
author = "Mohammad GhasemiGol and Hassan Takabi and Abbas
Ghaemi-Bafghi",
title = "A foresight model for intrusion response management",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "73--94",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300700",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bajwa:2016:NTN,
author = "Garima Bajwa and Ram Dantu",
title = "{Neurokey}: Towards a new paradigm of cancelable
biometrics-based key generation using
electroencephalograms",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "95--113",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300669",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2016:PPI,
author = "Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and
Guofei Gu and Michalis Polychronakis",
title = "{PRIDE}: a practical intrusion detection system for
resource constrained wireless mesh networks",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "114--132",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300724",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tang:2016:RIH,
author = "Zhenjun Tang and Huan Lao and Xianquan Zhang and Kai
Liu",
title = "Robust image hashing via {DCT} and {LLE}",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "133--148",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300852",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nunez:2016:EMA,
author = "David Nu{\~n}ez and Carmen Fern{\'a}ndez-Gago and
Jes{\'u}s Luna",
title = "Eliciting metrics for accountability of cloud
systems",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "149--164",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630075X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Langer:2016:ONA,
author = "Lucie Langer and Florian Skopik and Paul Smith and
Markus Kammerstetter",
title = "From old to new: Assessing cybersecurity risks for an
evolving smart grid",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "165--176",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300876",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2016:EIS,
author = "Hai Nguyen and Vinod Ganapathy and Abhinav Srivastava
and Shivaramakrishnan Vaidyanathan",
title = "Exploring infrastructure support for app-based
services on cloud platforms",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "177--192",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300888",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jiang:2016:SMS,
author = "Rui Jiang and Xianglong Wu and Bharat Bhargava",
title = "{SDSS-MAC}: Secure data sharing scheme in
multi-authority cloud storage systems",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "193--212",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300864",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Varshney:2016:PDU,
author = "Gaurav Varshney and Manoj Misra and Pradeep K. Atrey",
title = "A phish detector using lightweight search features",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "213--228",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300918",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miller:2016:MCS,
author = "Simon Miller and Christian Wagner and Uwe Aickelin and
Jonathan M. Garibaldi",
title = "Modelling cyber-security experts' decision making
processes using aggregation operators",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "229--245",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630089X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wan:2016:PEP,
author = "Zhiguo Wan and Wen-Tao Zhu and Guilin Wang",
title = "{PRAC}: Efficient privacy protection for
vehicle-to-grid communications in the smart grid",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "246--256",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300761",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Neisse:2016:PEF,
author = "Ricardo Neisse and Gary Steri and Dimitris Geneiatakis
and Igor Nai Fovino",
title = "A privacy enforcing framework for {Android}
applications",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "257--277",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300840",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Johnson:2016:TBV,
author = "Pontus Johnson and Dan Gorton and Robert
Lagerstr{\"o}m and Mathias Ekstedt",
title = "Time between vulnerability disclosures: a measure of
software product vulnerability",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "278--295",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300955",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Knowles:2016:SSA,
author = "William Knowles and Alistair Baron and Tim McGarr",
title = "The simulated security assessment ecosystem: Does
penetration testing need standardisation?",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "296--316",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300906",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lopriore:2016:ACL,
author = "Lanfranco Lopriore",
title = "Access control lists in password capability
environments",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "317--327",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300967",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Razaque:2016:TDP,
author = "Abdul Razaque and Syed S. Rizvi",
title = "Triangular data privacy-preserving model for
authenticating all key stakeholders in a cloud
environment",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "328--347",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300979",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBg,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "CO2",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301067",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "iii--iii",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301316",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dor:2016:MIS,
author = "Daniel Dor and Yuval Elovici",
title = "A model of the information security investment
decision-making process",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "1--13",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301043",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PN,
author = "Anonymous",
title = "Pages 1--116 ({November 2016})",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "1--116",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Saini:2016:CBE,
author = "Anil Saini and Manoj Singh Gaur and Vijay Laxmi and
Mauro Conti",
title = "Colluding browser extension attack on user privacy and
its implication for web browsers",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "14--28",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301018",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tas:2016:NSI,
author = "Ismail Melih Tas and Bahar Ugurdogan and Selcuk
Baktir",
title = "Novel session initiation protocol-based distributed
denial-of-service attacks and effective defense
strategies",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "29--44",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300980",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cherdantseva:2016:MER,
author = "Yulia Cherdantseva and Jeremy Hilton and Omer Rana and
Wendy Ivins",
title = "A multifaceted evaluation of the reference model of
information assurance and security",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "45--66",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301146",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barenghi:2016:PPE,
author = "Alessandro Barenghi and Michele Beretta and Alessandro
{Di Federico} and Gerardo Pelosi",
title = "A privacy-preserving encrypted {OSN} with stateless
server interaction: the {Snake} design",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "67--84",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301031",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dasgupta:2016:TDA,
author = "Dipankar Dasgupta and Arunava Roy and Abhijit Nag",
title = "Toward the design of adaptive selection strategies for
multi-factor authentication",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "85--116",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630102X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBh,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "63",
number = "??",
pages = "CO2",
month = nov,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:47 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301286",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "iii--iii",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301493",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2017:DCD,
author = "Tzy-Shiah Wang and Hui-Tang Lin and Wei-Tsung Cheng
and Chang-Yu Chen",
title = "{DBod}: Clustering and detecting {DGA}-based botnets
using {DNS} traffic analysis",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "1--15",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301250",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PJa,
author = "Anonymous",
title = "Pages 1--134 ({January 2017})",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "1--134",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bopche:2017:GSM,
author = "Ghanshyam S. Bopche and Babu M. Mehtre",
title = "Graph similarity metrics for assessing temporal
changes in attack surface of dynamic networks",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "16--43",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301171",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fuller:2017:MBD,
author = "Jonathan D. Fuller and Benjamin W. Ramsey and Mason J.
Rice and John M. Pecarina",
title = "Misuse-based detection of {Z-Wave} network attacks",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "44--58",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301341",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Muller:2017:ECL,
author = "Steve Muller and Carlo Harpes and Yves {Le Traon} and
Sylvain Gombault and Jean-Marie Bonnin",
title = "Efficiently computing the likelihoods of cyclically
interdependent risk scenarios",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "59--68",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301158",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruiz:2017:SKR,
author = "Jose Fran. Ruiz and Marcos Arjona and Antonio Ma{\~n}a
and Carsten Rudolph",
title = "Security knowledge representation artifacts for
creating secure {IT} systems",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "69--91",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300992",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patel:2017:NCI,
author = "Ahmed Patel and Hitham Alhussian and Jens Myrup
Pedersen and Bouchaib Bounabat and Joaquim Celestino
J{\'u}nior and Sokratis Katsikas",
title = "A nifty collaborative intrusion detection and
prevention architecture for Smart Grid ecosystems",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "92--109",
month = jan,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.07.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300748",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dimitrakakis:2017:NOB,
author = "Christos Dimitrakakis and Aikaterini Mitrokotsa",
title = "Near-optimal blacklisting",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "110--121",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000966",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kokolakis:2017:PAP,
author = "Spyros Kokolakis",
title = "Privacy attitudes and privacy behaviour: a review of
current research on the privacy paradox phenomenon",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "122--134",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001017",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "64",
number = "??",
pages = "CO2",
month = jan,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301468",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "iii--iv",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300184",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Niemimaa:2017:ISC,
author = "Marko Niemimaa",
title = "Information systems continuity process: Conceptual
foundations for the study of the ``social''",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "1--13",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301547",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PMa,
author = "Anonymous",
title = "Pages 1--432 ({March 2017})",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "1--432",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Siadati:2017:MYS,
author = "Hossein Siadati and Toan Nguyen and Payas Gupta and
Markus Jakobsson and Nasir Memon",
title = "Mind your {SMSes}: Mitigating social engineering in
second factor authentication",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "14--28",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630116X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zafar:2017:SCC,
author = "Faheem Zafar and Abid Khan and Saif Ur Rehman Malik
and Mansoor Ahmed and Adeel Anjum and Majid Iqbal Khan
and Nadeem Javed and Masoom Alam and Fuzel Jamil",
title = "A survey of cloud computing data integrity schemes:
Design challenges, taxonomy and future trends",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "29--49",
month = mar,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.10.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301377",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zaeem:2017:MAI,
author = "Razieh Nokhbeh Zaeem and Monisha Manoharan and
Yongpeng Yang and K. Suzanne Barber",
title = "Modeling and analysis of identity threat behaviors
through text mining of identity theft stories",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "50--63",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301559",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2017:RIS,
author = "Eun Hee Park and Jongwoo Kim and Young Soon Park",
title = "The role of information security learning and
individual factors in disclosing patients' health
information",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "64--76",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301444",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruan:2017:ICU,
author = "Keyun Ruan",
title = "Introducing cybernomics: a unifying economic framework
for measuring cyber risk",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "77--89",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301407",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rashidi:2017:ARU,
author = "Bahman Rashidi and Carol Fung and Elisa Bertino",
title = "{Android} resource usage risk assessment using hidden
{Markov} model and online learning",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "90--107",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301596",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bang:2017:ADN,
author = "June-ho Bang and Young-Jong Cho and Kyungran Kang",
title = "Anomaly detection of network-initiated {LTE} signaling
traffic in wireless sensor and actuator networks based
on a Hidden semi-{Markov} Model",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "108--120",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301614",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Feizollah:2017:AAA,
author = "Ali Feizollah and Nor Badrul Anuar and Rosli Salleh
and Guillermo Suarez-Tangil and Steven Furnell",
title = "{AndroDialysis}: Analysis of {Android} Intent
Effectiveness in Malware Detection",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "121--134",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301602",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Aburomman:2017:SID,
author = "Abdulla Amin Aburomman and Mamun Bin Ibne Reaz",
title = "A survey of intrusion detection systems based on
ensemble and hybrid classifiers",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "135--152",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301572",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bashir:2017:PCC,
author = "Masooda Bashir and Colin Wee and Nasir Memon and Boyi
Guo",
title = "Profiling cybersecurity competition participants:
Self-efficacy, decision-making and interests predict
effectiveness of competitions as a recruitment tool",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "153--165",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301389",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Motzek:2017:CBF,
author = "Alexander Motzek and Ralf M{\"o}ller",
title = "Context- and bias-free probabilistic mission impact
assessment",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "166--186",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301584",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Han:2017:NNT,
author = "Wenlin Han and Yang Xiao",
title = "{NFD}: Non-technical loss fraud detection in Smart
Grid",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "187--201",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301626",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yi:2017:EIV,
author = "Mingxu Yi and Jinxia Wei and Lingwei Song",
title = "Efficient integrity verification of replicated data in
cloud computing system",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "202--212",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301560",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meng:2017:TEC,
author = "Weizhi Meng and Wenjuan Li and Lam-For Kwok and
Kim-Kwang Raymond Choo",
title = "Towards enhancing click-draw based graphical passwords
using multi-touch behaviours on smartphones",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "213--229",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301638",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alam:2017:DAO,
author = "Shahid Alam and Zhengyang Qu and Ryan Riley and Yan
Chen and Vaibhav Rastogi",
title = "{DroidNative}: Automating and optimizing detection of
{Android} native code malware variants",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "230--246",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630164X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kandi:2017:ELC,
author = "Haribabu Kandi and Deepak Mishra and Subrahmanyam R.
K. Sai Gorthi",
title = "Exploring the learning capabilities of convolutional
neural networks for robust image watermarking",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "247--268",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301699",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alajeely:2017:DAP,
author = "Majeed Alajeely and Robin Doss and Asma'a Ahmad and
Vicky Mak-Hau",
title = "Defense against packet collusion attacks in
opportunistic networks",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "269--282",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301717",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ismail:2017:PRT,
author = "Hatem Ismail and Daniel Germanus and Neeraj Suri",
title = "{P2P} routing table poisoning: a quorum-based
sanitizing approach",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "283--299",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630178X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meszaros:2017:IOF,
author = "Jan Meszaros and Alena Buchalcevova",
title = "Introducing {OSSF}: a framework for online service
cybersecurity risk management",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "300--313",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301791",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2017:DNA,
author = "Zhaomin Chen and Chai Kiat Yeo and Bu Sung Lee and
Chiew Tong Lau",
title = "Detection of network anomalies using {Improved-MSPCA}
with sketches",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "314--328",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301419",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liang:2017:VVB,
author = "Hongliang Liang and Mingyu Li and Jian Xu and Wenying
Hu and Xiaoxiao Pei and Xiaodong Jia and Yan Song",
title = "{vmOS}: a virtualization-based, secure desktop
system",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "329--343",
month = mar,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.10.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301390",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2017:ALH,
author = "Karanpreet Singh and Paramvir Singh and Krishan
Kumar",
title = "Application layer {HTTP}-{GET} flood {DDoS} attacks:
Research landscape and challenges",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "344--372",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301365",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dwivedi:2017:PPC,
author = "Rudresh Dwivedi and Somnath Dey and Ramveer Singh and
Aditya Prasad",
title = "A privacy-preserving cancelable iris template
generation scheme using decimal encoding and look-up
table mapping",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "373--386",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301353",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hubballi:2017:CLD,
author = "Neminath Hubballi and Nikhil Tripathi",
title = "A closer look into {DHCP} starvation attack in
wireless networks",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "387--404",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301262",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2017:FMA,
author = "Naipeng Dong and Hugo Jonker and Jun Pang",
title = "Formal modelling and analysis of receipt-free auction
protocols in applied pi calculus",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "405--432",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301006",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "65",
number = "??",
pages = "CO2",
month = mar,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:48 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300159",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "iii--iii",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300457",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2017:QPI,
author = "Seung-Hyun Kim and In-Young Ko and Soo-Hyung Kim",
title = "Quality of Private Information {(QoPI)} model for
effective representation and prediction of privacy
controls in mobile computing",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "1--19",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300056",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PMb,
author = "Anonymous",
title = "Pages 1--234 ({May 2017})",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "1--234",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anjum:2017:SPM,
author = "Adeel Anjum and Guillaume Raschia and Marc Gelgon and
Abid Khan and Saif ur Rehman Malik and Naveed Ahmad and
Mansoor Ahmed and Sabah Suhail and M. Masoom Alam",
title = "$ \tau $-safety: a privacy model for sequential
publication with arbitrary updates",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "20--39",
month = may,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.12.014",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300019",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parsons:2017:HAI,
author = "Kathryn Parsons and Dragana Calic and Malcolm
Pattinson and Marcus Butavicius and Agata McCormac and
Tara Zwaans",
title = "The Human Aspects of Information Security
Questionnaire {(HAIS-Q)}: Two further validation
studies",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "40--51",
month = may,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.01.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300081",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Han:2017:IMI,
author = "JinYoung Han and Yoo Jung Kim and Hyungjin Kim",
title = "An integrative model of information security policy
compliance with psychological contract: Examining a
bilateral perspective",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "52--65",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300032",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Saidi:2017:AAC,
author = "Firas Saidi and Zouheir Trabelsi and Khaled Salah and
Henda {Ben Ghezala}",
title = "Approaches to analyze cyber terrorist communities:
Survey and challenges",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "66--80",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300068",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miyamoto:2017:WCR,
author = "Inez Miyamoto and Thomas H. Holzer and Shahryar
Sarkani",
title = "Why a counterfeit risk avoidance strategy fails",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "81--96",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300020",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mesbah:2017:REJ,
author = "Abdelhak Mesbah and Jean-Louis Lanet and Mohamed
Mezghiche",
title = "Reverse engineering a {Java Card} memory management
algorithm",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "97--114",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300093",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2017:DPA,
author = "Toan Van Nguyen and Napa Sae-Bae and Nasir Memon",
title = "{DRAW}-A-{PIN}: Authentication using finger-drawn
{PIN} on touch devices",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "115--128",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300123",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jeske:2017:FIT,
author = "Debora Jeske and Paul van Schaik",
title = "Familiarity with {Internet} threats: Beyond
awareness",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "129--141",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300214",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2017:FIW,
author = "Bhupendra Singh and Upasna Singh",
title = "A forensic insight into {Windows} 10 Cortana search",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "142--154",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300111",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chakraborty:2017:DMU,
author = "Nilesh Chakraborty and Samrat Mondal",
title = "On designing a {modified-UI} based honeyword
generation approach for overcoming the existing
limitations",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "155--168",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300226",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Razaque:2017:SQS,
author = "Abdul Razaque and Syed S. Rizvi and Meer J. Khan and
Qassim B. Hani and Julius P. Dichter and Reza M.
