Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.01",
%%%     date            = "22 January 2022",
%%%     time            = "15:35:18 MST",
%%%     filename        = "computsecur2010.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "26368 30996 113238 1237295",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 2010--2019.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            https://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.01, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2010 ( 106)    2014 ( 118)    2018 ( 221)
%%%                             2011 (  91)    2015 ( 131)    2019 ( 225)
%%%                             2012 ( 122)    2016 ( 120)    2020 (   3)
%%%                             2013 ( 129)    2017 ( 170)
%%%
%%%                             Article:       1436
%%%
%%%                             Total entries: 1436
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Anonymous:2010:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "iii--iii",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900131X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2010:Ea,
  author =       "Dimitris Gritzalis and Jan Eloff",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001138",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2010:SVE,
  author =       "Fuwen Liu and Hartmut Koenig",
  title =        "A survey of video encryption algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "3--15",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Basagiannis:2010:IMM,
  author =       "Stylianos Basagiannis and Panagiotis Katsaros and
                 Andrew Pombortsis",
  title =        "An intruder model with message inspection for model
                 checking security protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "16--34",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000856",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spathoulas:2010:RFP,
  author =       "Georgios P. Spathoulas and Sokratis K. Katsikas",
  title =        "Reducing false positives in intrusion detection
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "35--44",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000844",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seewald:2010:DIB,
  author =       "Alexander K. Seewald and Wilfried N. Gansterer",
  title =        "On the detection and identification of botnets",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "45--58",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000820",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shin:2010:AMD,
  author =       "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
                 Atluri",
  title =        "Anonymization models for directional location based
                 service environments",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "59--73",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000807",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Costa:2010:RMN,
  author =       "Gabriele Costa and Fabio Martinelli and Paolo Mori and
                 Christian Schaefer and Thomas Walter",
  title =        "Runtime monitoring for next generation {Java ME}
                 platform",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "74--87",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000790",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Toland:2010:IPM,
  author =       "Tyrone S. Toland and Csilla Farkas and Caroline M.
                 Eastman",
  title =        "The inference problem: Maintaining maximal
                 availability in the presence of database updates",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "88--103",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000789",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choi:2010:WVE,
  author =       "Y.-H. Choi and L. Li and P. Liu and G. Kesidis",
  title =        "Worm virulence estimation for the containment of local
                 worm outbreak",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "104--123",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000753",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2010:SCA,
  author =       "Chenfeng Vincent Zhou and Christopher Leckie and
                 Shanika Karunasekera",
  title =        "A survey of coordinated attacks and collaborative
                 intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "124--140",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900073X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Castro:2010:PCD,
  author =       "Carlos Javier Hernandez-Castro and Arturo Ribagorda",
  title =        "Pitfalls in {CAPTCHA} design and implementation: the
                 Math {CAPTCHA}, a case study",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "141--157",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000728",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAa,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "158--158",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITCa,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "159--162",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:CPa,
  author =       "Anonymous",
  title =        "Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "163--164",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900128X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PF,
  author =       "Anonymous",
  title =        "Pages 1--164 ({February 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2010:Eb,
  author =       "Dimitris Gritzalis and Sabrina {De Capitani di
                 Vimercati}",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "165--166",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ferrer-Gomilla:2010:CEM,
  author =       "Josep Lluis Ferrer-Gomilla and Jose A. Onieva and
                 Magdalena Payeras and Javier Lopez",
  title =        "Certified electronic mail: Properties revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "167--179",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000704",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jarraya:2010:SPP,
  author =       "Houssem Jarraya and Maryline Laurent",
  title =        "A secure peer-to-peer backup service keeping great
                 autonomy while under the supervision of a provider",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "180--195",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{DaVeiga:2010:FAI,
  author =       "A. {Da Veiga} and J. H. P. Eloff",
  title =        "A framework and assessment instrument for information
                 security culture",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "196--207",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000923",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Su:2010:WWA,
  author =       "Ming-Yang Su",
  title =        "{WARP}: a wormhole-avoidance routing protocol by
                 anomaly detection in mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "208--224",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ehlert:2010:SNS,
  author =       "Sven Ehlert and Dimitris Geneiatakis and Thomas
                 Magedanz",
  title =        "Survey of network security systems to counter
                 {SIP}-based denial-of-service attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "225--243",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holbl:2010:TPI,
  author =       "Marko H{\"o}lbl and Tatjana Welzer and Bostjan
                 Brumen",
  title =        "Two proposed identity-based three-party authenticated
                 key agreement protocols from pairings",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "244--252",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900090X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stakhanova:2010:SSB,
  author =       "Natalia Stakhanova and Samik Basu and Johnny Wong",
  title =        "On the symbiosis of specification-based and
                 anomaly-based detection",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "253--268",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000893",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2010:EFB,
  author =       "Chin-Chen Chang and Hao-Chuan Tsai and Yi-Pei Hsieh",
  title =        "An efficient and fair buyer-seller fingerprinting
                 scheme for large scale networks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "269--277",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000881",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Millan:2010:PBT,
  author =       "Gabriel L{\'o}pez Mill{\'a}n and Manuel Gil P{\'e}rez
                 and Gregorio Mart{\'\i}nez P{\'e}rez and Antonio F.
                 G{\'o}mez Skarmeta",
  title =        "{PKI}-based trust management in inter-domain
                 scenarios",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "278--290",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000868",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAb,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "291--291",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001606",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITCb,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "292--295",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:CPb,
  author =       "Anonymous",
  title =        "Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "296--296",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:CPc,
  author =       "Anonymous",
  title =        "Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "297--297",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000039",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PM,
  author =       "Anonymous",
  title =        "Pages 165--298 ({March 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:19 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITCc,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "i--iv",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "iv--iv",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000012X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2010:SIS,
  author =       "Seok-Won Lee and Mattia Monga",
  title =        "Special issue on software engineering for secure
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "299--301",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pironti:2010:PCJ,
  author =       "Alfredo Pironti and Riccardo Sisto",
  title =        "Provably correct {Java} implementations of {Spi
                 Calculus} security protocols specifications",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "302--314",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000832",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bauer:2010:RVC,
  author =       "Andreas Bauer and Jan J{\"u}rjens",
  title =        "Runtime verification of cryptographic protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "315--330",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xiao:2010:KSM,
  author =       "Liang Xiao and Bo Hu and Madalina Croitoru and Paul
                 Lewis and Srinandan Dasmahapatra",
  title =        "A knowledgeable security model for distributed health
                 information systems",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "331--349",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000819",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pavlich-Mariscal:2010:FCA,
  author =       "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
                 Laurent D. Michel",
  title =        "A framework of composable access control features:
                 Preserving separation of access control concerns from
                 models to code",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "350--379",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAc,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "380--380",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "3",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000009X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "iii--iii",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2010:Ec,
  author =       "Dimitris Gritzalis and Pierangela Samarati",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "381--382",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hilgenstieler:2010:ESP,
  author =       "Egon Hilgenstieler and Elias P. Duarte and Glenn
                 Mansfield-Keeni and Norio Shiratori",
  title =        "Extensions to the source path isolation engine for
                 precise and efficient log-based {IP} traceback",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "383--392",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rossudowski:2010:SPA,
  author =       "A. M. Rossudowski and H. S. Venter and J. H. P. Eloff
                 and D. G. Kourie",
  title =        "A security privacy aware architecture and protocol for
                 a single smart card used for multiple services",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "393--409",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2010:SAS,
  author =       "Fangwei Wang and Yunkai Zhang and Changguang Wang and
                 Jianfeng Ma and SangJae Moon",
  title =        "Stability analysis of a {SEIQV} epidemic model for
                 rapid spreading worms",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "410--418",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cheneau:2010:SIP,
  author =       "Tony Cheneau and Aymen Boudguiga and Maryline
                 Laurent",
  title =        "Significantly improved performances of the
                 cryptographically generated addresses thanks to {ECC}
                 and {GPGPU}",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "419--431",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Albrechtsen:2010:IIS,
  author =       "Eirik Albrechtsen and Jan Hovden",
  title =        "Improving information security awareness and behaviour
                 through dialogue, participation and collective
                 reflection. {An} intervention study",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "432--445",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yoon:2010:HSF,
  author =       "Ji Won Yoon and Hyoungshick Kim and Jun Ho Huh",
  title =        "Hybrid spam filtering for mobile communication",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "446--459",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ntantogian:2010:GME,
  author =       "Christoforos Ntantogian and Christos Xenakis and
                 Ioannis Stavrakakis",
  title =        "A generic mechanism for efficient authentication in
                 B3G networks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "460--475",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{VanNiekerk:2010:ISC,
  author =       "J. F. {Van Niekerk} and R. {Von Solms}",
  title =        "Information security culture: a management
                 perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "476--486",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mander:2010:PSD,
  author =       "Todd Mander and Richard Cheung and Farhad Nabhani",
  title =        "Power system {DNP3} data object security using data
                 sets",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "487--500",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Forne:2010:PAA,
  author =       "Jordi Forn{\'e} and Francisca Hinarejos and Andr{\'e}s
                 Mar{\'{\i}}n and Florina Almen{\'a}rez and Javier Lopez
                 and Jose A. Montenegro and Marc Lacoste and Daniel
                 D{\'{\i}}az",
  title =        "Pervasive authentication and authorization
                 infrastructures for mobile users",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "501--514",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2009.09.001",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809000911",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAd,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims and Scope",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "515--515",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000283",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITCd,
  author =       "Anonymous",
  title =        "{IFIP} Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "516--519",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000295",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PJ,
  author =       "Anonymous",
  title =        "Pages 381--520 ({June 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:20 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "iv--iv",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000043X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2010:Ed,
  author =       "Dimitris Gritzalis and Javier Lopez",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "521--522",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leitold:2010:RES,
  author =       "Herbert Leitold and Reinhard Posch and Thomas
                 R{\"o}ssler",
  title =        "Reconstruction of electronic signatures from
                 {eDocument} printouts",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "523--532",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blundo:2010:MKH,
  author =       "Carlo Blundo and Stelvio Cimato and Sabrina {De
                 Capitani di Vimercati} and Alfredo {De Santis} and Sara
                 Foresti and Stefano Paraboschi and Pierangela
                 Samarati",
  title =        "Managing key hierarchies for access control
                 enforcement: Heuristic approaches",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "533--547",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2009.12.006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Colantonio:2010:TRM,
  author =       "Alessandro Colantonio and Roberto {Di Pietro} and
                 Alberto Ocello and Nino Vincenzo Verde",
  title =        "Taming role mining complexity in {RBAC}",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "548--564",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000027",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pham:2010:TD,
  author =       "Quan Pham and Jason Reid and Adrian McCullagh and
                 Edward Dawson",
  title =        "On a taxonomy of delegation",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "565--579",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kolter:2010:CPM,
  author =       "Jan Kolter and Thomas Kernchen and G{\"u}nther
                 Pernul",
  title =        "Collaborative privacy management",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "580--591",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740480900145X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Farley:2010:RBD,
  author =       "Ryan Farley and Xinyuan Wang",
  title =        "Roving bugnet: Distributed surveillance threat and
                 mitigation",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "592--602",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Soupionis:2010:ACE,
  author =       "Yannis Soupionis and Dimitris Gritzalis",
  title =        "Audio {CAPTCHA}: Existing solutions assessment and a
                 new implementation for {VoIP} telephony",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "603--618",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sorniotti:2010:PSS,
  author =       "Alessandro Sorniotti and Refik Molva",
  title =        "A provably secure secret handshake with dynamic
                 controlled matching",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "619--627",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fernandez:2010:NAI,
  author =       "Marcel Fernandez and Josep Cotrina and Miguel Soriano
                 and Neus Domingo",
  title =        "A note about the identifier parent property in
                 {Reed--Solomon} codes",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "628--635",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAe,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "636--640",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBe,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "5",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "iii--iii",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000568",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2010:Ea,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "641--642",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Theoharidou:2010:MLC,
  author =       "Marianthi Theoharidou and Panayiotis Kotzanikolaou and
                 Dimitris Gritzalis",
  title =        "A multi-layer Criticality Assessment methodology based
                 on interdependencies",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "643--658",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000210",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sommestad:2010:PRM,
  author =       "Teodor Sommestad and Mathias Ekstedt and Pontus
                 Johnson",
  title =        "A probabilistic relational model for security risk
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "659--679",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kavallaris:2010:DPS,
  author =       "Theodoros Kavallaris and Vasilios Katos",
  title =        "On the detection of pod slurping attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "680--685",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zi:2010:IPN,
  author =       "Xiaochao Zi and Lihong Yao and Li Pan and Jianhua Li",
  title =        "Implementing a passive network covert timing channel",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "686--696",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404809001485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hinarejos:2010:PEC,
  author =       "M. Francisca Hinarejos and Jose L. Mu{\~n}oz and Jordi
                 Forn{\'e} and Oscar Esparza",
  title =        "{PREON}: an efficient cascade revocation mechanism for
                 delegation paths",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "697--711",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000222",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tjhai:2010:PTS,
  author =       "Gina C. Tjhai and Steven M. Furnell and Maria Papadaki
                 and Nathan L. Clarke",
  title =        "A preliminary two-stage alarm correlation and
                 filtering system using {SOM} neural network and
                 {$K$}-means algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "712--723",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAf,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "724--728",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000057X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBf,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000532",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PS,
  author =       "Anonymous",
  title =        "Pages 641--728 ({September 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "iii--iii",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2010:Eb,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "729--730",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000714",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ruighaver:2010:EDM,
  author =       "A. B. Ruighaver and S. B. Maynard and M. Warren",
  title =        "Ethical decision making: Improving the quality of
                 acceptable use policies",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "731--736",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmieri:2010:NAD,
  author =       "Francesco Palmieri and Ugo Fiore",
  title =        "Network anomaly detection through nonlinear analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "737--755",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000362",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guinde:2010:EHS,
  author =       "Nitesh B. Guinde and Sotirios G. Ziavras",
  title =        "Efficient hardware support for pattern matching in
                 network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "756--769",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000350",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pavlich-Mariscal:2010:FSA,
  author =       "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
                 Laurent D. Michel",
  title =        "A framework for security assurance of access control
                 enforcement code",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "770--784",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palmer:2010:ASM,
  author =       "Anthony J. Palmer",
  title =        "Approach for selecting the most suitable Automated
                 Personal Identification Mechanism {(ASMSA)}",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "785--806",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000325",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAg,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "807--811",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000726",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBg,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000647",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PO,
  author =       "Anonymous",
  title =        "Pages 729--812 ({October 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "7",
  pages =        "??--??",
  month =        oct,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:21 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "iii--iii",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000969",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2010:STP,
  author =       "Eugene H. Spafford",
  title =        "Security, technology, publishing, and ethics (Part
                 I)",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "813--814",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000878",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wei:2010:MPT,
  author =       "Jinpeng Wei and Calton Pu",
  title =        "Modeling and preventing {TOCTTOU} vulnerabilities in
                 {Unix}-style file systems",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "815--830",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000830",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Workman:2010:BPC,
  author =       "Michael Workman",
  title =        "A behaviorist perspective on corporate harassment
                 online: Validation of a theoretical model of
                 psychological motives",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "831--839",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000829",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kritzinger:2010:CSH,
  author =       "E. Kritzinger and S. H. von Solms",
  title =        "Cyber security for home users: a new way of protection
                 through awareness enforcement",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "840--847",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000775",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ardagna:2010:ACS,
  author =       "Claudio A. Ardagna and Sabrina {De Capitani di
                 Vimercati} and Sara Foresti and Tyrone W. Grandison and
                 Sushil Jajodia and Pierangela Samarati",
  title =        "Access control for smarter healthcare using policy
                 spaces",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "848--858",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2010.07.001",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000623",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kantzavelou:2010:GBI,
  author =       "Ioanna Kantzavelou and Sokratis Katsikas",
  title =        "A game-based intrusion detection mechanism to confront
                 internal attackers",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "859--874",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000611",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herranz:2010:CDP,
  author =       "Javier Herranz and Stan Matwin and Jordi Nin and
                 Vicen{\c{c}} Torra",
  title =        "Classifying data from protected statistical datasets",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "875--890",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:2010:MFA,
  author =       "Fred Cohen",
  title =        "A method for forensic analysis of control",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "891--902",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:ITAh,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "903--907",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000970",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IIS,
  author =       "Anonymous",
  title =        "Invitation to {IFIP} sec 2011",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "908--908",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000101X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:IEBh,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000933",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2010:PN,
  author =       "Anonymous",
  title =        "Pages 813--908 ({November 2010})",
  journal =      j-COMPUT-SECUR,
  volume =       "29",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2010",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "iii--iii",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000216",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2011:Ea,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "1--1",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000115X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2011:STP,
  author =       "Eugene H. Spafford",
  title =        "Security, technology, publishing, and ethics (part
                 {II})",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "2--3",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sadan:2011:WUS,
  author =       "Zac Sadan and David Schwartz",
  title =        "{WhiteScript}: Using social network analysis
                 parameters to balance between browser usability and
                 malware exposure",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "4--12",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000842",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gu:2011:SSP,
  author =       "Qijun Gu and Christopher Ferguson and Rizwan Noorani",
  title =        "A study of self-propagating mal-packets in sensor
                 networks: Attacks and defenses",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "13--27",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000854",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2011:ENI,
  author =       "Hua Guo and Yi Mu and Zhoujun Li and Xiyong Zhang",
  title =        "An efficient and non-interactive hierarchical key
                 agreement protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "28--34",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000866",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khan:2011:DCB,
  author =       "Hassan Khan and Mobin Javed and Syed Ali Khayam and
                 Fauzan Mirza",
  title =        "Designing a cluster-based covert channel to evade disk
                 investigation and forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "35--49",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000088X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Woo:2011:MVD,
  author =       "Sung-Whan Woo and HyunChul Joh and Omar H. Alhazmi and
                 Yashwant K. Malaiya",
  title =        "Modeling vulnerability discovery process in {Apache}
                 and {IIS HTTP} servers",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "50--62",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000908",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xenakis:2011:CEI,
  author =       "Christos Xenakis and Christoforos Panos and Ioannis
                 Stavrakakis",
  title =        "A comparative evaluation of intrusion detection
                 architectures for mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "63--80",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481000091X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ITAa,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "81--85",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000071",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ICC,
  author =       "Anonymous",
  title =        "{IFIPTM 2011} --- Call for Contributions",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "86--86",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000101",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:CMa,
  author =       "Anonymous",
  title =        "Call for membership",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "87--87",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:WCP,
  author =       "Anonymous",
  title =        "{WISE 7} --- Call for Papers",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "88--88",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000125",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "ifc--ifc",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:PJa,
  author =       "Anonymous",
  title =        "Pages 1--88 ({January 2011})",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "1",
  pages =        "??--??",
  month =        jan,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:22 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "iii--iii",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "iii--iii",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:23 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "iii--iii",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzaliz:2011:E,
  author =       "Dimitris Gritzaliz and James Joshi",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "89--90",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001094",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rao:2011:FGI,
  author =       "Prathima Rao and Dan Lin and Elisa Bertino and Ninghui
                 Li and Jorge Lobo",
  title =        "Fine-grained integration of access control policies",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "91--107",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000891",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carminati:2011:SWB,
  author =       "Barbara Carminati and Elena Ferrari and Raymond
                 Heatherly and Murat Kantarcioglu and Bhavani
                 Thuraisingham",
  title =        "Semantic web-based social network access control",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "108--115",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000799",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jin:2011:PCA,
  author =       "Jing Jin and Gail-Joon Ahn and Hongxin Hu and Michael
                 J. Covington and Xinwen Zhang",
  title =        "Patient-centric authorization framework for electronic
                 healthcare services",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "116--127",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000805",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mondal:2011:SAG,
  author =       "Samrat Mondal and Shamik Sural and Vijayalakshmi
                 Atluri",
  title =        "Security analysis of {GTRBAC} and its variants using
                 model checking",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "128--147",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000817",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stoller:2011:SRA,
  author =       "Scott D. Stoller and Ping Yang and Mikhail I. Gofman
                 and C. R. Ramakrishnan",
  title =        "Symbolic reachability analysis for parameterized
                 administrative role-based access control",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "148--164",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810000787",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ITAb,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "165--169",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:HCP,
  author =       "Anonymous",
  title =        "{HAISA} --- Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "170--170",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000393",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "2--3",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000319",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "iii--iii",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000563",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2011:Eb,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "171--171",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000496",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ma:2011:UCC,
  author =       "Xiongfeng Ma and Chi-Hang Fred Fung and Jean-Christian
                 Boileau and H. F. Chau",
  title =        "Universally composable and customizable
                 post-processing for practical quantum key
                 distribution",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "172--177",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001021",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Breaux:2011:LRS,
  author =       "Travis D. Breaux and David L. Baumer",
  title =        "Legally ``reasonable'' security requirements: a
                 10-year {FTC} retrospective",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "178--193",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001124",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chabot:2011:EEP,
  author =       "Hugues Chabot and Rapha{\"e}l Khoury and Nadia Tawbi",
  title =        "Extending the enforcement power of truncation monitors
                 using static analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "194--207",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001136",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gunson:2011:UPS,
  author =       "Nancie Gunson and Diarmid Marshall and Hazel Morton
                 and Mervyn Jack",
  title =        "User perceptions of security and usability of
                 single-factor and two-factor authentication in
                 automated telephone banking",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "208--220",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404810001148",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ariu:2011:HID,
  author =       "Davide Ariu and Roberto Tronci and Giorgio Giacinto",
  title =        "{\em {HMMPayl}}: an intrusion detection system based
                 on Hidden {Markov} Models",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "221--241",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moller:2011:MBU,
  author =       "Sebastian M{\"o}ller and Noam Ben-Asher and
                 Klaus-Peter Engelbrecht and Roman Englert and Joachim
                 Meyer",
  title =        "Modeling the behavior of users who are confronted with
                 security mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "242--256",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000423",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Basagiannis:2011:QAC,
  author =       "S. Basagiannis and S. Petridou and N. Alexiou and G.
