Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.00",
%%%     date            = "22 October 2019",
%%%     time            = "14:41:44 MDT",
%%%     filename        = "computsecur2020.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "56017 658 2607 27685",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 2020--2029.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            http://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.00, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2020 (  25)
%%%
%%%                             Article:         25
%%%
%%%                             Total entries:   25
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Aldribi:2020:HBC,
  author =       "Abdulaziz Aldribi and Issa Traor{\'e} and Belaid Moa
                 and Onyekachi Nwamuo",
  title =        "Hypervisor-based cloud intrusion detection through
                 online multivariate statistical change tracking",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101646",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301907",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alqahtani:2020:IBC,
  author =       "Fatmah H. Alqahtani and Fawaz A. Alsulaiman",
  title =        "Is image-based {CAPTCHA} secure against attacks based
                 on machine learning? {An} experimental study",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101635",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818312185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anglano:2020:AFA,
  author =       "Cosimo Anglano and Massimo Canonico and Marco
                 Guazzone",
  title =        "The {Android Forensics Automator (AnForA)}: a tool for
                 the Automated Forensic Analysis of {Android}
                 Applications",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101650",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:PJ,
  author =       "Anonymous",
  title =        "In progress ({January 2020})",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "??--??",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{benOthmane:2020:ESI,
  author =       "Lotfi ben Othmane and Doug Jacobson and Edgar Weippl",
  title =        "Editorial: Special issue on security and privacy in
                 smart cyber-physical systems",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101612",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301610",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Breitinger:2020:SSU,
  author =       "Frank Breitinger and Ryan Tully-Doyle and Courtney
                 Hassenfeldt",
  title =        "A survey on smartphone user's security choices,
                 awareness and education",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101647",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brilingaite:2020:FCD,
  author =       "Agne Brilingaite and Linas Bukauskas and Ausrius
                 Juozapavicius",
  title =        "A framework for competence development and assessment
                 in hybrid cybersecurity exercises",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101607",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buldas:2020:AEA,
  author =       "Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin
                 and Sjouke Mauw and Rolando Trujillo-Rasua",
  title =        "Attribute evaluation on attack trees with incomplete
                 information",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101630",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301774",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{daSilva:2020:HBS,
  author =       "Carlo Marcelo Revoredo da Silva and Eduardo Luzeiro
                 Feitosa and Vinicius Cardoso Garcia",
  title =        "Heuristic-based strategy for Phishing prediction: a
                 survey of {URL}-based approach",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101613",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301622",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Desouza:2020:WIS,
  author =       "Kevin C. Desouza and Atif Ahmad and Humza Naseer and
                 Munish Sharma",
  title =        "Weaponizing information systems for political
                 disruption: the {Actor, Lever, Effects, and Response
                 Taxonomy (ALERT)}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101606",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301579",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Djelouat:2020:SCS,
  author =       "Hamza Djelouat and Abbes Amira and Faycal Bensaali and
                 Issam Boukhennoufa",
  title =        "Secure compressive sensing for {ECG} monitoring",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101649",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301932",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Figueira:2020:IIS,
  author =       "Pedro Tub{\'\i}o Figueira and Cristina L{\'o}pez Bravo
                 and Jos{\'e} Luis Rivas L{\'o}pez",
  title =        "Improving information security risk analysis by
                 including threat-occurrence predictive models",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101609",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2020:SMV,
  author =       "Xinwen Hu and Yi Zhuang and Fuyuan Zhang",
  title =        "A security modeling and verification method of
                 embedded software based on {$Z$} and {MARTE}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101615",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818304358",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:BCS,
  author =       "Qian Lu and Ruobing Jiang and Yuzhan Ouyang and
                 Haipeng Qu and Jiahui Zhang",
  title =        "{BiRe}: a client-side Bi-directional {SYN} Reflection
                 mechanism against multi-model evil twin attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101618",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Obert:2020:DRE,
  author =       "James Obert and Adrian Chavez and Jay Johnson",
  title =        "Distributed renewable energy resource trust metrics
                 and secure routing",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101620",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301671",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paananen:2020:SAI,
  author =       "Hanna Paananen and Michael Lapke and Mikko Siponen",
  title =        "State of the art in information security policy
                 development",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101608",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818313002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Patsakis:2020:ECD,
  author =       "Constantinos Patsakis and Fran Casino and Vasilios
                 Katos",
  title =        "Encrypted and covert {DNS} queries for botnets:
                 Challenges and countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101614",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481831321X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Siponen:2020:CIN,
  author =       "Mikko Siponen and Petri Puhakainen and Anthony Vance",
  title =        "Can individuals' neutralization techniques be
                 overcome? {A} field experiment on password policy",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101617",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301646",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:DMB,
  author =       "Meng Wang and Yiqin Lu and Jiancheng Qin",
  title =        "A dynamic {MLP}-based {DDoS} attack detection method
                 using feature selection and feedback",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101645",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:USF,
  author =       "Ding Wang and Xizhe Zhang and Zijian Zhang and Ping
                 Wang",
  title =        "Understanding security failures of multi-factor
                 authentication schemes for multi-server environments",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101619",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481930166X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2020:ESD,
  author =       "Guangquan Xu and Bingjiang Guo and Chunhua Su and Xi
                 Zheng and Kaitai Liang and Duncan S. Wong and Hao
                 Wang",
  title =        "Am {I} eclipsed? {A} smart detector of eclipse attacks
                 for {Ethereum}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101604",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818313798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yamin:2020:CRS,
  author =       "Muhammad Mudassar Yamin and Basel Katt and Vasileios
                 Gkioulos",
  title =        "Cyber ranges and security testbeds: Scenarios,
                 functions, tools and architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101636",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301804",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yasasin:2020:FIS,
  author =       "Emrah Yasasin and Julian Prester and Gerit Wagner and
                 Guido Schryen",
  title =        "Forecasting {IT} security vulnerabilities --- An
                 empirical analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101610",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481830854X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yazdinejad:2020:PBS,
  author =       "Abbas Yazdinejad and Reza M. Parizi and Ali
                 Dehghantanha and Kim-Kwang Raymond Choo",
  title =        "{P4}-to-blockchain: a secure blockchain-enabled packet
                 parser for software defined networking",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101629",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301762",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2020:PPP,
  author =       "Jun Zhou and Meng Zheng and Zhenfu Cao and Xiaolei
                 Dong",
  title =        "{PVIDM}: Privacy-preserving verifiable shape context
                 based image denoising and matching with efficient
                 outsourcing in the malicious setting",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101631",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301786",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

%%% [22-Oct-2019] TO DO: v88 is still incomplete