Parizi",
title = "Secure and quality-of-service-supported
service-oriented architecture for mobile cloud handoff
process",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "169--184",
month = may,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.01.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730010X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Turkmen:2017:FAX,
author = "Fatih Turkmen and Jerry den Hartog and Silvio Ranise
and Nicola Zannone",
title = "Formal analysis of {XACML} policies using {SMT}",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "185--203",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300135",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Le:2017:FAN,
author = "Junqing Le and Xiaofeng Liao and Bo Yang",
title = "Full autonomy: a novel individualized anonymity model
for privacy preserving",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "204--217",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630181X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Aurigemma:2017:PPE,
author = "Salvatore Aurigemma and Thomas Mattson",
title = "Privilege or procedure: Evaluating the effect of
employee status on intent to comply with socially
interactive information security threats and controls",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "218--234",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300329",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "66",
number = "??",
pages = "CO2",
month = may,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300421",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "iii--iv",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300767",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wagner:2017:KAV,
author = "Markus Wagner and Alexander Rind and Niklas Th{\"u}r
and Wolfgang Aigner",
title = "A knowledge-assisted visual malware analysis system:
Design, validation, and reflection of {KAMAS}",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "1--15",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300263",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PJb,
author = "Anonymous",
title = "Pages 1--368 ({June 2017})",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "1--368",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sapegin:2017:TSC,
author = "Andrey Sapegin and David Jaeger and Feng Cheng and
Christoph Meinel",
title = "Towards a system for complex analysis of security
events in large-scale networks",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "16--34",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730024X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Qamar:2017:DDA,
author = "Sara Qamar and Zahid Anwar and Mohammad Ashiqur Rahman
and Ehab Al-Shaer and Bei-Tseng Chu",
title = "Data-driven analytics for cyber-threat intelligence
and information sharing",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "35--58",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300287",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sadhya:2017:PRS,
author = "Debanjan Sadhya and Sanjay Kumar Singh",
title = "Providing robust security measures to {Bloom} filter
based biometric template protection schemes",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "59--72",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300391",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chandrasekhar:2017:NAC,
author = "Santosh Chandrasekhar and Ahmed Ibrahim and Mukesh
Singhal",
title = "A novel access control protocol using proxy signatures
for cloud-based health information exchange",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "73--88",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300342",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2017:ISR,
author = "Jaehyun Park and Jiseong Noh and Myungchul Kim and
Brent Byunghoon Kang",
title = "{Invi-server}: Reducing the attack surfaces by making
protected server invisible on networks",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "89--106",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730038X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Skracic:2017:AAU,
author = "Kristian Skraci{\'c} and Predrag Pale and Zvonko
Kostanjcar",
title = "Authentication approach using one-time challenge
generation based on user behavior patterns captured in
transactional data sets",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "107--121",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730055X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khurat:2017:PPV,
author = "Assadarat Khurat and Boontawee Suntisrivaraporn and
Dieter Gollmann",
title = "Privacy policies verification in composite services
using {OWL}",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "122--141",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300512",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2017:PPT,
author = "Shuo Wang and Richard O. Sinnott",
title = "Protecting personal trajectories of social media users
through differential privacy",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "142--163",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300251",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2017:MLB,
author = "Yizheng Chen and Panagiotis Kintis and Manos
Antonakakis and Yacin Nadji and David Dagon and Michael
Farrell",
title = "Measuring lower bounds of the financial abuse to
online advertisers: a four year case study of the
{TDSS\slash TDL4 Botnet}",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "164--180",
month = jun,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.02.010",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300366",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsalis:2017:EPP,
author = "Nikolaos Tsalis and Alexios Mylonas and Antonia
Nisioti and Dimitris Gritzalis and Vasilios Katos",
title = "Exploring the protection of private browsing in
desktop browsers",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "181--197",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300597",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bryant:2017:NKC,
author = "Blake D. Bryant and Hossein Saiedian",
title = "A novel kill-chain framework for remote security log
analysis with {SIEM} software",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "198--210",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300561",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hasan:2017:UAF,
author = "Ragib Hasan and Rasib Khan",
title = "Unified authentication factors and fuzzy service
access using interaction provenance",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "211--231",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300408",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2017:SPA,
author = "Zeqing Guo and Weili Han and Liangxing Liu and Wenyuan
Xu and Minyue Ni and Yunlei Zhao and Xiaoyang Sean
Wang",
title = "Socialized policy administration",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "232--243",
month = jun,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.03.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300585",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choi:2017:ART,
author = "Hyo Shin Choi and Won Sang Lee and So Young Sohn",
title = "Analyzing research trends in personal information
privacy using topic modeling",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "244--253",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300603",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mohammed:2017:EPC,
author = "Zareef A. Mohammed and Gurvirender P. Tejay",
title = "Examining privacy concerns and ecommerce adoption in
developing countries: the impact of culture in shaping
individuals' perceptions toward technology",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "254--265",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300548",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herrmann:2017:EII,
author = "Dominik Herrmann and Hannes Federrath",
title = "Editorial: {30th IFIP International Information
Security Conference (IFIP SEC 2015)}",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "266--266",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730069X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karlsson:2017:PBD,
author = "Fredrik Karlsson and Karin Hedstr{\"o}m and G{\"o}ran
Goldkuhl",
title = "Practice-based discourse analysis of information
security policies",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "267--279",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301833",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bartnes:2017:CIS,
author = "Maria Bartnes and Nils Brede Moe",
title = "Challenges in {IT} security preparedness exercises: a
case study",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "280--290",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301705",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bella:2017:TET,
author = "Giampaolo Bella and Rosario Giustolisi and Gabriele
Lenzini and Peter Y. A. Ryan",
title = "Trustworthy exams without trusted parties",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "291--307",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301766",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lueks:2017:FRA,
author = "Wouter Lueks and Gergely Alp{\'a}r and Jaap-Henk
Hoepman and Pim Vullers",
title = "Fast revocation of attribute-based credentials for
both users and verifiers",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "308--323",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301729",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yamada:2017:EPA,
author = "Asahiko Yamada and Tatsuro Ikeda",
title = "Enhanced {PKI} authentication with trusted product at
claimant",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "324--334",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300044",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Do:2017:ADD,
author = "Quoc Huy Do and Richard Bubel and Reiner H{\"a}hnle",
title = "Automatic detection and demonstrator generation for
information flow leaks in object-oriented programs",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "335--349",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301730",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pham:2017:TCB,
author = "Dang Vinh Pham and Dogan Kesdogan",
title = "Towards a causality based analysis of anonymity
protection in indeterministic mix systems",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "350--368",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300378",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "67",
number = "??",
pages = "CO2",
month = jun,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:49 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300731",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "iii--iii",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301013",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dang-Pham:2017:ASN,
author = "Duy Dang-Pham and Siddhi Pittayachawan and Vince
Bruno",
title = "Applications of social network analysis in behavioural
information security research: Concepts and empirical
analysis",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "1--15",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300639",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PJc,
author = "Anonymous",
title = "Pages 1--196 ({July 2017})",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "1--196",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{deClercq:2017:SSC,
author = "Ruan de Clercq and Johannes G{\"o}tzfried and David
{\"U}bler and Pieter Maene and Ingrid Verbauwhede",
title = "{SOFIA}: Software and control flow integrity
architecture",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "16--35",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300664",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Idrees:2017:PNA,
author = "Fauzia Idrees and Muttukrishnan Rajarajan and Mauro
Conti and Thomas M. Chen and Yogachandran
Rahulamathavan",
title = "{PIndroid}: a novel {Android} malware detection system
using ensemble learning methods",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "36--46",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300640",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mao:2017:SIA,
author = "Weixuan Mao and Zhongmin Cai and Don Towsley and Qian
Feng and Xiaohong Guan",
title = "Security importance assessment for system objects and
malware detection",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "47--68",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300354",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ultra:2017:SMS,
author = "J. D. Ultra and S. Pancho-Festin",
title = "A simple model of separation of duty for access
control models",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "69--80",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300652",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ashibani:2017:CPS,
author = "Yosef Ashibani and Qusay H. Mahmoud",
title = "Cyber physical systems security: Analysis, challenges
and solutions",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "81--97",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300809",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dai:2017:ORR,
author = "Ting Dai and Xiaolei Li and Behnaz Hassanshahi and
Roland H. C. Yap and Zhenkai Liang",
title = "{$R$ opp} {$D$ roid}: Robust permission re-delegation
prevention in {Android} inter-component communication",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "98--111",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300688",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Badenhop:2017:ZWR,
author = "Christopher W. Badenhop and Scott R. Graham and
Benjamin W. Ramsey and Barry E. Mullins and Logan O.
Mailloux",
title = "The {Z-Wave} routing protocol and its security
implications",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "112--129",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300792",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Franke:2017:CIM,
author = "Ulrik Franke",
title = "The cyber insurance market in {Sweden}",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "130--144",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300883",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bauer:2017:PBT,
author = "Stefan Bauer and Edward W. N. Bernroider and Katharina
Chudzikowski",
title = "Prevention is better than cure! {Designing}
information security awareness programs to overcome
users' non-compliance with information security
policies in banks",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "145--159",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300871",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Aleroud:2017:PET,
author = "Ahmed Aleroud and Lina Zhou",
title = "Phishing environments, techniques, and
countermeasures: a survey",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "160--196",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300810",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "68",
number = "??",
pages = "CO2",
month = jul,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300986",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2017:ESI,
author = "Xinyi Huang and Joseph Liu and Javier Lopez",
title = "Editorial: Special issue on security data science and
cyber threat management",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "1--2",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300949",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kandias:2017:SLD,
author = "Miltiadis Kandias and Dimitris Gritzalis and Vasilis
Stavrou and Kostas Nikoloulis",
title = "Stress level detection via {OSN} usage pattern and
chronicity analysis: an {OSINT} threat intelligence
module",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "3--17",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301742",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Edwards:2017:PGA,
author = "Matthew Edwards and Robert Larson and Benjamin Green
and Awais Rashid and Alistair Baron",
title = "Panning for gold: Automatically analysing online
social engineering attack surfaces",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "18--34",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301845",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2017:ACI,
author = "Shigang Liu and Yu Wang and Jun Zhang and Chao Chen
and Yang Xiang",
title = "Addressing the class imbalance problem in {Twitter}
spam detection using ensemble learning",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "35--49",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301754",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jiang:2017:SCF,
author = "Peng Jiang and Yi Mu and Fuchun Guo and Qiaoyan Wen",
title = "Secure-channel free keyword search with authorization
in manager-centric databases",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "50--64",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301687",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xu:2017:EOS,
author = "Rui Xu and Kirill Morozov and Yanjiang Yang and
Jianying Zhou and Tsuyoshi Takagi",
title = "Efficient outsourcing of secure $k$-nearest neighbour
query over encrypted database",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "65--83",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301651",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2017:ENQ,
author = "Lu Zhou and Youwen Zhu and Aniello Castiglione",
title = "Efficient $k$-{NN} query over encrypted data in cloud
with limited key-disclosure and offline data owner",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "84--96",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301663",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2017:POP,
author = "Zhe Liu and Kim-Kwang Raymond Choo and Minghao Zhao",
title = "Practical-oriented protocols for privacy-preserving
outsourced big data analysis: Challenges and future
research directions",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "97--113",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301778",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xu:2017:AEP,
author = "Guowen Xu and Hongwei Li and Chen Tan and Dongxiao Liu
and Yuanshun Dai and Kan Yang",
title = "Achieving efficient and privacy-preserving truth
discovery in crowd sensing systems",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "114--126",
month = aug,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.11.014",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301675",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{deFuentes:2017:PPP,
author = "Jos{\'e} M. de Fuentes and Lorena Gonz{\'a}lez-Manzano
and Juan Tapiador and Pedro Peris-Lopez",
title = "{PRACIS}: Privacy-preserving and aggregatable
cybersecurity information sharing",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "127--141",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301821",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2017:DPP,
author = "Min Cherng Lee and Robin Mitra and Emmanuel Lazaridis
and An-Chow Lai and Yong Kheng Goh and Wun-She Yap",
title = "Data privacy preserving scheme using generalised
linear models",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "142--154",
month = aug,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.12.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301808",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Akiyama:2017:AEM,
author = "Mitsuaki Akiyama and Takeshi Yagi and Takeshi Yada and
Tatsuya Mori and Youki Kadobayashi",
title = "Analyzing the ecosystem of malicious {URL} redirection
through longitudinal observation from honeypots",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "155--173",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730007X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IFCa,
author = "Anonymous",
title = "Inside Front Cover --- Editorial Board Page\slash
Cover image legend if applicable",
journal = j-COMPUT-SECUR,
volume = "69",
number = "??",
pages = "CO2",
month = aug,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:50 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{AlSabah:2017:PCL,
author = "Mashael AlSabah and Alin Tomescu and Ilia Lebedev and
Dimitrios Serpanos and Srini Devadas",
title = "{PriviPK}: Certificate-less and secure email
communication",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "1--15",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300834",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PS,
author = "Anonymous",
title = "Pages 1--756 ({September 2017})",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "1--756",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{S:2017:EOB,
author = "Shitharth S. and Prince Winston D.",
title = "An enhanced optimization based algorithm for intrusion
detection in {SCADA} network",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "16--26",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300901",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Osborn:2017:SSI,
author = "Emma Osborn and Andrew Simpson",
title = "On small-scale {IT} users' system architectures and
cyber security: a {UK} case study",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "27--50",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300925",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2017:NMT,
author = "Hong-qi Zhang and Cheng Lei and De-xian Chang and
Ying-jie Yang",
title = "Network moving target defense technique based on
collaborative mutation",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "51--71",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301141",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{daVeiga:2017:DID,
author = "Ad{\'e}le da Veiga and Nico Martins",
title = "Defining and identifying dominant information security
cultures and subcultures",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "72--94",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300937",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mavani:2017:MAI,
author = "Monali Mavani and Krishna Asawa",
title = "Modeling and analyses of {IP} spoofing attack in
{6LoWPAN} network",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "95--110",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301116",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dang-Pham:2017:IFI,
author = "Duy Dang-Pham and Siddhi Pittayachawan and Vince
Bruno",
title = "Investigation into the formation of information
security influence: Network analysis of an emerging
organisation",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "111--123",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301177",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yousaf:2017:AIT,
author = "Awais Yousaf and Asim Loan and Radu F. Babiceanu and
Leandros Maglaras and Onaiza Yousaf",
title = "Architectural and information theoretic perspectives
of physical layer intruders for direct sequence spread
spectrum systems",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "124--143",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301189",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nacer:2017:DAM,
author = "Hassina Nacer and Nabil Djebari and Hachem Slimani and
Djamil Aissani",
title = "A distributed authentication model for composite {Web}
services",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "144--178",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301153",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yu:2017:EEG,
author = "Xingjie Yu and Zhan Wang and Yingjiu Li and Liang Li
and Wen Tao Zhu and Li Song",
title = "{EvoPass}: Evolvable graphical password against
shoulder-surfing attacks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "179--198",
month = sep,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.05.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730113X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mohsin:2017:IDD,
author = "Mujahid Mohsin and Zahid Anwar and Farhat Zaman and
Ehab Al-Shaer",
title = "{IoTChecker}: a data-driven framework for security
analytics of {Internet of Things} configurations",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "199--223",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301190",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fan:2017:DPI,
author = "Wenhao Fan and Yaohui Sang and Daishuai Zhang and Ran
Sun and Yuan'an Liu",
title = "{DroidInjector}: a process injection-based dynamic
tracking system for runtime behaviors of {Android}
applications",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "224--237",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301207",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Umer:2017:FBI,
author = "Muhammad Fahad Umer and Muhammad Sher and Yaxin Bi",
title = "Flow-based intrusion detection: Techniques and
challenges",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "238--254",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khammassi:2017:GLW,
author = "Chaouki Khammassi and Saoussen Krichen",
title = "A {GA}-{LR} wrapper approach for feature selection in
network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "255--277",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301244",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Eterovic-Soric:2017:SSD,
author = "Brett Eterovic-Soric and Kim-Kwang Raymond Choo and
Helen Ashman and Sameera Mubarak",
title = "Stalking the stalkers --- detecting and deterring
stalking behaviours using technology: a review",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "278--289",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730127X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choi:2017:OSL,
author = "Changho Choi and Nohyun Kwak and Jinsoo Jang and
Daehee Jang and Kuenwhee Oh and Kyungsoo Kwag and Brent
Byunghoon Kang",
title = "{S-OpenSGX}: a system-level platform for exploring
{SGX} enclave-based computing",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "290--306",
month = sep,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.06.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301256",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Oracevic:2017:SRO,
author = "Alma Oracevic and Serkan Akbas and Suat Ozdemir",
title = "Secure and reliable object tracking in wireless sensor
networks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "307--318",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301281",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moriano:2017:ICS,
author = "Pablo Moriano and Soumya Achar and L. Jean Camp",
title = "Incompetents, criminals, or spies: Macroeconomic
analysis of routing anomalies",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "319--334",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301372",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Clarke:2017:NPP,
author = "N. Clarke and F. Li and S. Furnell",
title = "A novel privacy preserving user identification
approach for network traffic",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "335--350",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301384",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegari:2017:ITM,
author = "Christian Callegari and Stefano Giordano and Michele
Pagano",
title = "An information-theoretic method for the detection of
anomalies in network traffic",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "351--365",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301438",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spyra:2017:SPA,
author = "Grzegorz Spyra and William J. Buchanan and Elias
Ekonomou",
title = "Sticky policies approach within cloud computing",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "366--375",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730144X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thompson:2017:SBH,
author = "Nik Thompson and Tanya Jane McGill and Xuequn Wang",
title = "{``Security} begins at {home''}: Determinants of home
computer and mobile device security behavior",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "376--391",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301426",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bhandari:2017:AIA,
author = "Shweta Bhandari and Wafa Ben Jaballah and Vineeta Jain
and Vijay Laxmi and Akka Zemmari and Manoj Singh Gaur
and Mohamed Mosbah and Mauro Conti",
title = "{Android} inter-app communication threats and
detection techniques",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "392--421",
month = sep,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.07.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301414",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guerrero-Higueras:2017:EAC,
author = "{\'A}ngel Manuel Guerrero-Higueras and Noem{\'\i}
DeCastro-Garc{\'\i}a and Francisco Javier
Rodr{\'\i}guez-Lera and Vicente Matell{\'a}n",
title = "Empirical analysis of cyber-attacks to an indoor real
time localization system for autonomous robots",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "422--435",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nazir:2017:AAS,
author = "Sajid Nazir and Shushma Patel and Dilip Patel",
title = "Assessing and augmenting {SCADA} cyber security: a
survey of techniques",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "436--454",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301293",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruzicic:2017:CSN,
author = "Vesna S. Ruzici{\'c} and Zivadin M. Mici{\'c}",
title = "Creating a strategic national knowledge architecture:
a comparative analysis of knowledge source innovation
in the {ICS} subfields of multimedia and {IT}
security",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "455--466",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cook:2017:ICS,
author = "Allan Cook and Helge Janicke and Richard Smith and
Leandros Maglaras",
title = "The industrial control system cyber defence triage
process",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "467--481",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sahay:2017:ASB,
author = "Rishikesh Sahay and Gregory Blanc and Zonghua Zhang
and Herv{\'e} Debar",
title = "{\em {ArOMA}}: an {SDN} based autonomic {DDoS}
mitigation framework",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "482--499",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Biondi:2017:ESC,
author = "Fabrizio Biondi and S{\'e}bastien Josse and Axel Legay
and Thomas Sirvent",
title = "Effectiveness of synthesis in concolic deobfuscation",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "500--515",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301475",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2017:BVP,
author = "Xiaolu Zhang and Ibrahim Baggili and Frank
Breitinger",
title = "Breaking into the vault: Privacy, security and
forensic analysis of {Android} vault applications",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "516--531",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301529",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Razaque:2017:SDA,
author = "Abdul Razaque and Syed S. Rizvi",
title = "Secure data aggregation using access control and
authentication for wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "532--545",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301402",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2017:ESN,
author = "Adnan Ahmad and Brian Whitworth and Furkh Zeshan and
Elisa Bertino and Robert Friedman",
title = "Extending social networks with delegation",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "546--564",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301517",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pisani:2017:SNA,
author = "Paulo Henrique Pisani and Norman Poh and Andr{\'e} C.