                 Papadimitriou and P. Katsaros",
  title =        "Quantitative analysis of a certified e-mail protocol
                 in mobile environments: a probabilistic model checking
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "257--272",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000435",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shih:2011:SMI,
  author =       "Dong-Her Shih and David C. Yen and Chih-Hung Cheng and
                 Ming-Hung Shih",
  title =        "A secure multi-item e-auction mechanism with bid
                 privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "273--287",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000460",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ITAc,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "288--292",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000575",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:CMb,
  author =       "Anonymous",
  title =        "Call for membership",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "293--293",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000605",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000538",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:PJb,
  author =       "Anonymous",
  title =        "Pages 171--294 ({June 2011})",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "iii--iii",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000782",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xiang:2011:EAN,
  author =       "Yang Xiang and Jiankun Hu and Wanlei Zhou",
  title =        "Editorial: Advances in network and system security",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "295--296",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000708",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tapiador:2011:MMA,
  author =       "Juan E. Tapiador and John A. Clark",
  title =        "Masquerade mimicry attack detection: a randomised
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "297--310",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000654",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2011:PFB,
  author =       "Peng Zhang and Jiankun Hu and Cai Li and Mohammed
                 Bennamoun and Vijayakumar Bhagavatula",
  title =        "A pitfall in fingerprint bio-cryptographic key
                 generation",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "311--319",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000459",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2011:HAB,
  author =       "Guojun Wang and Qin Liu and Jie Wu and Minyi Guo",
  title =        "Hierarchical attribute-based encryption and scalable
                 user revocation for sharing data in cloud servers",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "320--331",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2011:IPT,
  author =       "Xiaoxun Sun and Hua Wang and Jiuyong Li and Yanchun
                 Zhang",
  title =        "Injecting purpose and trust into data anonymisation",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "332--345",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000666",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ITAd,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "346--350",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000794",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "5",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:24 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "iii--iii",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "iii--iii",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:25 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Ci,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "iii--iii",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2011:Ec,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "351--352",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000733",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Davis:2011:DPA,
  author =       "Jonathan J. Davis and Andrew J. Clark",
  title =        "Data preprocessing for anomaly based network intrusion
                 detection: a review",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "353--375",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000691",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rekhis:2011:LBA,
  author =       "Slim Rekhis and Noureddine Boudriga",
  title =        "Logic-based approach for digital forensic
                 investigation in communication Networks",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "376--396",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Martinez-Moyano:2011:MBC,
  author =       "Ignacio J. Martinez-Moyano and Stephen H. Conrad and
                 David F. Andersen",
  title =        "Modeling behavioral considerations related to
                 information security",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "397--409",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000472",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Julisch:2011:CDB,
  author =       "Klaus Julisch and Christophe Suter and Thomas Woitalla
                 and Olaf Zimmermann",
  title =        "Compliance by design --- Bridging the chasm between
                 auditors and {IT} architects",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "410--426",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000514",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Giot:2011:UKD,
  author =       "Romain Giot and Mohamad El-Abed and Baptiste Hemery
                 and Christophe Rosenberger",
  title =        "Unconstrained keystroke dynamics authentication with
                 shared secret",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "427--445",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000502",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pereniguez:2011:PUP,
  author =       "F. Pereniguez and R. Marin-Lopez and G. Kambourakis
                 and S. Gritzalis and A. F. Gomez",
  title =        "{PrivaKERB}: a user privacy framework for {Kerberos}",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "446--463",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000617",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tauber:2011:SCM,
  author =       "Arne Tauber",
  title =        "A survey of certified mail systems provided on the
                 {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "464--485",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000629",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Posey:2011:UMA,
  author =       "Clay Posey and Rebecca J. Bennett and Tom L. Roberts",
  title =        "Understanding the mindset of the abusive insider: an
                 examination of insiders' causal reasoning following
                 internal security changes",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "486--497",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000630",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sachan:2011:RVD,
  author =       "Amit Sachan and Sabu Emmanuel",
  title =        "Rights violation detection in multi-level digital
                 rights management system",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "498--513",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000642",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yuxin:2011:FRS,
  author =       "Ding Yuxin and Yuan Xuebing and Zhou Di and Dong Li
                 and An Zhanchao",
  title =        "Feature representation and selection in malicious code
                 detection methods based on static system calls",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "514--524",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100068X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2011:TCS,
  author =       "Zonghua Zhang and Farid Na{\"\i}t-Abdesselam and
                 Pin-Han Ho and Youki Kadobayashi",
  title =        "Toward cost-sensitive self-optimizing anomaly
                 detection and response in autonomic networks",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "525--537",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2011:CTI,
  author =       "Jianhua Yang and David Woolbright",
  title =        "Correlating {TCP\slash IP} Packet contexts to detect
                 stepping-stone intrusion",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "538--546",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000721",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:ITAe,
  author =       "Anonymous",
  title =        "{IFIP TC11} --- Aims, Scope and Technical Committee",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "547--551",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000915",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBe,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "ifc--ifc",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000873",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:PSO,
  author =       "Anonymous",
  title =        "Pages 351--552 ({September--October 2011})",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "6--7",
  pages =        "??--??",
  month =        sep # "\slash " # oct,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:Cj,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "iii--iv",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001271",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2011:Ef,
  author =       "Eugene H. Spafford",
  title =        "Editorial for 30/8",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "553--554",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001209",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2011:DCS,
  author =       "Da Zhang and Chai Kiat Yeo",
  title =        "Distributed Court System for intrusion detection in
                 mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "555--570",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001155",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jaeger:2011:CUC,
  author =       "Trent Jaeger and Paul C. van Oorschot and Glenn
                 Wurster",
  title =        "Countering unauthorized code execution on commodity
                 kernels: a survey of common interfaces allowing kernel
                 code modification",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "571--579",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001143",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arnellos:2011:FDS,
  author =       "Argyris Arnellos and Dimitrios Lekkas and Dimitrios
                 Zissis and Thomas Spyrou and John Darzentas",
  title =        "Fair digital signing: the structural reliability of
                 signed documents",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "580--596",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100112X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mallesh:2011:ASD,
  author =       "Nayantara Mallesh and Matthew Wright",
  title =        "An analysis of the statistical disclosure attack and
                 receiver-bound cover",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "597--612",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001118",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gascon:2011:AUD,
  author =       "Hugo Gascon and Agustin Orfila and Jorge Blasco",
  title =        "Analysis of update delays in signature-based network
                 intrusion detection systems",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "613--624",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001106",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kolias:2011:SII,
  author =       "C. Kolias and G. Kambourakis and M. Maragoudakis",
  title =        "Swarm intelligence in intrusion detection: a survey",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "625--642",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100109X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Makri:2011:CRG,
  author =       "Eleftheria Makri and Elisavet Konstantinou",
  title =        "Constant round group key agreement protocols: a
                 comparative study",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "643--678",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001088",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mavrogiannopoulos:2011:TSM,
  author =       "Nikos Mavrogiannopoulos and Nessim Kisserli and Bart
                 Preneel",
  title =        "A taxonomy of self-modifying code for obfuscation",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "679--691",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001076",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Callegari:2011:CSW,
  author =       "C. Callegari and S. Giordano and M. Pagano and T.
                 Pepe",
  title =        "Combining sketches and wavelet analysis for multi
                 time-scale network anomaly detection",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "692--704",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001064",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bella:2011:EPC,
  author =       "Giampaolo Bella and Rosario Giustolisi and Salvatore
                 Riccobene",
  title =        "Enforcing privacy in e-commerce by balancing anonymity
                 and trust",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "705--718",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001052",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choo:2011:CTL,
  author =       "Kim-Kwang Raymond Choo",
  title =        "The cyber threat landscape: Challenges and future
                 research directions",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "719--731",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001040",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2011:MDU,
  author =       "Lin Huang and Mark Stamp",
  title =        "Masquerade detection using profile hidden {Markov}
                 models",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "732--747",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001003",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fuchs:2011:RIS,
  author =       "L. Fuchs and G. Pernul and R. Sandhu",
  title =        "Roles in information security --- a survey and
                 classification of the research area",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "748--769",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100099X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Okolica:2011:WDM,
  author =       "James S. Okolica and Gilbert L. Peterson",
  title =        "{Windows} driver memory analysis: a reverse
                 engineering methodology",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "770--779",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000988",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2011:EDR,
  author =       "GuangXu Zhou and Murat Demirer and Coskun Bayrak and
                 Licheng Wang",
  title =        "Enable delegation for {RBAC} with Secure Authorization
                 Certificate",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "780--790",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000976",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rrushi:2011:EBV,
  author =       "Julian Rrushi and Ehsan Mokhtari and Ali A. Ghorbani",
  title =        "Estimating botnet virulence within mathematical models
                 of botnet propagation dynamics",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "791--802",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000964",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Martin:2011:CUA,
  author =       "Nigel Martin and John Rice",
  title =        "Cybercrime: Understanding and addressing the concerns
                 of stakeholders",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "803--814",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100085X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Charanek:2011:VEE,
  author =       "Elias Abou Charanek and Hoseb Dermanilian and Imad
                 Elhajj and Ayman Kayssi and Ali Chehab",
  title =        "{$ E^2 $ VoIP$^2$}: Energy efficient voice over {IP}
                 privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "815--829",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000848",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2011:IMS,
  author =       "Jung-San Lee and Ming-Huang Hsieh",
  title =        "An interactive mobile {SMS} confirmation method using
                 secret sharing technique",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "830--839",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811000836",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:IEBf,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001246",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2011:PN,
  author =       "Anonymous",
  title =        "Pages 553--840 ({November 2011})",
  journal =      j-COMPUT-SECUR,
  volume =       "30",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2011",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:26 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "iii--iii",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100157X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2012:Ea,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "1--2",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001520",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leithner:2012:AF,
  author =       "Manuel Leithner and Edgar Weippl",
  title =        "{Android} forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "3--3",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001301",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mana:2012:TNB,
  author =       "Antonio Ma{\~n}a and Hristo Koshutanski and Ernesto J.
                 P{\'e}rez",
  title =        "A trust negotiation based security framework for
                 service provisioning in load-balancing clusters",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "4--25",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001428",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kulekci:2012:SBW,
  author =       "M. Oguzhan K{\"u}lekci",
  title =        "On scrambling the {Burrows--Wheeler} transform to
                 provide privacy in lossless compression",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "26--32",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2012:RHA,
  author =       "Gaobo Yang and Ning Chen and Qin Jiang",
  title =        "A robust hashing algorithm based on {SURF} for video
                 copy detection",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "33--39",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001404",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhatnagar:2012:NRA,
  author =       "Gaurav Bhatnagar and Q. M. Jonathan Wu and
                 Balasubramanian Raman",
  title =        "A new robust adjustable logo watermarking scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "40--58",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001398",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2012:TRS,
  author =       "Xingwen Zhao and Fangguo Zhang",
  title =        "Tracing and revoking scheme for dynamic privileges
                 against pirate rebroadcast",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "59--69",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001386",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mou:2012:FEC,
  author =       "Sheng Mou and Zhiwen Zhao and Sisi Jiang and Zushun Wu
                 and Jiaojiao Zhu",
  title =        "Feature extraction and classification algorithm for
                 detecting complex covert timing channel",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "70--82",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001349",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ifinedo:2012:UIS,
  author =       "Princely Ifinedo",
  title =        "Understanding information systems security policy
                 compliance: an integration of the theory of planned
                 behavior and the protection motivation theory",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "83--95",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001337",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodero-Merino:2012:BSP,
  author =       "Luis Rodero-Merino and Luis M. Vaquero and Eddy Caron
                 and Adrian Muresan and Fr{\'e}d{\'e}ric Desprez",
  title =        "Building safe {PaaS} clouds: a survey on security in
                 multitenant software platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "96--108",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001313",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stefan:2012:RKD,
  author =       "Deian Stefan and Xiaokui Shu and Danfeng (Daphne)
                 Yao",
  title =        "Robustness of keystroke-dynamics based biometrics
                 against synthetic forgeries",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "109--121",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001179",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lacey:2012:RUR,
  author =       "T. H. Lacey and R. F. Mills and B. E. Mullins and R.
                 A. Raines and M. E. Oxley and S. K. Rogers",
  title =        "{RIPsec} --- Using reputation-based multilayer
                 security to protect {MANETs}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "122--136",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2011.09.005",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001167",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dube:2012:MTR,
  author =       "T. Dube and R. Raines and G. Peterson and K. Bauer and
                 M. Grimaila and S. Rogers",
  title =        "Malware target recognition via static heuristics",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "137--147",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2011.09.002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001131",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001544",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PF,
  author =       "Anonymous",
  title =        "Pages 1--148 ({February 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "1",
  pages =        "??--??",
  month =        feb,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "iii--iii",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2012:Eb,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "149--150",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000168",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Al-Assam:2012:SEB,
  author =       "Hisham Al-Assam and Sabah Jassim",
  title =        "Security evaluation of biometric keys",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "151--163",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holm:2012:PAN,
  author =       "Hannes Holm",
  title =        "Performance of automated network vulnerability
                 scanning at remediating security issues",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "164--175",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001696",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wei:2012:TGD,
  author =       "Jinpeng Wei and Calton Pu",
  title =        "Toward a general defense against kernel queue hooking
                 attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "176--191",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001507",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xiao:2012:MFR,
  author =       "Da Xiao and Yan Yang and Wenbin Yao and Chunhua Wu and
                 Jianyi Liu and Yixian Yang",
  title =        "Multiple-File Remote Data Checking for cloud storage",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "192--205",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2011.12.005",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001489",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liginlal:2012:HPR,
  author =       "Divakaran Liginlal and Inkook Sim and Lara Khansa and
                 Paul Fearn",
  title =        "{HIPAA} Privacy Rule compliance: an interpretive study
                 using {Norman}'s action theory",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "206--220",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001453",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rhee:2012:UOI,
  author =       "Hyeun-Suk Rhee and Young U. Ryu and Cheong-Tag Kim",
  title =        "Unrealistic optimism on information security
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "221--232",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001441",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chung:2012:HQB,
  author =       "Yu-Chi Chung and Ming-Chuan Wu and Yih-Chang Chen and
                 Wen-Kui Chang",
  title =        "A Hot Query Bank approach to improve detection
                 performance against {SQL} injection attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "233--248",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481100143X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michael:2012:SRM,
  author =       "Katina Michael",
  title =        "Security Risk Management: Building an Information
                 Security Risk Management Program from the Ground Up",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "249--250",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001660",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bayuk:2012:CA,
  author =       "Jennifer L. Bayuk",
  title =        "Cyber Attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "251--251",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001519",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leithner:2012:CPT,
  author =       "Manuel Leithner and Edgar Weippl",
  title =        "Coding for Penetration Testers",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "252--252",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001490",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Macfarlane:2012:FSP,
  author =       "Richard Macfarlane and William Buchanan and Elias
                 Ekonomou and Omair Uthmani and Lu Fan and Owen Lo",
  title =        "Formal security policy implementations in network
                 firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "253--270",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2011.10.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001192",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PMa,
  author =       "Anonymous",
  title =        "Pages 149--270 ({March 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "2",
  pages =        "??--??",
  month =        mar,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:27 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "iii--iii",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200048X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Ea,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "271--272",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000570",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Molina:2012:OEA,
  author =       "Maurizio Molina and Ignasi Paredes-Oliva and Wayne
                 Routly and Pere Barlet-Ros",
  title =        "Operational experiences with anomaly detection in
                 backbone networks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "273--285",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000132",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vorakulpipat:2012:PSR,
  author =       "Chalee Vorakulpipat and Vasaka Visoottiviseth and
                 Siwaruk Siwamogsatham",
  title =        "Polite sender: a resource-saving spam email
                 countermeasure based on sender responsibilities and
                 recipient justifications",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "286--298",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abramov:2012:MIA,
  author =       "Jenny Abramov and Omer Anson and Michal Dahan and
                 Peretz Shoval and Arnon Sturm",
  title =        "A methodology for integrating access control policies
                 within database development",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "299--314",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karadsheh:2012:ASP,
  author =       "Louay Karadsheh",
  title =        "Applying security policies and service level agreement
                 to {IaaS} service model to enhance security and
                 transition",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "315--326",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lent:2012:EMB,
  author =       "Ricardo Lent",
  title =        "Evaluating a migration-based response to {DoS} attacks
                 in a system of distributed auctions",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "327--343",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Scholte:2012:TCN,
  author =       "Theodoor Scholte and Davide Balzarotti and Engin
                 Kirda",
  title =        "Have things changed now? {An} empirical study on input
                 validation vulnerabilities in web applications",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "344--356",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001684",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shiravi:2012:TDS,
  author =       "Ali Shiravi and Hadi Shiravi and Mahbod Tavallaee and
                 Ali A. Ghorbani",
  title =        "Toward developing a systematic approach to generate
                 benchmark datasets for intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "357--374",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001672",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000454",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PMb,
  author =       "Anonymous",
  title =        "Pages 271--374 ({May 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "3",
  pages =        "??--??",
  month =        may,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:FAI,
  author =       "Anonymous",
  title =        "Filler {AD:IFIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "i--i",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000764",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "iii--iv",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000739",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Eb,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "375--376",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000685",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zeng:2012:AIB,
  author =       "Ying Zeng and FenLin Liu and XiangYang Luo and ShiGuo
                 Lian",
  title =        "Abstract interpretation-based semantic framework for
                 software birthmark",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "377--390",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000545",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khan:2012:PAB,
  author =       "Muhammad Naeem Ahmed Khan",
  title =        "Performance analysis of {Bayesian} networks and neural
                 networks in classification of file system activities",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "391--401",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000533",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhi-jun:2012:MBA,
  author =       "Wu Zhi-jun and Zhang Hai-tao and Wang Ming-hua and Pei
                 Bao-song",
  title =        "{MSABMS}-based approach of detecting {LDoS} attack",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "402--417",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000521",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nicholson:2012:SSL,
  author =       "A. Nicholson and S. Webber and S. Dyer and T. Patel
                 and H. Janicke",
  title =        "{SCADA} security in the light of Cyber-Warfare",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "418--436",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sallam:2012:EBM,
  author =       "Ahmed I. Sallam and El-Sayed El-Rabaie and Osama S.
