@Preamble{
"\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
"\ifx \undefined \circled \def \circled #1{(#1)}\fi" #
"\ifx \undefined \reg \def \reg {\circled{R}}\fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
FAX: +1 801 581 4148,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|http://www.math.utah.edu/~beebe/|"}
@String{j-COMPUT-SECUR = "Computers \& Security"}
@Article{Anonymous:2010:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "iii--iii",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900131X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ea,
author = "Dimitris Gritzalis and Jan Eloff",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "1--2",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001138",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2010:SVE,
author = "Fuwen Liu and Hartmut Koenig",
title = "A survey of video encryption algorithms",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "3--15",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000698",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Basagiannis:2010:IMM,
author = "Stylianos Basagiannis and Panagiotis Katsaros and
Andrew Pombortsis",
title = "An intruder model with message inspection for model
checking security protocols",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "16--34",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spathoulas:2010:RFP,
author = "Georgios P. Spathoulas and Sokratis K. Katsikas",
title = "Reducing false positives in intrusion detection
systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "35--44",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000844",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seewald:2010:DIB,
author = "Alexander K. Seewald and Wilfried N. Gansterer",
title = "On the detection and identification of botnets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "45--58",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shin:2010:AMD,
author = "Heechang Shin and Jaideep Vaidya and Vijayalakshmi
Atluri",
title = "Anonymization models for directional location based
service environments",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "59--73",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Costa:2010:RMN,
author = "Gabriele Costa and Fabio Martinelli and Paolo Mori and
Christian Schaefer and Thomas Walter",
title = "Runtime monitoring for next generation {Java ME}
platform",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "74--87",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000790",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toland:2010:IPM,
author = "Tyrone S. Toland and Csilla Farkas and Caroline M.
Eastman",
title = "The inference problem: Maintaining maximal
availability in the presence of database updates",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "88--103",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000789",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choi:2010:WVE,
author = "Y.-H. Choi and L. Li and P. Liu and G. Kesidis",
title = "Worm virulence estimation for the containment of local
worm outbreak",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "104--123",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000753",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2010:SCA,
author = "Chenfeng Vincent Zhou and Christopher Leckie and
Shanika Karunasekera",
title = "A survey of coordinated attacks and collaborative
intrusion detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "124--140",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900073X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hernandez-Castro:2010:PCD,
author = "Carlos Javier Hernandez-Castro and Arturo Ribagorda",
title = "Pitfalls in {CAPTCHA} design and implementation: the
Math {CAPTCHA}, a case study",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "141--157",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000728",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAa,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "158--158",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001357",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCa,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "159--162",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPa,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "163--164",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900128X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PF,
author = "Anonymous",
title = "Pages 1--164 ({February 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "1",
pages = "??--??",
month = feb,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "iii--iii",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Eb,
author = "Dimitris Gritzalis and Sabrina {De Capitani di
Vimercati}",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "165--166",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001424",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ferrer-Gomilla:2010:CEM,
author = "Josep Lluis Ferrer-Gomilla and Jose A. Onieva and
Magdalena Payeras and Javier Lopez",
title = "Certified electronic mail: Properties revisited",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "167--179",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000704",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jarraya:2010:SPP,
author = "Houssem Jarraya and Maryline Laurent",
title = "A secure peer-to-peer backup service keeping great
autonomy while under the supervision of a provider",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "180--195",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001102",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DaVeiga:2010:FAI,
author = "A. {Da Veiga} and J. H. P. Eloff",
title = "A framework and assessment instrument for information
security culture",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "196--207",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000923",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Su:2010:WWA,
author = "Ming-Yang Su",
title = "{WARP}: a wormhole-avoidance routing protocol by
anomaly detection in mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "208--224",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ehlert:2010:SNS,
author = "Sven Ehlert and Dimitris Geneiatakis and Thomas
Magedanz",
title = "Survey of network security systems to counter
{SIP}-based denial-of-service attacks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "225--243",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holbl:2010:TPI,
author = "Marko H{\"o}lbl and Tatjana Welzer and Bostjan
Brumen",
title = "Two proposed identity-based three-party authenticated
key agreement protocols from pairings",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "244--252",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900090X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stakhanova:2010:SSB,
author = "Natalia Stakhanova and Samik Basu and Johnny Wong",
title = "On the symbiosis of specification-based and
anomaly-based detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "253--268",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000893",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chang:2010:EFB,
author = "Chin-Chen Chang and Hao-Chuan Tsai and Yi-Pei Hsieh",
title = "An efficient and fair buyer-seller fingerprinting
scheme for large scale networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "269--277",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000881",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Millan:2010:PBT,
author = "Gabriel L{\'o}pez Mill{\'a}n and Manuel Gil P{\'e}rez
and Gregorio Mart{\'\i}nez P{\'e}rez and Antonio F.
G{\'o}mez Skarmeta",
title = "{PKI}-based trust management in inter-domain
scenarios",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "278--290",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000868",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAb,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "291--291",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001606",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCb,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "292--295",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPb,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "296--296",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:CPc,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "297--297",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000039",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "ifc--ifc",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PM,
author = "Anonymous",
title = "Pages 165--298 ({March 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "2",
pages = "??--??",
month = mar,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:19 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCc,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "i--iv",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "iv--iv",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000012X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2010:SIS,
author = "Seok-Won Lee and Mattia Monga",
title = "Special issue on software engineering for secure
systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "299--301",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pironti:2010:PCJ,
author = "Alfredo Pironti and Riccardo Sisto",
title = "Provably correct {Java} implementations of {Spi
Calculus} security protocols specifications",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "302--314",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000832",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bauer:2010:RVC,
author = "Andreas Bauer and Jan J{\"u}rjens",
title = "Runtime verification of cryptographic protocols",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "315--330",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiao:2010:KSM,
author = "Liang Xiao and Bo Hu and Madalina Croitoru and Paul
Lewis and Srinandan Dasmahapatra",
title = "A knowledgeable security model for distributed health
information systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "331--349",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pavlich-Mariscal:2010:FCA,
author = "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
Laurent D. Michel",
title = "A framework of composable access control features:
Preserving separation of access control concerns from
models to code",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "350--379",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAc,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "380--380",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "3",
pages = "ifc--ifc",
month = may,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000009X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "iii--iii",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ec,
author = "Dimitris Gritzalis and Pierangela Samarati",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "381--382",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hilgenstieler:2010:ESP,
author = "Egon Hilgenstieler and Elias P. Duarte and Glenn
Mansfield-Keeni and Norio Shiratori",
title = "Extensions to the source path isolation engine for
precise and efficient log-based {IP} traceback",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "383--392",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rossudowski:2010:SPA,
author = "A. M. Rossudowski and H. S. Venter and J. H. P. Eloff
and D. G. Kourie",
title = "A security privacy aware architecture and protocol for
a single smart card used for multiple services",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "393--409",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001394",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2010:SAS,
author = "Fangwei Wang and Yunkai Zhang and Changguang Wang and
Jianfeng Ma and SangJae Moon",
title = "Stability analysis of a {SEIQV} epidemic model for
rapid spreading worms",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "410--418",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001096",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheneau:2010:SIP,
author = "Tony Cheneau and Aymen Boudguiga and Maryline
Laurent",
title = "Significantly improved performances of the
cryptographically generated addresses thanks to {ECC}
and {GPGPU}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "419--431",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001461",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Albrechtsen:2010:IIS,
author = "Eirik Albrechtsen and Jan Hovden",
title = "Improving information security awareness and behaviour
through dialogue, participation and collective
reflection. {An} intervention study",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "432--445",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001436",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yoon:2010:HSF,
author = "Ji Won Yoon and Hyoungshick Kim and Jun Ho Huh",
title = "Hybrid spam filtering for mobile communication",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "446--459",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001266",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2010:GME,
author = "Christoforos Ntantogian and Christos Xenakis and
Ioannis Stavrakakis",
title = "A generic mechanism for efficient authentication in
B3G networks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "460--475",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{VanNiekerk:2010:ISC,
author = "J. F. {Van Niekerk} and R. {Von Solms}",
title = "Information security culture: a management
perspective",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "476--486",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001126",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mander:2010:PSD,
author = "Todd Mander and Richard Cheung and Farhad Nabhani",
title = "Power system {DNP3} data object security using data
sets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "487--500",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001084",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Forne:2010:PAA,
author = "Jordi Forn{\'e} and Francisca Hinarejos and Andr{\'e}s
Mar{\'{\i}}n and Florina Almen{\'a}rez and Javier Lopez
and Jose A. Montenegro and Marc Lacoste and Daniel
D{\'{\i}}az",
title = "Pervasive authentication and authorization
infrastructures for mobile users",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "501--514",
month = jun,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2009.09.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809000911",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAd,
author = "Anonymous",
title = "{IFIP TC11} --- Aims and Scope",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "515--515",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000283",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITCd,
author = "Anonymous",
title = "{IFIP} Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "516--519",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000295",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PJ,
author = "Anonymous",
title = "Pages 381--520 ({June 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "4",
pages = "??--??",
month = jun,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:20 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "iv--iv",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000043X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2010:Ed,
author = "Dimitris Gritzalis and Javier Lopez",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "521--522",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leitold:2010:RES,
author = "Herbert Leitold and Reinhard Posch and Thomas
R{\"o}ssler",
title = "Reconstruction of electronic signatures from
{eDocument} printouts",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "523--532",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001254",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Blundo:2010:MKH,
author = "Carlo Blundo and Stelvio Cimato and Sabrina {De
Capitani di Vimercati} and Alfredo {De Santis} and Sara
Foresti and Stefano Paraboschi and Pierangela
Samarati",
title = "Managing key hierarchies for access control
enforcement: Heuristic approaches",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "533--547",
month = jul,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2009.12.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001448",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Colantonio:2010:TRM,
author = "Alessandro Colantonio and Roberto {Di Pietro} and
Alberto Ocello and Nino Vincenzo Verde",
title = "Taming role mining complexity in {RBAC}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "548--564",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000027",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pham:2010:TD,
author = "Quan Pham and Jason Reid and Adrian McCullagh and
Edward Dawson",
title = "On a taxonomy of delegation",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "565--579",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolter:2010:CPM,
author = "Jan Kolter and Thomas Kernchen and G{\"u}nther
Pernul",
title = "Collaborative privacy management",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "580--591",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740480900145X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Farley:2010:RBD,
author = "Ryan Farley and Xinyuan Wang",
title = "Roving bugnet: Distributed surveillance threat and
mitigation",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "592--602",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001400",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Soupionis:2010:ACE,
author = "Yannis Soupionis and Dimitris Gritzalis",
title = "Audio {CAPTCHA}: Existing solutions assessment and a
new implementation for {VoIP} telephony",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "603--618",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sorniotti:2010:PSS,
author = "Alessandro Sorniotti and Refik Molva",
title = "A provably secure secret handshake with dynamic