P. L. F. de Carvalho and Ana Carolina Lorena",
title = "Score normalization applied to adaptive biometric
systems",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "565--580",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301554",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ho:2017:TCC,
author = "Shuyuan Mary Ho and M{\'o}nica Ocasio-Vel{\'a}zquez
and Cheryl Booth",
title = "Trust or consequences? {Causal} effects of perceived
risk and subjective norms on cloud technology
adoption",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "581--595",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301591",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beheshti:2017:CMB,
author = "Seyed Mohammad Reza Saadat Beheshti and Panos Liatsis
and Muttukrishnan Rajarajan",
title = "A {CAPTCHA} model based on visual psychophysics: Using
the brain to distinguish between human users and
automated computer bots",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "596--617",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730161X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dassouki:2017:PCB,
author = "Khaled Dassouki and Haidar Safa and Mohamed Nassar and
Abbas Hijazi",
title = "Protecting from Cloud-based {SIP} flooding attacks by
leveraging temporal and structural fingerprints",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "618--633",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730158X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2017:DEH,
author = "Rui Zhao and Samantha John and Stacy Karas and Cara
Bussell and Jennifer Roberts and Daniel Six and Brandon
Gavett and Chuan Yue",
title = "Design and evaluation of the highly insidious extreme
phishing attacks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "634--647",
month = sep,
year = "2017",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.08.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301633",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2017:SSB,
author = "Yulong Fu and Zheng Yan and Hui Li and Xiao Long Xin
and Jin Cao",
title = "A secure {SDN} based {multi-RANs} architecture for
future {5G} networks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "648--662",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301785",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ki-Aries:2017:PCI,
author = "Duncan Ki-Aries and Shamal Faily",
title = "Persona-centred information security awareness",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "663--674",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301566",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nissim:2017:UBA,
author = "Nir Nissim and Ran Yahalom and Yuval Elovici",
title = "{USB}-based attacks",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "675--688",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301578",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Palumbo:2017:PAM,
author = "Paolo Palumbo and Luiza Sayfullina and Dmitriy
Komashinskiy and Emil Eirola and Juha Karhunen",
title = "A pragmatic {Android} malware detection procedure",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "689--701",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301542",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rodriguez:2017:TAS,
author = "David Mart{\'\i}nez Rodr{\'\i}guez and Jordi Nin and
Miguel Nu{\~n}ez-del-Prado",
title = "Towards the adaptation of {SDC} methods to stream
mining",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "702--722",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301761",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hudic:2017:SAA,
author = "Aleksandar Hudic and Paul Smith and Edgar R. Weippl",
title = "Security assurance assessment methodology for hybrid
clouds",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "723--743",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300627",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hernandez-Castro:2017:UML,
author = "Carlos Javier Hern{\'a}ndez-Castro and Mar{\'\i}a D.
R-Moreno and David F. Barrero and Stuart Gibson",
title = "Using machine learning to identify common flaws in
{CAPTCHA} design: {FunCAPTCHA} case analysis",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "744--756",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301128",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IFCb,
author = "Anonymous",
title = "Inside Front Cover --- Editorial Board Page\slash
Cover image legend if applicable",
journal = j-COMPUT-SECUR,
volume = "70",
number = "??",
pages = "CO2",
month = sep,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:51 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301864",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:E,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "1--1",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301645",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PN,
author = "Anonymous",
title = "Pages 1--132 ({November 2017})",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "1--132",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alcaraz:2017:RIC,
author = "Cristina Alcaraz and Javier Lopez and Kim-Kwang
Raymond Choo",
title = "Resilient interconnection in cyber-physical control
systems",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "2--14",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300573",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Belyaev:2017:FDI,
author = "Kirill Belyaev and Indrakshi Ray",
title = "On the formalization, design, and implementation of
component-oriented access control in lightweight
virtualized server environments",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "15--35",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301232",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stergiopoulos:2017:PAR,
author = "George Stergiopoulos and Panayiotis Katsaros and
Dimitris Gritzalis",
title = "Program analysis with risk-based classification of
dynamic invariants for logical error detection",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "36--50",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300330",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dumas:2017:DPP,
author = "Jean-Guillaume Dumas and Pascal Lafourcade and
Jean-Baptiste Orfila and Maxime Puys",
title = "Dual protocols for private multi-party matrix
multiplication and trust computations",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "51--70",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300913",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sciarretta:2017:AFS,
author = "Giada Sciarretta and Roberto Carbone and Silvio Ranise
and Alessandro Armando",
title = "Anatomy of the {Facebook} solution for mobile single
sign-on: Security assessment and improvements",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "71--86",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300895",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:PIS,
author = "Anonymous",
title = "Preface for the {IFIP SEC} special issue",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "87--87",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301657",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kulyk:2017:CRP,
author = "Oksana Kulyk and Stephan Neumann and Karola Marky and
Jurlind Budurushi and Melanie Volkamer",
title = "Coercion-resistant proxy voting",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "88--99",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Volkamer:2017:UET,
author = "Melanie Volkamer and Karen Renaud and Benjamin
Reinheimer and Alexandra Kunz",
title = "User experiences of {TORPEDO}: {TOoltip}-{poweRed}
Phishing Email {DetectiOn}",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "100--113",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300275",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bedford:2017:PSF,
author = "Andrew Bedford and Stephen Chong and Jos{\'e}e
Desharnais and Elisavet Kozyri and Nadia Tawbi",
title = "A progress-sensitive flow-sensitive inlined
information-flow control monitor (extended version)",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "114--131",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300676",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2017:IFCc,
author = "Anonymous",
title = "Inside Front Cover --- Editorial Board Page\slash
Cover image legend if applicable",
journal = j-COMPUT-SECUR,
volume = "71",
number = "??",
pages = "CO2",
month = nov,
year = "2017",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301712",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:RAL,
author = "Anonymous",
title = "Reviewer Acknowledgement list --- 2017",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "i--v",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302195",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2018:SAB,
author = "Jin Li and Yinghui Zhang and Xiaofeng Chen and Yang
Xiang",
title = "Secure attribute-based data sharing for
resource-limited users in cloud computing",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "1--12",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301621",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PJa,
author = "Anonymous",
title = "Pages 1--272 ({January 2018})",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "1--272",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nur:2018:RRI,
author = "Abdullah Yasin Nur and Mehmet Engin Tozal",
title = "Record route {IP} traceback: Combating {DoS} attacks
and the variants",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "13--25",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301773",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lemay:2018:SPA,
author = "Antoine Lemay and Joan Calvet and Fran{\c{c}}ois Menet
and Jos{\'e} M. Fernandez",
title = "Survey of publicly available reports on advanced
persistent threat actors",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "26--59",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301608",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2018:CES,
author = "Qiang Fu and Bo Feng and Dong Guo and Qiang Li",
title = "Combating the evolving spammers in online social
networks",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "60--73",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301797",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abdelhameed:2018:PPT,
author = "Saad A. Abdelhameed and Sherin M. Moussa and Mohamed
E. Khalifa",
title = "Privacy-preserving tabular data publishing: a
comprehensive evaluation from web to cloud",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "74--95",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301840",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2018:KSP,
author = "Wangtong Liu and Senlin Luo and Yu Liu and Limin Pan
and Qamas Gul Khan Safi",
title = "A kernel stack protection model against attacks from
kernel execution units",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "96--106",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301979",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Klonowski:2018:LWS,
author = "Marek Klonowski and Ania M. Piotrowska",
title = "Light-weight and secure aggregation protocols based on
{Bloom} filters",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "107--121",
month = jan,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.08.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301815",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2018:GBM,
author = "Li-E. Wang and Xianxian Li",
title = "A graph-based multifold model for anonymizing data
with attributes of multiple types",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "122--135",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730192X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Venugopal:2018:IDI,
author = "A. Vijayalakshmi Venugopal",
title = "Inadvertent disclosures of inventions in social media
affecting patent rights",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "136--144",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301967",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2018:TES,
author = "Dong Shen and Zhoujun Li and Xiaojing Su and Jinxin Ma
and Robert Deng",
title = "{TinyVisor}: an extensible secure framework on
{Android} platforms",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "145--162",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301955",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chang:2018:UFD,
author = "Bing Chang and Yao Cheng and Bo Chen and Fengwei Zhang
and Wen-Tao Zhu and Yingjiu Li and Zhan Wang",
title = "User-friendly deniable storage for mobile devices",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "163--174",
month = jan,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.09.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301943",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abdo:2018:SSR,
author = "H. Abdo and M. Kaouk and J.-M. Flaus and F. Masse",
title = "A safety\slash security risk analysis approach of
{Industrial Control Systems}: a cyber bowtie ---
combining new version of attack tree with bowtie
analysis",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "175--195",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301931",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anjum:2018:EPM,
author = "Adeel Anjum and Saif ur Rehman Malik and Kim-Kwang
Raymond Choo and Abid Khan and Asma Haroon and Sangeen
Khan and Samee U. Khan and Naveed Ahmad and Basit
Raza",
title = "An efficient privacy mechanism for electronic health
records",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "196--211",
month = jan,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.09.014",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302031",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tounsi:2018:STT,
author = "Wiem Tounsi and Helmi Rais",
title = "A survey on technical threat intelligence in the age
of sophisticated cyber attacks",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "212--233",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301839",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anisetti:2018:MTP,
author = "M. Anisetti and C. A. Ardagna and E. Damiani and N.
{El Ioini} and F. Gaudenzi",
title = "Modeling time, probability, and configuration
constraints for continuous cloud service
certification",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "234--254",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302018",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tripathi:2018:SRD,
author = "Nikhil Tripathi and Neminath Hubballi",
title = "Slow rate denial of service attacks against {HTTP/2}
and detection",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "255--272",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301980",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:IFC,
author = "Anonymous",
title = "Inside Front Cover --- Editorial Board Page\slash
Cover image legend if applicable",
journal = j-COMPUT-SECUR,
volume = "72",
number = "??",
pages = "CO2",
month = jan,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:52 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730216X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "ii--ii",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300440",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vennila:2018:DVS,
author = "Ganesan Vennila and M. S. K. Manikandan and M. N.
Suresh",
title = "Dynamic voice spammers detection using Hidden {Markov}
Model for Voice over {Internet} Protocol network",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "1--16",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302080",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PMa,
author = "Anonymous",
title = "Pages 1--544 ({March 2018})",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "1--544",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sepczuk:2018:NRB,
author = "Mariusz Sepczuk and Zbigniew Kotulski",
title = "A new risk-based authentication management model
oriented on user's experience",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "17--33",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302079",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jamil:2018:SPU,
author = "Fuzel Jamil and Abid Khan and Adeel Anjum and Mansoor
Ahmed and Farhana Jabeen and Nadeem Javaid",
title = "Secure provenance using an authenticated data
structure approach",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "34--56",
month = mar,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.10.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302122",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhuang:2018:PCS,
author = "Yan Zhuang",
title = "The performance cost of software obfuscation for
{Android} applications",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "57--72",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302092",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2018:MDM,
author = "Yuxin Ding and Xiaoling Xia and Sheng Chen and Ye Li",
title = "A malware detection method based on family behavior
graph",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "73--86",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302146",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menges:2018:CAI,
author = "Florian Menges and G{\"u}nther Pernul",
title = "A comparative analysis of incident reporting formats",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "87--101",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302250",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hatfield:2018:SEC,
author = "Joseph M. Hatfield",
title = "Social engineering in cybersecurity: the evolution of
a concept",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "102--113",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302249",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Buchler:2018:SOA,
author = "Norbou Buchler and Prashanth Rajivan and Laura R.
Marusich and Lewis Lightner and Cleotilde Gonzalez",
title = "Sociometrics and observational assessment of teaming
and leadership in a cyber security defense
competition",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "114--136",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302298",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamed:2018:NID,
author = "Tarfa Hamed and Rozita Dara and Stefan C. Kremer",
title = "Network intrusion detection system based on recursive
feature addition and bigram technique",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "137--155",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302274",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Adi:2018:ASP,
author = "Kamel Adi and Lamia Hamza and Liviu Pene",
title = "Automatic security policy enforcement in computer
systems",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "156--171",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302286",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alizadeh:2018:LDP,
author = "Mahdi Alizadeh and Xixi Lu and Dirk Fahland and Nicola
Zannone and Wil M. P. van der Aalst",
title = "Linking data and process perspectives for conformance
analysis",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "172--193",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302262",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patsakis:2018:MRT,
author = "Constantinos Patsakis and Athanasios Charemis and
Achilleas Papageorgiou and Dimitrios Mermigas and
Sotirios Pirounias",
title = "The market's response toward privacy and mass
surveillance: the {Snowden} aftermath",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "194--206",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730233X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2018:NBM,
author = "Hang Wei and Guan-Yu Hu and Zhi-Jie Zhou and Pei-Li
Qiao and Zhi-Guo Zhou and You-Min Zhang",
title = "A new {BRB} model for security-state assessment of
cloud computing based on the impact of external and
internal environments",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "207--218",
month = mar,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.11.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302341",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Aurigemma:2018:EEU,
author = "Salvatore Aurigemma and Thomas Mattson",
title = "Exploring the effect of uncertainty avoidance on
taking voluntary protective security actions",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "219--234",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302328",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ali-Gombe:2018:TMD,
author = "Aisha I. Ali-Gombe and Brendan Saltaformaggio and J.
``Ram'' Ramanujam and Dongyan Xu and Golden G.
Richard",
title = "Toward a more dependable hybrid analysis of {Android}
malware using aspect-oriented programming",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "235--248",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302377",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baseri:2018:PPF,
author = "Yaser Baseri and Abdelhakim Hafid and Soumaya
Cherkaoui",
title = "Privacy preserving fine-grained location-based access
control for mobile cloud",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "249--265",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302304",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bitton:2018:TMU,
author = "Ron Bitton and Andrey Finkelshtein and Lior Sidi and
Rami Puzis and Lior Rokach and Asaf Shabtai",
title = "Taxonomy of mobile users' security awareness",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "266--293",
month = mar,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.10.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302316",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horsman:2018:FRE,
author = "Graeme Horsman",
title = "Framework for Reliable Experimental Design {(FRED)}: a
research framework to ensure the dependable
interpretation of digital data for digital forensics",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "294--306",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302468",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karopoulos:2018:MMP,
author = "Georgios Karopoulos and Christoforos Ntantogian and
Christos Xenakis",
title = "{MASKER}: Masking for privacy-preserving aggregation
in the smart grid ecosystem",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "307--325",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302456",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2018:APA,
author = "Sen Chen and Minhui Xue and Lingling Fan and Shuang
Hao and Lihua Xu and Haojin Zhu and Bo Li",
title = "Automated poisoning attacks and defenses in malware
detection systems: an adversarial machine learning
approach",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "326--344",
month = mar,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.11.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302444",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gratian:2018:CHT,
author = "Margaret Gratian and Sruthi Bandi and Michel Cukier
and Josiah Dykstra and Amy Ginther",
title = "Correlating human traits and cyber security behavior
intentions",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "345--358",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302523",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2018:EDM,
author = "Chih-Hung Lin and Hsing-Kuo Pao and Jian-Wei Liao",
title = "Efficient dynamic malware analysis using virtual time
control mechanics",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "359--373",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730247X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Das:2018:RRD,
author = "Sanjeev Das and Bihuan Chen and Mahintham Chandramohan
and Yang Liu and Wei Zhang",
title = "{ROPSentry}: Runtime defense against {ROP} attacks
using hardware performance counters",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "374--388",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302481",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gomez-Hernandez:2018:RLT,
author = "J. A. G{\'o}mez-Hern{\'a}ndez and L.