                 Faragallah",
  title =        "Encryption-based multilevel model for {DBMS}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "437--446",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shaikh:2012:DRB,
  author =       "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
  title =        "Dynamic risk-based decision methods for access control
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "447--464",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000399",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2012:SBF,
  author =       "San-Tsai Sun and Kirstie Hawkey and Konstantin
                 Beznosov",
  title =        "Systematically breaking and fixing {OpenID} security:
                 Formal analysis, semi-automated empirical evaluation,
                 and practical countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "465--483",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2012:PSP,
  author =       "Hyoungshick Kim and Jun Ho Huh",
  title =        "{PIN} selection policies: Are they really effective?",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "484--496",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jung:2012:CCC,
  author =       "Youna Jung and James B. D. Joshi",
  title =        "{CRiBAC}: Community-centric role interaction based
                 access control model",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "497--523",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000351",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ayuso:2012:FFC,
  author =       "Pablo Neira Ayuso and Rafael M. Gasca and Laurent
                 Lefevre",
  title =        "{FT}-{FW}: a cluster-based fault-tolerant architecture
                 for stateful firewalls",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "524--539",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000156",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gouglidis:2012:DAC,
  author =       "Antonios Gouglidis and Ioannis Mavridis",
  title =        "{domRBAC}: an access control model for modern
                 collaborative systems",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "540--556",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Blasco:2012:BIL,
  author =       "Jorge Blasco and Julio Cesar Hernandez-Castro and Juan
                 E. Tapiador and Arturo Ribagorda",
  title =        "Bypassing information leakage protection with trusted
                 applications",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "557--568",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ksiezopolski:2012:QMQ,
  author =       "Bogdan Ksiezopolski",
  title =        "{QoP}-{ML}: Quality of protection modelling language
                 for cryptographic protocols",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "569--596",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pfleeger:2012:LBS,
  author =       "Shari Lawrence Pfleeger and Deanna D. Caputo",
  title =        "Leveraging behavioral science to mitigate cyber
                 security risk",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "597--611",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001659",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{VanGundy:2012:NUR,
  author =       "Matthew {Van Gundy} and Hao Chen",
  title =        "{Noncespaces}: Using randomization to defeat
                 cross-site scripting attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "612--628",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001477",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hudic:2012:PCC,
  author =       "Aleksandar Hudic and Edgar Weippl",
  title =        "Private Cloud Computing: Consolidation,
                 Virtualization, and Service-Oriented Infrastructure",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "629--629",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000612",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cuppens-Boulahia:2012:PTO,
  author =       "Nora Cuppens-Boulahia",
  title =        "Penetration Tester's Open Source Toolkit",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "630--632",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000600",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michael:2012:SCC,
  author =       "Katina Michael",
  title =        "Securing the Cloud: Cloud Computer Security Techniques
                 and Tactics",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "633--633",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000569",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michael:2012:BIS,
  author =       "Katina Michael",
  title =        "The Basics of Information Security: Understanding the
                 Fundamentals of {InfoSec} in Theory and Practice",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "634--635",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Weippl:2012:ESE,
  author =       "Edgar Weippl and Manuel Leithner",
  title =        "Enterprise Security for the Executive",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "636--636",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200051X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caelli:2012:CWT,
  author =       "William J. (Bill) Caelli",
  title =        "Cyber Warfare --- Techniques, Tactics and Tools for
                 Security Practitioners",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "637--637",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000430",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leithner:2012:TMS,
  author =       "Manuel Leithner and Edgar R. Weippl",
  title =        "{Thor}'s {Microsoft} Security {Bible}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "638--638",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000405",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leithner:2012:XFD,
  author =       "Manuel Leithner and Edgar Weippl",
  title =        "{XBOX} 360 Forensics: a Digital Forensics Guide to
                 Examining Artifacts",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "639--639",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:EBa,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000703",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PJa,
  author =       "Anonymous",
  title =        "Pages 375--640 ({June 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "4",
  pages =        "??--??",
  month =        jun,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:28 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "iii--iii",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000880",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2012:Ec,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "641--642",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000934",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahmad:2012:IRT,
  author =       "Atif Ahmad and Justin Hadgkiss and A. B. Ruighaver",
  title =        "Incident response teams --- Challenges in supporting
                 the organisational security function",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "643--652",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000624",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Martinez:2012:SAM,
  author =       "Sergio Mart{\'\i}nez and David S{\'a}nchez and Aida
                 Valls",
  title =        "Semantic adaptive microaggregation of categorical
                 microdata",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "653--672",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000648",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Padayachee:2012:TCI,
  author =       "Keshnee Padayachee",
  title =        "Taxonomy of compliant information security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "673--680",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200065X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Uzunov:2012:SDS,
  author =       "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
                 Falkner",
  title =        "Securing distributed systems using patterns: a
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "681--703",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000661",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yan:2012:SMA,
  author =       "Diqun Yan and Rangding Wang and Xianmin Yu and Jie
                 Zhu",
  title =        "Steganography for {MP3} audio by exploiting the rule
                 of window switching",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "704--716",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000673",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Uzun:2012:SLP,
  author =       "Yasin Uzun and Kemal Bicakci",
  title =        "A second look at the performance of neural networks
                 for keystroke dynamics using a publicly available
                 dataset",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "717--726",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000636",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Callegari:2012:WCI,
  author =       "C. Callegari and S. Giordano and M. Pagano and T.
                 Pepe",
  title =        "{WAVE}-{CUSUM}: Improving {CUSUM} performance in
                 network anomaly detection by means of wavelet
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "727--735",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bayuk:2012:PP,
  author =       "Jennifer L. Bayuk",
  title =        "A programmer's perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "736--737",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200079X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Leithner:2012:LTH,
  author =       "Manuel Leithner and Edgar Weippl",
  title =        "Low Tech Hacking",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "738--738",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000806",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000855",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PJb,
  author =       "Anonymous",
  title =        "Pages 641--738 ({July 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "5",
  pages =        "??--??",
  month =        jul,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "iii--iii",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001113",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2012:Ed,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "739--740",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001149",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fu:2012:EHA,
  author =       "Anmin Fu and Yuqing Zhang and Zhenchao Zhu and Qi Jing
                 and Jingyu Feng",
  title =        "An efficient handover authentication scheme with
                 privacy preservation for {IEEE} 802.16m network",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "741--749",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001009",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khansa:2012:IHP,
  author =       "Lara Khansa and Deborah F. Cook and Tabitha James and
                 Olga Bruyaka",
  title =        "Impact of {HIPAA} provisions on the stock market value
                 of healthcare institutions, and information security
                 and other information technology firms",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "750--770",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000995",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Castiglione:2012:ESM,
  author =       "Aniello Castiglione and Giuseppe Cattaneo and Maurizio
                 Cembalo and Alfredo De Santis and Pompeo Faruolo and
                 Fabio Petagna and Umberto Ferraro Petrillo",
  title =        "Engineering a secure mobile messaging framework",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "771--781",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2012.06.004",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200096X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shiaeles:2012:RTD,
  author =       "Stavros N. Shiaeles and Vasilios Katos and Alexandros
                 S. Karakos and Basil K. Papadopoulos",
  title =        "Real time {DDoS} detection using fuzzy estimators",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "782--790",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000922",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hsieh:2012:EHF,
  author =       "Wen-Bin Hsieh and Jenq-Shiou Leu",
  title =        "Exploiting hash functions to intensify the remote user
                 authentication scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "791--798",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000910",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michael:2012:HNG,
  author =       "Katina Michael",
  title =        "Hacking: the Next Generation",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "799--799",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000971",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wedge:2012:BDF,
  author =       "Tim Wedge",
  title =        "The Basics of Digital Forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "800--800",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000983",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsoumas:2012:ICW,
  author =       "Bill Tsoumas and Dimitris Gritzalis",
  title =        "Inside Cyber Warfare: Mapping the Cyber Underworld",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "801--801",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000831",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mylonas:2012:PMA,
  author =       "Alexis Mylonas and Dimitris Gritzalis",
  title =        "Practical Malware Analysis: the Hands-On Guide to
                 Dissecting Malicious Software",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "802--803",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000818",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001083",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PS,
  author =       "Anonymous",
  title =        "Pages 739--804 ({September 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "6",
  pages =        "??--??",
  month =        sep,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:29 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "iii--iii",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001290",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:ECS,
  author =       "Anonymous",
  title =        "Editorial Computers and Security Special Issue
                 {IFIP\slash SEC 2010 ``Security and Privacy --- Silver
                 Linings in the Cloud''}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "805--805",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200137X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Coull:2012:UDR,
  author =       "Scott E. Coull and Andrew M. White and Ting-Fang Yen
                 and Fabian Monrose and Michael K. Reiter",
  title =        "Understanding domain registration abuses",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "806--815",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200082X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hasan:2012:PPF,
  author =       "Omar Hasan and Lionel Brunie and Elisa Bertino",
  title =        "Preserving privacy of feedback providers in
                 decentralized reputation systems",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "816--826",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001465",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Magazinius:2012:FID,
  author =       "Jonas Magazinius and Alejandro Russo and Andrei
                 Sabelfeld",
  title =        "On-the-fly inlining of dynamic security monitors",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "827--843",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404811001180",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Colantonio:2012:BDD,
  author =       "Alessandro Colantonio and Roberto {Di Pietro} and Nino
                 Vincenzo Verde",
  title =        "A business-driven decomposition methodology for role
                 mining",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "844--855",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812000090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "7",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001265",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:A,
  author =       "Anonymous",
  title =        "Announcement",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "ii--ii",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001575",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "iii--iii",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200154X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:CP,
  author =       "Anonymous",
  title =        "Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "iii--iv",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001587",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2012:Ee,
  author =       "Gene Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "857--858",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001691",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Qian:2012:MIS,
  author =       "Ying Qian and Yulin Fang and Jose J. Gonzalez",
  title =        "Managing information security risks during new
                 technology adoption",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "859--869",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001368",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shi:2012:SED,
  author =       "Jie Shi and Yingjiu Li and Robert H. Deng",
  title =        "A secure and efficient discovery service system in
                 {EPCglobal} network",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "870--885",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200123X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2012:FQE,
  author =       "Yu-Lun Huang and Hsin-Yi Tsai",
  title =        "A framework for quantitative evaluation of parallel
                 control-flow obfuscation",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "886--896",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001198",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shehab:2012:ACO,
  author =       "Mohamed Shehab and Anna Squicciarini and Gail-Joon Ahn
                 and Irini Kokkinou",
  title =        "Access control for online social networks third party
                 applications",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "897--911",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001186",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2012:OMS,
  author =       "Zhi Yang and Lihua Yin and Shuyuan Jin and Xingyuan
                 Chen",
  title =        "Optimal mining on security labels for decentralized
                 information flow control",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "912--924",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001174",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mut-Puigserver:2012:SET,
  author =       "Maci{\`a} Mut-Puigserver and M. Magdalena
                 Payeras-Capell{\`a} and Josep-Llu{\'\i}s Ferrer-Gomila
                 and Arnau Vives-Guasch and Jordi Castell{\`a}-Roca",
  title =        "A survey of electronic ticketing applied to
                 transport",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "925--939",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001058",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hjorth:2012:TDS,
  author =       "Theis Solberg Hjorth and Rune Torbensen",
  title =        "Trusted Domain: a security platform for home
                 automation",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "940--955",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001046",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alcaraz:2012:SKM,
  author =       "Cristina Alcaraz and Javier Lopez and Rodrigo Roman
                 and Hsiao-Hwa Chen",
  title =        "Selecting key management schemes for {WSN}
                 applications",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "956--966",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001034",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rekhis:2012:HVT,
  author =       "Slim Rekhis and Noureddine Boudriga",
  title =        "A Hierarchical Visibility theory for formal digital
                 investigation of anti-forensic attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "967--982",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001022",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2012:PPE,
  author =       "Steven Furnell and Nathan Clarke",
  title =        "Power to the people? {The} evolving recognition of
                 human aspects of security",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "983--988",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001228",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jardi-Cedo:2012:SPS,
  author =       "Roger Jard{\'\i}-Ced{\'o} and Jordi Pujol-Ahull{\'o}
                 and Jordi Castell{\`a}-Roca and Alexandre Viejo",
  title =        "Study on poll-site voting and verification systems",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "989--1010",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001162",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bayuk:2012:WT,
  author =       "Jennifer L. Bayuk",
  title =        "Wishful thinking",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "1011--1012",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001241",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michael:2012:HSC,
  author =       "Katina Michael",
  title =        "Handbook on Securing Cyber-Physical Critical
                 Infrastructure: Foundations and Challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "1013--1013",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001150",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001514",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2012:PN,
  author =       "Anonymous",
  title =        "Pages 857--1014 ({November 2012})",
  journal =      j-COMPUT-SECUR,
  volume =       "31",
  number =       "8",
  pages =        "??--??",
  month =        nov,
  year =         "2012",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:30 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "iii--iv",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001873",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2013:Ea,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "v--v",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Toledo:2013:DFS,
  author =       "Nerea Toledo and Marivi Higuero and Jasone Astorga and
                 Marina Aguado and Jean Marie Bonnin",
  title =        "Design and formal security evaluation of {NeMHIP}: a
                 new secure and efficient network mobility management
                 protocol based on the Host Identity Protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "1--18",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001599",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:PF,
  author =       "Anonymous",
  title =        "Pages 1--270 ({February 2013})",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "1--270",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schmidt:2013:TFV,
  author =       "Andreas U. Schmidt and Andreas Leicher and Andreas
                 Brett and Yogendra Shah and Inhyok Cha",
  title =        "Tree-formed verification data for trusted platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "19--35",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200140X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tan:2013:CRM,
  author =       "Hailun Tan and Diethelm Ostry and John Zic and Sanjay
                 Jha",
  title =        "A confidential and {DoS}-resistant multi-hop code
                 dissemination protocol for wireless sensor networks",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "36--55",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001484",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garfinkel:2013:DMT,
  author =       "Simson L. Garfinkel",
  title =        "Digital media triage with bulk data analysis and {\em
                 bulk\_extractor}",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "56--72",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001472",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reddy:2013:ADF,
  author =       "K. Reddy and H. S. Venter",
  title =        "The architecture of a digital forensic readiness
                 management system",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "73--89",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001447",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crossler:2013:FDB,
  author =       "Robert E. Crossler and Allen C. Johnston and Paul
                 Benjamin Lowry and Qing Hu and Merrill Warkentin and
                 Richard Baskerville",
  title =        "Future directions for behavioral information security
                 research",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "90--101",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2012.09.010",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001460",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Damopoulos:2013:KTT,
  author =       "D. Damopoulos and G. Kambourakis and S. Gritzalis",
  title =        "From keyloggers to touchloggers: Take the rough with
                 the smooth",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "102--114",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001654",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lasc:2013:DDA,
  author =       "Ioana Lasc and Reiner Dojen and Tom Coffey",
  title =        "On the detection of desynchronisation attacks against
                 security protocols that use dynamic shared secrets",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "115--129",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001678",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeMott:2013:SBF,
  author =       "Jared D. DeMott and Richard J. Enbody and William F.