controlled matching",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "619--627",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001370",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fernandez:2010:NAI,
author = "Marcel Fernandez and Josep Cotrina and Miguel Soriano
and Neus Domingo",
title = "A note about the identifier parent property in
{Reed--Solomon} codes",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "628--635",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAe,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "636--640",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "iii--iii",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000568",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "641--642",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Theoharidou:2010:MLC,
author = "Marianthi Theoharidou and Panayiotis Kotzanikolaou and
Dimitris Gritzalis",
title = "A multi-layer Criticality Assessment methodology based
on interdependencies",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "643--658",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000210",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sommestad:2010:PRM,
author = "Teodor Sommestad and Mathias Ekstedt and Pontus
Johnson",
title = "A probabilistic relational model for security risk
analysis",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "659--679",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kavallaris:2010:DPS,
author = "Theodoros Kavallaris and Vasilios Katos",
title = "On the detection of pod slurping attacks",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "680--685",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zi:2010:IPN,
author = "Xiaochao Zi and Lihong Yao and Li Pan and Jianhua Li",
title = "Implementing a passive network covert timing channel",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "686--696",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404809001485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hinarejos:2010:PEC,
author = "M. Francisca Hinarejos and Jose L. Mu{\~n}oz and Jordi
Forn{\'e} and Oscar Esparza",
title = "{PREON}: an efficient cascade revocation mechanism for
delegation paths",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "697--711",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000222",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tjhai:2010:PTS,
author = "Gina C. Tjhai and Steven M. Furnell and Maria Papadaki
and Nathan L. Clarke",
title = "A preliminary two-stage alarm correlation and
filtering system using {SOM} neural network and
{$K$}-means algorithm",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "712--723",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAf,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "724--728",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000057X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "ifc--ifc",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000532",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PS,
author = "Anonymous",
title = "Pages 641--728 ({September 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "6",
pages = "??--??",
month = sep,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "iii--iii",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000672",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "729--730",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000714",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruighaver:2010:EDM,
author = "A. B. Ruighaver and S. B. Maynard and M. Warren",
title = "Ethical decision making: Improving the quality of
acceptable use policies",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "731--736",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000386",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Palmieri:2010:NAD,
author = "Francesco Palmieri and Ugo Fiore",
title = "Network anomaly detection through nonlinear analysis",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "737--755",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000362",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guinde:2010:EHS,
author = "Nitesh B. Guinde and Sotirios G. Ziavras",
title = "Efficient hardware support for pattern matching in
network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "756--769",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000350",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pavlich-Mariscal:2010:FSA,
author = "Jaime A. Pavlich-Mariscal and Steven A. Demurjian and
Laurent D. Michel",
title = "A framework for security assurance of access control
enforcement code",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "770--784",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Palmer:2010:ASM,
author = "Anthony J. Palmer",
title = "Approach for selecting the most suitable Automated
Personal Identification Mechanism {(ASMSA)}",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "785--806",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000325",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAg,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "807--811",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000726",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBg,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "ifc--ifc",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000647",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PO,
author = "Anonymous",
title = "Pages 729--812 ({October 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "7",
pages = "??--??",
month = oct,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:21 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "iii--iii",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000969",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2010:STP,
author = "Eugene H. Spafford",
title = "Security, technology, publishing, and ethics (Part
I)",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "813--814",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000878",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2010:MPT,
author = "Jinpeng Wei and Calton Pu",
title = "Modeling and preventing {TOCTTOU} vulnerabilities in
{Unix}-style file systems",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "815--830",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000830",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Workman:2010:BPC,
author = "Michael Workman",
title = "A behaviorist perspective on corporate harassment
online: Validation of a theoretical model of
psychological motives",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "831--839",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000829",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kritzinger:2010:CSH,
author = "E. Kritzinger and S. H. von Solms",
title = "Cyber security for home users: a new way of protection
through awareness enforcement",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "840--847",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000775",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ardagna:2010:ACS,
author = "Claudio A. Ardagna and Sabrina {De Capitani di
Vimercati} and Sara Foresti and Tyrone W. Grandison and
Sushil Jajodia and Pierangela Samarati",
title = "Access control for smarter healthcare using policy
spaces",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "848--858",
month = nov,
year = "2010",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2010.07.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000623",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kantzavelou:2010:GBI,
author = "Ioanna Kantzavelou and Sokratis Katsikas",
title = "A game-based intrusion detection mechanism to confront
internal attackers",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "859--874",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000611",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herranz:2010:CDP,
author = "Javier Herranz and Stan Matwin and Jordi Nin and
Vicen{\c{c}} Torra",
title = "Classifying data from protected statistical datasets",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "875--890",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:2010:MFA,
author = "Fred Cohen",
title = "A method for forensic analysis of control",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "891--902",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000374",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:ITAh,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "903--907",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000970",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IIS,
author = "Anonymous",
title = "Invitation to {IFIP} sec 2011",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "908--908",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000101X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:IEBh,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000933",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2010:PN,
author = "Anonymous",
title = "Pages 813--908 ({November 2010})",
journal = j-COMPUT-SECUR,
volume = "29",
number = "8",
pages = "??--??",
month = nov,
year = "2010",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "iii--iii",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000216",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "1--1",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000115X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:STP,
author = "Eugene H. Spafford",
title = "Security, technology, publishing, and ethics (part
{II})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "2--3",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001161",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sadan:2011:WUS,
author = "Zac Sadan and David Schwartz",
title = "{WhiteScript}: Using social network analysis
parameters to balance between browser usability and
malware exposure",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "4--12",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000842",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gu:2011:SSP,
author = "Qijun Gu and Christopher Ferguson and Rizwan Noorani",
title = "A study of self-propagating mal-packets in sensor
networks: Attacks and defenses",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "13--27",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000854",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2011:ENI,
author = "Hua Guo and Yi Mu and Zhoujun Li and Xiyong Zhang",
title = "An efficient and non-interactive hierarchical key
agreement protocol",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "28--34",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000866",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khan:2011:DCB,
author = "Hassan Khan and Mobin Javed and Syed Ali Khayam and
Fauzan Mirza",
title = "Designing a cluster-based covert channel to evade disk
investigation and forensics",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "35--49",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000088X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Woo:2011:MVD,
author = "Sung-Whan Woo and HyunChul Joh and Omar H. Alhazmi and
Yashwant K. Malaiya",
title = "Modeling vulnerability discovery process in {Apache}
and {IIS HTTP} servers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "50--62",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000908",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2011:CEI,
author = "Christos Xenakis and Christoforos Panos and Ioannis
Stavrakakis",
title = "A comparative evaluation of intrusion detection
architectures for mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "63--80",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481000091X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAa,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "81--85",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000071",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ICC,
author = "Anonymous",
title = "{IFIPTM 2011} --- Call for Contributions",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "86--86",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000101",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:CMa,
author = "Anonymous",
title = "Call for membership",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "87--87",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:WCP,
author = "Anonymous",
title = "{WISE 7} --- Call for Papers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "88--88",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000125",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "ifc--ifc",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000186",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PJa,
author = "Anonymous",
title = "Pages 1--88 ({January 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "1",
pages = "??--??",
month = jan,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:22 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:23 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "iii--iii",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000344",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzaliz:2011:E,
author = "Dimitris Gritzaliz and James Joshi",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "89--90",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001094",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rao:2011:FGI,
author = "Prathima Rao and Dan Lin and Elisa Bertino and Ninghui
Li and Jorge Lobo",
title = "Fine-grained integration of access control policies",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "91--107",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000891",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carminati:2011:SWB,
author = "Barbara Carminati and Elena Ferrari and Raymond
Heatherly and Murat Kantarcioglu and Bhavani
Thuraisingham",
title = "Semantic web-based social network access control",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "108--115",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000799",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jin:2011:PCA,
author = "Jing Jin and Gail-Joon Ahn and Hongxin Hu and Michael
J. Covington and Xinwen Zhang",
title = "Patient-centric authorization framework for electronic
healthcare services",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "116--127",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000805",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mondal:2011:SAG,
author = "Samrat Mondal and Shamik Sural and Vijayalakshmi
Atluri",
title = "Security analysis of {GTRBAC} and its variants using
model checking",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "128--147",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000817",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stoller:2011:SRA,
author = "Scott D. Stoller and Ping Yang and Mikhail I. Gofman
and C. R. Ramakrishnan",
title = "Symbolic reachability analysis for parameterized
administrative role-based access control",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "148--164",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810000787",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAb,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "165--169",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000356",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:HCP,
author = "Anonymous",
title = "{HAISA} --- Call for papers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "170--170",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000393",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "2--3",
pages = "ifc--ifc",
month = mar,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000319",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "iii--iii",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000563",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "171--171",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000496",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ma:2011:UCC,
author = "Xiongfeng Ma and Chi-Hang Fred Fung and Jean-Christian
Boileau and H. F. Chau",
title = "Universally composable and customizable
post-processing for practical quantum key
distribution",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "172--177",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001021",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Breaux:2011:LRS,
author = "Travis D. Breaux and David L. Baumer",
title = "Legally ``reasonable'' security requirements: a
10-year {FTC} retrospective",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "178--193",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001124",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chabot:2011:EEP,
author = "Hugues Chabot and Rapha{\"e}l Khoury and Nadia Tawbi",
title = "Extending the enforcement power of truncation monitors
using static analysis",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "194--207",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001136",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gunson:2011:UPS,
author = "Nancie Gunson and Diarmid Marshall and Hazel Morton
and Mervyn Jack",
title = "User perceptions of security and usability of
single-factor and two-factor authentication in
automated telephone banking",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "208--220",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404810001148",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ariu:2011:HID,
author = "Davide Ariu and Roberto Tronci and Giorgio Giacinto",
title = "{\em {HMMPayl}}: an intrusion detection system based
on Hidden {Markov} Models",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "221--241",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Moller:2011:MBU,
author = "Sebastian M{\"o}ller and Noam Ben-Asher and
Klaus-Peter Engelbrecht and Roman Englert and Joachim
Meyer",
title = "Modeling the behavior of users who are confronted with
security mechanisms",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "242--256",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000423",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Basagiannis:2011:QAC,
author = "S. Basagiannis and S. Petridou and N. Alexiou and G.