{\'A}lvarez-Gonz{\'a}lez and P. Garc{\'\i}a-Teodoro",
title = "{R-Locker}: Thwarting ransomware action through a
honeyfile-based approach",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "389--398",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302560",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Burnap:2018:MCU,
author = "Pete Burnap and Richard French and Frederick Turner
and Kevin Jones",
title = "Malware classification using self organising feature
maps and machine activity data",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "399--410",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302535",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Macia-Fernandez:2018:UND,
author = "Gabriel Maci{\'a}-Fern{\'a}ndez and Jos{\'e} Camacho
and Roberto Mag{\'a}n-Carri{\'o}n and Pedro
Garc{\'\i}a-Teodoro and Roberto Ther{\'o}n",
title = "{UGR`16}: a new dataset for the evaluation of
cyclostationarity-based network {IDSs}",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "411--424",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302353",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mao:2018:LPP,
author = "Yunlong Mao and Yuan Zhang and Xiaoyan Zhang and
Fengyuan Xu and Sheng Zhong",
title = "Location privacy in public access points positioning:
an optimization and geometry approach",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "425--438",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302365",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Coulter:2018:IAD,
author = "Rory Coulter and Lei Pan",
title = "Intelligent agents defending for an {IoT} world: a
review",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "439--458",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302511",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bushouse:2018:GCP,
author = "Micah Bushouse and Douglas Reeves",
title = "{Goalkeeper}: Comprehensive process enforcement from
the hypervisor",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "459--473",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302572",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{deAlvarenga:2018:PMH,
author = "Sean Carlisto de Alvarenga and Sylvio Barbon and
Rodrigo Sanches Miani and Michel Cukier and Bruno Bogaz
Zarpel{\~a}o",
title = "Process mining and hierarchical clustering to help
intrusion alert visualization",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "474--491",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302584",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luo:2018:EAS,
author = "Yuchuan Luo and Ming Xu and Kai Huang and Dongsheng
Wang and Shaojing Fu",
title = "Efficient auditing for shared data in the cloud with
secure user revocation and computations outsourcing",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "492--506",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302663",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2018:LLP,
author = "Yimin Guo and Zhenfeng Zhang",
title = "\pkg{LPSE}: Lightweight password-strength estimation
for password meters",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "507--518",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See corrigendum \cite{Guo:2020:CLL}.",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301530",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goel:2018:MPA,
author = "Diksha Goel and Ankit Kumar Jain",
title = "Mobile phishing attacks and defence mechanisms: State
of art and open research challenges",
journal = j-COMPUT-SECUR,
volume = "73",
number = "??",
pages = "519--544",
month = mar,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:53 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302717",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "ii--ii",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301032",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bartoli:2018:ETW,
author = "Alberto Bartoli and Eric Medvet and Filippo Onesti",
title = "{Evil twins} and {WPA2 Enterprise}: a coming security
disaster?",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "1--11",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302808",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PMb,
author = "Anonymous",
title = "Pages 1--400 ({May 2018})",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "1--400",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{deLeon:2018:ASD,
author = "Daniel Conte de Leon and Christopher E. Goes and
Michael A. Haney and Axel W. Krings",
title = "{ADLES}: Specifying, deploying, and sharing hands-on
cyber-exercises",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "12--40",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302742",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nakhila:2018:GIU,
author = "Omar Nakhila and Muhammad Faisal Amjad and Erich
Dondyk and Cliff Zou",
title = "Gateway independent user-side wi-fi {Evil Twin} Attack
detection using virtual wireless clients",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "41--54",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302766",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wu:2018:MSF,
author = "Hao Wu and Zhonghua Wang",
title = "Multi-source fusion-based security detection method
for heterogeneous networks",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "55--70",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300063",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2018:PID,
author = "Asma'a Ahmad and Robin Doss and Majeed Alajeely and
Sarab F. {Al Rubeaai} and Dua'a Ahmad",
title = "Packet integrity defense mechanism in {OppNets}",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "71--93",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300269",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2018:PEA,
author = "Bhupendra Singh and Upasna Singh",
title = "Program execution analysis in {Windows}: a study of
data sources, their format and comparison of forensic
capability",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "94--114",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300257",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Medkova:2018:CAA,
author = "Jana Medkov{\'a}",
title = "Composition attack against social network data",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "115--129",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300051",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Manes:2018:DIK,
author = "Valentin J. M. Man{\`e}s and Daehee Jang and Chanho
Ryu and Brent Byunghoon Kang",
title = "Domain Isolated Kernel: a lightweight sandbox for
untrusted kernel extensions",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "130--143",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300282",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Al-rimy:2018:RTS,
author = "Bander Ali Saleh Al-rimy and Mohd Aizaini Maarof and
Syed Zainudeen Mohd Shaid",
title = "Ransomware threat success factors, taxonomy, and
countermeasures: a survey and research directions",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "144--166",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830004X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mao:2018:BDK,
author = "Weixuan Mao and Zhongmin Cai and Yuan Yang and
Xiaohong Shi and Xiaohong Guan",
title = "From big data to knowledge: a spatio-temporal approach
to malware detection",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "167--183",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302705",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gutierrez:2018:RRD,
author = "Christopher N. Gutierrez and Eugene H. Spafford and
Saurabh Bagchi and Thomas Yurek",
title = "Reactive redundancy for data destruction protection
({R2D2})",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "184--201",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730281X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kuang:2018:EVM,
author = "Kaiyuan Kuang and Zhanyong Tang and Xiaoqing Gong and
Dingyi Fang and Xiaojiang Chen and Zheng Wang",
title = "Enhance virtual-machine-based code obfuscation
security through dynamic bytecode scheduling",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "202--220",
month = may,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.01.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300270",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stiborek:2018:PAD,
author = "Jan Stiborek and Tom{\'a}s Pevn{\'y} and Martin
Reh{\'a}k",
title = "Probabilistic analysis of dynamic malware traces",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "221--239",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300336",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guerrero:2018:SSS,
author = "Daniel Guerrero and Alin A. Carsteanu and Julio B.
Clempner",
title = "Solving {Stackelberg} security {Markov} games
employing the bargaining {Nash} approach: Convergence
analysis",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "240--257",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300221",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sucasas:2018:PEO,
author = "Victor Sucasas and Georgios Mantas and Saud Althunibat
and Leonardo Oliveira and Angelos Antonopoulos and
Ifiok Otung and Jonathan Rodriguez",
title = "A privacy-enhanced {OAuth} 2.0 based protocol for
Smart City mobile applications",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "258--274",
month = may,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.01.014",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300361",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choo:2018:ICT,
author = "Kim-Kwang Raymond Choo and Matt Bishop and William
Glisson and Kara Nance",
title = "{Internet}- and cloud-of-things cybersecurity research
challenges and advances",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "275--276",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830097X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegati:2018:CTM,
author = "Franco Callegati and Saverio Giallorenzo and Andrea
Melis and Marco Prandini",
title = "Cloud-of-Things meets Mobility-as-a-Service: an
insider threat perspective",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "277--295",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302134",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Talbot:2018:DRA,
author = "Christopher M. Talbot and Michael A. Temple and
Timothy J. Carbino and J. Addison Betances",
title = "Detecting rogue attacks on commercial wireless Insteon
home automation systems",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "296--307",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302055",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassan:2018:STB,
author = "Shaikh Shahriar Hassan and Soumik Das Bibon and Md
Shohrab Hossain and Mohammed Atiquzzaman",
title = "Security threats in {Bluetooth} technology",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "308--322",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300615",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alali:2018:IRA,
author = "Mansour Alali and Ahmad Almogren and Mohammad Mehedi
Hassan and Iehab A. L. Rassan and Md Zakirul Alam
Bhuiyan",
title = "Improving risk assessment model of cyber security
using fuzzy logic inference system",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "323--339",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302006",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sohal:2018:CFI,
author = "Amandeep Singh Sohal and Rajinder Sandhu and Sandeep
K. Sood and Victor Chang",
title = "A cybersecurity framework to identify malicious edge
device in fog computing and cloud-of-things
environments",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "340--354",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301827",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Amato:2018:RHB,
author = "Flora Amato and Aniello Castiglione and Aniello De
Santo and Vincenzo Moscato and Antonio Picariello and
Fabio Persia and Giancarlo Sperl{\'{\i}}",
title = "Recognizing human behaviours in online social
networks",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "355--370",
month = may,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.06.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301219",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pipyros:2018:NSI,
author = "Kosmas Pipyros and Christos Thraskias and Lilian
Mitrou and Dimitris Gritzalis and Theodoros
Apostolopoulos",
title = "A new strategy for improving cyber-attacks evaluation
in the context of {Tallinn Manual}",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "371--383",
month = may,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817300822",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pizzolante:2018:PCG,
author = "Raffaele Pizzolante and Arcangelo Castiglione and
Bruno Carpentieri and Alfredo De Santis and Francesco
Palmieri and Aniello Castiglione",
title = "On the protection of consumer genomic data in the
{Internet} of Living Things",
journal = j-COMPUT-SECUR,
volume = "74",
number = "??",
pages = "384--400",
month = may,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.06.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301220",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "ii--ii",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830316X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Furnell:2018:ESB,
author = "Steven Furnell and Warut Khern-am-nuai and Rawan
Esmael and Weining Yang and Ninghui Li",
title = "Enhancing security behaviour by supporting the user",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "1--9",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300385",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PJb,
author = "Anonymous",
title = "Pages 1--218 ({June 2018})",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "1--218",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Miller:2018:IPR,
author = "Daniel Bradford Miller and William Bradley Glisson and
Mark Yampolskiy and Kim-Kwang Raymond Choo",
title = "Identifying {$3$D} printer residual data via
open-source documentation",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "10--23",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300324",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cabaj:2018:CEE,
author = "Krzysztof Cabaj and Dulce Domingos and Zbigniew
Kotulski and Ana Resp{\'\i}cio",
title = "Cybersecurity education: Evolution of the discipline
and analysis of master programs",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "24--35",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300373",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chiba:2018:NAC,
author = "Zouhair Chiba and Noureddine Abghour and Khalid
Moussaid and Amina {El Omri} and Mohamed Rida",
title = "A novel architecture combined with optimal parameters
for back propagation neural networks applied to anomaly
network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "36--58",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300543",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Halabi:2018:BBF,
author = "Talal Halabi and Martine Bellaiche",
title = "A broker-based framework for standardization and
management of Cloud {Security-SLAs}",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "59--71",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300476",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zangeneh:2018:CSM,
author = "Vahid Zangeneh and Mehdi Shajari",
title = "A cost-sensitive move selection strategy for moving
target defense",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "72--91",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302821",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sayed:2018:ITI,
author = "Bassam Sayed and Issa Traor{\'e} and Amany
Abdelhalim",
title = "{If-transpiler}: Inlining of hybrid flow-sensitive
security monitor for {JavaScript}",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "92--117",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300397",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2018:SRF,
author = "Chen Chen and Baojiang Cui and Jinxin Ma and Runpu Wu
and Jianchao Guo and Wenqian Liu",
title = "A systematic review of fuzzing techniques",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "118--137",
month = jun,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.02.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300658",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2018:OTP,
author = "Chang-Seop Park",
title = "One-time password based on hash chain without shared
secret and re-registration",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "138--146",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301391",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menard:2018:ICP,
author = "Philip Menard and Merrill Warkentin and Paul Benjamin
Lowry",
title = "The impact of collectivism and psychological ownership
on protection motivation: a cross-cultural
examination",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "147--166",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300488",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2018:FFN,
author = "Bo Fu and Yang Xiao and Hui Chen",
title = "{FNF}: Flow-net based fingerprinting and its
applications",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "167--181",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300877",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Avery:2018:FMD,
author = "Jeffrey Avery and John Ross Wallrabenstein",
title = "Formally modeling deceptive patches using a game-based
approach",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "182--190",
month = jun,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301330",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hussain:2018:SFM,
author = "Muzammil Hussain and Ahmed Al-Haiqi and A. A. Zaidan
and B. B. Zaidan and M. Kiah and Salman Iqbal and S.
Iqbal and Mohamed Abdulnabi",
title = "A security framework for {mHealth} apps on {Android}
platform",
journal = j-COMPUT-SECUR,
volume = "75",
number = "??",
pages = "191--217",
month = jun,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.02.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:54 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300798",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "ii--ii",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305455",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Muller:2018:TRA,
author = "Steve Muller and Jean Lancrenon and Carlo Harpes and
Yves Le Traon and Sylvain Gombault and Jean-Marie
Bonnin",
title = "A training-resistant anomaly detection system",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "1--11",
month = jul,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.02.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830155X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PJc,
author = "Anonymous",
title = "Pages 1--366 ({July 2018})",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "1--366",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhong:2018:CSD,
author = "Chen Zhong and Tao Lin and Peng Liu and John Yen and
Kai Chen",
title = "A cyber security data triage operation retrieval
system",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "12--31",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301408",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tiruvakadu:2018:CWA,
author = "Divya Sai Keerthi Tiruvakadu and Venkataram Pallapa",
title = "Confirmation of wormhole attack in {MANETs} using
honeypot",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "32--49",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300865",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Amigud:2018:IRS,
author = "Alexander Amigud and Joan Arnedo-Moreno and Thanasis
Daradoumis and Ana-Elena Guerrero-Roldan",
title = "An integrative review of security and integrity
strategies in an academic environment: Current
understanding and emerging perspectives",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "50--70",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301792",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meng:2018:SAE,
author = "Huasong Meng and Vrizlynn L. L. Thing and Yao Cheng
and Zhongmin Dai and Li Zhang",
title = "A survey of {Android} exploits in the wild",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "71--91",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301664",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stavova:2018:ELS,
author = "Vlasta Stavova and Lenka Dedkova and Vashek Matyas and
Mike Just and David Smahel and Martin Ukrop",
title = "Experimental large-scale review of attractors for
detection of potentially unwanted applications",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "92--100",
month = jul,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.02.017",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301640",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heartfield:2018:DSS,
author = "Ryan Heartfield and George Loukas",
title = "Detecting semantic social engineering attacks with the
weakest link: Implementation and empirical evaluation
of a human-as-a-security-sensor framework",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "101--127",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301780",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2018:ADS,
author = "Minh Hai Nguyen and Dung Le Nguyen and Xuan Mao Nguyen
and Tho Thanh Quan",
title = "Auto-detection of sophisticated malware using
lazy-binding control flow graph and deep learning",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "128--155",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300889",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bouhaddi:2018:EID,
author = "Myria Bouhaddi and Mohammed Sa{\"\i}d Radjef and Kamel
Adi",
title = "An efficient intrusion detection in
resource-constrained mobile ad-hoc networks",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "156--177",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301652",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tudor:2018:IDC,
author = "Valentin Tudor and Magnus Almgren and Marina
Papatriantafilou",
title = "The influence of dataset characteristics on privacy
preserving methods in the advanced metering
infrastructure",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "178--196",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830141X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Murnion:2018:MLS,
author = "Shane Murnion and William J. Buchanan and Adrian
Smales and Gordon Russell",
title = "Machine learning and semantic analysis of in-game chat
for cyberbullying",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "197--213",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301597",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Navarro:2018:SSM,
author = "Julio Navarro and Aline Deruyver and Pierre Parrend",
title = "A systematic survey on multi-step attack detection",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "214--249",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302141",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bertino:2018:ESP,
author = "Elisa Bertino and Valentina Casola and Aniello
Castiglione and Willy Susilo",
title = "Editorial: Security and privacy protection vs
sustainable development",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "250--251",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830539X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meng:2018:JDJ,
author = "Weizhi Meng and Lijun Jiang and Yu Wang and Jin Li and
Jun Zhang and Yang Xiang",
title = "{JFCGuard}: Detecting juice filming charging attack
via processor usage analysis on smartphones",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "252--264",
month = jul,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.11.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302493",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wu:2018:TSD,
author = "Tingmin Wu and Sheng Wen and Yang Xiang and Wanlei
Zhou",
title = "{Twitter} spam detection: Survey of new approaches and
comparative study",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "265--284",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730250X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toor:2018:VQA,
author = "Andeep S. Toor and Harry Wechsler and Michele Nappi
and Kim-Kwang Raymond Choo",
title = "Visual Question Authentication Protocol {(VQAP)}",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "285--294",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302547",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Polverini:2018:REP,
author = "D. Polverini and F. Ardente and I. Sanchez and F.