                 Punch",
  title =        "Systematic bug finding and fault localization enhanced
                 with input data tracking",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "130--157",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200168X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2013:EAG,
  author =       "Shuzhen Wang and Zonghua Zhang and Youki Kadobayashi",
  title =        "Exploring attack graph for cost-benefit security
                 hardening: a probabilistic approach",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "158--169",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001496",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Joaquim:2013:EEE,
  author =       "Rui Joaquim and Paulo Ferreira and Carlos Ribeiro",
  title =        "{EVIV}: an end-to-end verifiable {Internet} voting
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "170--191",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001642",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lerch-Hostalot:2013:LMS,
  author =       "Daniel Lerch-Hostalot and David Meg{\'\i}as",
  title =        "{LSB} matching steganalysis based on patterns of pixel
                 differences and random embedding",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "192--206",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001745",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paulin:2013:USF,
  author =       "Alois Paulin and Tatjana Welzer",
  title =        "A universal system for fair non-repudiable certified
                 e-mail without a trusted third party",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "207--218",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001757",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schreuders:2013:SAA,
  author =       "Z. Cliffe Schreuders and Tanya McGill and Christian
                 Payne",
  title =        "The state of the art of application restrictions and
                 sandboxes: a survey of application-oriented access
                 controls and their shortfalls",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "219--241",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001435",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2013:SRB,
  author =       "Ken H. Guo",
  title =        "Security-related behavior in using information systems
                 in the workplace: a review and synthesis",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "242--251",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001666",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jammalamadaka:2013:MAO,
  author =       "Ravi Chandra Jammalamadaka and Roberto Gamboni and
                 Sharad Mehrotra and Kent Seamons and Nalini
                 Venkatasubramanian",
  title =        "A middleware approach for outsourcing data securely",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "252--266",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200106X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Soupionis:2013:HV,
  author =       "Yannis Soupionis and Dimitris Gritzalis",
  title =        "Hacking {VoIP}",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "267--267",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001423",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kandias:2013:MPT,
  author =       "Miltiadis Kandias and Dimitris Gritzalis",
  title =        "{Metasploit}: the Penetration Tester's Guide",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "268--269",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001459",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBa,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "32",
  number =       "??",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001848",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "iii--iii",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ea,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "1--2",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kolkowska:2013:OPI,
  author =       "Ella Kolkowska and Gurpreet Dhillon",
  title =        "Organizational power and information security rule
                 compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "3--11",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001010",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abramov:2013:TAS,
  author =       "Raz Abramov and Amir Herzberg",
  title =        "{TCP Ack} storm {DoS} attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "12--27",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001411",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Montanari:2013:DSP,
  author =       "Mirko Montanari and Ellick Chan and Kevin Larson and
                 Wucherl Yoo and Roy H. Campbell",
  title =        "Distributed security policy conformance",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "28--40",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001770",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Armando:2013:AFB,
  author =       "Alessandro Armando and Roberto Carbone and Luca
                 Compagna and Jorge Cu{\'e}llar and Giancarlo Pellegrino
                 and Alessandro Sorniotti",
  title =        "An authentication flaw in browser-based Single Sign-On
                 protocols: Impact and remediations",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "41--58",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2012.08.007",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001356",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Haenni:2013:GAP,
  author =       "Rolf Haenni and Reto E. Koenig",
  title =        "A generic approach to prevent board flooding attacks
                 in coercion-resistant electronic voting schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "59--69",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001381",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "33",
  number =       "??",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:31 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "iii--iii",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:SIT,
  author =       "Anonymous",
  title =        "Special issue on trust in cyber, physical and social
                 computing: Call for papers",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "iii--iii",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2013:Eb,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "iv--iv",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kussul:2013:AST,
  author =       "Olga Kussul and Nataliia Kussul and Sergii Skakun",
  title =        "Assessing security threat scenarios for utility-based
                 reputation model in grids",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "1--15",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:PM,
  author =       "Anonymous",
  title =        "Pages 1--140 ({May 2013})",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "1--140",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hassanzadeh:2013:OCI,
  author =       "Amin Hassanzadeh and Radu Stoleru",
  title =        "On the optimality of cooperative intrusion detection
                 for resource constrained wireless networks",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "16--35",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cho:2013:CFM,
  author =       "Gyu-Sang Cho",
  title =        "A computer forensic method for detecting timestamp
                 forgery in {NTFS}",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "36--46",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001721",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mylonas:2013:DSU,
  author =       "Alexios Mylonas and Anastasia Kastania and Dimitris
                 Gritzalis",
  title =        "Delegate the smartphone user? {Security} awareness in
                 smartphone platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "47--66",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001733",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Ardieta:2013:TSA,
  author =       "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
                 and Jose M. de Fuentes and Benjamin Ramos",
  title =        "A taxonomy and survey of attacks on digital
                 signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "67--112",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001794",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Salah:2013:ASW,
  author =       "Khaled Salah and Jose M. Alcaraz Calero and Jorge
                 Bernal Bernab{\'e} and Juan M. Mar{\'\i}n Perez and
                 Sherali Zeadally",
  title =        "Analyzing the security of {Windows 7} and {Linux} for
                 cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "113--122",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001800",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramanathan:2013:PDI,
  author =       "Venkatesh Ramanathan and Harry Wechsler",
  title =        "Phishing detection and impersonated entity discovery
                 using {Conditional Random Field} and {Latent Dirichlet
                 Allocation}",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "123--139",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001812",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "34",
  number =       "??",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "iii--iii",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ec,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "1--1",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Asghar:2013:EES,
  author =       "Muhammad Rizwan Asghar and Mihaela Ion and Giovanni
                 Russello and Bruno Crispo",
  title =        "{{\em ESPOON$_{\it ERBAC}$}}: Enforcing security
                 policies in outsourced environments",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "2--24",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001824",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jerschow:2013:MSR,
  author =       "Yves Igor Jerschow and Martin Mauve",
  title =        "Modular square root puzzles: Design of
                 non-parallelizable and non-interactive client puzzles",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "25--36",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001782",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Salim:2013:BAR,
  author =       "Farzad Salim and Jason Reid and Uwe Dulleck and Ed
                 Dawson",
  title =        "Budget-aware Role Based Access Control",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "37--50",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481200171X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "35",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "iii--iii",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000734",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2013:ALG,
  author =       "Su Yong Kim and Sungdeok Cha and Doo-Hwan Bae",
  title =        "Automatic and lightweight grammar generation for fuzz
                 testing",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "1--11",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:PJ,
  author =       "Anonymous",
  title =        "Pages 1--68 ({July 2013})",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "1--68",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choo:2013:NPM,
  author =       "Kim-Kwang Raymond Choo",
  title =        "New payment methods: a review of 2010-2012 {FATF}
                 mutual evaluation reports",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "12--26",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fu:2013:VSP,
  author =       "Yulong Fu and Ousmane Kon{\'e}",
  title =        "Validation of security protocol implementations from
                 security objectives",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "27--39",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2013:NIC,
  author =       "Hegui Zhu and Cheng Zhao and Xiangde Zhang and
                 Lianping Yang",
  title =        "A novel iris and chaos-based random number generator",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "40--48",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{James:2013:UNB,
  author =       "Tabitha L. James and Lara Khansa and Deborah F. Cook
                 and Olga Bruyaka and Kellie B. Keeling",
  title =        "Using network-based text analysis to analyze trends in
                 {Microsoft}'s security innovations",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "49--67",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:IEB,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "36",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:32 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "iii--iii",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ed,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "iv--v",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hamedheidari:2013:NAB,
  author =       "Sina Hamedheidari and Reza Rafeh",
  title =        "A novel agent-based approach to detect sinkhole
                 attacks in wireless sensor networks",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "1--14",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000783",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:PS,
  author =       "Anonymous",
  title =        "Pages 1--228 ({September 2013})",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "1--228",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jin:2013:MFB,
  author =       "Lei Jin and James B. D. Joshi and Mohd Anwar",
  title =        "Mutual-friend based attacks in social network
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "15--30",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanDeursen:2013:MIS,
  author =       "Nicole van Deursen and William J. Buchanan and
                 Alistair Duff",
  title =        "Monitoring information security risks within health
                 care",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "31--45",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roh:2013:WBC,
  author =       "Byeong-hee Roh and Ju Wan Kim and Ki-Yeol Ryu and
                 Jea-Tek Ryu",
  title =        "A whitelist-based countermeasure scheme using a
                 {Bloom} filter against {SIP} flooding attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "46--61",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000771",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Riley:2013:FPT,
  author =       "Ryan Riley",
  title =        "A framework for prototyping and testing data-only
                 rootkit attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "62--71",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heckman:2013:ACD,
  author =       "Kristin E. Heckman and Michael J. Walsh and Frank J.
                 Stech and Todd A. O'Boyle and Stephen R. DiCato and
                 Audra F. Herber",
  title =        "Active cyber defense with denial and deception: a
                 cyber-wargame experiment",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "72--77",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.03.015",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300076X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Savola:2013:QSM,
  author =       "Reijo M. Savola",
  title =        "Quality of security metrics and measurements",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "78--90",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000850",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nakaguro:2013:DLN,
  author =       "Yoichi Nakaguro and Matthew N. Dailey and Sanparith
                 Marukatat and Stanislav S. Makhanov",
  title =        "Defeating line-noise {CAPTCHAs} with multiple
                 quadratic snakes",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "91--110",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000862",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alcaide:2013:AAP,
  author =       "Almudena Alcaide and Esther Palomar and Jos{\'e}
                 Montero-Castillo and Arturo Ribagorda",
  title =        "Anonymous authentication for privacy-preserving {IoT}
                 target-driven applications",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "111--123",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2013:EAF,
  author =       "Celia Li and Uyen Trang Nguyen and Hoang Lan Nguyen
                 and Nurul Huda",
  title =        "Efficient authentication for fast handover in wireless
                 mesh networks",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "124--142",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abdalaal:2013:PPP,
  author =       "Ahmed Abdalaal and Mehmet Ercan Nergiz and Yucel
                 Saygin",
  title =        "Privacy-preserving publishing of opinion polls",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "143--154",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bayuk:2013:STA,
  author =       "Jennifer L. Bayuk",
  title =        "Security as a theoretical attribute construct",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "155--175",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spathoulas:2013:EIP,
  author =       "Georgios P. Spathoulas and Sokratis K. Katsikas",
  title =        "Enhancing {IDS} performance through comprehensive
                 alert post-processing",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "176--196",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Castillo-Perez:2013:ORC,
  author =       "Sergio Castillo-P{\'e}rez and Joaquin Garcia-Alfaro",
  title =        "Onion routing circuit construction via latency
                 graphs",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "197--214",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zonouz:2013:SCB,
  author =       "Saman Zonouz and Amir Houmansadr and Robin Berthier
                 and Nikita Borisov and William Sanders",
  title =        "Secloud: a cloud-based comprehensive and lightweight
                 security solution for smartphones",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "215--227",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300031X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "37",
  number =       "??",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000989",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "iii--iii",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300117X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gritzalis:2013:CDE,
  author =       "Dimitris Gritzalis and Gurvirender Tejay",
  title =        "Cybercrime in the Digital Economy --- Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "1--2",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ouedraogo:2013:SCS,
  author =       "Moussa Ouedraogo and Haralambos Mouratidis",
  title =        "Selecting a Cloud Service Provider in the age of
                 cybercrime",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "3--13",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lopez:2013:SCO,
  author =       "Javier Lopez and Cristina Alcaraz and Rodrigo Roman",
  title =        "Smart control of operational threats in control
                 substations",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "14--27",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Luo:2013:IPV,
  author =       "Xin (Robert) Luo and Wei Zhang and Stephen Burd and
                 Alessandro Seazzu",
  title =        "Investigating phishing victimization with the
                 Heuristic-Systematic Model: a theoretical framework and
                 an exploration",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "28--38",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404812001927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spyridopoulos:2013:GTD,
  author =       "T. Spyridopoulos and G. Karanikas and T. Tryfonas and
                 G. Oikonomou",
  title =        "A game theoretic defence framework against {DoS\slash
                 DDoS} cyber attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "39--50",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300059X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mylonas:2013:SSD,
  author =       "Alexios Mylonas and Vasilis Meletiadis and Lilian
                 Mitrou and Dimitris Gritzalis",
  title =        "{Smartphone} sensor data as digital evidence",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "51--75",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsigkritis:2013:AGE,
  author =       "Theocharis Tsigkritis and George Spanoudakis",
  title =        "Assessing the genuineness of events in runtime
                 monitoring of cyber systems",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "76--96",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{vonSolms:2013:ISC,
  author =       "Rossouw von Solms and Johan van Niekerk",
  title =        "From information security to cyber security",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "97--102",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kohn:2013:IDF,
  author =       "M. D. Kohn and M. M. Eloff and J. H. P. Eloff",
  title =        "Integrated digital forensic process model",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "103--115",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBf,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "38",
  number =       "??",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:33 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001144",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "iii--iii",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001508",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ci,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "iii--iv",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Cj,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "iii--iv",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:Ee,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "1--1",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001454",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2013:BDB,
  author =       "David Zhao and Issa Traore and Bassam Sayed and Wei Lu
                 and Sherif Saad and Ali Ghorbani and Dan Garant",
  title =        "Botnet detection based on traffic behavior analysis
                 and flow intervals",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "2--16",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.04.007",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Herrmann:2013:BBT,
  author =       "Dominik Herrmann and Christian Banse and Hannes
                 Federrath",
  title =        "Behavior-based tracking: Exploiting characteristic
                 patterns in {DNS} traffic",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "17--33",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000576",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rios:2013:CCT,
  author =       "Ruben Rios and Jose A. Onieva and Javier Lopez",
  title =        "Covert communications through network configuration
                 messages",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "34--46",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeCapitanidiVimercati:2013:EDW,
  author =       "Sabrina {De Capitani di Vimercati} and Sara Foresti
                 and Sushil Jajodia and Giovanni Livraga and Stefano
                 Paraboschi and Pierangela Samarati",
  title =        "Enforcing dynamic write privileges in data
                 outsourcing",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "47--63",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.01.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000266",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia-Alfaro:2013:MSF,
  author =       "Joaquin Garcia-Alfaro and Fr{\'e}d{\'e}ric Cuppens and
                 Nora Cuppens-Boulahia and Salvador Martinez and Jordi
                 Cabot",
  title =        "Management of stateful firewall misconfiguration",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "64--85",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khambhammettu:2013:FRA,
  author =       "Hemanth Khambhammettu and Sofiene Boulares and Kamel
                 Adi and Luigi Logrippo",
  title =        "A framework for risk assessment in access control
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "86--103",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Armando:2013:BFA,
  author =       "Alessandro Armando and Alessio Merlo and Mauro
                 Migliardi and Luca Verderame",
  title =        "Breaking and fixing the {Android} Launching Flow",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "104--115",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000540",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Agudo:2013:PAC,
  author =       "Isaac Agudo and Ruben Rios and Javier Lopez",
  title =        "A privacy-aware continuous authentication scheme for
                 proximity-based access control",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "117--126",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:PN,
  author =       "Anonymous",
  title =        "Pages 117--502 ({November 2013})",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "117--502",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Crawford:2013:FCT,
  author =       "Heather Crawford and Karen Renaud and Tim Storer",
  title =        "A framework for continuous, transparent mobile device
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "127--136",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Derawi:2013:GAR,
  author =       "Mohammad Derawi and Patrick Bours",
  title =        "Gait and activity recognition using commercial
                 phones",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "137--144",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barlow:2013:DME,
  author =       "Jordan B. Barlow and Merrill Warkentin and Dustin
                 Ormond and Alan R. Dennis",
  title =        "Don't make excuses! {Discouraging} neutralization to
                 reduce {IT} policy violation",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "145--159",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trabelsi:2013:DTA,
  author =       "Zouheir Trabelsi and Liren Zhang and Safaa Zeidan and
                 Kilani Ghoudi",
  title =        "Dynamic traffic awareness statistical model for
                 firewall performance enhancement",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "160--172",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2013:CSM,
  author =       "Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang
                 and Zhijie Shi and Zhe Liu and Jean-Fran{\c{c}}ois
                 Gallais",
  title =        "A comprehensive study of multiple deductions-based
                 algebraic trace driven cache attacks on {AES}",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "173--189",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.07.002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300093X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zonouz:2013:CPS,
  author =       "Saman Zonouz and Parisa Haghani",
  title =        "Cyber-physical security metric inference in smart grid
                 critical infrastructures based on system
                 administrators' responsive behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "190--200",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sharma:2013:AAM,
  author =       "Manisha Sharma and Shamik Sural and Jaideep Vaidya and
                 Vijayalakshmi Atluri",
  title =        "{AMTRAC}: an administrative model for temporal
                 role-based access control",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "201--218",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Azad:2013:CRD,
  author =       "Muhammad Ajmal Azad and Ricardo Morla",
  title =        "{Caller-REP}: Detecting unwanted calls with caller
                 social strength",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "219--236",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Baracaldo:2013:ARM,
  author =       "Nathalie Baracaldo and James Joshi",
  title =        "An adaptive risk management and access control
                 framework to mitigate insider threats",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "237--254",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2013:EID,
  author =       "Chun Guo and Ya-Jian Zhou and Yuan Ping and Shou-Shan
                 Luo and Yu-Ping Lai and Zhong-Kun Zhang",
  title =        "Efficient intrusion detection using representative
                 instances",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "255--267",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.08.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300120X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Azmi:2013:SSH,
  author =       "Reza Azmi and Boshra Pishgoo",
  title =        "{SHADuDT}: Secure hypervisor-based anomaly detection
                 using danger theory",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "268--288",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stanekova:2013:ADM,
  author =       "L'ubica Stanekov{\'a} and Martin Stanek",
  title =        "Analysis of dictionary methods for {PIN} selection",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "289--298",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Djamaludin:2013:EIT,
  author =       "C. I. Djamaludin and E. Foo and P. Corke",
  title =        "Establishing initial trust in autonomous Delay
                 Tolerant Networks without centralised {PKI}",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "299--314",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001247",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ding:2013:FMD,
  author =       "Yuxin Ding and Xuebing Yuan and Ke Tang and Xiao Xiao
                 and Yibin Zhang",
  title =        "A fast malware detection algorithm based on
                 objective-oriented association mining",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "315--324",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Belguechi:2013:IFC,
  author =       "Rima Belguechi and Estelle Cherrier and Christophe
                 Rosenberger and Samy Ait-Aoudia",
  title =        "An integrated framework combining Bio-Hashed minutiae