Papadimitriou and P. Katsaros",
title = "Quantitative analysis of a certified e-mail protocol
in mobile environments: a probabilistic model checking
approach",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "257--272",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000435",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shih:2011:SMI,
author = "Dong-Her Shih and David C. Yen and Chih-Hung Cheng and
Ming-Hung Shih",
title = "A secure multi-item e-auction mechanism with bid
privacy",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "273--287",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000460",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAc,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "288--292",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000575",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:CMb,
author = "Anonymous",
title = "Call for membership",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "293--293",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000605",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000538",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PJb,
author = "Anonymous",
title = "Pages 171--294 ({June 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "4",
pages = "??--??",
month = jun,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "iii--iii",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000782",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiang:2011:EAN,
author = "Yang Xiang and Jiankun Hu and Wanlei Zhou",
title = "Editorial: Advances in network and system security",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "295--296",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000708",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tapiador:2011:MMA,
author = "Juan E. Tapiador and John A. Clark",
title = "Masquerade mimicry attack detection: a randomised
approach",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "297--310",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000654",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:PFB,
author = "Peng Zhang and Jiankun Hu and Cai Li and Mohammed
Bennamoun and Vijayakumar Bhagavatula",
title = "A pitfall in fingerprint bio-cryptographic key
generation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "311--319",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000459",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2011:HAB,
author = "Guojun Wang and Qin Liu and Jie Wu and Minyi Guo",
title = "Hierarchical attribute-based encryption and scalable
user revocation for sharing data in cloud servers",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "320--331",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000678",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sun:2011:IPT,
author = "Xiaoxun Sun and Hua Wang and Jiuyong Li and Yanchun
Zhang",
title = "Injecting purpose and trust into data anonymisation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "332--345",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAd,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "346--350",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:24 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000757",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:25 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Ci,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "iii--iii",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000903",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ec,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "351--352",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000733",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Davis:2011:DPA,
author = "Jonathan J. Davis and Andrew J. Clark",
title = "Data preprocessing for anomaly based network intrusion
detection: a review",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "353--375",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000691",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rekhis:2011:LBA,
author = "Slim Rekhis and Noureddine Boudriga",
title = "Logic-based approach for digital forensic
investigation in communication Networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "376--396",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000447",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martinez-Moyano:2011:MBC,
author = "Ignacio J. Martinez-Moyano and Stephen H. Conrad and
David F. Andersen",
title = "Modeling behavioral considerations related to
information security",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "397--409",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000472",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Julisch:2011:CDB,
author = "Klaus Julisch and Christophe Suter and Thomas Woitalla
and Olaf Zimmermann",
title = "Compliance by design --- Bridging the chasm between
auditors and {IT} architects",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "410--426",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000514",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giot:2011:UKD,
author = "Romain Giot and Mohamad El-Abed and Baptiste Hemery
and Christophe Rosenberger",
title = "Unconstrained keystroke dynamics authentication with
shared secret",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "427--445",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000502",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pereniguez:2011:PUP,
author = "F. Pereniguez and R. Marin-Lopez and G. Kambourakis
and S. Gritzalis and A. F. Gomez",
title = "{PrivaKERB}: a user privacy framework for {Kerberos}",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "446--463",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000617",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tauber:2011:SCM,
author = "Arne Tauber",
title = "A survey of certified mail systems provided on the
{Internet}",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "464--485",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000629",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Posey:2011:UMA,
author = "Clay Posey and Rebecca J. Bennett and Tom L. Roberts",
title = "Understanding the mindset of the abusive insider: an
examination of insiders' causal reasoning following
internal security changes",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "486--497",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000630",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sachan:2011:RVD,
author = "Amit Sachan and Sabu Emmanuel",
title = "Rights violation detection in multi-level digital
rights management system",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "498--513",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000642",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yuxin:2011:FRS,
author = "Ding Yuxin and Yuan Xuebing and Zhou Di and Dong Li
and An Zhanchao",
title = "Feature representation and selection in malicious code
detection methods based on static system calls",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "514--524",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100068X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:TCS,
author = "Zonghua Zhang and Farid Na{\"\i}t-Abdesselam and
Pin-Han Ho and Youki Kadobayashi",
title = "Toward cost-sensitive self-optimizing anomaly
detection and response in autonomic networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "525--537",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100071X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2011:CTI,
author = "Jianhua Yang and David Woolbright",
title = "Correlating {TCP\slash IP} Packet contexts to detect
stepping-stone intrusion",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "538--546",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000721",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:ITAe,
author = "Anonymous",
title = "{IFIP TC11} --- Aims, Scope and Technical Committee",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "547--551",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000915",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "ifc--ifc",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PSO,
author = "Anonymous",
title = "Pages 351--552 ({September--October 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "6--7",
pages = "??--??",
month = sep # "\slash " # oct,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:Cj,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "iii--iv",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001271",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2011:Ef,
author = "Eugene H. Spafford",
title = "Editorial for 30/8",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "553--554",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001209",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2011:DCS,
author = "Da Zhang and Chai Kiat Yeo",
title = "Distributed Court System for intrusion detection in
mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "555--570",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001155",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jaeger:2011:CUC,
author = "Trent Jaeger and Paul C. van Oorschot and Glenn
Wurster",
title = "Countering unauthorized code execution on commodity
kernels: a survey of common interfaces allowing kernel
code modification",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "571--579",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001143",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Arnellos:2011:FDS,
author = "Argyris Arnellos and Dimitrios Lekkas and Dimitrios
Zissis and Thomas Spyrou and John Darzentas",
title = "Fair digital signing: the structural reliability of
signed documents",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "580--596",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100112X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mallesh:2011:ASD,
author = "Nayantara Mallesh and Matthew Wright",
title = "An analysis of the statistical disclosure attack and
receiver-bound cover",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "597--612",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001118",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gascon:2011:AUD,
author = "Hugo Gascon and Agustin Orfila and Jorge Blasco",
title = "Analysis of update delays in signature-based network
intrusion detection systems",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "613--624",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001106",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolias:2011:SII,
author = "C. Kolias and G. Kambourakis and M. Maragoudakis",
title = "Swarm intelligence in intrusion detection: a survey",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "625--642",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100109X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Makri:2011:CRG,
author = "Eleftheria Makri and Elisavet Konstantinou",
title = "Constant round group key agreement protocols: a
comparative study",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "643--678",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001088",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mavrogiannopoulos:2011:TSM,
author = "Nikos Mavrogiannopoulos and Nessim Kisserli and Bart
Preneel",
title = "A taxonomy of self-modifying code for obfuscation",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "679--691",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001076",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegari:2011:CSW,
author = "C. Callegari and S. Giordano and M. Pagano and T.