Mathieux and P. Tecchio and L. Beslay",
title = "Resource efficiency, privacy and security by design: a
first experience on enterprise servers and data storage
products triggered by a policy process",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "295--310",
month = jul,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.12.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302614",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baddar:2018:SEA,
author = "Sherenaz Al-Haj Baddar and Alessio Merlo and Mauro
Migliardi and Francesco Palmieri",
title = "Saving energy in aggressive intrusion detection
through dynamic latency sensitivity recognition",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "311--326",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302638",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lykou:2018:NMT,
author = "Georgia Lykou and Despina Mentzelioti and Dimitris
Gritzalis",
title = "A new methodology toward effectively assessing data
center sustainability",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "327--340",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302754",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2018:AAP,
author = "Zhuo Wei and Yongdong Wu and Yanjiang Yang and Zheng
Yan and Qingqi Pei and Yajuan Xie and Jian Weng",
title = "{AutoPrivacy}: Automatic privacy protection and
tagging suggestion for mobile social photo",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "341--353",
month = jul,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2017.12.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302626",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Varga:2018:DSA,
author = "Mihai Varga and Alina Petrescu-Nita and Florin Pop",
title = "Deadline scheduling algorithm for sustainable
computing in {Hadoop} environment",
journal = j-COMPUT-SECUR,
volume = "76",
number = "??",
pages = "354--366",
month = jul,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300038",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "ii--iii",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308034",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azad:2018:SMS,
author = "Muhammad Ajmal Azad and Ricardo Morla and Khaled
Salah",
title = "Systems and methods for {SPIT} detection in {VoIP}:
Survey and future directions",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "1--20",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302414",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PA,
author = "Anonymous",
title = "Pages 1--886 ({August 2018})",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "1--886",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baruah:2018:TFA,
author = "Barnana Baruah and Subhasish Dhal",
title = "A two-factor authentication scheme against {FDM}
attack in {IFTTT} based Smart Home System",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "21--35",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302402",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chakraborty:2018:SBD,
author = "Bodhi Chakraborty and Shekhar Verma and Krishna Pratap
Singh",
title = "Staircase based differential privacy with branching
mechanism for location privacy preservation in wireless
sensor networks",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "36--48",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830227X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gao:2018:SUP,
author = "Tianchong Gao and Feng Li",
title = "Studying the utility preservation in social network
anonymization via persistent homology",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "49--64",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303122",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Molin:2018:SUC,
author = "Eric Molin and Kirsten Meeuwisse and Wolter Pieters
and Caspar Chorus",
title = "Secure or usable computers? {Revealing} employees'
perceptions and trade-offs by means of a discrete
choice experiment",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "65--78",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xun:2018:SDL,
author = "Peng Xun and Pei-dong Zhu and Sabita Maharjan and
Peng-shuai Cui",
title = "Successive direct load altering attack in smart grid",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "79--93",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302554",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yilmaz:2018:ADP,
author = "Ercan Nurcan Yilmaz and Serkan G{\"o}nen",
title = "Attack detection\slash prevention system against cyber
attack in industrial control systems",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "94--105",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303316",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ferrer-Gomila:2018:SEC,
author = "Josep-Llu{\'\i}s Ferrer-Gomila and M. Francisca
Hinarejos and Lloren{\c{c}} Huguet-Rotger",
title = "A survey on electronic coupons",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "106--127",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Molinaro:2018:EAD,
author = "Kylie A. Molinaro and Matthew L. Bolton",
title = "Evaluating the applicability of the double system lens
model to the analysis of phishing email judgments",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "128--137",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302955",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chiba:2018:DBA,
author = "Daiki Chiba and Mitsuaki Akiyama and Takeshi Yagi and
Kunio Hato and Tatsuya Mori and Shigeki Goto",
title = "{DomainChroma}: Building actionable threat
intelligence from malicious domain names",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "138--161",
month = aug,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.03.013",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302967",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Oluwatimi:2018:CAS,
author = "Oyindamola Oluwatimi and Maria Luisa Damiani and Elisa
Bertino",
title = "A context-aware system to secure enterprise content:
Incorporating reliability specifiers",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "162--178",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303018",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Symeonidis:2018:CDF,
author = "Iraklis Symeonidis and Gergely Bicz{\'o}k and Fatemeh
Shirazi and Cristina P{\'e}rez-Sol{\`a} and Jessica
Schroers and Bart Preneel",
title = "Collateral damage of {Facebook} third-party
applications: a comprehensive study",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "179--208",
month = aug,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.03.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830302X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Geniola:2018:AAF,
author = "Alberto Geniola and Markku Antikainen and Tuomas
Aura",
title = "Automated analysis of freeware installers promoted by
download portals",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "209--225",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302797",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gerber:2018:EPP,
author = "Nina Gerber and Paul Gerber and Melanie Volkamer",
title = "Explaining the privacy paradox: a systematic review of
literature investigating privacy attitude and
behavior",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "226--261",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303031",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leszczyna:2018:RSC,
author = "Rafa{\l} Leszczyna",
title = "A review of standards with cybersecurity requirements
for smart grid",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "262--276",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302803",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sundararaj:2018:OCF,
author = "Vinu Sundararaj and Selvi Muthukumar and R. S. Kumar",
title = "An optimal cluster formation based energy efficient
dynamic scheduling hybrid {MAC} protocol for heavy
traffic load in wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "277--288",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303754",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{AlShboul:2018:VCM,
author = "Rabah AlShboul and Fadi Thabtah and Neda Abdelhamid
and Mofleh Al-diabat",
title = "A visualization cybersecurity method based on
features' dissimilarity",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "289--303",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303572",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vijayanand:2018:IDS,
author = "R. Vijayanand and D. Devaraj and B. Kannapiran",
title = "Intrusion detection system for wireless mesh network
using multiple support vector machine classifiers with
genetic-algorithm-based feature selection",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "304--314",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303766",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamid:2018:ESS,
author = "Brahim Hamid and Donatus Weber",
title = "Engineering secure systems: Models, patterns and
empirical validation",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "315--348",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303043",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garg:2018:EAA,
author = "Urvashi Garg and Geeta Sikka and Lalit K. Awasthi",
title = "Empirical analysis of attack graphs for mitigating
critical paths and vulnerabilities",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "349--359",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303493",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheah:2018:BAS,
author = "Madeline Cheah and Siraj A. Shaikh and Jeremy Bryans
and Paul Wooderson",
title = "Building an automotive security assurance case using
systematic security evaluations",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "360--379",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303584",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Angin:2018:SPA,
author = "Pelin Angin and Bharat Bhargava and Rohit Ranchal",
title = "A self-protecting agents based model for
high-performance mobile-cloud computing",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "380--396",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303948",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lencse:2018:MIP,
author = "G{\'a}bor Lencse and Youki Kadobayashi",
title = "Methodology for the identification of potential
security issues of different {IPv6} transition
technologies: Threat analysis of {DNS64} and stateful
{NAT64}",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "397--411",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303663",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2018:MCA,
author = "Tianqiang Huang and Xueli Zhang and Wei Huang and
Lingpeng Lin and Weifeng Su",
title = "A multi-channel approach through fusion of audio for
detecting video inter-frame forgery",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "412--426",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304243",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{AlSabah:2018:YCY,
author = "Mashael AlSabah and Gabriele Oligeri and Ryan Riley",
title = "Your culture is in your password: an analysis of a
demographically-diverse password dataset",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "427--441",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302979",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khalid:2018:TMN,
author = "Waqar Khalid and Zahid Ullah and Naveed Ahmed and Yue
Cao and Muhammad Khalid and Muhammad Arshad and Farhan
Ahmad and Haitham Cruickshank",
title = "A taxonomy on misbehaving nodes in delay tolerant
networks",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "442--471",
month = aug,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.04.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304681",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lyvas:2018:DDP,
author = "Christos Lyvas and Costas Lambrinoudakis and Dimitris
Geneiatakis",
title = "{Dypermin}: Dynamic permission mining framework for
{Android} platform",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "472--487",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304954",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2018:TPP,
author = "Zhaowei Hu and Jing Yang and Jianpei Zhang",
title = "Trajectory privacy protection method based on the time
interval divided",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "488--499",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304899",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Malina:2018:SET,
author = "Lukas Malina and Petr Dzurenda and Jan Hajny and
Zdenek Martinasek",
title = "Secure and efficient two-factor zero-knowledge
authentication solution for access control systems",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "500--513",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304942",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bag:2018:PAD,
author = "Samiran Bag and Muhammad Ajmal Azad and Feng Hao",
title = "A privacy-aware decentralized and personalized
reputation system",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "514--530",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304930",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alves:2018:VST,
author = "Thiago Alves and Rishabh Das and Aaron Werth and
Thomas Morris",
title = "Virtualization of {SCADA} testbeds for cybersecurity
research: a modular approach",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "531--546",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304905",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xia:2018:CGB,
author = "Xiaofang Xia and Yang Xiao and Wei Liang and Meng
Zheng",
title = "Coded grouping-based inspection algorithms to detect
malicious meters in neighborhood area smart grid",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "547--564",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304929",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Al-Safwani:2018:IDM,
author = "Nadher Al-Safwani and Yousef Fazea and Huda Ibrahim",
title = "{ISCP}: In-depth model for selecting critical security
controls",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "565--577",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305534",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rhode:2018:ESM,
author = "Matilda Rhode and Pete Burnap and Kevin Jones",
title = "Early-stage malware prediction using recurrent neural
networks",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "578--594",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305546",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beltran:2018:IAA,
author = "Marta Beltr{\'a}n",
title = "Identifying, authenticating and authorizing smart
objects and end users to cloud services in {Internet of
Things}",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "595--611",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301366",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2018:SSD,
author = "Li Yang and Teng Wei and Fengwei Zhang and Jianfeng
Ma",
title = "{SADUS}: Secure data deletion in user space for mobile
devices",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "612--626",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300683",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2018:UYU,
author = "Dan Lin and Nicholas Hilbert and Christian Storer and
Wei Jiang and Jianping Fan",
title = "{UFace}: Your universal password that no one can see",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "627--641",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302067",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jiang:2018:SCU,
author = "Jun Jiang and Bowei Xi and Murat Kantarcioglu",
title = "Spatial counts under differential privacy mechanism on
changing spatial scales",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "642--652",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302559",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mancuhan:2018:SVC,
author = "Koray Mancuhan and Chris Clifton",
title = "Support vector classification with $l$-diversity",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "653--665",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302791",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Darivandpour:2018:ESP,
author = "Javad Darivandpour and Mikhail J. Atallah",
title = "Efficient and secure pattern matching with wildcards
using lightweight cryptography",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "666--674",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830021X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paul:2018:ADC,
author = "Padma Polash Paul and Madeena Sultana and Sorin Adam
Matei and Marina Gavrilova",
title = "Authorship disambiguation in a collaborative editing
environment",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "675--693",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300294",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Grothoff:2018:TSN,
author = "Christian Grothoff and Matthias Wachs and Monika
Ermert and Jacob Appelbaum",
title = "Toward secure name resolution on the {Internet}",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "694--708",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300403",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chun:2018:PPP,
author = "Hu Chun and Kui Ren and Wei Jiang",
title = "Privacy-preserving power usage and supply control in
smart grid",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "709--719",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830049X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2018:SSR,
author = "Seulbae Kim and Heejo Lee",
title = "Software systems at risk: an empirical study of cloned
vulnerabilities in practice",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "720--736",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300944",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gu:2018:GTH,
author = "Zhongshu Gu and Brendan Saltaformaggio and Xiangyu
Zhang and Dongyan Xu",
title = "{$G$ emini}: Guest-transparent honey files via
hypervisor-level access redirection",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "737--744",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301433",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abouhogail:2018:NSP,
author = "Reham Abdellatif Abouhogail and Mohammed S. Gadelrab",
title = "A new secure and privacy preserved protocol for
{IEEE802.11s} networks",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "745--755",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817301992",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Black:2018:SSB,
author = "Paul Black and Iqbal Gondal and Robert Layton",
title = "A survey of similarities in banking malware
behaviours",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "756--772",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481730202X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rios:2018:MPA,
author = "Ruben Rios and Carmen Fernandez-Gago and Javier
Lopez",
title = "Modelling privacy-aware trust negotiations",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "773--789",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404817302043",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2018:MUP,
author = "Sungjin Kim and Jinkook Kim and Brent ByungHoon Kang",
title = "Malicious {URL} protection based on attackers'
habitual behavioral analysis",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "790--806",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300348",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weishaupl:2018:ISI,
author = "Eva Weish{\"a}upl and Emrah Yasasin and Guido
Schryen",
title = "Information security investments: an exploratory
multiple case study on decision-making, evaluation and
learning",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "807--823",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300555",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2018:DPC,
author = "Hojoon Lee and Minsu Kim and Yunheung Paek and Brent
Byunghoon Kang",
title = "A dynamic per-context verification of kernel address
integrity from external monitors",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "824--837",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301421",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Altabash:2018:ITD,
author = "Kholood {Al tabash} and Jassim Happa",
title = "Insider-threat detection using {Gaussian} Mixture
Models and Sensitivity Profiles",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "838--859",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Verkijika:2018:USS,
author = "Silas Formunyuy Verkijika",
title = "Understanding smartphone security behaviors: an
extension of the protection motivation theory with
anticipated regret",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "860--870",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ni:2018:MIU,
author = "Sang Ni and Quan Qian and Rui Zhang",
title = "Malware identification using visualization images and
deep learning",
journal = j-COMPUT-SECUR,
volume = "77",
number = "??",
pages = "871--885",
month = aug,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:55 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303481",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:CSEa,
author = "Anonymous",
title = "Computers and Security Editorial Board",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "ii--iii",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nyang:2018:TTP,
author = "DaeHun Nyang and Hyoungshick Kim and Woojoo Lee and
Sung-bae Kang and Geumhwan Cho and Mun-Kyu Lee and Aziz
Mohaisen",
title = "{Two-Thumbs-Up}: Physical protection for {PIN} entry
secure against recording attacks",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "1--15",
month = sep,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.05.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305789",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PS,
author = "Anonymous",
title = "Pages 1--490 ({September 2018})",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "1--490",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Viegas:2018:REE,
author = "Eduardo Viegas and Altair Santin and Luiz Oliveira and
Andr{\'e} Fran{\c{c}}a and Ricardo Jasinski and Volnei
Pedroni",
title = "A reliable and energy-efficient classifier combination
scheme for intrusion detection in embedded systems",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "16--32",
month = sep,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.05.014",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306175",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dalmazo:2018:TSM,
author = "Bruno L. Dalmazo and Jo{\~a}o P. Vilela and Marilia
Curado",
title = "Triple-Similarity Mechanism for alarm management in
the cloud",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "33--42",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Beuran:2018:IFH,
author = "Razvan Beuran and Dat Tang and Cuong Pham and Ken-ichi
Chinen and Yasuo Tan and Yoichi Shinoda",
title = "Integrated framework for hands-on cybersecurity
training: {CyTrONE}",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "43--59",
month = sep,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.06.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2018:PPM,
author = "Huu Hiep Nguyen",
title = "Privacy-preserving mechanisms for k-modes clustering",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "60--75",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304218",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanderWalt:2018:CSI,
author = "Estee van der Walt and J. H. P. Eloff and Jacomine
Grobler",
title = "Cyber-security: Identity deception detection on social
media platforms",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "76--89",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moreno-Sanchez:2018:CEI,
author = "Pedro Moreno-Sanchez and Uzair Mahmood and Aniket
Kate",
title = "{ClearChart}: Ensuring integrity of consumer ratings
in online marketplaces",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "90--102",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304401",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Myers:2018:ADI,
author = "David Myers and Suriadi Suriadi and Kenneth Radke and
Ernest Foo",
title = "Anomaly detection for industrial control systems using
process mining",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "103--125",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306795",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hammi:2018:BTD,
author = "Mohamed Tahar Hammi and Badis Hammi and Patrick Bellot
and Ahmed Serhrouchni",
title = "Bubbles of Trust: a decentralized blockchain-based
authentication system for {IoT}",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "126--142",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300890",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chong:2018:IPP,
author = "Isis Chong and Huangyi Ge and Ninghui Li and Robert W.
Proctor",
title = "Influence of privacy priming and security framing on
mobile app selection",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "143--154",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Habler:2018:ULE,
author = "Edan Habler and Asaf Shabtai",
title = "Using {LSTM} encoder-decoder algorithm for detecting
anomalous {ADS-B} messages",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "155--173",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303729",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2018:TBU,
author = "Toan Nguyen and Nasir Memon",
title = "Tap-based user authentication for smartwatches",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "174--186",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303778",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{SanMiguelCarrasco:2018:UID,
author = "Rafael {San Miguel Carrasco} and Miguel-Angel
Sicilia",
title = "Unsupervised intrusion detection through skip-gram
models of network behavior",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "187--197",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302700",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Renaud:2018:RCS,
author = "Karen Renaud and Stephen Flowerday and Merrill
Warkentin and Paul Cockshott and Craig Orgeron",
title = "Is the responsibilization of the cyber security risk
reasonable and judicious?",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "198--211",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303262",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jin:2018:TLI,
author = "Lei Jin and Chao Li and Balaji Palanisamy and James
Joshi",
title = "{$k$-Trustee}: Location injection attack-resilient
anonymization for location privacy",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "212--230",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305200",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wu:2018:CPI,
author = "Zezhi Wu and Xingyuan Chen and Xuehui Du and Zhi
Yang",
title = "{CDroid}: practically implementation a formal-analyzed
{CIFC} model on {Android}",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "231--244",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307776",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shams:2018:TAS,
author = "Erfan A. Shams and Ahmet Rizaner and Ali Hakan
Ulusoy",
title = "Trust aware support vector machine intrusion detection
and prevention system in vehicular ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "245--254",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307569",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guerar:2018:ICU,
author = "Meriem Guerar and Alessio Merlo and Mauro Migliardi
and Francesco Palmieri",
title = "Invisible {CAPPCHA}: a usable mechanism to distinguish
between malware and humans on the mobile {IoT}",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "255--266",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2018:SEB,
author = "Lixiang Shen and Dejun Mu and Guo Cao and Maoyuan Qin
and Jeremy Blackstone and Ryan Kastner",
title = "Symbolic execution based test-patterns generation
algorithm for hardware {Trojan} detection",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "267--280",
month = sep,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.07.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305352",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2018:TSS,
author = "Qiao Hu and Jingyi Zhang and Aikaterini Mitrokotsa and
Gerhard Hancke",
title = "Tangible security: Survey of methods supporting secure
ad-hoc connects of edge devices with physical context",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "281--300",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307739",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Geetha:2018:OVC,
author = "P. Geetha and V. S. Jayanthi and A. N. Jayanthi",
title = "Optimal visual cryptographic scheme with multiple
share creation for multimedia applications",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "301--320",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308241",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tripathy:2018:RBS,
author = "Bata Krishna Tripathy and Debi Prasad Das and Swagat
Kumar Jena and Padmalochan Bera",
title = "Risk based Security Enforcement in Software Defined
Network",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "321--335",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301913",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yao:2018:KMA,
author = "Mei-Ling Yao and Ming-Chuen Chuang and Chun-Cheng
Hsu",
title = "The Kano model analysis of features for mobile
security applications",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "336--346",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303341",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Haq:2018:MLW,
author = "Irfan {Ul Haq} and Sergio Chica and Juan Caballero and
Somesh Jha",
title = "Malware lineage in the wild",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "347--363",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308605",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alves:2018:OIC,
author = "Thiago Alves and Thomas Morris",
title = "{OpenPLC}: an {IEC} 61,131-3 compliant open source
industrial controller for cyber security research",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "364--379",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305388",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kwon:2018:FSE,
author = "Hyun Kwon and Yongchul Kim and Ki-Woong Park and
Hyunsoo Yoon and Daeseon Choi",
title = "Friend-safe evasion attack: an adversarial example
that is correctly recognized by a friendly classifier",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "380--397",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308770",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heartfield:2018:TCP,
author = "Ryan Heartfield and George Loukas and Sanja Budimir
and Anatolij Bezemskij and Johnny R. J. Fontaine and
Avgoustinos Filippoupolitis and Etienne Roesch",
title = "A taxonomy of cyber-physical threats and impact in the
smart home",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "398--428",
month = sep,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.07.011",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304875",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Navarro:2018:LOM,
author = "Luiz C. Navarro and Alexandre K. W. Navarro and
Andr{\'e} Gr{\'e}gio and Anderson Rocha and Ricardo
Dahab",
title = "Leveraging ontologies and machine-learning techniques
for malware analysis into {Android} permissions
ecosystems",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "429--453",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bottarelli:2018:PCW,
author = "Mirko Bottarelli and Gregory Epiphaniou and Dhouha
Kbaier {Ben Ismail} and Petros Karadimas and Haider
Al-Khateeb",
title = "Physical characteristics of wireless communication
channels for secret key establishment: a survey of the
research",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "454--476",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300841",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anthi:2018:ESA,
author = "Eirini Anthi and Shazaib Ahmad and Omer Rana and
George Theodorakopoulos and Pete Burnap",
title = "{EclipseIoT}: a secure and adaptive hub for the
{Internet of Things}",
journal = j-COMPUT-SECUR,
volume = "78",
number = "??",
pages = "477--490",
month = sep,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:CSEb,
author = "Anonymous",
title = "Computers and Security Editorial Board",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "ii--iii",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310812",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:A,
author = "Anonymous",
title = "Announcement",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "iv--iv",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azad:2018:MRR,
author = "Muhammad Ajmal Azad and Samiran Bag and Feng Hao and
Khaled Salah",
title = "{M2M-REP}: Reputation system for machines in the
{Internet of Things}",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "1--16",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2018:PN,
author = "Anonymous",
title = "Pages 1--208 ({November 2018})",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "1--208",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schmidt:2018:EIT,
author = "Sabine Schmidt and Wojciech Mazurczyk and Radoslaw
Kulesza and J{\"o}rg Keller and Luca Caviglione",
title = "Exploiting {IP} telephony with silence suppression for
hidden data transfers",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "17--32",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305777",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hong:2018:DSM,
author = "Jin B. Hong and Simon Yusuf Enoch and Dong Seong Kim
and Armstrong Nhlabatsi and Noora Fetais and Khaled M.