                 template and {PKCS15} compliant card for a better
                 secure management of fingerprint cancelable templates",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "325--339",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001260",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2013:IAM,
  author =       "Ying-Dar Lin and Yuan-Cheng Lai and Chien-Hung Chen
                 and Hao-Chuan Tsai",
  title =        "Identifying {Android} malicious repackaged
                 applications by thread-grained system call sequences",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "340--350",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{BenSaied:2013:TMS,
  author =       "Yosra {Ben Saied} and Alexis Olivereau and Djamal
                 Zeghlache and Maryline Laurent",
  title =        "Trust management system design for the {Internet of
                 Things}: a context-aware and multi-service approach",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "351--365",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seo:2013:AAP,
  author =       "Dongwon Seo and Heejo Lee and Adrian Perrig",
  title =        "{APFS}: Adaptive Probabilistic Filter Scheduling
                 against distributed denial-of-service attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "366--385",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001314",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Silic:2013:DUO,
  author =       "Mario Silic",
  title =        "Dual-use open source security software in
                 organizations --- Dilemma: Help or hinder?",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "386--395",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001326",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ashenden:2013:COC,
  author =       "Debi Ashenden and Angela Sasse",
  title =        "{CISOs} and organisational culture: Their own worst
                 enemy?",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "396--405",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001338",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karopoulos:2013:UCS,
  author =       "Georgios Karopoulos and Paolo Mori and Fabio
                 Martinelli",
  title =        "Usage control in {SIP}-based multimedia delivery",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "406--418",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300134X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Park:2013:DCM,
  author =       "Younghee Park and Douglas S. Reeves and Mark Stamp",
  title =        "Deriving common malware behavior through graph
                 clustering",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "419--430",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001351",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2013:IAA,
  author =       "Peng Zhou and Xiapu Luo and Rocky K. C. Chang",
  title =        "Inference attacks against trust-based onion routing:
                 Trust degree to the rescue",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "431--446",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cheng:2013:UVS,
  author =       "Lijiao Cheng and Ying Li and Wenli Li and Eric Holm
                 and Qingguo Zhai",
  title =        "Understanding the violation of {IS} security policy in
                 organizations: an integrated model based on social
                 control and deterrence theory",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "447--459",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2013:CBW,
  author =       "Ying-Dar Lin and Yuan-Cheng Lai and Cheng-Yuan Ho and
                 Wei-Hsuan Tai",
  title =        "Creditability-based weighted voting for reducing false
                 positives and negatives in intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "460--474",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001399",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anagnostopoulos:2013:DAA,
  author =       "Marios Anagnostopoulos and Georgios Kambourakis and
                 Panagiotis Kopanos and Georgios Louloudakis and
                 Stefanos Gritzalis",
  title =        "{DNS} amplification attack revisited",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "475--485",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001405",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hocking:2013:COU,
  author =       "C. G. Hocking and S. M. Furnell and N. L. Clarke and
                 P. L. Reynolds",
  title =        "{Co}-operative user identity verification using an
                 Authentication Aura",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "486--502",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBg,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (Part A)",
  number =       "??",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001478",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBh,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:34 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2013:EBi,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "39 (part B)",
  number =       "??",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2013",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:35 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "iii--iii",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001752",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Ea,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "iv--iv",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PP,
  author =       "Anonymous",
  title =        "The passing of a pioneer",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "v--vi",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001788",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Armando:2014:MCA,
  author =       "Alessandro Armando and Serena Elisa Ponta",
  title =        "Model checking authorization requirements in business
                 processes",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "1--22",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001429",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PF,
  author =       "Anonymous",
  title =        "Pages 1--114 ({February 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "1--114",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gowtham:2014:CEA,
  author =       "R. Gowtham and Ilango Krishnamurthi",
  title =        "A comprehensive and efficacious architecture for
                 detecting phishing webpages",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "23--37",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001442",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bachlechner:2014:SCC,
  author =       "Daniel Bachlechner and Stefan Thalmann and Ronald
                 Maier",
  title =        "Security and compliance challenges in complex {IT}
                 outsourcing arrangements: a multi-stakeholder
                 perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "38--59",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001533",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Patsakis:2014:TDS,
  author =       "Constantinos Patsakis and Kleanthis Dellios and
                 M{\'e}lanie Bouroche",
  title =        "Towards a distributed secure in-vehicle communication
                 architecture for modern vehicles",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "60--74",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300165X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2014:EDN,
  author =       "Jie Yang and Hai-tao Liu and Zu-ping Zhang and Jian
                 Dong",
  title =        "Extended {DMTP}: a new protocol for improved graylist
                 categorization",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "75--83",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001430",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xenakis:2014:APT,
  author =       "Christos Xenakis and Christoforos Ntantogian",
  title =        "An advanced persistent threat in {3G} networks:
                 Attacking the home network from roaming networks",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "84--94",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001685",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhatia:2014:FGR,
  author =       "Sajal Bhatia and Desmond Schmidt and George Mohay and
                 Alan Tickle",
  title =        "A framework for generating realistic traffic for
                 Distributed Denial-of-Service attacks and Flash
                 Events",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "95--107",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001673",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Denning:2014:FPA,
  author =       "Dorothy E. Denning",
  title =        "Framework and principles for active cyber defense",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "108--113",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001661",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBa,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "40",
  number =       "??",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001727",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "iii--iii",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramaswamy:2014:E,
  author =       "Lakshmish Ramaswamy and Barbara Carminati and Lujo
                 Bauer and Dongwan Shin and James Joshi and Calton Pu
                 and Dimitris Gritzalis",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "1--2",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2014.01.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Le:2014:CEA,
  author =       "Meixing Le and Krishna Kant and Sushil Jajodia",
  title =        "Consistency and enforcement of access rules in
                 cooperative data sharing environment",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "3--18",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jung:2014:CPB,
  author =       "Youna Jung and James B. D. Joshi",
  title =        "{CPBAC}: Property-based access control model for
                 secure cooperation in online social networks",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "19--39",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001211",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Squicciarini:2014:IHS,
  author =       "Anna Squicciarini and Sushama Karumanchi and Dan Lin
                 and Nicole DeSisto",
  title =        "Identifying hidden social circles for advanced privacy
                 configuration",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "40--51",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gupta:2014:FPM,
  author =       "Aditi Gupta and Michael S. Kirkpatrick and Elisa
                 Bertino",
  title =        "A formal proximity model for {RBAC} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "52--67",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001296",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allahbakhsh:2014:RQU,
  author =       "Mohammad Allahbakhsh and Aleksandar Ignjatovic and
                 Boualem Benatallah and Seyed-Mehdi-Reza Beheshti and
                 Norman Foo and Elisa Bertino",
  title =        "Representation and querying of unfair evaluations in
                 social rating systems",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "68--88",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.09.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "41",
  number =       "??",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:36 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "iii--iii",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400039X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Ec,
  author =       "Anonymous",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "iv--v",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400042X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rathgeb:2014:CMB,
  author =       "C. Rathgeb and C. Busch",
  title =        "Cancelable multi-biometrics: Mixing iris-codes based
                 on adaptive {Bloom} filters",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "1--12",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PM,
  author =       "Anonymous",
  title =        "Pages 1--192 ({May 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "1--192",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schrittwieser:2014:CCH,
  author =       "Sebastian Schrittwieser and Stefan Katzenbeisser and
                 Peter Kieseberg and Markus Huber and Manuel Leithner
                 and Martin Mulazzani and Edgar Weippl",
  title =        "Covert Computation --- Hiding code in code through
                 compile-time obfuscation",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "13--26",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.12.006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahmad:2014:POC,
  author =       "Atif Ahmad and Rachelle Bosua and Rens Scheepers",
  title =        "Protecting organizational competitive advantage: a
                 knowledge leakage perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "27--39",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amthor:2014:WWM,
  author =       "Peter Amthor and Winfried E. K{\"u}hnhauser and Anja
                 P{\"o}lck",
  title =        "{WorSE}: a Workbench for Model-based Security
                 Engineering",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "40--55",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Allam:2014:SIS,
  author =       "Sean Allam and Stephen V. Flowerday and Ethan
                 Flowerday",
  title =        "{Smartphone} information security awareness: a victim
                 of operational pressures",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "56--65",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ntantogian:2014:EPA,
  author =       "Christoforos Ntantogian and Dimitris Apostolopoulos
                 and Giannis Marinakis and Christos Xenakis",
  title =        "Evaluating the privacy of {Android} mobile
                 applications under forensic analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "66--76",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{LaBarge:2014:ASR,
  author =       "Ralph LaBarge and Thomas A. Mazzuchi and Shahram
                 Sarkani",
  title =        "An automated system for rapid and secure device
                 sanitization",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "77--91",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Goseva-Popstojanova:2014:CCM,
  author =       "Katerina Goseva-Popstojanova and Goce Anastasovski and
                 Ana Dimitrijevikj and Risto Pantev and Brandon Miller",
  title =        "Characterization and classification of malicious {Web}
                 traffic",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "92--115",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000170",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Park:2014:TOS,
  author =       "Joon S. Park and Kevin A. Kwiat and Charles A. Kamhoua
                 and Jonathan White and Sookyung Kim",
  title =        "Trusted Online Social Network {(OSN)} services with
                 optimal data management",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "116--136",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000236",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kwon:2014:TAD,
  author =       "Taekyoung Kwon and Sarang Na",
  title =        "{TinyLock}: Affordable defense against smudge attacks
                 on smartphone pattern lock systems",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "137--150",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001697",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dong:2014:AES,
  author =       "Xin Dong and Jiadi Yu and Yuan Luo and Yingying Chen
                 and Guangtao Xue and Minglu Li",
  title =        "Achieving an effective, scalable and
                 privacy-preserving data sharing service in cloud
                 computing",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "151--164",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2013.12.002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001703",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parsons:2014:DEA,
  author =       "Kathryn Parsons and Agata McCormac and Marcus
                 Butavicius and Malcolm Pattinson and Cate Jerram",
  title =        "Determining employee awareness using the Human Aspects
                 of Information Security Questionnaire {(HAIS-Q)}",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "165--176",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481300179X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Michalopoulos:2014:GRT,
  author =       "Dimitrios Michalopoulos and Ioannis Mavridis and
                 Marija Jankovic",
  title =        "{GARS}: Real-time system for identification,
                 assessment and control of cyber grooming attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "177--190",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813001806",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Virvilis:2014:ADA,
  author =       "Nikos Virvilis and Dimitris Gritzalis",
  title =        "Automatic Defense Against Zero-day Polymorphic Worms
                 in Communication Networks",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "191--192",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000182",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "42",
  number =       "??",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000364",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "iii--iii",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spafford:2014:E,
  author =       "Eugene H. Spafford",
  title =        "Editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "iv--iv",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000704",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shabtai:2014:MMD,
  author =       "A. Shabtai and L. Tenenboim-Chekina and D. Mimran and
                 L. Rokach and B. Shapira and Y. Elovici",
  title =        "Mobile malware detection through analysis of
                 deviations in application network behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "1--18",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2014.02.009",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PJa,
  author =       "Anonymous",
  title =        "Pages 1--218 ({June 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "1--218",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tamjidyamcholo:2014:EMK,
  author =       "Alireza Tamjidyamcholo and Mohd Sapiyan Bin Baba and
                 Nor Liyana Mohd Shuib and Vala Ali Rohani",
  title =        "Evaluation model for knowledge sharing in information
                 security professional virtual community",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "19--34",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000297",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bou-Harb:2014:FPA,
  author =       "Elias Bou-Harb and Mourad Debbabi and Chadi Assi",
  title =        "On fingerprinting probing activities",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "35--48",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2014:SAB,
  author =       "Feng Zhu and Jinpeng Wei",
  title =        "Static analysis based invariant detection for
                 commodity operating systems",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "49--63",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kajzer:2014:EIM,
  author =       "Mitchell Kajzer and John D'Arcy and Charles R. Crowell
                 and Aaron Striegel and Dirk {Van Bruggen}",
  title =        "An exploratory investigation of message-person
                 congruence in information security awareness
                 campaigns",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "64--76",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000327",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bailey:2014:UIA,
  author =       "Kyle O. Bailey and James S. Okolica and Gilbert L.
                 Peterson",
  title =        "User identification and authentication using
                 multi-modal behavioral biometrics",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "77--89",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000340",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Flores:2014:ISK,
  author =       "Waldo Rocha Flores and Egil Antonsen and Mathias
                 Ekstedt",
  title =        "Information security knowledge sharing in
                 organizations: Investigating the effect of behavioral
                 information security governance and national culture",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "90--110",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000339",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rughinis:2014:NVN,
  author =       "Cosima Rughinis and Razvan Rughinis",
  title =        "Nothing ventured, nothing gained. {Profiles} of online
                 activity, cyber-crime exposure, and security measures
                 of end-users in {European Union}",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "111--125",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ugarte-Pedrero:2014:AAD,
  author =       "Xabier Ugarte-Pedrero and Igor Santos and Iv{\'a}n
                 Garc{\'{\i}}a-Ferreira and Sergio Huerta and Borja Sanz
                 and Pablo G. Bringas",
  title =        "On the adoption of anomaly detection for packed
                 executable filtering",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "126--144",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2014.03.012",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000522",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vrakas:2014:OUI,
  author =       "Nikos Vrakas and Dimitris Geneiatakis and Costas
                 Lambrinoudakis",
  title =        "Obscuring users' identity in {VoIP\slash IMS}
                 environments",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "145--158",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000510",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gonzalez-Manzano:2014:SEU,
  author =       "Lorena Gonz{\'a}lez-Manzano and Ana I.
                 Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
                 Arturo Ribagorda",
  title =        "{SoNeUCON$_{\rm ABC}$}, an expressive usage control
                 model for {Web}-Based Social Networks",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "159--187",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stergiopoulos:2014:BHD,
  author =       "George Stergiopoulos and Dimitris Gritzalis",
  title =        "A Bug {Hunter}'s Diary",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "188--188",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000200",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meng:2014:EEP,
  author =       "Weizhi Meng and Wenjuan Li and Lam-For Kwok",
  title =        "{EFM}: Enhancing the performance of signature-based
                 network intrusion detection systems using enhanced
                 filter mechanism",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "189--204",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400025X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fang:2014:PBA,
  author =       "Zheran Fang and Weili Han and Yingjiu Li",
  title =        "Permission based {Android} security: Issues and
                 countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "205--218",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000261",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "43",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:37 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000649",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "iii--iii",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000777",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:AVR,
  author =       "Anonymous",
  title =        "Is Anti-virus Really Dead?",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "iv--iv",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000820",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Webb:2014:SAM,
  author =       "Jeb Webb and Atif Ahmad and Sean B. Maynard and Graeme
                 Shanks",
  title =        "A situation awareness model for information security
                 risk management",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "1--15",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000571",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PJb,
  author =       "Anonymous",
  title =        "Pages 1--118 ({July 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "1--118",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kortesniemi:2014:SCU,
  author =       "Yki Kortesniemi and Mikko S{\"a}rel{\"a}",
  title =        "Survey of certificate usage in distributed access
                 control",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "16--32",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000534",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shmueli:2014:IDE,
  author =       "Erez Shmueli and Ronen Vaisenberg and Ehud Gudes and
                 Yuval Elovici",
  title =        "Implementing a database encryption solution, design
                 and implementation issues",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "33--50",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000509",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nergiz:2014:HA,
  author =       "Mehmet Ercan Nergiz and Muhammed Zahit G{\"o}k",
  title =        "Hybrid $k$-Anonymity",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "51--63",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kirchner:2014:SCM,
  author =       "Martin Kirchner and Edgar Weippl",
  title =        "Securing Cloud and Mobility",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "64--64",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ding:2014:CFB,
  author =       "Yuxin Ding and Wei Dai and Shengli Yan and Yumei
                 Zhang",
  title =        "Control flow-based opcode behavior analysis for
                 Malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "65--74",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahmadinejad:2014:UDI,
  author =       "Seyed Hossein Ahmadinejad and Philip W. L. Fong",
  title =        "Unintended disclosure of information: Inference
                 attacks by third-party extensions to Social Network
                 Systems",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "75--91",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400056X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Peng:2014:PMS,
  author =       "Sancheng Peng and Min Wu and Guojun Wang and Shui Yu",
  title =        "Propagation model of smartphone worms based on
                 semi-{Markov} process and social relationship graph",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "92--103",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jang:2014:DSI,
  author =       "Young-Su Jang and Jin-Young Choi",
  title =        "Detecting {SQL} injection attacks using query result
                 size",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "104--118",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "44",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000741",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "iii--iv",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001126",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shameli-Sendi:2014:TIR,
  author =       "Alireza Shameli-Sendi and Mohamed Cheriet and
                 Abdelwahab Hamou-Lhadj",
  title =        "Taxonomy of intrusion risk assessment and response
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "1--16",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000613",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PS,
  author =       "Anonymous",
  title =        "Pages 1--306 ({September 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "1--306",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alenezi:2014:UT,
  author =       "Mohammed N. Alenezi and Martin J. Reed",
  title =        "Uniform {DoS} traceback",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "17--26",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000601",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hamid:2014:APP,
  author =       "Isredza Rahmi A. Hamid and Jemal H. Abawajy",
  title =        "An approach for profiling phishing activities",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "27--41",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000546",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tondel:2014:ISI,
  author =       "Inger Anne T{\o}ndel and Maria B. Line and Martin
                 Gilje Jaatun",
  title =        "Information security incident management: Current
                 practice as reported in the literature",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "42--57",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000819",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lagazio:2014:MLA,
  author =       "Monica Lagazio and Nazneen Sherif and Mike Cushman",
  title =        "A multi-level approach to understanding the impact of
                 cyber crime on the financial sector",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "58--74",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400087X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pieterse:2014:BCC,
  author =       "Heloise Pieterse and Martin S. Olivier",
  title =        "{Bluetooth} Command and Control channel",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "75--83",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000881",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nguyen:2014:STB,
  author =       "Vu Duc Nguyen and Yang-Wai Chow and Willy Susilo",
  title =        "On the security of text-based {$3$D CAPTCHAs}",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "84--99",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000856",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia:2014:ECB,
  author =       "S. Garc{\'\i}a and M. Grill and J. Stiborek and A.