Pepe",
title = "Combining sketches and wavelet analysis for multi
time-scale network anomaly detection",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "692--704",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001064",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bella:2011:EPC,
author = "Giampaolo Bella and Rosario Giustolisi and Salvatore
Riccobene",
title = "Enforcing privacy in e-commerce by balancing anonymity
and trust",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "705--718",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001052",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choo:2011:CTL,
author = "Kim-Kwang Raymond Choo",
title = "The cyber threat landscape: Challenges and future
research directions",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "719--731",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001040",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2011:MDU,
author = "Lin Huang and Mark Stamp",
title = "Masquerade detection using profile hidden {Markov}
models",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "732--747",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001003",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fuchs:2011:RIS,
author = "L. Fuchs and G. Pernul and R. Sandhu",
title = "Roles in information security --- a survey and
classification of the research area",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "748--769",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100099X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Okolica:2011:WDM,
author = "James S. Okolica and Gilbert L. Peterson",
title = "{Windows} driver memory analysis: a reverse
engineering methodology",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "770--779",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000988",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2011:EDR,
author = "GuangXu Zhou and Murat Demirer and Coskun Bayrak and
Licheng Wang",
title = "Enable delegation for {RBAC} with Secure Authorization
Certificate",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "780--790",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000976",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rrushi:2011:EBV,
author = "Julian Rrushi and Ehsan Mokhtari and Ali A. Ghorbani",
title = "Estimating botnet virulence within mathematical models
of botnet propagation dynamics",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "791--802",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000964",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martin:2011:CUA,
author = "Nigel Martin and John Rice",
title = "Cybercrime: Understanding and addressing the concerns
of stakeholders",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "803--814",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100085X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Charanek:2011:VEE,
author = "Elias Abou Charanek and Hoseb Dermanilian and Imad
Elhajj and Ayman Kayssi and Ali Chehab",
title = "{$ E^2 $ VoIP$^2$}: Energy efficient voice over {IP}
privacy",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "815--829",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2011:IMS,
author = "Jung-San Lee and Ming-Huang Hsieh",
title = "An interactive mobile {SMS} confirmation method using
secret sharing technique",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "830--839",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811000836",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001246",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2011:PN,
author = "Anonymous",
title = "Pages 553--840 ({November 2011})",
journal = j-COMPUT-SECUR,
volume = "30",
number = "8",
pages = "??--??",
month = nov,
year = "2011",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:26 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "iii--iii",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100157X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "1--2",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001520",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:AF,
author = "Manuel Leithner and Edgar Weippl",
title = "{Android} forensics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "3--3",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001301",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mana:2012:TNB,
author = "Antonio Ma{\~n}a and Hristo Koshutanski and Ernesto J.
P{\'e}rez",
title = "A trust negotiation based security framework for
service provisioning in load-balancing clusters",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "4--25",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001428",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kulekci:2012:SBW,
author = "M. Oguzhan K{\"u}lekci",
title = "On scrambling the {Burrows--Wheeler} transform to
provide privacy in lossless compression",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "26--32",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/datacompression.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001416",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2012:RHA,
author = "Gaobo Yang and Ning Chen and Qin Jiang",
title = "A robust hashing algorithm based on {SURF} for video
copy detection",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "33--39",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001404",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bhatnagar:2012:NRA,
author = "Gaurav Bhatnagar and Q. M. Jonathan Wu and
Balasubramanian Raman",
title = "A new robust adjustable logo watermarking scheme",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "40--58",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001398",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2012:TRS,
author = "Xingwen Zhao and Fangguo Zhang",
title = "Tracing and revoking scheme for dynamic privileges
against pirate rebroadcast",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "59--69",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001386",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mou:2012:FEC,
author = "Sheng Mou and Zhiwen Zhao and Sisi Jiang and Zushun Wu
and Jiaojiao Zhu",
title = "Feature extraction and classification algorithm for
detecting complex covert timing channel",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "70--82",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001349",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ifinedo:2012:UIS,
author = "Princely Ifinedo",
title = "Understanding information systems security policy
compliance: an integration of the theory of planned
behavior and the protection motivation theory",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "83--95",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001337",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rodero-Merino:2012:BSP,
author = "Luis Rodero-Merino and Luis M. Vaquero and Eddy Caron
and Adrian Muresan and Fr{\'e}d{\'e}ric Desprez",
title = "Building safe {PaaS} clouds: a survey on security in
multitenant software platforms",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "96--108",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001313",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stefan:2012:RKD,
author = "Deian Stefan and Xiaokui Shu and Danfeng (Daphne)
Yao",
title = "Robustness of keystroke-dynamics based biometrics
against synthetic forgeries",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "109--121",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001179",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lacey:2012:RUR,
author = "T. H. Lacey and R. F. Mills and B. E. Mullins and R.
A. Raines and M. E. Oxley and S. K. Rogers",
title = "{RIPsec} --- Using reputation-based multilayer
security to protect {MANETs}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "122--136",
month = feb,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.09.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001167",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dube:2012:MTR,
author = "T. Dube and R. Raines and G. Peterson and K. Bauer and
M. Grimaila and S. Rogers",
title = "Malware target recognition via static heuristics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "137--147",
month = feb,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.09.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001131",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "ifc--ifc",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001544",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PF,
author = "Anonymous",
title = "Pages 1--148 ({February 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "1",
pages = "??--??",
month = feb,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "iii--iii",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000302",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "149--150",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000168",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Al-Assam:2012:SEB,
author = "Hisham Al-Assam and Sabah Jassim",
title = "Security evaluation of biometric keys",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "151--163",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000065",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holm:2012:PAN,
author = "Hannes Holm",
title = "Performance of automated network vulnerability
scanning at remediating security issues",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "164--175",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001696",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wei:2012:TGD,
author = "Jinpeng Wei and Calton Pu",
title = "Toward a general defense against kernel queue hooking
attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "176--191",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001507",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xiao:2012:MFR,
author = "Da Xiao and Yan Yang and Wenbin Yao and Chunhua Wu and
Jianyi Liu and Yixian Yang",
title = "Multiple-File Remote Data Checking for cloud storage",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "192--205",
month = mar,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.12.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001489",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liginlal:2012:HPR,
author = "Divakaran Liginlal and Inkook Sim and Lara Khansa and
Paul Fearn",
title = "{HIPAA} Privacy Rule compliance: an interpretive study
using {Norman}'s action theory",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "206--220",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001453",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rhee:2012:UOI,
author = "Hyeun-Suk Rhee and Young U. Ryu and Cheong-Tag Kim",
title = "Unrealistic optimism on information security
management",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "221--232",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001441",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chung:2012:HQB,
author = "Yu-Chi Chung and Ming-Chuan Wu and Yih-Chang Chen and
Wen-Kui Chang",
title = "A Hot Query Bank approach to improve detection
performance against {SQL} injection attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "233--248",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481100143X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:SRM,
author = "Katina Michael",
title = "Security Risk Management: Building an Information
Security Risk Management Program from the Ground Up",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "249--250",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001660",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:CA,
author = "Jennifer L. Bayuk",
title = "Cyber Attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "251--251",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001519",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:CPT,
author = "Manuel Leithner and Edgar Weippl",
title = "Coding for Penetration Testers",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "252--252",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001490",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Macfarlane:2012:FSP,
author = "Richard Macfarlane and William Buchanan and Elias
Ekonomou and Omair Uthmani and Lu Fan and Owen Lo",
title = "Formal security policy implementations in network
firewalls",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "253--270",
month = mar,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2011.10.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001192",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "ifc--ifc",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000272",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PMa,
author = "Anonymous",
title = "Pages 149--270 ({March 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "2",
pages = "??--??",
month = mar,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:27 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "iii--iii",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200048X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "271--272",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000570",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Molina:2012:OEA,
author = "Maurizio Molina and Ignasi Paredes-Oliva and Wayne
Routly and Pere Barlet-Ros",
title = "Operational experiences with anomaly detection in
backbone networks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "273--285",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000132",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vorakulpipat:2012:PSR,
author = "Chalee Vorakulpipat and Vasaka Visoottiviseth and
Siwaruk Siwamogsatham",
title = "Polite sender: a resource-saving spam email
countermeasure based on sender responsibilities and
recipient justifications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "286--298",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000119",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abramov:2012:MIA,
author = "Jenny Abramov and Omer Anson and Michal Dahan and
Peretz Shoval and Arnon Sturm",
title = "A methodology for integrating access control policies
within database development",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "299--314",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000089",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karadsheh:2012:ASP,
author = "Louay Karadsheh",
title = "Applying security policies and service level agreement
to {IaaS} service model to enhance security and
transition",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "315--326",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000077",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lent:2012:EMB,
author = "Ricardo Lent",
title = "Evaluating a migration-based response to {DoS} attacks
in a system of distributed auctions",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "327--343",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Scholte:2012:TCN,
author = "Theodoor Scholte and Davide Balzarotti and Engin
Kirda",
title = "Have things changed now? {An} empirical study on input
validation vulnerabilities in web applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "344--356",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001684",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shiravi:2012:TDS,
author = "Ali Shiravi and Hadi Shiravi and Mahbod Tavallaee and
Ali A. Ghorbani",
title = "Toward developing a systematic approach to generate
benchmark datasets for intrusion detection",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "357--374",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001672",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "ifc--ifc",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000454",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PMb,
author = "Anonymous",
title = "Pages 271--374 ({May 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "3",
pages = "??--??",
month = may,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:FAI,
author = "Anonymous",
title = "Filler {AD:IFIP}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "i--i",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000764",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "iii--iv",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000739",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Eb,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "375--376",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000685",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zeng:2012:AIB,
author = "Ying Zeng and FenLin Liu and XiangYang Luo and ShiGuo
Lian",
title = "Abstract interpretation-based semantic framework for
software birthmark",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "377--390",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000545",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khan:2012:PAB,
author = "Muhammad Naeem Ahmed Khan",
title = "Performance analysis of {Bayesian} networks and neural
networks in classification of file system activities",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "391--401",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000533",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhi-jun:2012:MBA,
author = "Wu Zhi-jun and Zhang Hai-tao and Wang Ming-hua and Pei
Bao-song",
title = "{MSABMS}-based approach of detecting {LDoS} attack",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "402--417",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000521",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nicholson:2012:SSL,
author = "A. Nicholson and S. Webber and S. Dyer and T. Patel
and H. Janicke",
title = "{SCADA} security in the light of Cyber-Warfare",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "418--436",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000429",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sallam:2012:EBM,
author = "Ahmed I. Sallam and El-Sayed El-Rabaie and Osama S.