Khan",
title = "Dynamic security metrics for measuring the
effectiveness of moving target defense techniques",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "33--52",
month = nov,
year = "2018",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.08.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304449",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Krzywiecki:2018:POD,
author = "Lukasz Krzywiecki and Kamil Kluczniak and Patryk
Kozie{\l} and Nisha Panwar",
title = "Privacy-oriented dependency via deniable {SIGMA}
protocol",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "53--67",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301962",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Torten:2018:ISA,
author = "Ron Torten and Carmen Reaiche and Stephen Boyle",
title = "The impact of security awareness on information
technology professionals' behavior",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "68--79",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304656",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Signes-Pont:2018:MMP,
author = "Mar{\'\i}a Teresa Signes-Pont and Antonio
Cort{\'e}s-Castillo and Higinio Mora-Mora and Julian
Szymanski",
title = "Modelling the malware propagation in mobile computer
devices",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "80--93",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302773",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Landauer:2018:DLF,
author = "Max Landauer and Markus Wurzenberger and Florian
Skopik and Giuseppe Settanni and Peter Filzmoser",
title = "Dynamic log file analysis: an unsupervised cluster
evolution approach for anomaly detection",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "94--116",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lallie:2018:EPC,
author = "Harjinder Singh Lallie and Kurt Debattista and Jay
Bal",
title = "Evaluating practitioner cyber-security attack graph
configuration preferences",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "117--131",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306163",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mamolar:2018:TTD,
author = "Ana Serrano Mamolar and Zeeshan Pervez and Jose M.
Alcaraz Calero and Asad Masood Khattak",
title = "Towards the transversal detection of {DDoS} network
attacks in {5G} multi-tenant overlay networks",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "132--147",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cid-Fuentes:2018:AFD,
author = "Javier {\'A}lvarez Cid-Fuentes and Claudia Szabo and
Katrina Falkner",
title = "An adaptive framework for the detection of novel
botnets",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "148--161",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309805",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Conti:2018:ESR,
author = "Mauro Conti and Ankit Gangwal and Sushmita Ruj",
title = "On the economic significance of ransomware campaigns:
a {Bitcoin} transactions perspective",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "162--189",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304334",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hong:2018:PBI,
author = "Sanghyun Hong and Alina Nicolae and Abhinav Srivastava
and Tudor Dumitras",
title = "{Peek-a-boo}: Inferring program behaviors in a
virtualized infrastructure without introspection",
journal = j-COMPUT-SECUR,
volume = "79",
number = "??",
pages = "190--207",
month = nov,
year = "2018",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:57 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830244X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:CSE,
author = "Anonymous",
title = "Computers and Security Editorial Board",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "ii--iii",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312434",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Samarasinghe:2019:ALT,
author = "Nayanamana Samarasinghe and Mohammad Mannan",
title = "Another look at {TLS} ecosystems in networked devices
vs. {Web} servers",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "1--13",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306916",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PJa,
author = "Anonymous",
title = "Pages 1--334 ({January 2019})",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "1--334",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2019:SAN,
author = "Lu Zhou and Jiageng Chen and Yidan Zhang and Chunhua
Su and Marino Anthony James",
title = "Security analysis and new models on the intelligent
symmetric key encryption",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "14--24",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309647",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Marett:2019:QTA,
author = "Kent Marett and Ali Vedadi and Alexandra Durcikova",
title = "A quantitative textual analysis of three types of
threat communication and subsequent maladaptive
responses",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "25--35",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308629",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nadler:2019:DML,
author = "Asaf Nadler and Avi Aminov and Asaf Shabtai",
title = "Detection of malicious and low throughput data
exfiltration over the {DNS} protocol",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "36--53",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304000",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wijayarathna:2019:WJC,
author = "Chamila Wijayarathna and Nalin Asanka Gamagedara
Arachchilage",
title = "Why {Johnny} can't develop a secure application? {A}
usability analysis of {Java Secure Socket Extension
API}",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "54--73",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304887",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Evans:2019:HNT,
author = "Mark Evans and Ying He and Leandros Maglaras and Helge
Janicke",
title = "{HEART}-{IS}: a novel technique for evaluating human
error-related information security incidents",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "74--89",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301615",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2019:WHC,
author = "Ximing Liu and Yingjiu Li and Robert H. Deng and Bing
Chang and Shujun Li",
title = "When Human cognitive modeling meets {PINs}:
User-independent inter-keystroke timing attacks",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "90--107",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302736",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sillic:2019:CIO,
author = "Mario Sillic",
title = "Critical impact of organizational and individual
inertia in explaining non-compliant security behavior
in the Shadow {IT} context",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "108--119",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306114",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2019:SEF,
author = "Li Zhang and Vrizlynn L. L. Thing and Yao Cheng",
title = "A scalable and extensible framework for {Android}
malware detection and family attribution",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "120--133",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830419X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2019:SCE,
author = "Dong Li and Huaqun Guo and Jianying Zhou and Luying
Zhou and Jun Wen Wong",
title = "{SCADAWall}: a {CPI}-enabled firewall model for
{SCADA} security",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "134--154",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paladi:2019:SAC,
author = "Nicolae Paladi and Christian Gehrmann",
title = "{SDN} Access Control for the Masses",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "155--172",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2019:ESE,
author = "Jaemin Park and Sungjin Park and Brent Byunghoon Kang
and Kwangjo Kim",
title = "{eMotion}: an {SGX} extension for migrating enclaves",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "173--185",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304279",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheminod:2019:CAA,
author = "Manuel Cheminod and Luca Durante and Lucia Seno and
Fulvio Valenza and Adriano Valenzano",
title = "A comprehensive approach to the automatic refinement
and verification of access control policies",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "186--199",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303870",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zeng:2019:ESL,
author = "Jianping Zeng and Jiangjiao Duan and Chengrong Wu",
title = "Empirical study on lexical sentiment in passwords from
{Chinese} websites",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "200--210",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307028",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rajab:2019:EEP,
author = "Majed Rajab and Ali Eydgahi",
title = "Evaluating the explanatory power of theoretical
frameworks on intention to comply with information
security policies in higher education",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "211--223",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311325",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Naicker:2019:ECM,
author = "V. Naicker and M. Mafaiti",
title = "The establishment of collaboration in managing
information security through multisourcing",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "224--237",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303067",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gonzalez-Manzano:2019:DRO,
author = "Lorena Gonz{\'a}lez-Manzano and Jose M. de Fuentes",
title = "Design recommendations for online cybersecurity
courses",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "238--256",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302050",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tang:2019:SAA,
author = "Zhushou Tang and Minhui Xue and Guozhu Meng and
Chengguo Ying and Yugeng Liu and Jianan He and Haojin
Zhu and Yang Liu",
title = "Securing {Android} applications via edge assistant
third-party library detection",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "257--272",
month = jan,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.07.024",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311301",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2019:FMS,
author = "Jie Zhang and Zhanyong Tang and Meng Li and Dingyi
Fang and Xiaojiang Chen and Zheng Wang",
title = "Find me a safe zone: a countermeasure for channel
state information based attacks",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "273--290",
month = jan,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.09.017",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guan:2019:DAI,
author = "Chong Guan and Kun Sun and Lingguang Lei and Pingjian
Wang and Yuewu Wang and Wei Chen",
title = "{DangerNeighbor} attack: Information leakage via
{postMessage} mechanism in {HTML5}",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "291--305",
month = jan,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.09.010",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308484",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gratian:2019:IIU,
author = "Margaret Gratian and Darshan Bhansali and Michel
Cukier and Josiah Dykstra",
title = "Identifying infected users via network traffic",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "306--316",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306680",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bui:2019:GEA,
author = "Thang Bui and Scott D. Stoller and Jiajie Li",
title = "Greedy and evolutionary algorithms for mining
relationship-based access control policies",
journal = j-COMPUT-SECUR,
volume = "80",
number = "??",
pages = "317--333",
month = jan,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:58 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304565",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:RA,
author = "Anonymous",
title = "Reviewer Acknowledgment",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "i--v",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314639",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "ii--iii",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314585",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mousavi:2019:CCB,
author = "Nima Mousavi and Mahesh Tripunitara",
title = "Constructing cascade {Bloom} filters for efficient
access enforcement",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "1--14",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PMa,
author = "Anonymous",
title = "Pages 1--184 ({March 2019})",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "1--184",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2019:RCC,
author = "Yu-Guang Yang and Xue-Pei Guo and Gang Xu and Xiu-Bo
Chen and Jian Li and Yi-Hua Zhou and Wei-Min Shi",
title = "Reducing the communication complexity of quantum
private database queries by subtle classical
post-processing with relaxed quantum ability",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "15--24",
month = mar,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.08.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311234",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sabottke:2019:HTB,
author = "Carl Sabottke and Daniel Chen and Lucas Layman and
Tudor Dumitras",
title = "How to trick the {Borg}: threat models against manual
and automated techniques for detecting network
attacks",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "25--40",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311283",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hadlington:2019:ERW,
author = "Lee Hadlington and Masa Popovac and Helge Janicke and
Iryna Yevseyeva and Kevin Jones",
title = "Exploring the role of work identity and work locus of
control in information security awareness",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "41--48",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308897",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pellet:2019:LSN,
author = "Hector Pellet and Stavros Shiaeles and Stavros
Stavrou",
title = "Localising social network users and profiling their
movement",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "49--57",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301524",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Du:2019:SPA,
author = "Shaoyong Du and Jingyu Hua and Sheng Zhong",
title = "Securing peer-assisted indoor localization leveraging
acoustic ranging",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "58--77",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312392",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tan:2019:MMT,
author = "Hailun Tan and Gene Tsudik and Sanjay Jha",
title = "{MTRA}: Multi-Tier randomized remote attestation in
{IoT} networks",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "78--93",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307697",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2019:DAT,
author = "Ye Wang and Qingbao Li and Ping Zhang and Zhifeng Chen
and Guimin Zhang",
title = "{DOPdefender}: an approach to thwarting data-oriented
programming attacks based on a data-aware automaton",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "94--106",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830659X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hammad:2019:PSF,
author = "Mohamed Hammad and Kuanquan Wang",
title = "Parallel score fusion of {ECG} and fingerprint for
human authentication based on convolution neural
network",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "107--122",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308411",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ucci:2019:SML,
author = "Daniele Ucci and Leonardo Aniello and Roberto
Baldoni",
title = "Survey of machine learning techniques for malware
analysis",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "123--147",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303808",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{B:2019:FAB,
author = "Selvakumar B. and Muneeswaran K.",
title = "Firefly algorithm based feature selection for network
intrusion detection",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "148--155",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303936",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Do:2019:RAM,
author = "Quang Do and Ben Martini and Kim-Kwang Raymond Choo",
title = "The role of the adversary model in applied security
research",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "156--181",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2019:E,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "81",
number = "??",
pages = "182--183",
month = mar,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314548",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "ii--iii",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300379",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Qiu:2019:CPT,
author = "Jian Qiu and Hengjian Li and Chuan Zhao",
title = "Cancelable palmprint templates based on random
measurement and noise data for security and
privacy-preserving authentication",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "1--14",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PMb,
author = "Anonymous",
title = "Pages 1--328 ({May 2019})",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "1--328",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guri:2019:AJC,
author = "Mordechai Guri and Dima Bykhovsky",
title = "{aIR-Jumper}: Covert air-gap exfiltration\slash
infiltration via security cameras and infrared {(IR)}",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "15--29",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307193",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2019:TPA,
author = "Jinyan Wang and Chen Liu and Xingcheng Fu and Xudong
Luo and Xianxian Li",
title = "A three-phase approach to differentially private
crucial patterns mining over data streams",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "30--48",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Woo:2019:DEC,
author = "Simon S. Woo",
title = "Design and evaluation of {$3$D CAPTCHAs}",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "49--67",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301238",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2019:IID,
author = "Dong Wang and Zhengquan Xu",
title = "Impact of inaccurate data on Differential Privacy",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "68--79",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304747",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Opasiak:2019:SAD,
author = "Krzysztof Opasiak and Wojciech Mazurczyk",
title = "(In)Secure {Android} Debugging: Security analysis and
lessons learned",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "80--98",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831023X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmed:2019:OPS,
author = "Idrees Ahmed and Abid Khan and Mansoor Ahmed and Saif
ur Rehman",
title = "Order preserving secure provenance scheme for
distributed networks",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "99--117",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306667",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2019:SLF,
author = "Deokjin Kim and Daehee Jang and Minjoon Park and
Yunjong Jeong and Jonghwan Kim and Seokjin Choi and
Brent Byunghoon Kang",
title = "{SGX}-{LEGO}: Fine-grained {SGX} controlled-channel
attack and its countermeasure",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "118--139",
month = may,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.12.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302347",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sauerwein:2019:ACP,
author = "Clemens Sauerwein and Irdin Pekaric and Michael
Felderer and Ruth Breu",
title = "An analysis and classification of public information
security data sources used in research and practice",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "140--155",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304978",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ring:2019:FBN,
author = "Markus Ring and Daniel Schl{\"o}r and Dieter Landes
and Andreas Hotho",
title = "Flow-based network traffic generation using Generative
Adversarial Networks",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "156--172",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308393",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Peng:2019:SIP,
author = "Fei Peng and Jing Yang and Zi-Xing Lin and Min Long",
title = "Source identification of {$3$D} printed objects based
on inherent equipment distortion",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "173--183",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lv:2019:ACD,
author = "Denglong Lv and Shibing Zhu",
title = "Achieving correlated differential privacy of big data
publication",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "184--195",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830289X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ibrahim:2019:TCC,
author = "Fady A. M. Ibrahim and Elsayed E. Hemayed",
title = "Trusted Cloud Computing Architectures for
infrastructure as a service: Survey and systematic
literature review",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "196--226",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302712",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Firoozjaei:2019:TOO,
author = "Mahdi Daghmehchi Firoozjaei and MinChang Kim and
JaeSeung Song and Hyoungshick Kim",
title = "{$ O^2 $ TR}: Offline {OTR} messaging system under
network disruption",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "227--240",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Renaud:2019:WCM,
author = "Karen Renaud and Robert Otondo and Merrill Warkentin",
title = "``{This} is the way `{I}' create my passwords''
\ldots{} does the endowment effect deter people from
changing the way they create their passwords?",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "241--260",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830909X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2019:ELA,
author = "Yun Zhou and Peichao Wang",
title = "An ensemble learning approach for {XSS} attack
detection with domain knowledge and threat
intelligence",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "261--269",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306370",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Henriksen-Bulmer:2019:PRA,
author = "Jane Henriksen-Bulmer and Shamal Faily and Sheridan
Jeary",
title = "Privacy risk assessment in context: a meta-model based
on contextual integrity",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "270--283",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301998",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{David:2019:EDF,
author = "Jisa David and Ciza Thomas",
title = "Efficient {DDoS} flood attack detection using dynamic
thresholding on flow-based network traffic",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "284--295",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307624",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gal-Oz:2019:MMR,
author = "Nurit Gal-Oz and Yaron Gonen and Ehud Gudes",
title = "Mining meaningful and rare roles from web application
usage patterns",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "296--313",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301202",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Milosevic:2019:TAP,
author = "Jelena Milosevic and Miroslaw Malek and Alberto
Ferrante",
title = "Time, accuracy and power consumption tradeoff in
mobile malware detection systems",
journal = j-COMPUT-SECUR,
volume = "82",
number = "??",
pages = "314--328",
month = may,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:59 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307880",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "ii--iii",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300793",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bock:2019:ADS,
author = "Leon B{\"o}ck and Emmanouil Vasilomanolakis and Jan
Helge Wolf and Max M{\"u}hlh{\"a}user",
title = "Autonomously detecting sensors in fully distributed
botnets",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "1--13",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312094",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PJb,
author = "Anonymous",
title = "Pages 1--406 ({June 2019})",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "1--406",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yadav:2019:EAM,
author = "Ram Mahesh Yadav",
title = "Effective analysis of malware detection in cloud
computing",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "14--21",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304012",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsakalidis:2019:CIA,
author = "George Tsakalidis and Kostas Vergidis and Sophia
Petridou and Maro Vlachopoulou",
title = "A cybercrime incident architecture with adaptive
response policy",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "22--37",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308150",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lopez:2019:ACU,
author = "Alberto Urue{\~n}a L{\'o}pez and Fernando Mateo and
Julio Nav{\'{\i}}o-Marco and Jos{\'e} Mar{\'{\i}}a
Mart{\'{\i}}nez-Mart{\'{\i}}nez and Juan
G{\'o}mez-Sanch{\'{\i}}s and Joan Vila-Franc{\'e}s and
Antonio Jos{\'e} Serrano-L{\'o}pez",
title = "Analysis of computer user behavior, security incidents
and fraud using Self-Organizing Maps",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "38--51",
month = jun,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.01.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300828",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sindiren:2019:AMP,
author = "Erhan Sindiren and B{\"u}nyamin Ciylan",
title = "Application model for privileged account access
control system in enterprise networks",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "52--67",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304395",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Akilal:2019:VFR,
author = "Karim Akilal and Hachem Slimani and Mawloud Omar",
title = "A very fast and robust trust inference algorithm in
weighted signed social networks using controversy,
eclecticism, and reciprocity",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "68--78",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308708",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2019:SCC,
author = "Jinsoo Jang and Brent Byunghoon Kang",
title = "Securing a communication channel for the trusted
execution environment",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "79--92",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kaghazgaran:2019:CEP,
author = "Parisa Kaghazgaran and Hassan Takabi and Flannery Hope
Currin and Armando Soriano",
title = "Communication-efficient private distance calculation
based on oblivious transfer extensions",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "93--105",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yu:2019:ABC,
author = "Feng Yu and Qiang Liu and Shu Wu and Liang Wang and
Tieniu Tan",
title = "Attention-based convolutional approach for
misinformation identification from massive and noisy
microblog posts",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "106--121",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303997",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gupta:2019:DRB,
author = "Sandeep Gupta and Attaullah Buriro and Bruno Crispo",
title = "{DriverAuth}: a risk-based multi-modal biometric-based
driver authentication scheme for ride-sharing
platforms",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "122--139",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Smith-Creasey:2019:NWI,
author = "Max Smith-Creasey and Muttukrishnan Rajarajan",
title = "A novel word-independent gesture-typing continuous
authentication scheme for mobile devices",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "140--150",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mhenni:2019:DSA,
author = "Abir Mhenni and Estelle Cherrier and Christophe
Rosenberger and Najoua Essoukri {Ben Amara}",
title = "Double serial adaptation mechanism for keystroke
dynamics authentication based on a single password",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "151--166",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306059",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Senavirathne:2019:IPM,
author = "Navoda Senavirathne and Vicen{\c{c}} Torra",
title = "Integrally private model selection for decision
trees",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "167--181",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2019:RAE,
author = "Daehee Jang and Yunjong Jeong and Sungman Lee and
Minjoon Park and Kuenhwan Kwak and Donguk Kim and Brent
Byunghoon Kang",
title = "Rethinking anti-emulation techniques for large-scale
software deployment",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "182--200",
month = jun,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.02.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310216",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liew:2019:ESA,
author = "Seow Wooi Liew and Nor Fazlida Mohd Sani and Mohd.