                 Zunino",
  title =        "An empirical comparison of botnet detection methods",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "100--123",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000923",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Razzaq:2014:OAD,
  author =       "Abdul Razzaq and Zahid Anwar and H. Farooq Ahmad and
                 Khalid Latif and Faisal Munir",
  title =        "Ontology for attack detection: an intelligent approach
                 to web application security",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "124--146",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000868",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Idrus:2014:SBK,
  author =       "Syed Zulkarnain Syed Idrus and Estelle Cherrier and
                 Christophe Rosenberger and Patrick Bours",
  title =        "Soft biometrics for keystroke dynamics: Profiling
                 individuals while typing passwords",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "147--155",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000893",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2014:PEA,
  author =       "Chao Shen and Zhongmin Cai and Xiaohong Guan and Roy
                 Maxion",
  title =        "Performance evaluation of anomaly-detection algorithms
                 for mouse dynamics",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "156--171",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000807",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Thalmann:2014:CDL,
  author =       "Stefan Thalmann and Daniel Bachlechner and Lukas
                 Demetz and Markus Manhart",
  title =        "Complexity is dead, long live complexity! {How}
                 software can help service providers manage security and
                 compliance",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "172--185",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000935",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Montenegro:2014:PSS,
  author =       "Jose A. Montenegro and Javier Lopez",
  title =        "A practical solution for sealed bid and multi-currency
                 auctions",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "186--198",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000972",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitrokotsa:2014:LLD,
  author =       "Aikaterini Mitrokotsa and Cristina Onete and Serge
                 Vaudenay",
  title =        "Location leakage in distance bounding: Why location
                 privacy does not work",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "199--209",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000947",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2014:TON,
  author =       "Hao Zhang and Nenghai Yu and Yonggang Wen and Weiming
                 Zhang",
  title =        "Towards optimal noise distribution for privacy
                 preserving in data aggregation",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "210--230",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400090X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chitrakar:2014:SCS,
  author =       "Roshan Chitrakar and Chuanhe Huang",
  title =        "Selection of Candidate Support Vectors in incremental
                 {SVM} for network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "231--241",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000996",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oza:2014:HAD,
  author =       "Aditya Oza and Kevin Ross and Richard M. Low and Mark
                 Stamp",
  title =        "{HTTP} attack detection using $n$-gram analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "242--254",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000959",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jurcut:2014:DGS,
  author =       "Anca D. Jurcut and Tom Coffey and Reiner Dojen",
  title =        "Design guidelines for security protocols to prevent
                 replay and parallel session attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "255--273",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000911",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Silic:2014:SIV,
  author =       "Mario Silic and Andrea Back",
  title =        "Shadow {IT} --- a view from behind the curtain",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "274--283",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400100X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Archibald:2014:CAD,
  author =       "Rennie Archibald and Dipak Ghosal",
  title =        "A comparative analysis of detection metrics for covert
                 timing channels",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "284--292",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000467",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cohen:2014:TSI,
  author =       "Fred Cohen and Don Cohen",
  title =        "Time and space interval record schedule consistency
                 analysis for atomic items without interactions in open
                 spaces with stationary locations",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "293--304",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000315",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsalis:2014:SCM,
  author =       "Nikolaos Tsalis and Dimitris Gritzalis",
  title =        "Securing cloud and mobility: a practitioner's guide",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "305--305",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBf,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "45",
  number =       "??",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:38 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "iii--iii",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hassanzadeh:2014:RTA,
  author =       "Amin Hassanzadeh and Radu Stoleru and Michalis
                 Polychronakis and Geoffrey Xie",
  title =        "{RAPID}: Traffic-agnostic intrusion detection for
                 resource-constrained wireless mesh networks",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "1--17",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:PO,
  author =       "Anonymous",
  title =        "Pages 1--174 ({October 2014})",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "1--174",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Franke:2014:CSA,
  author =       "Ulrik Franke and Joel Brynielsson",
  title =        "Cyber situational awareness --- a systematic review of
                 the literature",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "18--31",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001011",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2014:TSU,
  author =       "Rui Zhao and Chuan Yue",
  title =        "Toward a secure and usable cloud-based password
                 manager for web browsers",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "32--47",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jandel:2014:DSR,
  author =       "Magnus J{\"a}ndel",
  title =        "Decision support for releasing anonymised data",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "48--61",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Elhadi:2014:EDM,
  author =       "Ammar Ahmed E. Elhadi and Mohd Aizaini Maarof and
                 Bazara I. A. Barry and Hentabli Hamza",
  title =        "Enhancing the detection of metamorphic malware using
                 call graphs",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "62--78",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Luckner:2014:SWS,
  author =       "Marcin Luckner and Micha{\l} Gad and Pawe{\l}
                 Sobkowiak",
  title =        "Stable web spam detection using features based on
                 lexical items",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "79--93",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001151",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Almalawi:2014:UAB,
  author =       "Abdulmohsen Almalawi and Xinghuo Yu and Zahir Tari and
                 Adil Fahad and Ibrahim Khalil",
  title =        "An unsupervised anomaly-based detection approach for
                 integrity attacks on {SCADA} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "94--110",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Diaz:2014:NXB,
  author =       "Jesus Diaz and David Arroyo and Francisco B.
                 Rodriguez",
  title =        "New X.509-based mechanisms for fair anonymity
                 management",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "111--125",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001023",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Adamsky:2014:SBB,
  author =       "Florian Adamsky and Syed Ali Khayam and Rudolf
                 J{\"a}ger and Muttukrishnan Rajarajan",
  title =        "Stealing bandwidth from {BitTorrent} seeders",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "126--140",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001205",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seo:2014:CCS,
  author =       "Ilju Seo and Heejo Lee and Seung Chul Han",
  title =        "Cylindrical Coordinates Security Visualization for
                 multiple domain command and control botnet detection",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "141--153",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001187",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jha:2014:SAT,
  author =       "Sadhana Jha and Shamik Sural and Jaideep Vaidya and
                 Vijayalakshmi Atluri",
  title =        "Security analysis of temporal {RBAC} under an
                 administrative model",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "154--172",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001217",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stavrou:2014:ICN,
  author =       "Vasilis Stavrou and Dimitris Gritzalis",
  title =        "Introduction to Computer and Network Security:
                 Navigating Shades of {Gray}",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "173--173",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000303",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBg,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "46",
  number =       "??",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001242",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "iii--iii",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yan:2014:ESI,
  author =       "Zheng Yan and Guojun Wang and Valtteri Niemi and
                 Robert H. Deng",
  title =        "Editorial: Special issue on trust in cyber, physical
                 and social computing",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "1--2",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2014:AAG,
  author =       "Yue Shen and Zheng Yan and Raimo Kantola",
  title =        "Analysis on the acceptance of Global Trust Management
                 for unwanted traffic control based on game theory",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "3--25",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cheng:2014:ECQ,
  author =       "Liang Cheng and Yang Zhang and Zhihui Han and Yi Deng
                 and Xiaoshan Sun and Dengguo Feng",
  title =        "Evaluating and comparing the quality of access control
                 in different operating systems",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "26--40",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2014.05.001",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000716",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gonzalez-Manzano:2014:CCO,
  author =       "Lorena Gonz{\'a}lez-Manzano and Ana I.
                 Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
                 Arturo Ribagorda",
  title =        "{CooPeD}: {Co}-owned Personal Data management",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "41--65",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000960",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shahriar:2014:EDV,
  author =       "Hossain Shahriar and Komminist Weldemariam and
                 Mohammad Zulkernine and Thibaud Lutellier",
  title =        "Effective detection of vulnerable and malicious
                 browser extensions",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "66--84",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000984",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dong:2014:HFC,
  author =       "Yan Dong and Yongna Li and Tingting Sun",
  title =        "Happy faces considered trustworthy irrespective of
                 perceiver's mood: Challenges to the mood congruency
                 effect",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "85--93",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814000625",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2014:EBh,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "47",
  number =       "??",
  pages =        "ifc--ifc",
  month =        nov,
  year =         "2014",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:39 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "iii--iv",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zineddine:2015:VMT,
  author =       "Mhamed Zineddine",
  title =        "Vulnerabilities and mitigation techniques toning in
                 the cloud: a cost and vulnerabilities coverage
                 optimization approach using Cuckoo search algorithm
                 with {L{\'e}vy} flights",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "1--18",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001333",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PF,
  author =       "Anonymous",
  title =        "Pages 1--298 ({February 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "1--298",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mesquida:2015:IIS,
  author =       "Antoni Llu{\'\i}s Mesquida and Antonia Mas",
  title =        "Implementing information security best practices on
                 software lifecycle processes: the {{\em ISO\slash IEC
                 15504 Security Extension}}",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "19--34",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Friedberg:2015:CAP,
  author =       "Ivo Friedberg and Florian Skopik and Giuseppe Settanni
                 and Roman Fiedler",
  title =        "Combating advanced persistent threats: From network
                 event correlation to incident detection",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "35--57",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barnes:2015:LEA,
  author =       "David J. Barnes and Julio Hernandez-Castro",
  title =        "On the limits of engine analysis for cheating
                 detection in chess",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "58--73",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Do:2015:EDA,
  author =       "Quang Do and Ben Martini and Kim-Kwang Raymond Choo",
  title =        "Exfiltrating data from {Android} devices",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "74--91",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400162X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Diaz-Lopez:2015:MXS,
  author =       "Daniel D{\'\i}az-L{\'o}pez and Gin{\'e}s
                 D{\'o}lera-Tormo and F{\'e}lix G{\'o}mez-M{\'a}rmol and
                 Gregorio Mart{\'\i}nez-P{\'e}rez",
  title =        "Managing {XACML} systems in distributed environments
                 through Meta-Policies",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "92--115",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2015:TCA,
  author =       "Jianfeng Lu and James B. D. Joshi and Lei Jin and
                 Yiding Liu",
  title =        "Towards complexity analysis of User Authorization
                 Query problem in {RBAC}",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "116--130",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2015:DHS,
  author =       "Shu-Yuan Shen and Li-Hong Huang",
  title =        "A data hiding scheme using pixel value differencing
                 and improving exploiting modification directions",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "131--141",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2015:IAA,
  author =       "Xi-Jun Lin and Lin Sun and Haipeng Qu",
  title =        "Insecurity of an anonymous authentication for
                 privacy-preserving {IoT} target-driven applications",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "142--149",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001229",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kent:2015:AGA,
  author =       "Alexander D. Kent and Lorie M. Liebrock and Joshua C.
                 Neil",
  title =        "Authentication graphs: Analyzing user behavior within
                 an enterprise network",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "150--166",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001321",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maeng:2015:TAU,
  author =       "YoungJae Maeng and Aziz Mohaisen and Mun-Kyu Lee and
                 DaeHun Nyang",
  title =        "Transaction authentication using complementary
                 colors",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "167--181",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Reece:2015:PIS,
  author =       "R. P. Reece and B. C. Stahl",
  title =        "The professionalisation of information security:
                 Perspectives of {UK} practitioners",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "182--195",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yan:2015:LRP,
  author =       "Qiang Yan and Jin Han and Yingjiu Li and Jianying Zhou
                 and Robert H. Deng",
  title =        "Leakage-resilient password entry: Challenges, design,
                 and evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "196--211",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001540",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alam:2015:FMM,
  author =       "Shahid Alam and R. Nigel Horspool and Issa Traore and
                 Ibrahim Sogukpinar",
  title =        "A framework for metamorphic malware analysis and
                 real-time detection",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "212--233",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001576",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ozcelik:2015:DEB,
  author =       "Ilker {\"O}z{\c{c}}elik and Richard R. Brooks",
  title =        "Deceiving entropy based {DoS} detection",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "234--245",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481400159X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nissim:2015:DMP,
  author =       "Nir Nissim and Aviad Cohen and Chanan Glezer and Yuval
                 Elovici",
  title =        "Detection of malicious {PDF} files and directions for
                 enhancements: a state-of-the art survey",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "246--266",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001606",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Montesdioca:2015:MUS,
  author =       "Gustavo Percio Zimmermann Montesdioca and Ant{\^o}nio
                 Carlos Gastaud Ma{\c{c}}ada",
  title =        "Measuring user satisfaction with information security
                 practices",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "267--280",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dang-Pham:2015:CIA,
  author =       "Duy Dang-Pham and Siddhi Pittayachawan",
  title =        "Comparing intention to avoid malware across contexts
                 in a {BYOD}-enabled {Australian} university: a
                 Protection Motivation Theory approach",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "281--297",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBa,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "48",
  number =       "??",
  pages =        "ifc--ifc",
  month =        feb,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001722",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "iii--iii",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ngo:2015:DDX,
  author =       "Canh Ngo and Yuri Demchenko and Cees de Laat",
  title =        "Decision Diagrams for {XACML} Policy Evaluation and
                 Management",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "1--16",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PMa,
  author =       "Anonymous",
  title =        "Pages 1--276 ({March 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "1--276",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Masdari:2015:TEC,
  author =       "Mohammad Masdari and Sam Jabbehdari and Jamshid
                 Bagherzadeh and Ahmad Khadem-Zadeh",
  title =        "Towards efficient certificate status validations with
                 {E-ADOPT} in mobile ad hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "17--27",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001667",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abril:2015:SMA,
  author =       "Daniel Abril and Guillermo Navarro-Arribas and
                 Vicen{\c{c}} Torra",
  title =        "Spherical microaggregation: Anonymizing sparse vector
                 spaces",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "28--44",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rahman:2015:SIS,
  author =       "Nurul Hidayah Ab Rahman and Kim-Kwang Raymond Choo",
  title =        "A survey of information security incident handling in
                 the cloud",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "45--69",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Robinson:2015:CWI,
  author =       "Michael Robinson and Kevin Jones and Helge Janicke",
  title =        "Cyber warfare: Issues and challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "70--94",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001692",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2015:DFA,
  author =       "Dae Wook Kim and Peiying Yan and Junjie Zhang",
  title =        "Detecting fake anti-virus software distribution
                 webpages",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "95--106",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Patel:2015:NMT,
  author =       "Ahmed Patel and Samaher Al-Janabi and Ibrahim
                 AlShourbaji and Jens Pedersen",
  title =        "A novel methodology towards a trusted environment in
                 mashup web applications",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "107--122",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Komurcu:2015:EGM,
  author =       "Giray K{\"o}m{\"u}rc{\"u} and Ali Emre Pusane and
                 G{\"u}nhan D{\"u}ndar",
  title =        "An efficient grouping method and error probability
                 analysis for {RO}-{PUFs}",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "123--131",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2015:TMP,
  author =       "Yixuan Zhang and Jingsha He and Bin Zhao and Zhiqing
                 Huang and Ruohong Liu",
  title =        "Towards more pro-active access control in computer
                 systems and networks",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "132--146",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Onarlioglu:2015:SSL,
  author =       "Kaan Onarlioglu and Ahmet Salih Buyukkayhan and
                 William Robertson and Engin Kirda",
  title =        "{SENTINEL}: Securing Legacy {Firefox} Extensions",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "147--161",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{daVeiga:2015:IIS,
  author =       "Ad{\'e}le da Veiga and Nico Martins",
  title =        "Improving the information security culture through
                 monitoring and implementation actions illustrated
                 through a case study",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "162--176",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001862",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shropshire:2015:PAI,
  author =       "Jordan Shropshire and Merrill Warkentin and Shwadhin
                 Sharma",
  title =        "Personality, attitudes, and intentions: Predicting
                 initial adoption of information security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "177--191",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Geneiatakis:2015:PVA,
  author =       "Dimitris Geneiatakis and Igor Nai Fovino and Ioannis
                 Kounelis and Paquale Stirparo",
  title =        "A Permission verification approach for {Android}
                 mobile applications",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "192--205",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ramaki:2015:RRT,
  author =       "Ali Ahmadian Ramaki and Morteza Amini and Reza
                 Ebrahimi Atani",
  title =        "{RTECA}: Real time episode correlation algorithm for
                 multi-step attack scenarios detection",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "206--219",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tormo:2015:TPP,
  author =       "Gin{\'e}s D{\'o}lera Tormo and F{\'e}lix G{\'o}mez
                 M{\'a}rmol and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "Towards privacy-preserving reputation management for
                 hybrid broadcast broadband applications",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "220--238",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2015:PLA,
  author =       "Yan Li and Yingjiu Li and Qiang Yan and Robert H.
                 Deng",
  title =        "Privacy leakage analysis in online social networks",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "239--254",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Elish:2015:PUT,
  author =       "Karim O. Elish and Xiaokui Shu and Danfeng (Daphne)
                 Yao and Barbara G. Ryder and Xuxian Jiang",
  title =        "Profiling user-trigger dependence for {Android}
                 malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "255--273",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stergiopoulos:2015:HPT,
  author =       "George Stergiopoulos and Dimitris Gritzalis",
  title =        "Hacking and Penetration Testing with Low Power
                 Devices",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "274--275",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "49",
  number =       "??",
  pages =        "ifc--ifc",
  month =        mar,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:40 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "iii--iii",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000280",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shittu:2015:IAP,
  author =       "Riyanat Shittu and Alex Healing and Robert
                 Ghanea-Hercock and Robin Bloomfield and Muttukrishnan
                 Rajarajan",
  title =        "Intrusion alert prioritisation and attack detection
                 using post-correlation analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "1--15",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PMb,
  author =       "Anonymous",
  title =        "Pages 1--106 ({May 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "1--106",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vigil:2015:IAN,
  author =       "Mart{\'\i}n Vigil and Johannes Buchmann and Daniel
                 Cabarcas and Christian Weinert and Alexander
                 Wiesmaier",
  title =        "Integrity, authenticity, non-repudiation, and proof of
                 existence for long-term archiving: a survey",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "16--32",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bouffard:2015:UCF,
  author =       "Guillaume Bouffard and Jean-Louis Lanet",
  title =        "The ultimate control flow transfer in a {Java} based
                 smart card",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "33--46",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500005X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ibrahim:2015:RJS,
  author =       "Doaa H. Ibrahim and Emad S. Hassan and Sami A.
                 El-Dolil",
  title =        "Relay and jammer selection schemes for improving
                 physical layer security in two-way cooperative
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "47--59",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000140",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tang:2015:STC,
  author =       "Changlong Tang and Jiqiang Liu",
  title =        "Selecting a trusted cloud service provider for your
                 {SaaS} program",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "60--73",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000139",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cheng:2015:DAD,
  author =       "Xiang Cheng and Sen Su and Shengzhi Xu and Zhengyi
                 Li",
  title =        "{DP-Apriori}: a differentially private frequent
                 itemset mining algorithm based on transaction
                 splitting",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "74--90",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404814001850",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dong:2015:SSS,
  author =       "Xin Dong and Jiadi Yu and Yanmin Zhu and Yingying Chen
                 and Yuan Luo and Minglu Li",
  title =        "{SECO}: Secure and scalable data collaboration
                 services in cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "91--105",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.01.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "50",
  number =       "??",
  pages =        "ifc--ifc",
  month =        may,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000255",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "iii--iii",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000498",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cui:2015:PLT,
  author =       "Baojiang Cui and Fuwei Wang and Tao Guo and Guowei
                 Dong",
  title =        "A practical off-line taint analysis framework and its
                 application in reverse engineering of file format",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "1--15",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000218",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PJa,
  author =       "Anonymous",
  title =        "Pages 1--62 ({June 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "1--62",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maiorca:2015:SAE,
  author =       "Davide Maiorca and Davide Ariu and Igino Corona and
                 Marco Aresu and Giorgio Giacinto",
  title =        "Stealth attacks: an extended insight into the
                 obfuscation effects on {Android} malware",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "16--31",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500022X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Roumani:2015:TSM,
  author =       "Yaman Roumani and Joseph K. Nwankpa and Yazan F.