Faragallah",
title = "Encryption-based multilevel model for {DBMS}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "437--446",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shaikh:2012:DRB,
author = "Riaz Ahmed Shaikh and Kamel Adi and Luigi Logrippo",
title = "Dynamic risk-based decision methods for access control
systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "447--464",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000399",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sun:2012:SBF,
author = "San-Tsai Sun and Kirstie Hawkey and Konstantin
Beznosov",
title = "Systematically breaking and fixing {OpenID} security:
Formal analysis, semi-automated empirical evaluation,
and practical countermeasures",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "465--483",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000387",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2012:PSP,
author = "Hyoungshick Kim and Jun Ho Huh",
title = "{PIN} selection policies: Are they really effective?",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "484--496",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000363",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:2012:CCC,
author = "Youna Jung and James B. D. Joshi",
title = "{CRiBAC}: Community-centric role interaction based
access control model",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "497--523",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000351",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ayuso:2012:FFC,
author = "Pablo Neira Ayuso and Rafael M. Gasca and Laurent
Lefevre",
title = "{FT}-{FW}: a cluster-based fault-tolerant architecture
for stateful firewalls",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "524--539",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000156",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gouglidis:2012:DAC,
author = "Antonios Gouglidis and Ioannis Mavridis",
title = "{domRBAC}: an access control model for modern
collaborative systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "540--556",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000144",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Blasco:2012:BIL,
author = "Jorge Blasco and Julio Cesar Hernandez-Castro and Juan
E. Tapiador and Arturo Ribagorda",
title = "Bypassing information leakage protection with trusted
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "557--568",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000120",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ksiezopolski:2012:QMQ,
author = "Bogdan Ksiezopolski",
title = "{QoP}-{ML}: Quality of protection modelling language
for cryptographic protocols",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "569--596",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pfleeger:2012:LBS,
author = "Shari Lawrence Pfleeger and Deanna D. Caputo",
title = "Leveraging behavioral science to mitigate cyber
security risk",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "597--611",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001659",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{VanGundy:2012:NUR,
author = "Matthew {Van Gundy} and Hao Chen",
title = "{Noncespaces}: Using randomization to defeat
cross-site scripting attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "612--628",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001477",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hudic:2012:PCC,
author = "Aleksandar Hudic and Edgar Weippl",
title = "Private Cloud Computing: Consolidation,
Virtualization, and Service-Oriented Infrastructure",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "629--629",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000612",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cuppens-Boulahia:2012:PTO,
author = "Nora Cuppens-Boulahia",
title = "Penetration Tester's Open Source Toolkit",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "630--632",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000600",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:SCC,
author = "Katina Michael",
title = "Securing the Cloud: Cloud Computer Security Techniques
and Tactics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "633--633",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000569",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:BIS,
author = "Katina Michael",
title = "The Basics of Information Security: Understanding the
Fundamentals of {InfoSec} in Theory and Practice",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "634--635",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Weippl:2012:ESE,
author = "Edgar Weippl and Manuel Leithner",
title = "Enterprise Security for the Executive",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "636--636",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200051X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Caelli:2012:CWT,
author = "William J. (Bill) Caelli",
title = "Cyber Warfare --- Techniques, Tactics and Tools for
Security Practitioners",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "637--637",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000430",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:TMS,
author = "Manuel Leithner and Edgar R. Weippl",
title = "{Thor}'s {Microsoft} Security {Bible}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "638--638",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:XFD,
author = "Manuel Leithner and Edgar Weippl",
title = "{XBOX} 360 Forensics: a Digital Forensics Guide to
Examining Artifacts",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "639--639",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "ifc--ifc",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000703",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PJa,
author = "Anonymous",
title = "Pages 375--640 ({June 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "4",
pages = "??--??",
month = jun,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:28 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "iii--iii",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000880",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ec,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "641--642",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000934",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2012:IRT,
author = "Atif Ahmad and Justin Hadgkiss and A. B. Ruighaver",
title = "Incident response teams --- Challenges in supporting
the organisational security function",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "643--652",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000624",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Martinez:2012:SAM,
author = "Sergio Mart{\'\i}nez and David S{\'a}nchez and Aida
Valls",
title = "Semantic adaptive microaggregation of categorical
microdata",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "653--672",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000648",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Padayachee:2012:TCI,
author = "Keshnee Padayachee",
title = "Taxonomy of compliant information security behavior",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "673--680",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200065X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2012:SDS,
author = "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
Falkner",
title = "Securing distributed systems using patterns: a
survey",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "681--703",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000661",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2012:SMA,
author = "Diqun Yan and Rangding Wang and Xianmin Yu and Jie
Zhu",
title = "Steganography for {MP3} audio by exploiting the rule
of window switching",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "704--716",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000673",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzun:2012:SLP,
author = "Yasin Uzun and Kemal Bicakci",
title = "A second look at the performance of neural networks
for keystroke dynamics using a publicly available
dataset",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "717--726",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000636",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Callegari:2012:WCI,
author = "C. Callegari and S. Giordano and M. Pagano and T.
Pepe",
title = "{WAVE}-{CUSUM}: Improving {CUSUM} performance in
network anomaly detection by means of wavelet
analysis",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "727--735",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000788",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:PP,
author = "Jennifer L. Bayuk",
title = "A programmer's perspective",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "736--737",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200079X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Leithner:2012:LTH,
author = "Manuel Leithner and Edgar Weippl",
title = "Low Tech Hacking",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "738--738",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000806",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "ifc--ifc",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000855",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PJb,
author = "Anonymous",
title = "Pages 641--738 ({July 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "5",
pages = "??--??",
month = jul,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "iii--iii",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001113",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ed,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "739--740",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001149",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2012:EHA,
author = "Anmin Fu and Yuqing Zhang and Zhenchao Zhu and Qi Jing
and Jingyu Feng",
title = "An efficient handover authentication scheme with
privacy preservation for {IEEE} 802.16m network",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "741--749",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001009",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khansa:2012:IHP,
author = "Lara Khansa and Deborah F. Cook and Tabitha James and
Olga Bruyaka",
title = "Impact of {HIPAA} provisions on the stock market value
of healthcare institutions, and information security
and other information technology firms",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "750--770",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000995",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Castiglione:2012:ESM,
author = "Aniello Castiglione and Giuseppe Cattaneo and Maurizio
Cembalo and Alfredo De Santis and Pompeo Faruolo and
Fabio Petagna and Umberto Ferraro Petrillo",
title = "Engineering a secure mobile messaging framework",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "771--781",
month = sep,
year = "2012",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.06.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200096X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shiaeles:2012:RTD,
author = "Stavros N. Shiaeles and Vasilios Katos and Alexandros
S. Karakos and Basil K. Papadopoulos",
title = "Real time {DDoS} detection using fuzzy estimators",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "782--790",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000922",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hsieh:2012:EHF,
author = "Wen-Bin Hsieh and Jenq-Shiou Leu",
title = "Exploiting hash functions to intensify the remote user
authentication scheme",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "791--798",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000910",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:HNG,
author = "Katina Michael",
title = "Hacking: the Next Generation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "799--799",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000971",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wedge:2012:BDF,
author = "Tim Wedge",
title = "The Basics of Digital Forensics",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "800--800",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000983",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsoumas:2012:ICW,
author = "Bill Tsoumas and Dimitris Gritzalis",
title = "Inside Cyber Warfare: Mapping the Cyber Underworld",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "801--801",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000831",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2012:PMA,
author = "Alexis Mylonas and Dimitris Gritzalis",
title = "Practical Malware Analysis: the Hands-On Guide to
Dissecting Malicious Software",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "802--803",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000818",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "ifc--ifc",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001083",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PS,
author = "Anonymous",
title = "Pages 739--804 ({September 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "6",
pages = "??--??",
month = sep,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:29 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "iii--iii",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001290",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:ECS,
author = "Anonymous",
title = "Editorial Computers and Security Special Issue
{IFIP\slash SEC 2010 ``Security and Privacy --- Silver
Linings in the Cloud''}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "805--805",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200137X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Coull:2012:UDR,
author = "Scott E. Coull and Andrew M. White and Ting-Fang Yen
and Fabian Monrose and Michael K. Reiter",
title = "Understanding domain registration abuses",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "806--815",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200082X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hasan:2012:PPF,
author = "Omar Hasan and Lionel Brunie and Elisa Bertino",
title = "Preserving privacy of feedback providers in
decentralized reputation systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "816--826",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001465",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Magazinius:2012:FID,
author = "Jonas Magazinius and Alejandro Russo and Andrei
Sabelfeld",
title = "On-the-fly inlining of dynamic security monitors",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "827--843",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404811001180",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Colantonio:2012:BDD,
author = "Alessandro Colantonio and Roberto {Di Pietro} and Nino
Vincenzo Verde",
title = "A business-driven decomposition methodology for role
mining",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "844--855",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812000090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "7",
pages = "ifc--ifc",