Taufik Abdullah and Razali Yaakob and Mohd Yunus
Sharum",
title = "An effective security alert mechanism for real-time
phishing tweet detection on {Twitter}",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "201--207",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Han:2019:MDE,
author = "Weijie Han and Jingfeng Xue and Yong Wang and Lu Huang
and Zixiao Kong and Limin Mao",
title = "{MalDAE}: Detecting and explaining malware based on
correlation and fusion of static and dynamic
characteristics",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "208--233",
month = jun,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.02.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831246X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gottwalt:2019:CFS,
author = "Florian Gottwalt and Elizabeth Chang and Tharam
Dillon",
title = "{CorrCorr}: a feature selection method for
multivariate correlation network anomaly detection
techniques",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "234--245",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818306485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rao:2019:JPI,
author = "Routhu Srinivasa Rao and Alwyn Roshan Pais",
title = "{Jail-Phish}: an improved search engine based phishing
detection system",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "246--267",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304280",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chondros:2019:DEE,
author = "Nikos Chondros and Bingsheng Zhang and Thomas
Zacharias and Panos Diamantopoulos and Stathis Maneas
and Christos Patsonakis and Alex Delis and Aggelos
Kiayias and Mema Roussopoulos",
title = "Distributed, end-to-end verifiable, and
privacy-preserving {Internet} voting systems",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "268--299",
month = jun,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.03.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310290",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Odelu:2019:EPP,
author = "Vanga Odelu and Sourav Saha and Rajendra Prasath and
Lakshminarayana Sadineni and Mauro Conti and Minho Jo",
title = "Efficient privacy preserving device authentication in
{WBANs} for industrial e-health applications",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "300--312",
month = jun,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.03.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308204",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vitunskaite:2019:SCC,
author = "Morta Vitunskaite and Ying He and Thomas Brandstetter
and Helge Janicke",
title = "Smart cities and cyber security: Are we there yet?A
comparative study on the role of standards, third party
risk management and security ownership",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "313--331",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310423",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hatamian:2019:RUM,
author = "Majid Hatamian and Jetzabel Serna and Kai Rannenberg",
title = "Revealing the unrevealed: Mining smartphone users
privacy perception on app markets",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "332--353",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313051",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hatfield:2019:VHH,
author = "Joseph M. Hatfield",
title = "Virtuous human hacking: the ethics of social
engineering in penetration-testing",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "354--366",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831174X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Axon:2019:HAN,
author = "Louise Axon and Jassim Happa and Michael Goldsmith and
Sadie Creese",
title = "Hearing attacks in network data: an effectiveness
study",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "367--388",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303377",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jain:2019:EDD,
author = "Vineeta Jain and Vijay Laxmi and Manoj Singh Gaur and
Mohamed Mosbah",
title = "{ETGuard}: Detecting {D2D} attacks using wireless
{Evil Twins}",
journal = j-COMPUT-SECUR,
volume = "83",
number = "??",
pages = "389--405",
month = jun,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310708",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "ii--iii",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301014",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Navas:2019:UMO,
author = "Jorge Navas and Marta Beltr{\'a}n",
title = "Understanding and mitigating {OpenID} Connect
threats",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "1--16",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312781",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PJc,
author = "Anonymous",
title = "Pages 1--402 ({July 2019})",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "1--402",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2019:PPF,
author = "Shaoxin Li and Nankun Mu and Junqing Le and Xiaofeng
Liao",
title = "Privacy preserving frequent itemset mining: Maximizing
data utility based on database reconstruction",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "17--34",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302748",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nurain:2019:PAI,
author = "Novia Nurain and Suraiya Tairin and Taslim Arefin Khan
and Shahad Ishraq and A. B. M. Alim {Al Islam}",
title = "Power attack: an imminent security threat in real-time
system for detecting missing rail blocks in developing
countries",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "35--52",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiong:2019:TMS,
author = "Wenjun Xiong and Robert Lagerstr{\"o}m",
title = "Threat modeling --- a systematic literature review",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "53--69",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307478",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sharafaldin:2019:EFN,
author = "Iman Sharafaldin and Arash Habibi Lashkari and Ali A.
Ghorbani",
title = "An evaluation framework for network security
visualizations",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "70--92",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308952",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DiFrancescoMaesa:2019:BBA,
author = "Damiano {Di Francesco Maesa} and Paolo Mori and Laura
Ricci",
title = "A blockchain based approach for the definition of
auditable Access Control systems",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "93--119",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309398",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luh:2019:ADC,
author = "Robert Luh and Helge Janicke and Sebastian
Schrittwieser",
title = "{AIDIS}: Detecting and classifying anomalous behavior
in ubiquitous kernel processes",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "120--147",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314457",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sultan:2019:PPM,
author = "Sari Sultan",
title = "Privacy-preserving metering in smart grid for billing,
operational metering, and incentive-based schemes: a
survey",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "148--165",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303675",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhanwei:2019:ADM,
author = "Song Zhanwei and Liu Zenghui",
title = "Abnormal detection method of industrial control system
based on behavior model",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "166--178",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gezer:2019:FBA,
author = "Ali Gezer and Gary Warner and Clifford Wilson and
Prakash Shrestha",
title = "A flow-based approach for {Trickbot} banking {Trojan}
detection",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "179--192",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309568",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chakraborty:2019:TIP,
author = "Nilesh Chakraborty and Vijay S. Anand and Samrat
Mondal",
title = "Towards identifying and preventing behavioral side
channel attack on recording attack resilient unaided
authentication services",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "193--205",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302062",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2019:EPH,
author = "Christoforos Ntantogian and Stefanos Malliaros and
Christos Xenakis",
title = "Evaluation of password hashing schemes in open source
web platforms",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "206--224",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308332",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kalech:2019:CAD,
author = "Meir Kalech",
title = "Cyber-attack detection in {SCADA} systems using
temporal pattern recognition techniques",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "225--238",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307594",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jones:2019:SDR,
author = "A. Jones and O. Angelopoulou and L. Noriega",
title = "Survey of data remaining on second hand memory cards
in the {UK}",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "239--243",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307077",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rashidibajgan:2019:PPH,
author = "Samaneh Rashidibajgan and Robin Doss",
title = "Privacy-preserving history-based routing in
Opportunistic Networks",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "244--255",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312148",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2019:KBC,
author = "Yan Ding and Nurbol Luktarhan and Keqin Li and Wushour
Slamu",
title = "A keyword-based combination approach for detecting
phishing webpages",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "256--275",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300707",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fadolalkarim:2019:PAP,
author = "Daren Fadolalkarim and Elisa Bertino",
title = "{A-PANDDE}: Advanced Provenance-based {ANomaly}
Detection of Data Exfiltration",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "276--287",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300823",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolar:2019:MSD,
author = "Martin Kolar and Carmen Fernandez-Gago and Javier
Lopez",
title = "A model specification for the design of trust
negotiations",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "288--300",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310484",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rahman:2019:SDA,
author = "Mohammad Ashiqur Rahman and Amarjit Datta and Ehab
Al-Shaer",
title = "Security design against stealthy attacks on power
system state estimation: a formal approach",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "301--317",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300725",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xu:2019:LPI,
author = "Zhou Xu and Yaping Lin and Voundi Koe Arthur Sandor
and Zhisheng Huang and Xinbo Liu",
title = "A lightweight privacy and integrity preserving range
query scheme for mobile cloud computing",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "318--333",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2019:KPT,
author = "Toan Nguyen and Aditi Roy and Nasir Memon",
title = "Kid on the phone! {Toward} automatic detection of
children on mobile devices",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "334--348",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303407",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhong:2019:SLS,
author = "Lin Zhong and Qianhong Wu and Jan Xie and Zhenyu Guan
and Bo Qin",
title = "A secure large-scale instant payment system based on
blockchain",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "349--364",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831407X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lu:2019:DFB,
author = "Tingting Lu and Junfeng Wang",
title = "Data-flow bending: On the effectiveness of data-flow
integrity",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "365--375",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312604",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2019:FHM,
author = "Jixin Zhang and Zheng Qin and Hui Yin and Lu Ou and
Kehuan Zhang",
title = "A feature-hybrid malware variants detection using
{CNN} based opcode embedding and {BPNN} based {API}
embedding",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "376--392",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312902",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jiang:2019:PPW,
author = "Han Jiang and Hao Wang and Zhihua Zheng and Qiuliang
Xu",
title = "Privacy preserved wireless sensor location protocols
based on mobile edge computing",
journal = j-COMPUT-SECUR,
volume = "84",
number = "??",
pages = "393--401",
month = jul,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:00 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311295",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "ii--iii",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301282",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ibrahim:2019:RAM,
author = "Tahir Musa Ibrahim and Shafi'i Muhammad Abdulhamid and
Ala Abdusalam Alarood and Haruna Chiroma and Mohammed
Ali Al-garadi and Nadim Rana and Amina Nuhu Muhammad
and Adamu Abubakar and Khalid Haruna and Lubna A.
Gabralla",
title = "Recent advances in mobile touch screen security
authentication methods: a systematic literature
review",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "1--24",
month = aug,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.04.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818305030",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PA,
author = "Anonymous",
title = "Pages 1--452 ({August 2019})",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "1--452",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Badhani:2019:CCE,
author = "Shikha Badhani and Sunil K. Muttoo",
title = "{CENDroid} --- a cluster-ensemble classifier for
detecting malicious {Android} applications",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "25--40",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300872",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ye:2019:ESM,
author = "Bei Ye and Yajun Guo and Lei Zhang and Xiaowei Guo",
title = "An empirical study of mnemonic password creation
tips",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "41--50",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300884",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2019:FCB,
author = "Luying Zhou and Huaqun Guo and Gelei Deng",
title = "A fog computing based approach to {DDoS} mitigation in
{IIoT} systems",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "51--62",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tan:2019:OSS,
author = "Jing-lei Tan and Cheng Lei and Hong-qi Zhang and
Yu-qiao Cheng",
title = "Optimal strategy selection approach to moving target
defense based on {Markov} robust game",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "63--76",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313919",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xu:2019:DMD,
author = "Congyuan Xu and Jizhong Shen and Xin Du",
title = "Detection method of domain names generated by {DGAs}
based on semantic representation and deep neural
network",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "77--88",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312938",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2019:PGP,
author = "Jinyin Chen and Mengmeng Su and Shijing Shen and Hui
Xiong and Haibin Zheng",
title = "{POBA}-{GA}: Perturbation optimized black-box
adversarial attacks via genetic algorithm",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "89--106",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314378",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2019:RSI,
author = "Ping Wang and Xing He and Yushu Zhang and Wenying Wen
and Ming Li",
title = "A robust and secure image sharing scheme with personal
identity information embedded",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "107--121",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300914",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chejerla:2019:IFA,
author = "Brijesh Kashyap Chejerla and Sanjay. K. Madria",
title = "Information fusion architecture for secure cyber
physical systems",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "122--137",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314391",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carlin:2019:CAM,
author = "Domhnall Carlin and Philip O'Kane and Sakir Sezer",
title = "A cost analysis of machine learning using dynamic
runtime opcodes for malware detection",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "138--155",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300082",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Eckhart:2019:STP,
author = "Matthias Eckhart and Kristof Meixner and Dietmar
Winkler and Andreas Ekelhart",
title = "Securing the testing process for industrial automation
software",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "156--180",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314482",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pan:2019:CAI,
author = "Zhiwen Pan and Salim Hariri and Jesus Pacheco",
title = "Context aware intrusion detection for building
automation systems",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "181--201",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300926",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heydemann:2019:FVS,
author = "Karine Heydemann and Jean-Fran{\c{c}}ois Lalande and
Pascal Berthom{\'e}",
title = "Formally verified software countermeasures for
control-flow integrity of smart card {$C$} code",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "202--224",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302037",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Qin:2019:TPB,
author = "Maoyuan Qin and Wei Hu and Xinmu Wang and Dejun Mu and
Baolei Mao",
title = "Theorem proof based gate level information flow
tracking for hardware security verification",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "225--239",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300975",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Farhi:2019:MNU,
author = "Nitzan Farhi and Nir Nissim and Yuval Elovici",
title = "{Malboard}: a novel user keystroke impersonation
attack and trusted detection framework based on
side-channel analysis",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "240--269",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309957",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heigl:2019:RPS,
author = "Michael Heigl and Laurin Doerr and Nicolas Tiefnig and
Dalibor Fiala and Martin Schramm",
title = "A resource-preserving self-regulating Uncoupled {MAC}
algorithm to be applied in incident detection",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "270--287",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301099",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chaudhary:2019:BBB,
author = "Rajat Chaudhary and Anish Jindal and Gagangeet Singh
Aujla and Shubhani Aggarwal and Neeraj Kumar and
Kim-Kwang Raymond Choo",
title = "{\em {BEST}}: Blockchain-based secure energy trading
in {SDN}-enabled intelligent transportation system",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "288--299",
month = aug,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.05.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831201X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alomar:2019:UPU,
author = "Noura Alomar and Mansour Alsaleh and Abdulrahman
Alarifi",
title = "Uncovering the predictors of unsafe computing
behaviors in online crowdsourcing contexts",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "300--312",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Korac:2019:FMU,
author = "Dragan Kora{\'c} and Dejan Simi{\'c}",
title = "Fishbone model and universal authentication framework
for evaluation of multifactor authentication in mobile
environment",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "313--332",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kubilay:2019:CNP,
author = "Murat Yasin Kubilay and Mehmet Sabir Kiraz and Haci
Ali Mantar",
title = "{CertLedger}: a new {PKI} model with Certificate
Transparency based on blockchain",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "333--352",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313014",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2019:DBA,
author = "Rupeng Yang and Man Ho Au and Qiuliang Xu and Zuoxia
Yu",
title = "Decentralized blacklistable anonymous credentials with
reputation",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "353--371",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313282",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yanushkevich:2019:CCE,
author = "Svetlana N. Yanushkevich and Kelly W. Sundberg and
Nathan W. Twyman and Richard M. Guest and Vlad P.
Shmerko",
title = "Cognitive checkpoint: Emerging technologies for
biometric-enabled watchlist screening",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "372--385",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300951",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Manesh:2019:CAU,
author = "Mohsen Riahi Manesh and Naima Kaabouch",
title = "Cyber-attacks on unmanned aerial system networks:
Detection, countermeasure, and future research
directions",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "386--401",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300963",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patil:2019:DES,
author = "Rajendra Patil and Harsha Dudeja and Chirag Modi",
title = "Designing an efficient security framework for
detecting intrusions in virtual network of cloud
computing",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "402--422",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310629",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2019:ONP,
author = "Yimin Guo and Zhenfeng Zhang and Yajun Guo",
title = "\pkg{Optiwords}: a new password policy for creating
memorable and strong passwords",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "423--435",
month = aug,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See \cite{Guo:2020:CON}.",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301105",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Biondi:2019:EER,
author = "Fabrizio Biondi and Michael A. Enescu and Thomas
Given-Wilson and Axel Legay and Lamine Noureddine and
Vivek Verma",
title = "Effective, efficient, and robust packing detection and
classification",
journal = j-COMPUT-SECUR,
volume = "85",
number = "??",
pages = "436--451",
month = aug,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.05.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:01 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "ii--iii",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301452",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2019:IED,
author = "Erzhou Zhu and Peng Wen and Kanqi Ni and Ruhui Ma",
title = "Implementation of an effective dynamic concolic
execution framework for analyzing binary programs",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "1--27",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818300932",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:PS,
author = "Anonymous",
title = "Pages 1--512 ({September 2019})",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "1--512",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2019:ICD,
author = "Manmeet Singh and Maninder Singh and Sanmeet Kaur",
title = "Issues and challenges in {DNS} based botnet detection:
a survey",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "28--52",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301117",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gu:2019:NAI,
author = "Jie Gu and Lihong Wang and Huiwen Wang and Shanshan
Wang",
title = "A novel approach to intrusion detection using {SVM}
ensemble with feature augmentation",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "53--62",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301154",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elkhadir:2019:CNA,
author = "Zyad Elkhadir and Benattou Mohammed",
title = "A cyber network attack detection based on {GM} Median
Nearest Neighbors {LDA}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "63--74",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301142",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dodel:2019:IMA,
author = "Matias Dodel and Gustavo Mesch",
title = "An integrated model for assessing cyber-safety
behaviors: How cognitive, socioeconomic and digital
determinants affect diverse safety practices",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "75--91",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818303080",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Raju:2019:STB,
author = "BKSP Kumar Raju and G. Geethakumari",
title = "{SNAPS}: Towards building snapshot based provenance
system for virtual machines in the cloud environment",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "92--111",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818301895",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2019:ZCS,
author = "Yuncong Zhang and Yu Long and Zhen Liu and Zhiqiang
Liu and Dawu Gu",
title = "{Z-Channel}: Scalable and efficient scheme in
{Zerocash}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "112--131",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313737",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shuai:2019:AAS,
author = "Mengxia Shuai and Nenghai Yu and Hongxia Wang and Ling
Xiong",
title = "Anonymous authentication scheme for smart home
environment with provable security",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "132--146",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313701",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ring:2019:SNB,
author = "Markus Ring and Sarah Wunderlich and Deniz Scheuring
and Dieter Landes and Andreas Hotho",
title = "A survey of network-based intrusion detection data
sets",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "147--167",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481930118X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Scalas:2019:ESA,
author = "Michele Scalas and Davide Maiorca and Francesco
Mercaldo and Corrado Aaron Visaggio and Fabio
Martinelli and Giorgio Giacinto",
title = "On the effectiveness of system {API}-related
information for {Android} ransomware detection",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "168--182",
month = sep,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.06.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301178",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2019:MAB,
author = "Mahendra Pratap Singh and Shamik Sural and Jaideep
Vaidya and Vijayalakshmi Atluri",
title = "Managing attribute-based access control policies in a
unified framework using data warehousing and in-memory
database",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "183--205",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301166",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sai:2019:ASI,
author = "Ashish Rajendra Sai and Jim Buckley and Andrew {Le
Gear}",
title = "Assessing the security implication of {Bitcoin}
exchange rates",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "206--222",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312112",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gope:2019:LLA,
author = "Prosanta Gope",
title = "{LAAP}: Lightweight anonymous authentication protocol
for {D2D}-Aided fog computing paradigm",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "223--237",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831160X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2019:AMP,
author = "Jen-Wei Hu and Lo-Yao Yeh and Shih-Wei Liao and
Chu-Sing Yang",
title = "Autonomous and malware-proof blockchain-based firmware
update platform with efficient batch verification for
{Internet of Things} devices",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "238--252",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831438X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Norta:2019:SFB,
author = "Alex Norta and Raimundas Matulevicius and Benjamin
Leiding",
title = "Safeguarding a formalized Blockchain-enabled
identity-authentication protocol by applying security
risk-oriented patterns",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "253--269",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302670",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bendiab:2019:FNF,
author = "Keltoum Bendiab and Stavros Shiaeles and Samia
Boucherkha and Bogdan Ghita",
title = "{FCMDT}: a novel fuzzy cognitive maps dynamic trust
model for cloud federated identity management",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "270--290",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312252",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chiba:2019:IAB,
author = "Zouhair Chiba and Noreddine Abghour and Khalid
Moussaid and Amina {El omri} and Mohamed Rida",
title = "Intelligent approach to build a Deep Neural Network
based {IDS} for cloud environment using combination of
machine learning algorithms",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "291--317",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301221",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ali:2019:BBP,
author = "Gauhar Ali and Naveed Ahmad and Yue Cao and Muhammad
Asif and Haitham Cruickshank and Qazi Ejaz Ali",
title = "Blockchain based permission delegation and access
control in {Internet of Things} {(BACI)}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "318--334",
month = sep,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.06.010",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301208",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Aranha:2019:RSV,
author = "Diego F. Aranha and Pedro Y. S. Barbosa and Thiago N.