                 Roumani",
  title =        "Time series modeling of vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "32--40",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000358",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{benOthmane:2015:IAC,
  author =       "Lotfi ben Othmane and Rohit Ranchal and Ruchith
                 Fernando and Bharat Bhargava and Eric Bodden",
  title =        "Incorporating attacker capabilities in risk estimation
                 and mitigation",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "41--61",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000334",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "51",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jun,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:41 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "iii--iv",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000772",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cerroni:2015:DDN,
  author =       "Walter Cerroni and Gianluca Moro and Roberto Pasolini
                 and Marco Ramilli",
  title =        "Decentralized detection of network attacks through
                 {P2P} data clustering of {SNMP} data",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "1--16",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000383",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PJb,
  author =       "Anonymous",
  title =        "Pages 1--292 ({July 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "1--292",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ntantogian:2015:GTF,
  author =       "Christoforos Ntantogian and Stefanos Malliaros and
                 Christos Xenakis",
  title =        "{Gaithashing}: a two-factor authentication scheme
                 based on gait features",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "17--32",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000413",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fattori:2015:HBM,
  author =       "Aristide Fattori and Andrea Lanzi and Davide
                 Balzarotti and Engin Kirda",
  title =        "Hypervisor-based malware protection with
                 {AccessMiner}",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "33--50",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000395",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2015:DIN,
  author =       "Erzhou Zhu and Feng Liu and Zuo Wang and Alei Liang
                 and Yiwen Zhang and Xuejian Li and Xuejun Li",
  title =        "{Dytaint}: the implementation of a novel lightweight
                 3-state dynamic taint analysis framework for x86 binary
                 programs",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "51--69",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.03.008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000401",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Elyas:2015:DFR,
  author =       "Mohamed Elyas and Atif Ahmad and Sean B. Maynard and
                 Andrew Lonie",
  title =        "Digital forensic readiness: Expert perspectives on a
                 theoretical framework",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "70--89",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000449",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Virvilis:2015:SBW,
  author =       "Nikos Virvilis and Alexios Mylonas and Nikolaos Tsalis
                 and Dimitris Gritzalis",
  title =        "Security Busters: {Web} browser security vs. rogue
                 sites",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "90--105",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2015:TPC,
  author =       "Yongzhi Wang and Jinpeng Wei",
  title =        "Toward protecting control flow confidentiality in
                 cloud-based computation",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "106--127",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000553",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsohou:2015:ARC,
  author =       "Aggeliki Tsohou and Maria Karyda and Spyros
                 Kokolakis",
  title =        "Analyzing the role of cognitive and cultural biases in
                 the internalization of information security policies:
                 Recommendations for information security awareness
                 programs",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "128--141",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000565",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cowley:2015:ENI,
  author =       "Jennifer A. Cowley and Frank L. Greitzer and Bronwyn
                 Woods",
  title =        "Effect of network infrastructure factors on
                 information system risk judgments",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "142--158",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000619",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2015:CDF,
  author =       "Ting Wang and Dongyao Ji",
  title =        "Comment on {``Design and formal security evaluation of
                 NeMHIP''}",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "159--161",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404813000345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EIT,
  author =       "Anonymous",
  title =        "Editorial --- {28th IFIP TC-11 International
                 Information Security and Privacy Conference}",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "162--163",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000711",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krishnan:2015:EPR,
  author =       "Padmanabhan Krishnan and Kostyantyn Vorobyov",
  title =        "Enforcement of privacy requirements",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "164--177",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500036X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zwattendorfer:2015:DSP,
  author =       "Bernd Zwattendorfer and Daniel Slamanig",
  title =        "Design strategies for a privacy-friendly {Austrian
                 eID} system in the public cloud",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "178--193",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000346",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parsons:2015:DPS,
  author =       "Kathryn Parsons and Agata McCormac and Malcolm
                 Pattinson and Marcus Butavicius and Cate Jerram",
  title =        "The design of phishing studies: Challenges for
                 researchers",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "194--206",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000231",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wessel:2015:IMD,
  author =       "Sascha Wessel and Manuel Huber and Frederic Stumpf and
                 Claudia Eckert",
  title =        "Improving mobile device security with operating
                 system-level virtualization",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "207--220",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000206",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fuchs:2015:WMM,
  author =       "Karl-Peter Fuchs and Dominik Herrmann and Hannes
                 Federrath",
  title =        "Workload modelling for mix-based anonymity services",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "221--233",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500019X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2015:SSA,
  author =       "Jehyun Lee and Suyeon Lee and Heejo Lee",
  title =        "Screening smartphone applications using malware family
                 signatures",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "234--249",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000188",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yi:2015:PW,
  author =       "Jeong Hyun Yi and Kyung-Hyune Rhee and Gail-Joon Ahn",
  title =        "Preface --- {WISA} 2014",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "250--250",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000723",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mohaisen:2015:AHF,
  author =       "Aziz Mohaisen and Omar Alrawi and Manar Mohaisen",
  title =        "{AMAL}: High-fidelity, behavior-based automated
                 malware analysis and classification",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "251--266",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000425",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2015:DAE,
  author =       "Eunhyun Kim and Kyungwon Park and Hyoungshick Kim and
                 Jaeseung Song",
  title =        "Design and analysis of enumeration attacks on finding
                 friends with phone numbers: a case study with
                 {KakaoTalk}",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "267--275",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000589",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seo:2015:MMS,
  author =       "Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and
                 Jongseok Choi and Howon Kim",
  title =        "{Montgomery} multiplication and squaring for Optimal
                 Prime Fields",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "276--291",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/fparith.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000371",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "52",
  number =       "??",
  pages =        "ifc--ifc",
  month =        jul,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000747",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "iii--iv",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Heurix:2015:TPE,
  author =       "Johannes Heurix and Peter Zimmermann and Thomas
                 Neubauer and Stefan Fenz",
  title =        "A taxonomy for privacy enhancing technologies",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "1--17",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000668",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PS,
  author =       "Anonymous",
  title =        "Pages 1--246 ({September 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "1--246",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Holm:2015:EBI,
  author =       "Hannes Holm and Khalid Khan Afridi",
  title =        "An expert-based investigation of the Common
                 Vulnerability Scoring System",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "18--30",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000620",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Serwadda:2015:WMD,
  author =       "Abdul Serwadda and Vir V. Phoha",
  title =        "When Mice devour the Elephants: a {DDoS} attack
                 against size-based scheduling schemes in the
                 {Internet}",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "31--43",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000644",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2015:SDB,
  author =       "Yongge Wang and Tony Nicol",
  title =        "On statistical distance based testing of pseudo random
                 sequences and experiments with {PHP} and {Debian
                 OpenSSL}",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "44--64",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/prng.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000693",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Safa:2015:ISC,
  author =       "Nader Sohrabi Safa and Mehdi Sookhak and Rossouw Von
                 Solms and Steven Furnell and Norjihan Abdul Ghani and
                 Tutut Herawan",
  title =        "Information security conscious care behaviour
                 formation in organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "65--78",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.05.012",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000863",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alsmadi:2015:SSD,
  author =       "Izzat Alsmadi and Dianxiang Xu",
  title =        "Security of Software Defined Networks: a survey",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "79--108",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500070X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trabelsi:2015:SDS,
  author =       "Zouheir Trabelsi and Safaa Zeidan and Mohammad M.
                 Masud and Kilani Ghoudi",
  title =        "Statistical dynamic splay tree filters towards
                 multilevel firewall packet filtering enhancement",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "109--131",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500084X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ngoqo:2015:ISB,
  author =       "Bukelwa Ngoqo and Stephen V. Flowerday",
  title =        "Information Security Behaviour Profiling Framework
                 {(ISBPF)} for student mobile phone users",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "132--142",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000851",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2015:IEM,
  author =       "Chao Shen and Shichao Pei and Zhenyu Yang and Xiaohong
                 Guan",
  title =        "Input extraction via motion-sensor behavior analysis
                 on smartphones",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "143--155",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000991",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vavilis:2015:AAF,
  author =       "Sokratis Vavilis and Alexandru Egner and Milan
                 Petkovi{\'c} and Nicola Zannone",
  title =        "An anomaly analysis framework for database systems",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "156--173",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000905",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:ESS,
  author =       "Anonymous",
  title =        "Editorial --- {SEC'14} special issue on {ICT} systems
                 security and privacy protection",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "174--174",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Carminati:2015:BDS,
  author =       "Michele Carminati and Roberto Caron and Federico Maggi
                 and Ilenia Epifani and Stefano Zanero",
  title =        "{BankSealer}: a decision support system for online
                 banking fraud analysis and investigation",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "175--186",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000437",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bal:2015:SPR,
  author =       "G{\"o}khan Bal and Kai Rannenberg and Jason I. Hong",
  title =        "{Styx}: Privacy risk communication for the {Android}
                 smartphone platform based on apps' data-access behavior
                 patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "187--202",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000541",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Atighehchi:2015:NME,
  author =       "Kevin Atighehchi and Alexis Bonnecaze and Gabriel
                 Risterucci",
  title =        "New models for efficient authenticated dictionaries",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "203--214",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shahandashti:2015:RUP,
  author =       "Siamak F. Shahandashti and Reihaneh Safavi-Naini and
                 Nashad Ahmed Safa",
  title =        "Reconciling user privacy and implicit authentication
                 for mobile devices",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "215--233",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000838",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Saevanee:2015:CUA,
  author =       "Hataichanok Saevanee and Nathan Clarke and Steven
                 Furnell and Valerio Biscione",
  title =        "Continuous user authentication using multi-modal
                 biometrics",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "234--246",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000875",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:EBf,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "53",
  number =       "??",
  pages =        "ifc--ifc",
  month =        sep,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:42 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "iii--iii",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001352",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:IA,
  author =       "Anonymous",
  title =        "Introduction --- {ARES} 2014",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "1--1",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001558",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maier:2015:GDM,
  author =       "Dominik Maier and Mykola Protsenko and Tilo
                 M{\"u}ller",
  title =        "A game of Droid and Mouse: the threat of
                 split-personality malware on {Android}",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "2--15",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000656",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chiew:2015:UWL,
  author =       "Kang Leng Chiew and Ee Hung Chang and San Nah Sze and
                 Wei King Tiong",
  title =        "Utilisation of website logo for phishing detection",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "16--26",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Scanlon:2015:NIM,
  author =       "Mark Scanlon and Jason Farina and M-Tahar Kechadi",
  title =        "Network investigation methodology for {BitTorrent}
                 Sync: a Peer-to-Peer based file synchronisation
                 service",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "27--43",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500067X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pang:2015:NAC,
  author =       "Jun Pang and Yang Zhang",
  title =        "A new access control scheme for {Facebook}-style
                 social networks",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "44--59",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000632",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Neisse:2015:SMB,
  author =       "Ricardo Neisse and Gary Steri and Igor Nai Fovino and
                 Gianmarco Baldini",
  title =        "{SecKit}: a Model-based Security Toolkit for the
                 {Internet of Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "60--76",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000887",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bouabana-Tebibel:2015:PSE,
  author =       "Thouraya Bouabana-Tebibel and Abdellah Kaci",
  title =        "Parallel search over encrypted data under attribute
                 based encryption on the Cloud Computing",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "77--91",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000577",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "54",
  number =       "??",
  pages =        "ifc--ifc",
  month =        oct,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001327",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:Ch,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "iii--iii",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ruohonen:2015:SGO,
  author =       "Jukka Ruohonen and Sami Hyrynsalmi and Ville
                 Lepp{\"a}nen",
  title =        "The sigmoidal growth of operating system security
                 vulnerabilities: an empirical revisit",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "1--20",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001005",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:PN,
  author =       "Anonymous",
  title =        "Pages 1--280 ({November 2015})",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "1--280",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{El-Emam:2015:NDH,
  author =       "Nameer N. El-Emam",
  title =        "New data-hiding algorithm based on adaptive neural
                 networks with modified particle swarm optimization",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "21--45",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500098X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Giot:2015:RPB,
  author =       "Romain Giot and Bernadette Dorizzi and Christophe
                 Rosenberger",
  title =        "A review on the public benchmark databases for static
                 keystroke dynamics",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "46--61",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000942",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jia:2015:MBC,
  author =       "Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek
                 Saxena and Jian Mao and Zhenkai Liang",
  title =        "Man-in-the-browser-cache: Persisting {HTTPS} attacks
                 via browser cache poisoning",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "62--80",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.07.004",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zahadat:2015:BSE,
  author =       "Nima Zahadat and Paul Blessner and Timothy Blackburn
                 and Bill A. Olson",
  title =        "{BYOD} security engineering: a framework and its
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "81--99",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000978",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Solic:2015:ISS,
  author =       "Kresimir Solic and Hrvoje Ocevcic and Marin Golub",
  title =        "The information systems' security level assessment
                 model based on an ontology and evidential reasoning
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "100--112",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsalis:2015:BRH,
  author =       "Nikolaos Tsalis and Dimitris Gritzalis",
  title =        "Book Review: {{\booktitle{Hacking Web Intelligence:
                 Open Source Intelligence and Web Reconnaissance
                 Concepts and Techniques}}, Sudhanshu Chauhan, Nutan
                 Kumar Panda, Elsevier Publications, USA (2015)}",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "113--113",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001236",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mouton:2015:NES,
  author =       "Francois Mouton and Mercia M. Malan and Kai K. Kimppa
                 and H. S. Venter",
  title =        "Necessity for ethics in social engineering research",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "114--127",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stavrou:2015:BRI,
  author =       "Vasilis Stavrou and Dimitris Gritzalis",
  title =        "Book Review: {{\booktitle{Introduction to Social Media
                 Investigation --- a hands-on Approach}}, Jennifer
                 Golbeck, Elsevier Publications, USA (2015)}",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "128--129",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yin:2015:DSC,
  author =       "Ting Yin and Gaobo Yang and Leida Li and Dengyong
                 Zhang and Xingming Sun",
  title =        "Detecting seam carving based image resizing using
                 local binary patterns",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "130--141",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stevanovic:2015:GTP,
  author =       "Matija Stevanovic and Jens Myrup Pedersen and
                 Alessandro D'Alconzo and Stefan Ruehrup and Andreas
                 Berger",
  title =        "On the ground truth problem of malicious {DNS} traffic
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "142--158",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500125X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia-Teodoro:2015:AGH,
  author =       "P. Garcia-Teodoro and J. E. Diaz-Verdejo and J. E.
                 Tapiador and R. Salazar-Hernandez",
  title =        "Automatic generation of {HTTP} intrusion signatures by
                 selective identification of anomalies",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "159--174",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001297",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cheng:2015:DPM,
  author =       "Xiang Cheng and Sen Su and Shengzhi Xu and Peng Tang
                 and Zhengyi Li",
  title =        "Differentially private maximal frequent sequence
                 mining",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "175--192",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Uzunov:2015:SSF,
  author =       "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
                 Falkner",
  title =        "Security solution frames and security patterns for
                 authorization in distributed, collaborative systems",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "193--234",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001200",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cazorla:2015:TSA,
  author =       "Lorena Cazorla and Cristina Alcaraz and Javier Lopez",
  title =        "A three-stage analysis of {IDS} for critical
                 infrastructures",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "235--250",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2015:RBF,
  author =       "Bing Liu and Chao-Hsien Chu",
  title =        "Relationship-based federated access control model for
                 {EPC} Discovery Service",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "251--270",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000899",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gope:2015:RLA,
  author =       "Prosanta Gope and Tzonelih Hwang",
  title =        "A realistic lightweight authentication protocol
                 preserving strong anonymity for securing {RFID}
                 system",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "271--280",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000681",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2015:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "55",
  number =       "??",
  pages =        "CO2",
  month =        nov,
  year =         "2015",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:43 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500142X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Ca,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "iii--iii",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001728",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cherdantseva:2016:RCS,
  author =       "Yulia Cherdantseva and Pete Burnap and Andrew Blyth
                 and Peter Eden and Kevin Jones and Hugh Soulsby and
                 Kristan Stoddart",
  title =        "A review of cyber security risk assessment methods for
                 {SCADA} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "1--27",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2015.09.009",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PF,
  author =       "Anonymous",
  title =        "Pages 1--162 ({February 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "1--162",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pierazzi:2016:ESA,
  author =       "Fabio Pierazzi and Sara Casolari and Michele Colajanni
                 and Mirco Marchetti",
  title =        "Exploratory security analytics for anomaly detection",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "28--49",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia:2016:FVS,
  author =       "D. A. L{\'o}pez Garc{\'\i}a",
  title =        "A flexible e-voting scheme for debate tools",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "50--62",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001546",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dhillon:2016:IIS,
  author =       "Gurpreet Dhillon and Romilla Syed and Cristiane
                 Pedron",
  title =        "Interpreting information security culture: an
                 organizational transformation case study",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "63--69",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500139X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Safa:2016:ISP,
  author =       "Nader Sohrabi Safa and Rossouw {Von Solms} and Steven
                 Furnell",
  title =        "Information security policy compliance model in
                 organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "70--82",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ogutcu:2016:API,
  author =       "Gizem {\"O}g{\"u}t{\c{c}}{\"u} and {\"O}zlem M{\"u}ge
                 Testik and Oumout Chouseinoglou",
  title =        "Analysis of personal information security behavior and
                 awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "83--93",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001406",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{DOrazio:2016:AME,
  author =       "Christian D'Orazio and Kim-Kwang Raymond Choo",
  title =        "An adversary model to evaluate {DRM} protection of
                 video contents on {iOS} devices",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "94--110",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000954",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Singh:2016:SRI,
  author =       "Karanpreet Singh and Paramvir Singh and Krishan
                 Kumar",
  title =        "A systematic review of {IP} traceback schemes for
                 denial of service attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "111--139",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000930",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2016:SBP,
  author =       "Mun-Kyu Lee and Hyeonjin Nam and Dong Kyue Kim",
  title =        "Secure bimodal {PIN}-entry method using audio
                 signals",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "140--150",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000929",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horsman:2016:CSR,
  author =       "Graeme Horsman",
  title =        "The challenges surrounding the regulation of anonymous
                 communication provision in the {United Kingdom}",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "151--162",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815000917",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBa,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "56",
  number =       "??",
  pages =        "CO2",
  month =        feb,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Cb,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "iii--iii",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500190X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harichandran:2016:CFN,
  author =       "Vikram S. Harichandran and Frank Breitinger and
                 Ibrahim Baggili and Andrew Marrington",
  title =        "A cyber forensics needs analysis survey: Revisiting
                 the domain's needs a decade later",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "1--13",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PMa,
  author =       "Anonymous",
  title =        "Pages 1--106 ({March 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "1--106",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shameli-Sendi:2016:TIS,
  author =       "Alireza Shameli-Sendi and Rouzbeh Aghababaei-Barzegar
                 and Mohamed Cheriet",
  title =        "Taxonomy of information security risk assessment
                 {(ISRA)}",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "14--30",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001650",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Awan:2016:ICR,
  author =       "Malik Shahzad Kaleem Awan and Pete Burnap and Omer
                 Rana",
  title =        "Identifying cyber risk hotspots: a framework for
                 measuring temporal variance in computer network risk",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "31--46",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{West:2016:IFF,
  author =       "Jarrod West and Maumita Bhattacharya",
  title =        "Intelligent financial fraud detection: a comprehensive
                 review",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "47--66",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001261",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sieklik:2016:ETD,
  author =       "Boris Sieklik and Richard Macfarlane and William J.