month = oct,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001265",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:A,
author = "Anonymous",
title = "Announcement",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "ii--ii",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001575",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "iii--iii",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200154X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:CP,
author = "Anonymous",
title = "Call for papers",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "iii--iv",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001587",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2012:Ee,
author = "Gene Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "857--858",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001691",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Qian:2012:MIS,
author = "Ying Qian and Yulin Fang and Jose J. Gonzalez",
title = "Managing information security risks during new
technology adoption",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "859--869",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001368",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shi:2012:SED,
author = "Jie Shi and Yingjiu Li and Robert H. Deng",
title = "A secure and efficient discovery service system in
{EPCglobal} network",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "870--885",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200123X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2012:FQE,
author = "Yu-Lun Huang and Hsin-Yi Tsai",
title = "A framework for quantitative evaluation of parallel
control-flow obfuscation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "886--896",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001198",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shehab:2012:ACO,
author = "Mohamed Shehab and Anna Squicciarini and Gail-Joon Ahn
and Irini Kokkinou",
title = "Access control for online social networks third party
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "897--911",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001186",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2012:OMS,
author = "Zhi Yang and Lihua Yin and Shuyuan Jin and Xingyuan
Chen",
title = "Optimal mining on security labels for decentralized
information flow control",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "912--924",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001174",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mut-Puigserver:2012:SET,
author = "Maci{\`a} Mut-Puigserver and M. Magdalena
Payeras-Capell{\`a} and Josep-Llu{\'\i}s Ferrer-Gomila
and Arnau Vives-Guasch and Jordi Castell{\`a}-Roca",
title = "A survey of electronic ticketing applied to
transport",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "925--939",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001058",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hjorth:2012:TDS,
author = "Theis Solberg Hjorth and Rune Torbensen",
title = "Trusted Domain: a security platform for home
automation",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "940--955",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001046",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alcaraz:2012:SKM,
author = "Cristina Alcaraz and Javier Lopez and Rodrigo Roman
and Hsiao-Hwa Chen",
title = "Selecting key management schemes for {WSN}
applications",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "956--966",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001034",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rekhis:2012:HVT,
author = "Slim Rekhis and Noureddine Boudriga",
title = "A Hierarchical Visibility theory for formal digital
investigation of anti-forensic attacks",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "967--982",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001022",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Furnell:2012:PPE,
author = "Steven Furnell and Nathan Clarke",
title = "Power to the people? {The} evolving recognition of
human aspects of security",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "983--988",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001228",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jardi-Cedo:2012:SPS,
author = "Roger Jard{\'\i}-Ced{\'o} and Jordi Pujol-Ahull{\'o}
and Jordi Castell{\`a}-Roca and Alexandre Viejo",
title = "Study on poll-site voting and verification systems",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "989--1010",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001162",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2012:WT,
author = "Jennifer L. Bayuk",
title = "Wishful thinking",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "1011--1012",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001241",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michael:2012:HSC,
author = "Katina Michael",
title = "Handbook on Securing Cyber-Physical Critical
Infrastructure: Foundations and Challenges",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "1013--1013",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001150",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "ifc--ifc",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001514",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2012:PN,
author = "Anonymous",
title = "Pages 857--1014 ({November 2012})",
journal = j-COMPUT-SECUR,
volume = "31",
number = "8",
pages = "??--??",
month = nov,
year = "2012",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:30 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "iii--iv",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001873",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2013:Ea,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "v--v",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000035",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Toledo:2013:DFS,
author = "Nerea Toledo and Marivi Higuero and Jasone Astorga and
Marina Aguado and Jean Marie Bonnin",
title = "Design and formal security evaluation of {NeMHIP}: a
new secure and efficient network mobility management
protocol based on the Host Identity Protocol",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "1--18",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001599",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PF,
author = "Anonymous",
title = "Pages 1--270 ({February 2013})",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "1--270",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schmidt:2013:TFV,
author = "Andreas U. Schmidt and Andreas Leicher and Andreas
Brett and Yogendra Shah and Inhyok Cha",
title = "Tree-formed verification data for trusted platforms",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "19--35",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200140X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tan:2013:CRM,
author = "Hailun Tan and Diethelm Ostry and John Zic and Sanjay
Jha",
title = "A confidential and {DoS}-resistant multi-hop code
dissemination protocol for wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "36--55",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001484",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garfinkel:2013:DMT,
author = "Simson L. Garfinkel",
title = "Digital media triage with bulk data analysis and {\em
bulk\_extractor}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "56--72",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001472",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Reddy:2013:ADF,
author = "K. Reddy and H. S. Venter",
title = "The architecture of a digital forensic readiness
management system",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "73--89",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001447",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Crossler:2013:FDB,
author = "Robert E. Crossler and Allen C. Johnston and Paul
Benjamin Lowry and Qing Hu and Merrill Warkentin and
Richard Baskerville",
title = "Future directions for behavioral information security
research",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "90--101",
month = feb,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.09.010",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001460",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Damopoulos:2013:KTT,
author = "D. Damopoulos and G. Kambourakis and S. Gritzalis",
title = "From keyloggers to touchloggers: Take the rough with
the smooth",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "102--114",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001654",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lasc:2013:DDA,
author = "Ioana Lasc and Reiner Dojen and Tom Coffey",
title = "On the detection of desynchronisation attacks against
security protocols that use dynamic shared secrets",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "115--129",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001678",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DeMott:2013:SBF,
author = "Jared D. DeMott and Richard J. Enbody and William F.
Punch",
title = "Systematic bug finding and fault localization enhanced
with input data tracking",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "130--157",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200168X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2013:EAG,
author = "Shuzhen Wang and Zonghua Zhang and Youki Kadobayashi",
title = "Exploring attack graph for cost-benefit security
hardening: a probabilistic approach",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "158--169",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001496",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Joaquim:2013:EEE,
author = "Rui Joaquim and Paulo Ferreira and Carlos Ribeiro",
title = "{EVIV}: an end-to-end verifiable {Internet} voting
system",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "170--191",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001642",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lerch-Hostalot:2013:LMS,
author = "Daniel Lerch-Hostalot and David Meg{\'\i}as",
title = "{LSB} matching steganalysis based on patterns of pixel
differences and random embedding",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "192--206",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001745",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Paulin:2013:USF,
author = "Alois Paulin and Tatjana Welzer",
title = "A universal system for fair non-repudiable certified
e-mail without a trusted third party",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "207--218",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001757",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schreuders:2013:SAA,
author = "Z. Cliffe Schreuders and Tanya McGill and Christian
Payne",
title = "The state of the art of application restrictions and
sandboxes: a survey of application-oriented access
controls and their shortfalls",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "219--241",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001435",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2013:SRB,
author = "Ken H. Guo",
title = "Security-related behavior in using information systems
in the workplace: a review and synthesis",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "242--251",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001666",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jammalamadaka:2013:MAO,
author = "Ravi Chandra Jammalamadaka and Roberto Gamboni and
Sharad Mehrotra and Kent Seamons and Nalini
Venkatasubramanian",
title = "A middleware approach for outsourcing data securely",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "252--266",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200106X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Soupionis:2013:HV,
author = "Yannis Soupionis and Dimitris Gritzalis",
title = "Hacking {VoIP}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "267--267",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001423",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kandias:2013:MPT,
author = "Miltiadis Kandias and Dimitris Gritzalis",
title = "{Metasploit}: the Penetration Tester's Guide",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "268--269",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001459",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "32",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001848",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "iii--iii",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000114",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "1--2",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kolkowska:2013:OPI,
author = "Ella Kolkowska and Gurpreet Dhillon",
title = "Organizational power and information security rule
compliance",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "3--11",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001010",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abramov:2013:TAS,
author = "Raz Abramov and Amir Herzberg",
title = "{TCP Ack} storm {DoS} attacks",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "12--27",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001411",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montanari:2013:DSP,
author = "Mirko Montanari and Ellick Chan and Kevin Larson and
Wucherl Yoo and Roy H. Campbell",
title = "Distributed security policy conformance",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "28--40",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001770",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2013:AFB,
author = "Alessandro Armando and Roberto Carbone and Luca
Compagna and Jorge Cu{\'e}llar and Giancarlo Pellegrino
and Alessandro Sorniotti",
title = "An authentication flaw in browser-based Single Sign-On
protocols: Impact and remediations",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "41--58",
month = mar,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2012.08.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001356",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Haenni:2013:GAP,
author = "Rolf Haenni and Reto E. Koenig",
title = "A generic approach to prevent board flooding attacks
in coercion-resistant electronic voting schemes",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "59--69",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001381",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "33",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:31 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000308",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iii--iii",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:SIT,
author = "Anonymous",
title = "Special issue on trust in cyber, physical and social
computing: Call for papers",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iii--iii",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000448",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2013:Eb,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "iv--iv",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kussul:2013:AST,
author = "Olga Kussul and Nataliia Kussul and Sergii Skakun",