C. Cardoso and Caio L{\"u}ders Ara{\'u}jo and Paulo
Matias",
title = "The return of software vulnerabilities in the
{Brazilian} voting machine",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "335--349",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301191",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bongiovanni:2019:LSP,
author = "Ivano Bongiovanni",
title = "The {\em least secure places in the universe}? {A}
systematic literature review on information security
management in higher education",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "350--357",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301324",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sajjad:2019:EPP,
author = "Haider Sajjad and Tehsin Kanwal and Adeel Anjum and
Saif ur Rehman Malik and Ahmed Khan and Abid Khan and
Umar Manzoor",
title = "An efficient privacy preserving protocol for dynamic
continuous data collection",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "358--371",
month = sep,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.06.017",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301312",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hashemi:2019:SDN,
author = "Atiye Sadat Hashemi and Saeed Mozaffari",
title = "Secure deep neural networks using adversarial image
generation and training with {Noise-GAN}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "372--387",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481930121X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bai:2019:MCN,
author = "Wei Bai and Zhisong Pan and Shize Guo and Zhe Chen and
Shiming Xia",
title = "{MDC-Checker}: a novel network risk assessment
framework for multiple domain configurations",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "388--401",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2019:SMA,
author = "Atif Ahmad and Jeb Webb and Kevin C. Desouza and James
Boorman",
title = "Strategically-motivated advanced persistent threat:
Definition, process, tactics and a disinformation model
of counterattack",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "402--418",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310988",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:GES,
author = "Anonymous",
title = "Guest editorial: Special Issue on {Information Systems
Security, Privacy, Security and Cryptography (ICISSP
2017 and SECRYPT 2017)}",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "419--419",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301233",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huber:2019:FCL,
author = "Manuel Huber and Julian Horsch and Junaid Ali and
Sascha Wessel",
title = "Freeze and Crypt: {Linux} kernel support for main
memory encryption",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "420--436",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310435",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ohtake:2019:OSA,
author = "Go Ohtake and Reihaneh Safavi-Naini and Liang Feng
Zhang",
title = "Outsourcing scheme of {ABE} encryption secure against
malicious adversary",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "437--452",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300525",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dreier:2019:FPV,
author = "Jannik Dreier and Maxime Puys and Marie-Laure Potet
and Pascal Lafourcade and Jean-Louis Roch",
title = "Formally and practically verifying flow properties in
industrial systems",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "453--470",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831441X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jolfaei:2019:LIP,
author = "Alireza Jolfaei and Krishna Kant",
title = "A lightweight integrity protection scheme for low
latency smart grid applications",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "471--483",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831126X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barradas:2019:FAC,
author = "Diogo Barradas and Tiago Brito and David Duarte and
Nuno Santos and Lu{\'\i}s Rodrigues",
title = "Forensic analysis of communication records of
messaging applications from physical memory",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "484--497",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bu:2019:BSI,
author = "Lake Bu and Mark G. Karpovsky and Michel A. Kinsy",
title = "{Bulwark}: Securing implantable medical devices
communication channels",
journal = j-COMPUT-SECUR,
volume = "86",
number = "??",
pages = "498--511",
month = sep,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:47:02 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818312525",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:N,
author = "Anonymous",
title = "{November 2019}",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "??--??",
month = nov,
year = "2019",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2019:EB,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101624",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/S0167-4048(19)30171-3",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301713",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Connolly:2019:RCR,
author = "Lena Y. Connolly and David S. Wall",
title = "The rise of crypto-ransomware in a changing cybercrime
landscape: Taxonomising countermeasures",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101568",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101568",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301336",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Masood:2019:DMM,
author = "Zaheer Masood and Raza Samar and Muhammad Asif Zahoor
Raja",
title = "Design of a mathematical model for the {Stuxnet} virus
in a network of critical control infrastructure",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101565",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.07.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831229X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rubio:2019:CCD,
author = "Juan Enrique Rubio and Cristina Alcaraz and Rodrigo
Roman and Javier Lopez",
title = "Current cyber-defense trends in industrial control
systems",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101561",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.06.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301245",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zou:2019:BBP,
author = "Renpeng Zou and Xixiang Lv and Baocang Wang",
title = "Blockchain-based photo forensics with permissible
transformations",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101567",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101567",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313981",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Klobas:2019:HPS,
author = "Jane E. Klobas and Tanya McGill and Xuequn Wang",
title = "How perceived security risk affects intention to use
smart home devices: a reasoned action explanation",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101571",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101571",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301348",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Samarasinghe:2019:TGP,
author = "Nayanamana Samarasinghe and Mohammad Mannan",
title = "Towards a global perspective on web tracking",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101569",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101569",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314007",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen-Vu:2019:AFM,
author = "Long Nguyen-Vu and Jinung Ahn and Souhwan Jung",
title = "{Android} Fragmentation in Malware Detection",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101573",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101573",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301361",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chamikara:2019:ESP,
author = "M. A. P. Chamikara and P. Bertok and D. Liu and S.
Camtepe and I. Khalil",
title = "An efficient and scalable privacy preserving algorithm
for big data and data streams",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101570",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101570",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313683",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Genga:2019:DRE,
author = "Laura Genga and Nicola Zannone and Anna Squicciarini",
title = "Discovering reliable evidence of data misuse by
exploiting rule redundancy",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101577",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101577",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818302025",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alshawish:2019:QPM,
author = "Ali Alshawish and Mohamed Amine Abid and Hermann de
Meer",
title = "Quasi-purification of mixed game strategies:
Sub-optimality of equilibria in security games",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101575",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101575",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300458",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2019:UMP,
author = "Kai Chen and Chen Song and Liming Wang and Zhen Xu",
title = "Using memory propagation tree to improve performance
of protocol fuzzer when testing {ICS}",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101582",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101582",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301385",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horak:2019:OHS,
author = "Karel Hor{\'a}k and Branislav Bosansk{\'y} and Petr
Tom{\'a}sek and Christopher Kiekintveld and Charles
Kamhoua",
title = "Optimizing honeypot strategies against dynamic lateral
movement using partially observable stochastic games",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101579",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101579",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300665",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Junior:2019:BSP,
author = "Edson Floriano S. Junior and Eduardo Alchieri and
Diego F. Aranha and Priscila Solis",
title = "Building secure protocols for extensible distributed
coordination through secure extensions",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101583",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101583",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301397",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Durkota:2019:HNA,
author = "Karel Durkota and Viliam Lis{\'y} and Branislav
Bosansk{\'y} and Christopher Kiekintveld and Michal
Pechoucek",
title = "Hardening networks against strategic attackers using
attack graph games",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101578",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101578",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300689",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2019:BBA,
author = "Kexin Hu and Zhenfeng Zhang and Kaiwen Guo",
title = "Breaking the binding: Attacks on the {Merkle} approach
to prove liabilities and its applications",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101585",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101585",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See corrigendum \cite{Hu:2020:CBB}.",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314093",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2019:OBK,
author = "Yuxin Ding and Rui Wu and Xiao Zhang",
title = "Ontology-based knowledge representation for malware
individuals and families",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101574",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101574",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301373",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kammuller:2019:ATI,
author = "Florian Kamm{\"u}ller",
title = "Attack trees in {Isabelle} extended with probabilities
for quantum cryptography",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101572",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101572",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481930135X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2019:AEI,
author = "Ziyu Wang and Jianwei Liu and Qianhong Wu and Yanting
Zhang and Hui Yu and Ziyu Zhou",
title = "An analytic evaluation for the impact of uncle blocks
by selfish and stubborn mining in an imperfect
{Ethereum} network",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101581",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101581",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818314172",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wagner:2019:CTI,
author = "Thomas D. Wagner and Khaled Mahbub and Esther Palomar
and Ali E. Abdallah",
title = "Cyber threat intelligence sharing: Survey and research
directions",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101589",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101589",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481830467X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yu:2019:PQQ,
author = "Bin Yu and Joseph Liu and Surya Nepal and Jiangshan Yu
and Paul Rimba",
title = "Proof-of-{QoS}: {QoS} based blockchain consensus
protocol",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101580",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101580",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313774",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Han:2019:RRO,
author = "Xiaohui Han and Lianhai Wang and Shujiang Xu and Dawei
Zhao and Guangqi Liu",
title = "Recognizing roles of online illegal gambling
participants: an ensemble learning approach",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101588",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101588",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301415",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abraham:2019:EEL,
author = "Sherly Abraham and InduShobha Chengalur-Smith",
title = "Evaluating the effectiveness of learner controlled
information security training",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101586",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101586",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mainardi:2019:PRA,
author = "Nicholas Mainardi and Alessandro Barenghi and Gerardo
Pelosi",
title = "Plaintext recovery attacks against linearly
decryptable fully homomorphic encryption schemes",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101587",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101587",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301403",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nissim:2019:VMA,
author = "Nir Nissim and Omri Lahav and Aviad Cohen and Yuval
Elovici and Lior Rokach",
title = "Volatile memory analysis using the {MinHash} method
for efficient and secured detection of malware in
private cloud",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101590",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101590",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481831188X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Laszka:2019:DMA,
author = "Aron Laszka and Waseem Abbas and Yevgeniy Vorobeychik
and Xenofon Koutsoukos",
title = "Detection and mitigation of attacks on transportation
networks as a multi-stage security game",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101576",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101576",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300628",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yakura:2019:NMA,
author = "Hiromu Yakura and Shinnosuke Shinozaki and Reon
Nishimura and Yoshihiro Oyama and Jun Sakuma",
title = "Neural malware analysis with attention mechanism",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101592",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101592",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300264",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Basuchoudhary:2019:SSC,
author = "Atin Basuchoudhary and Nicola Searle",
title = "Snatched secrets: Cybercrime and trade secrets
modelling a firm's decision to report a theft of trade
secrets",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101591",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101591",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300616",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2019:SAD,
author = "Yu Li and Jin Huang and Ademola Ikusan and Milliken
Mitchell and Junjie Zhang and Rui Dai",
title = "\pkg{ShellBreaker}: Automatically detecting
{PHP}-based malicious web shells",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101595",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101595",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301506",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Movahedi:2019:VPC,
author = "Yazdan Movahedi and Michel Cukier and Ilir Gashi",
title = "Vulnerability prediction capability: a comparison
between vulnerability discovery models and neural
network models",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101596",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101596",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301518",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hina:2019:IGP,
author = "Sadaf Hina and Dhanapal Durai Dominic Panneer Selvam
and Paul Benjamin Lowry",
title = "Institutional governance and protection motivation:
Theoretical insights into shaping employees' security
compliance behavior in higher education institutions in
the developing world",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101594",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101594",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818308320",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2019:OSA,
author = "Tengyao Li and Buhong Wang and Fute Shang and Jiwei
Tian and Kunrui Cao",
title = "Online sequential attack detection for {ADS-B} data
based on hierarchical temporal memory",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101599",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101599",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301531",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Panda:2019:PIA,
author = "Sakshyam Panda and Daniel W. Woods and Aron Laszka and
Andrew Fielder and Emmanouil Panaousis",
title = "Post-incident audits on cyber insurance discounts",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101593",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101593",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819300641",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Akinrolabu:2019:CRA,
author = "Olusola Akinrolabu and Jason R. C. Nurse and Andrew
Martin and Steve New",
title = "Cyber risk assessment in cloud provider environments:
Current models and future needs",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101600",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101600",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301543",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2019:SCA,
author = "Xuewen Dong and Feng Wu and Anter Faree and Deke Guo
and Yulong Shen and Jianfeng Ma",
title = "Selfholding: a combined attack model using selfish
mining with block withholding attack",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101584",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101584",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313038",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Camacho:2019:MBD,
author = "Jos{\'e} Camacho and Jose Manuel
Garc{\'\i}a-Gim{\'e}nez and Noem{\'\i} Marta
Fuentes-Garc{\'\i}a and Gabriel
Maci{\'a}-Fern{\'a}ndez",
title = "Multivariate Big Data Analysis for intrusion
detection: 5 steps from the haystack to the needle",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101603",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101603",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818307909",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Burdon:2019:SSC,
author = "Mark Burdon and Lizzie Coles-Kemp",
title = "The significance of securing as a critical component
of information security: an {Australian} narrative",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101601",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101601",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301555",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2019:TRF,
author = "Hongxin Hu and Wonkyu Han and Sukwha Kyung and Juan
Wang and Gail-Joon Ahn and Ziming Zhao and Hongda Li",
title = "Towards a reliable firewall for software-defined
networks",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101597",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101597",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481930152X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Putz:2019:SAL,
author = "Benedikt Putz and Florian Menges and G{\"u}nther
Pernul",
title = "A secure and auditable logging infrastructure based on
a permissioned blockchain",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101602",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101602",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313907",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Senarath:2019:DMM,
author = "Awanthika Senarath and Nalin Asanka Gamagedara
Arachchilage",
title = "A data minimization model for embedding privacy into
software systems",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101605",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101605",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818309106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{BenOthmane:2019:SIS,
author = "Lotfi {Ben Othmane} and Doug Jacobson and Edgar
Weippl",
title = "Special Issue on Security and Privacy in Smart
Cyber-physical Systems",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101611",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.101611",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404819301609",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2019:FAI,
author = "Eun Hee Park and Jongwoo Kim and Lynn L. Wiles and
Young Soon Park",
title = "Factors affecting intention to disclose patients'
health information",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101340",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.05.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304917",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sharma:2019:DRB,
author = "Shwadhin Sharma and Merrill Warkentin",
title = "Do {I} really belong?: Impact of employment status on
information security policy compliance",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101397",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.09.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818304024",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choi:2019:PTE,
author = "Hoyul Choi and Jongmin Jeong and Simon S. Woo and
Kyungtae Kang and Junbeom Hur",
title = "Password typographical error resilience in honey
encryption",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101411",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.07.020",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Voris:2019:AAU,
author = "Jonathan Voris and Yingbo Song and Malek {Ben Salem}
and Shlomo Hershkop and Salvatore Stolfo",
title = "Active authentication using file system decoys and
user behavior modeling: results of a large scale
study",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101412",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2018.07.021",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818311258",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gheisari:2019:CAP,
author = "Mehdi Gheisari and Guojun Wang and Wazir Zada Khan and
Christian Fern{\'a}ndez-Campusano",
title = "A context-aware privacy-preserving method for
{IoT}-based smart city using {Software Defined
Networking}",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101470",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.02.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818313336",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cao:2019:TAA,
author = "Yan Cao and Zhiqiu Huang and Changbo Ke and Jian Xie
and Jinyong Wang",
title = "A topology-aware access control model for
collaborative cyber-physical spaces: Specification and
verification",
journal = j-COMPUT-SECUR,
volume = "87",
number = "??",
pages = "Article 101478",
month = nov,
year = "2019",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2019.02.013",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Sat Jan 22 15:25:37 MST 2022",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404818310861",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hu:2020:CBB,
author = "Kexin Hu and Zhenfeng Zhang and Kaiwen Guo",
title = "Corrigendum to {``Breaking the binding: Attacks on the
Merkle approach to prove liabilities and its
applications'' [Computers and Security, Volume 87,
2019, 101585]}",
journal = j-COMPUT-SECUR,
volume = "94",
number = "??",
pages = "Article 101878",
month = jul,
year = "2020",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2020.101878",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Wed Mar 10 08:25:04 MST 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See \cite{Hu:2019:BBA}.",
URL = "http://www.sciencedirect.com/science/article/pii/S0167404820301516",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2020:CLL,
author = "Yimin Guo and Zhenfeng Zhang",
title = "Corrigendum to {``\pkg{LPSE}: Lightweight
password-strength estimation for password meters''
[Computers and Security, Volume 73, 2018, Pages
507--518]}",
journal = j-COMPUT-SECUR,
volume = "94",
number = "??",
pages = "Article 101879",
month = jul,
year = "2020",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2020.101879",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Wed Mar 10 08:25:04 MST 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See \cite{Guo:2018:LLP}.",
URL = "http://www.sciencedirect.com/science/article/pii/S0167404820301528",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2020:CON,
author = "Yimin Guo and Zhenfeng Zhang and Yajun Guo",
title = "Corrigendum to {``\pkg{Optiwords}: a new password
policy for creating memorable and strong password''
[Computers and Security, Volume 85, 2019, Pages
423--435]}",
journal = j-COMPUT-SECUR,
volume = "94",
number = "??",
pages = "Article 101880",
month = jul,
year = "2020",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2020.101880",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Wed Mar 10 08:25:04 MST 2021",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
note = "See \cite{Guo:2019:ONP}.",
URL = "http://www.sciencedirect.com/science/article/pii/S016740482030153X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "http://www.sciencedirect.com/science/journal/01674048",
}