                 Buchanan",
  title =        "Evaluation of {TFTP DDoS} amplification attack",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "67--92",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Faria:2016:IPK,
  author =       "Gerson de Souza Faria and Hae Yong Kim",
  title =        "Identification of pressed keys by time difference of
                 arrivals of mechanical vibrations",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "93--105",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001662",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBb,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "57",
  number =       "??",
  pages =        "CO2",
  month =        mar,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:44 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481500187X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Cc,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "iii--iv",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300165",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2016:CCI,
  author =       "Xiao-Fan Chen and Shun-Zheng Yu",
  title =        "{CIPA}: a collaborative intrusion prevention
                 architecture for programmable network and {SDN}",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "1--19",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001856",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PMb,
  author =       "Anonymous",
  title =        "Pages 1--284 ({May 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "1--284",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Horcas:2016:ADM,
  author =       "Jose-Miguel Horcas and M{\'o}nica Pinto and Lidia
                 Fuentes and Wissam Mallouli and Edgardo Montes de Oca",
  title =        "An approach for deploying and monitoring dynamic
                 security policies",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "20--38",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001832",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Konradt:2016:PEA,
  author =       "Christian Konradt and Andreas Schilling and Brigitte
                 Werners",
  title =        "Phishing: an economic analysis of cybercrime
                 perpetrators",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "39--46",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001844",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2016:SWS,
  author =       "Cheng Huang and JiaYong Liu and Yong Fang and Zheng
                 Zuo",
  title =        "A study on {Web} security incidents in {China} by
                 analyzing vulnerability disclosure platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "47--62",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001820",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Asghar:2016:DIR,
  author =       "Hira Asghar and Zahid Anwar and Khalid Latif",
  title =        "A deliberately insecure {RDF}-based {Semantic Web}
                 application framework for teaching {SPARQL\slash
                 SPARUL} injection attacks and defense mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "63--82",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001807",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{GhasemiGol:2016:CAN,
  author =       "Mohammad GhasemiGol and Abbas Ghaemi-Bafghi and Hassan
                 Takabi",
  title =        "A comprehensive approach for network attack
                 forecasting",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "83--105",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001819",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Obert:2016:PAE,
  author =       "James Obert and Inna Pivkina and Hong Huang and
                 Huiping Cao",
  title =        "Proactively applied encryption in multipath networks",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "106--124",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001960",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jang:2016:ADA,
  author =       "Jae-wook Jang and Hyunjae Kang and Jiyoung Woo and
                 Aziz Mohaisen and Huy Kang Kim",
  title =        "{Andro-Dumpsys}: Anti-malware system based on the
                 similarity of malware creator and malware centric
                 information",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "125--138",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481600002X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Abazari:2016:EAM,
  author =       "Farzaneh Abazari and Morteza Analoui and Hassan
                 Takabi",
  title =        "Effect of anti-malware software on infectious nodes in
                 cloud environment",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "139--148",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001959",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2016:FSL,
  author =       "Weize Li and Lun Xie and Zulan Deng and Zhiliang
                 Wang",
  title =        "False sequential logic attack on {SCADA} system and
                 its physical impact analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "149--159",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sadhya:2016:PPS,
  author =       "Debanjan Sadhya and Sanjay Kumar Singh",
  title =        "Privacy preservation for soft biometrics based
                 multimodal recognition system",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "160--179",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2016:CRA,
  author =       "Hao Zhang and Danfeng (Daphne) Yao and Naren
                 Ramakrishnan and Zhibin Zhang",
  title =        "Causality reasoning about network events for detecting
                 stealthy malware activities",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "180--198",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ni:2016:FMR,
  author =       "Siru Ni and Yi Zhuang and Jingjing Gu and Ying Huo",
  title =        "A formal model and risk assessment method for
                 security-critical real-time embedded systems",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "199--215",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spanos:2016:IIS,
  author =       "Georgios Spanos and Lefteris Angelis",
  title =        "The impact of information security events to the stock
                 market: a systematic literature review",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "216--229",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300013",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ji:2016:CEM,
  author =       "Yuede Ji and Yukun He and Xinyang Jiang and Jian Cao
                 and Qiang Li",
  title =        "Combating the evasion mechanisms of social bots",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "230--249",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300025",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ulas:2016:ARL,
  author =       "Cihan Ulas and Ulas Asik and Cant{\"u}rk Karadeniz",
  title =        "Analysis and reconstruction of laser printer
                 information leakages in the media of electromagnetic
                 radiation, power, and signal lines",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "250--267",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300049",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Farina:2016:MBP,
  author =       "Paolo Farina and Enrico Cambiaso and Gianluca Papaleo
                 and Maurizio Aiello",
  title =        "Are mobile botnets a possible threat? {The} case of
                 {SlowBot Net}",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "268--283",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300086",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBc,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "58",
  number =       "??",
  pages =        "CO2",
  month =        may,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630013X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Cd,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "iii--iii",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300396",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menesidou:2016:AKE,
  author =       "Sofia Anna Menesidou and Dimitrios Vardalis and
                 Vasilios Katos",
  title =        "Automated key exchange protocol evaluation in delay
                 tolerant networks",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "1--8",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300098",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PJa,
  author =       "Anonymous",
  title =        "Pages 1--254 ({June 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "1--254",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barton:2016:ISS,
  author =       "Kevin A. Barton and Gurvirender Tejay and Michael Lane
                 and Steve Terrell",
  title =        "Information system security commitment: a study of
                 external influences on senior management",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "9--25",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300104",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Flores:2016:SIR,
  author =       "Waldo Rocha Flores and Mathias Ekstedt",
  title =        "Shaping intention to resist social engineering through
                 transformational leadership, information security
                 culture and awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "26--44",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2016:SER,
  author =       "Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and
                 Jinbo Xiong and Danwei Chen",
  title =        "Secure, efficient and revocable multi-authority access
                 control system in cloud storage",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "45--59",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.02.002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300050",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2016:UIS,
  author =       "Chunghun Lee and Choong C. Lee and Suhyun Kim",
  title =        "Understanding information security stress: Focusing on
                 the type of information security compliance activity",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "60--70",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300074",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Morovati:2016:NBD,
  author =       "Kamran Morovati and Sanjay Kadam and Ali Ghorbani",
  title =        "A network based document management model to prevent
                 data extrusion",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "71--91",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300062",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Junaid:2016:DDM,
  author =       "Mohsin Junaid and Donggang Liu and David Kung",
  title =        "{Dexteroid}: Detecting malicious behaviors in
                 {Android} apps using reverse-engineered life cycle
                 models",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "92--117",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300037",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Camacho:2016:PBM,
  author =       "Jos{\'e} Camacho and Alejandro P{\'e}rez-Villegas and
                 Pedro Garc{\'\i}a-Teodoro and Gabriel
                 Maci{\'a}-Fern{\'a}ndez",
  title =        "{PCA}-based multivariate statistical network
                 monitoring for anomaly detection",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "118--137",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300116",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tsai:2016:UOS,
  author =       "Hsin-yi Sandy Tsai and Mengtian Jiang and Saleem
                 Alhabash and Robert LaRose and Nora J. Rifon and Shelia
                 R. Cotten",
  title =        "Understanding online safety behaviors: a protection
                 motivation theory perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "138--150",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.02.009",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300190",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{El-Hajj:2016:SCW,
  author =       "Wassim El-Hajj and Ghassen {Ben Brahim} and Hazem Hajj
                 and Haidar Safa and Ralph Adaimy",
  title =        "Security-by-construction in web applications
                 development via database annotations",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "151--165",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404815001972",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Davis:2016:AFE,
  author =       "Jonathan J. Davis and Ernest Foo",
  title =        "Automated feature engineering for {HTTP} tunnel
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "166--185",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816000080",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mouton:2016:SEA,
  author =       "Francois Mouton and Louise Leenen and H. S. Venter",
  title =        "Social engineering attack examples, templates and
                 scenarios",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "186--209",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300268",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Teh:2016:STD,
  author =       "Pin Shen Teh and Ning Zhang and Andrew Beng Jin Teoh
                 and Ke Chen",
  title =        "A survey on touch dynamics authentication in mobile
                 devices",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "210--235",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300256",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pasquale:2016:AEC,
  author =       "Liliana Pasquale and Sorren Hanvey and Mark Mcgloin
                 and Bashar Nuseibeh",
  title =        "Adaptive evidence collection in the cloud using attack
                 scenarios",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "236--254",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300232",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBd,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "59",
  number =       "??",
  pages =        "CO2",
  month =        jun,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:45 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300360",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Ce,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "iii--iii",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630058X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alexiou:2016:FSA,
  author =       "Nikolaos Alexiou and Stylianos Basagiannis and Sophia
                 Petridou",
  title =        "Formal security analysis of near field communication
                 using model checking",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "1--14",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300244",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PJb,
  author =       "Anonymous",
  title =        "Pages 1--226 ({July 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "1--226",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Djamaludin:2016:RUT,
  author =       "C. I. Djamaludin and E. Foo and S. Camtepe and P.
                 Corke",
  title =        "Revocation and update of trust in autonomous delay
                 tolerant networks",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "15--36",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630030X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Giboney:2016:SEA,
  author =       "Justin Scott Giboney and Jeffrey Gainer Proudfoot and
                 Sanjay Goel and Joseph S. Valacich",
  title =        "The Security Expertise Assessment Measure {(SEAM)}:
                 Developing a scale for hacker expertise",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "37--51",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300323",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2016:TRR,
  author =       "Gang Liu and Runnan Zhang and Huimin Song and Can Wang
                 and Jinhui Liu and Aijun Liu",
  title =        "{Ts-RBAC}: a {RBAC} model with transformation",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "52--61",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.03.006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300281",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xenakis:2016:USM,
  author =       "Christos Xenakis and Christoforos Ntantogian and
                 Orestis Panos",
  title =        "{(U)SimMonitor}: a mobile application for security
                 evaluation of cellular networks",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "62--78",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630027X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitra:2016:MTR,
  author =       "Barsha Mitra and Shamik Sural and Jaideep Vaidya and
                 Vijayalakshmi Atluri",
  title =        "Mining temporal roles using many-valued concepts",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "79--94",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300335",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schryen:2016:DTN,
  author =       "Guido Schryen and Gerit Wagner and Alexander
                 Schlegel",
  title =        "Development of two novel face-recognition {CAPTCHAs}:
                 a security and usability study",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "95--116",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300293",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Such:2016:IAT,
  author =       "Jose M. Such and Antonios Gouglidis and William
                 Knowles and Gaurav Misra and Awais Rashid",
  title =        "Information assurance techniques: Perceived cost
                 effectiveness",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "117--133",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300311",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pisani:2016:ETU,
  author =       "Paulo Henrique Pisani and Romain Giot and Andr{\'e} C.
                 P. L. F. de Carvalho and Ana Carolina Lorena",
  title =        "Enhanced template update: Application to keystroke
                 dynamics",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "134--153",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630044X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Skopik:2016:PSP,
  author =       "Florian Skopik and Giuseppe Settanni and Roman
                 Fiedler",
  title =        "A problem shared is a problem halved: a survey on the
                 dimensions of collective cyber defense through security
                 information sharing",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "154--176",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300347",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2016:MTP,
  author =       "Wenjuan Li and Weizhi Meng and Xiapu Luo and Lam For
                 Kwok",
  title =        "{\em {MVPSys}}: Toward practical multi-view based
                 false alarm reduction system in network intrusion
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "177--192",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300475",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sucasas:2016:APP,
  author =       "Victor Sucasas and Georgios Mantas and Firooz B.
                 Saghezchi and Ayman Radwan and Jonathan Rodriguez",
  title =        "An autonomous privacy-preserving authentication scheme
                 for intelligent transportation systems",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "193--205",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300463",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kar:2016:SDS,
  author =       "Debabrata Kar and Suvasini Panigrahi and Srikanth
                 Sundararajan",
  title =        "{SQLiGoT}: Detecting {SQL} injection attacks using
                 graph of tokens and {SVM}",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "206--225",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300451",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBe,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "60",
  number =       "??",
  pages =        "CO2",
  month =        jul,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300554",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Cf,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "iii--iii",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300815",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Canfora:2016:HSE,
  author =       "Gerardo Canfora and Francesco Mercaldo and Corrado
                 Aaron Visaggio",
  title =        "An {HMM} and structural entropy based detector for
                 {Android} malware: an empirical study",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "1--18",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300499",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PA,
  author =       "Anonymous",
  title =        "Pages 1--184 ({August 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "1--184",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tran:2016:CRR,
  author =       "Hiep Tran and Enrique Campos-Nanez and Pavel Fomin and
                 James Wasek",
  title =        "Cyber resilience recovery model to combat zero-day
                 malware attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "19--31",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300505",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bartnes:2016:FIS,
  author =       "Maria Bartnes and Nils Brede Moe and Poul E.
                 Heegaard",
  title =        "The future of information security incident management
                 training: a case study of electrical power companies",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "32--45",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300530",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kearney:2016:CPD,
  author =       "W. D. Kearney and H. A. Kruger",
  title =        "Can perceptual differences account for enigmatic
                 information security behaviour in an organisation?",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "46--58",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300645",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rrushi:2016:NDT,
  author =       "Julian L. Rrushi",
  title =        "{NIC} displays to thwart malware attacks mounted from
                 within the {OS}",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "59--71",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300517",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Balachandran:2016:CFO,
  author =       "Vivek Balachandran and Sufatrio and Darell J. J. Tan
                 and Vrizlynn L. L. Thing",
  title =        "Control flow obfuscation for {Android} applications",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "72--93",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300529",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Uzunov:2016:SSS,
  author =       "Anton V. Uzunov",
  title =        "A survey of security solutions for distributed
                 publish\slash subscribe systems",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "94--129",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300487",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2016:UPP,
  author =       "Chao Shen and Tianwen Yu and Haodi Xu and Gengshan
                 Yang and Xiaohong Guan",
  title =        "User practice in password security: an empirical study
                 of real-life passwords in the wild",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "130--141",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300657",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boshmaf:2016:ILV,
  author =       "Yazan Boshmaf and Dionysios Logothetis and Georgos
                 Siganos and Jorge Ler{\'{\i}}a and Jose Lorenzo and
                 Matei Ripeanu and Konstantin Beznosov and Hassan
                 Halawa",
  title =        "{{\'I}}ntegro: Leveraging victim prediction for robust
                 fake account detection in large scale {OSNs}",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "142--168",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.05.005",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300633",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Flowerday:2016:ISP,
  author =       "Stephen V. Flowerday and Tite Tuyikeze",
  title =        "Information security policy development and
                 implementation: the what, how and who",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "169--183",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300670",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:IEBf,
  author =       "Anonymous",
  title =        "{IFC} --- Editorial Board",
  journal =      j-COMPUT-SECUR,
  volume =       "61",
  number =       "??",
  pages =        "CO2",
  month =        aug,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300785",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:Cg,
  author =       "Anonymous",
  title =        "Contents",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "iii--iii",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816301092",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Modic:2016:NET,
  author =       "Jolanda Modic and Ruben Trapero and Ahmed Taha and
                 Jesus Luna and Miha Stopar and Neeraj Suri",
  title =        "Novel efficient techniques for real-time cloud
                 security assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "1--18",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.06.003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300682",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2016:PS,
  author =       "Anonymous",
  title =        "Pages 1--348 ({September 2016})",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "1--348",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hellal:2016:MCF,
  author =       "Aya Hellal and Lotfi {Ben Romdhane}",
  title =        "Minimal contrast frequent pattern mining for malware
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "19--32",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300694",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2016:DBM,
  author =       "Yonggon Kim and Ohmin Kwon and Jinsoo Jang and
                 Seongwook Jin and Hyeongboo Baek and Brent Byunghoon
                 Kang and Hyunsoo Yoon",
  title =        "On-demand bootstrapping mechanism for isolated
                 cryptographic operations on commodity accelerators",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "33--48",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2016.06.006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300712",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{delRio:2016:ABC,
  author =       "Jose Sanchez del Rio and Daniela Moctezuma and
                 Cristina Conde and Isaac Martin de Diego and Enrique
                 Cabello",
  title =        "Automated border control e-gates and facial
                 recognition systems",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "49--72",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300736",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{GhasemiGol:2016:FMI,
  author =       "Mohammad GhasemiGol and Hassan Takabi and Abbas
                 Ghaemi-Bafghi",
  title =        "A foresight model for intrusion response management",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "73--94",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300700",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bajwa:2016:NTN,
  author =       "Garima Bajwa and Ram Dantu",
  title =        "{Neurokey}: Towards a new paradigm of cancelable
                 biometrics-based key generation using
                 electroencephalograms",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "95--113",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300669",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hassanzadeh:2016:PPI,
  author =       "Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and
                 Guofei Gu and Michalis Polychronakis",
  title =        "{PRIDE}: a practical intrusion detection system for
                 resource constrained wireless mesh networks",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "114--132",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300724",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tang:2016:RIH,
  author =       "Zhenjun Tang and Huan Lao and Xianquan Zhang and Kai
                 Liu",
  title =        "Robust image hashing via {DCT} and {LLE}",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "133--148",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404816300852",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nunez:2016:EMA,
  author =       "David Nu{\~n}ez and Carmen Fern{\'a}ndez-Gago and
                 Jes{\'u}s Luna",
  title =        "Eliciting metrics for accountability of cloud
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "149--164",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481630075X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "https://www.sciencedirect.com/science/journal/01674048",
}

@Article{Langer:2016:ONA,
  author =       "Lucie Langer and Florian Skopik and Paul Smith and
                 Markus Kammerstetter",
  title =        "From old to new: Assessing cybersecurity risks for an
                 evolving smart grid",
  journal =      j-COMPUT-SECUR,
  volume =       "62",
  number =       "??",
  pages =        "165--176",
  month =        sep,
  year =         "2016",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Mon Sep 23 09:46:46 MDT 2019"