title = "Assessing security threat scenarios for utility-based
reputation model in grids",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "1--15",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000230",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PM,
author = "Anonymous",
title = "Pages 1--140 ({May 2013})",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "1--140",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2013:OCI,
author = "Amin Hassanzadeh and Radu Stoleru",
title = "On the optimality of cooperative intrusion detection
for resource constrained wireless networks",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "16--35",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cho:2013:CFM,
author = "Gyu-Sang Cho",
title = "A computer forensic method for detecting timestamp
forgery in {NTFS}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "36--46",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001721",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2013:DSU,
author = "Alexios Mylonas and Anastasia Kastania and Dimitris
Gritzalis",
title = "Delegate the smartphone user? {Security} awareness in
smartphone platforms",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "47--66",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001733",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hernandez-Ardieta:2013:TSA,
author = "Jorge L. Hernandez-Ardieta and Ana I. Gonzalez-Tablas
and Jose M. de Fuentes and Benjamin Ramos",
title = "A taxonomy and survey of attacks on digital
signatures",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "67--112",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001794",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Salah:2013:ASW,
author = "Khaled Salah and Jose M. Alcaraz Calero and Jorge
Bernal Bernab{\'e} and Juan M. Mar{\'\i}n Perez and
Sherali Zeadally",
title = "Analyzing the security of {Windows 7} and {Linux} for
cloud computing",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "113--122",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001800",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramanathan:2013:PDI,
author = "Venkatesh Ramanathan and Harry Wechsler",
title = "Phishing detection and impersonated entity discovery
using {Conditional Random Field} and {Latent Dirichlet
Allocation}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "123--139",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001812",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "34",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "iii--iii",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000643",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ec,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "1--1",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Asghar:2013:EES,
author = "Muhammad Rizwan Asghar and Mihaela Ion and Giovanni
Russello and Bruno Crispo",
title = "{{\em ESPOON$_{\it ERBAC}$}}: Enforcing security
policies in outsourced environments",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "2--24",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001824",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jerschow:2013:MSR,
author = "Yves Igor Jerschow and Martin Mauve",
title = "Modular square root puzzles: Design of
non-parallelizable and non-interactive client puzzles",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "25--36",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001782",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Salim:2013:BAR,
author = "Farzad Salim and Jason Reid and Uwe Dulleck and Ed
Dawson",
title = "Budget-aware Role Based Access Control",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "37--50",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481200171X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "35",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "iii--iii",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000734",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2013:ALG,
author = "Su Yong Kim and Sungdeok Cha and Doo-Hwan Bae",
title = "Automatic and lightweight grammar generation for fuzz
testing",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "1--11",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000254",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PJ,
author = "Anonymous",
title = "Pages 1--68 ({July 2013})",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "1--68",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Choo:2013:NPM,
author = "Kim-Kwang Raymond Choo",
title = "New payment methods: a review of 2010-2012 {FATF}
mutual evaluation reports",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "12--26",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000278",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fu:2013:VSP,
author = "Yulong Fu and Ousmane Kon{\'e}",
title = "Validation of security protocol implementations from
security objectives",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "27--39",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000229",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2013:NIC,
author = "Hegui Zhu and Cheng Zhao and Xiangde Zhang and
Lianping Yang",
title = "A novel iris and chaos-based random number generator",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "40--48",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{James:2013:UNB,
author = "Tabitha L. James and Lara Khansa and Deborah F. Cook
and Olga Bruyaka and Kellie B. Keeling",
title = "Using network-based text analysis to analyze trends in
{Microsoft}'s security innovations",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "49--67",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:IEB,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "36",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:32 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000709",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "iii--iii",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001041",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ed,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "iv--v",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001053",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamedheidari:2013:NAB,
author = "Sina Hamedheidari and Reza Rafeh",
title = "A novel agent-based approach to detect sinkhole
attacks in wireless sensor networks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "1--14",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000783",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PS,
author = "Anonymous",
title = "Pages 1--228 ({September 2013})",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "1--228",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jin:2013:MFB,
author = "Lei Jin and James B. D. Joshi and Mohd Anwar",
title = "Mutual-friend based attacks in social network
systems",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "15--30",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000795",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{vanDeursen:2013:MIS,
author = "Nicole van Deursen and William J. Buchanan and
Alistair Duff",
title = "Monitoring information security risks within health
care",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "31--45",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000813",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Roh:2013:WBC,
author = "Byeong-hee Roh and Ju Wan Kim and Ki-Yeol Ryu and
Jea-Tek Ryu",
title = "A whitelist-based countermeasure scheme using a
{Bloom} filter against {SIP} flooding attacks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "46--61",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000771",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Riley:2013:FPT,
author = "Ryan Riley",
title = "A framework for prototyping and testing data-only
rootkit attacks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "62--71",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000825",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heckman:2013:ACD,
author = "Kristin E. Heckman and Michael J. Walsh and Frank J.
Stech and Todd A. O'Boyle and Stephen R. DiCato and
Audra F. Herber",
title = "Active cyber defense with denial and deception: a
cyber-wargame experiment",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "72--77",
month = sep,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.03.015",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300076X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Savola:2013:QSM,
author = "Reijo M. Savola",
title = "Quality of security metrics and measurements",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "78--90",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000850",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nakaguro:2013:DLN,
author = "Yoichi Nakaguro and Matthew N. Dailey and Sanparith
Marukatat and Stanislav S. Makhanov",
title = "Defeating line-noise {CAPTCHAs} with multiple
quadratic snakes",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "91--110",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000862",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alcaide:2013:AAP,
author = "Almudena Alcaide and Esther Palomar and Jos{\'e}
Montero-Castillo and Arturo Ribagorda",
title = "Anonymous authentication for privacy-preserving {IoT}
target-driven applications",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "111--123",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000904",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2013:EAF,
author = "Celia Li and Uyen Trang Nguyen and Hoang Lan Nguyen
and Nurul Huda",
title = "Efficient authentication for fast handover in wireless
mesh networks",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "124--142",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000916",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abdalaal:2013:PPP,
author = "Ahmed Abdalaal and Mehmet Ercan Nergiz and Yucel
Saygin",
title = "Privacy-preserving publishing of opinion polls",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "143--154",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000539",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bayuk:2013:STA,
author = "Jennifer L. Bayuk",
title = "Security as a theoretical attribute construct",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "155--175",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spathoulas:2013:EIP,
author = "Georgios P. Spathoulas and Sokratis K. Katsikas",
title = "Enhancing {IDS} performance through comprehensive
alert post-processing",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "176--196",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Castillo-Perez:2013:ORC,
author = "Sergio Castillo-P{\'e}rez and Joaquin Garcia-Alfaro",
title = "Onion routing circuit construction via latency
graphs",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "197--214",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zonouz:2013:SCB,
author = "Saman Zonouz and Amir Houmansadr and Robin Berthier
and Nikita Borisov and William Sanders",
title = "Secloud: a cloud-based comprehensive and lightweight
security solution for smartphones",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "215--227",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300031X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "37",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000989",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "iii--iii",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300117X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gritzalis:2013:CDE,
author = "Dimitris Gritzalis and Gurvirender Tejay",
title = "Cybercrime in the Digital Economy --- Editorial",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "1--2",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001120",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ouedraogo:2013:SCS,
author = "Moussa Ouedraogo and Haralambos Mouratidis",
title = "Selecting a Cloud Service Provider in the age of
cybercrime",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "3--13",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lopez:2013:SCO,
author = "Javier Lopez and Cristina Alcaraz and Rodrigo Roman",
title = "Smart control of operational threats in control
substations",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "14--27",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000588",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luo:2013:IPV,
author = "Xin (Robert) Luo and Wei Zhang and Stephen Burd and
Alessandro Seazzu",
title = "Investigating phishing victimization with the
Heuristic-Systematic Model: a theoretical framework and
an exploration",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "28--38",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404812001927",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spyridopoulos:2013:GTD,
author = "T. Spyridopoulos and G. Karanikas and T. Tryfonas and
G. Oikonomou",
title = "A game theoretic defence framework against {DoS\slash
DDoS} cyber attacks",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "39--50",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300059X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mylonas:2013:SSD,
author = "Alexios Mylonas and Vasilis Meletiadis and Lilian
Mitrou and Dimitris Gritzalis",
title = "{Smartphone} sensor data as digital evidence",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "51--75",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsigkritis:2013:AGE,
author = "Theocharis Tsigkritis and George Spanoudakis",
title = "Assessing the genuineness of events in runtime
monitoring of cyber systems",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "76--96",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{vonSolms:2013:ISC,
author = "Rossouw von Solms and Johan van Niekerk",
title = "From information security to cyber security",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "97--102",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000801",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kohn:2013:IDF,
author = "M. D. Kohn and M. M. Eloff and J. H. P. Eloff",
title = "Integrated digital forensic process model",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "103--115",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000849",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "38",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:33 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001144",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "iii--iii",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001508",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ci,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "iii--iv",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:34 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Cj,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "iii--iv",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001582",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:Ee,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "1--1",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001454",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2013:BDB,
author = "David Zhao and Issa Traore and Bassam Sayed and Wei Lu
and Sherif Saad and Ali Ghorbani and Dan Garant",
title = "Botnet detection based on traffic behavior analysis
and flow intervals",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "2--16",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.04.007",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000837",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Herrmann:2013:BBT,
author = "Dominik Herrmann and Christian Banse and Hannes
Federrath",
title = "Behavior-based tracking: Exploiting characteristic
patterns in {DNS} traffic",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "17--33",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000576",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rios:2013:CCT,
author = "Ruben Rios and Jose A. Onieva and Javier Lopez",
title = "Covert communications through network configuration
messages",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "34--46",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DeCapitanidiVimercati:2013:EDW,
author = "Sabrina {De Capitani di Vimercati} and Sara Foresti
and Sushil Jajodia and Giovanni Livraga and Stefano
Paraboschi and Pierangela Samarati",
title = "Enforcing dynamic write privileges in data
outsourcing",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "47--63",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.01.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000266",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia-Alfaro:2013:MSF,
author = "Joaquin Garcia-Alfaro and Fr{\'e}d{\'e}ric Cuppens and
Nora Cuppens-Boulahia and Salvador Martinez and Jordi
Cabot",
title = "Management of stateful firewall misconfiguration",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "64--85",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000217",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Khambhammettu:2013:FRA,
author = "Hemanth Khambhammettu and Sofiene Boulares and Kamel
Adi and Luigi Logrippo",
title = "A framework for risk assessment in access control
systems",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "86--103",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2013:BFA,
author = "Alessandro Armando and Alessio Merlo and Mauro
Migliardi and Luca Verderame",
title = "Breaking and fixing the {Android} Launching Flow",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "104--115",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000540",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Agudo:2013:PAC,
author = "Isaac Agudo and Ruben Rios and Javier Lopez",
title = "A privacy-aware continuous authentication scheme for
proximity-based access control",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "117--126",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000874",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:PN,
author = "Anonymous",
title = "Pages 117--502 ({November 2013})",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "117--502",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Crawford:2013:FCT,
author = "Heather Crawford and Karen Renaud and Tim Storer",
title = "A framework for continuous, transparent mobile device
authentication",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "127--136",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000886",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Derawi:2013:GAR,
author = "Mohammad Derawi and Patrick Bours",
title = "Gait and activity recognition using commercial
phones",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "137--144",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000953",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barlow:2013:DME,
author = "Jordan B. Barlow and Merrill Warkentin and Dustin
Ormond and Alan R. Dennis",
title = "Don't make excuses! {Discouraging} neutralization to
reduce {IT} policy violation",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "145--159",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000898",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Trabelsi:2013:DTA,
author = "Zouheir Trabelsi and Liren Zhang and Safaa Zeidan and
Kilani Ghoudi",
title = "Dynamic traffic awareness statistical model for
firewall performance enhancement",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "160--172",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000928",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2013:CSM,
author = "Xinjie Zhao and Shize Guo and Fan Zhang and Tao Wang
and Zhijie Shi and Zhe Liu and Jean-Fran{\c{c}}ois
Gallais",
title = "A comprehensive study of multiple deductions-based
algebraic trace driven cache attacks on {AES}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "173--189",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.07.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300093X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zonouz:2013:CPS,
author = "Saman Zonouz and Parisa Haghani",
title = "Cyber-physical security metric inference in smart grid
critical infrastructures based on system
administrators' responsive behavior",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "190--200",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000941",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sharma:2013:AAM,
author = "Manisha Sharma and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "{AMTRAC}: an administrative model for temporal
role-based access control",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "201--218",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000965",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azad:2013:CRD,
author = "Muhammad Ajmal Azad and Ricardo Morla",
title = "{Caller-REP}: Detecting unwanted calls with caller
social strength",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "219--236",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001090",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Baracaldo:2013:ARM,
author = "Nathalie Baracaldo and James Joshi",
title = "An adaptive risk management and access control
framework to mitigate insider threats",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "237--254",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001119",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Guo:2013:EID,
author = "Chun Guo and Ya-Jian Zhou and Yuan Ping and Shou-Shan
Luo and Yu-Ping Lai and Zhong-Kun Zhang",
title = "Efficient intrusion detection using representative
instances",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "255--267",
month = nov,
year = "2013",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.08.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300120X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Azmi:2013:SSH,
author = "Reza Azmi and Boshra Pishgoo",
title = "{SHADuDT}: Secure hypervisor-based anomaly detection
using danger theory",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "268--288",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001223",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stanekova:2013:ADM,
author = "L'ubica Stanekov{\'a} and Martin Stanek",
title = "Analysis of dictionary methods for {PIN} selection",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "289--298",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001235",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Djamaludin:2013:EIT,
author = "C. I. Djamaludin and E. Foo and P. Corke",
title = "Establishing initial trust in autonomous Delay
Tolerant Networks without centralised {PKI}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "299--314",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001247",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2013:FMD,
author = "Yuxin Ding and Xuebing Yuan and Ke Tang and Xiao Xiao
and Yibin Zhang",
title = "A fast malware detection algorithm based on
objective-oriented association mining",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "315--324",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001259",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Belguechi:2013:IFC,
author = "Rima Belguechi and Estelle Cherrier and Christophe
Rosenberger and Samy Ait-Aoudia",
title = "An integrated framework combining Bio-Hashed minutiae
template and {PKCS15} compliant card for a better
secure management of fingerprint cancelable templates",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "325--339",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001260",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2013:IAM,
author = "Ying-Dar Lin and Yuan-Cheng Lai and Chien-Hung Chen
and Hao-Chuan Tsai",
title = "Identifying {Android} malicious repackaged
applications by thread-grained system call sequences",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "340--350",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001272",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{BenSaied:2013:TMS,
author = "Yosra {Ben Saied} and Alexis Olivereau and Djamal
Zeghlache and Maryline Laurent",
title = "Trust management system design for the {Internet of
Things}: a context-aware and multi-service approach",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "351--365",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001302",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2013:AAP,
author = "Dongwon Seo and Heejo Lee and Adrian Perrig",
title = "{APFS}: Adaptive Probabilistic Filter Scheduling
against distributed denial-of-service attacks",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "366--385",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001314",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Silic:2013:DUO,
author = "Mario Silic",
title = "Dual-use open source security software in
organizations --- Dilemma: Help or hinder?",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "386--395",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001326",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ashenden:2013:COC,
author = "Debi Ashenden and Angela Sasse",
title = "{CISOs} and organisational culture: Their own worst
enemy?",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "396--405",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001338",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Karopoulos:2013:UCS,
author = "Georgios Karopoulos and Paolo Mori and Fabio
Martinelli",
title = "Usage control in {SIP}-based multimedia delivery",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "406--418",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300134X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2013:DCM,
author = "Younghee Park and Douglas S. Reeves and Mark Stamp",
title = "Deriving common malware behavior through graph
clustering",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "419--430",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001351",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhou:2013:IAA,
author = "Peng Zhou and Xiapu Luo and Rocky K. C. Chang",
title = "Inference attacks against trust-based onion routing:
Trust degree to the rescue",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "431--446",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001363",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2013:UVS,
author = "Lijiao Cheng and Ying Li and Wenli Li and Eric Holm
and Qingguo Zhai",
title = "Understanding the violation of {IS} security policy in
organizations: an integrated model based on social
control and deterrence theory",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "447--459",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001387",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2013:CBW,
author = "Ying-Dar Lin and Yuan-Cheng Lai and Cheng-Yuan Ho and
Wei-Hsuan Tai",
title = "Creditability-based weighted voting for reducing false
positives and negatives in intrusion detection",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "460--474",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001399",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anagnostopoulos:2013:DAA,
author = "Marios Anagnostopoulos and Georgios Kambourakis and
Panagiotis Kopanos and Georgios Louloudakis and
Stefanos Gritzalis",
title = "{DNS} amplification attack revisited",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "475--485",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001405",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hocking:2013:COU,
author = "C. G. Hocking and S. M. Furnell and N. L. Clarke and
P. L. Reynolds",
title = "{Co}-operative user identity verification using an
Authentication Aura",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "486--502",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001417",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBg,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (Part A)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001478",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBh,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:34 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2013:EBi,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "39 (part B)",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2013",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:35 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001557",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "iii--iii",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001752",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ea,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "iv--iv",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000042",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PP,
author = "Anonymous",
title = "The passing of a pioneer",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "v--vi",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001788",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Armando:2014:MCA,
author = "Alessandro Armando and Serena Elisa Ponta",
title = "Model checking authorization requirements in business
processes",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "1--22",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001429",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PF,
author = "Anonymous",
title = "Pages 1--114 ({February 2014})",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "1--114",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gowtham:2014:CEA,
author = "R. Gowtham and Ilango Krishnamurthi",
title = "A comprehensive and efficacious architecture for
detecting phishing webpages",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "23--37",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001442",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bachlechner:2014:SCC,
author = "Daniel Bachlechner and Stefan Thalmann and Ronald
Maier",
title = "Security and compliance challenges in complex {IT}
outsourcing arrangements: a multi-stakeholder
perspective",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "38--59",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001533",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patsakis:2014:TDS,
author = "Constantinos Patsakis and Kleanthis Dellios and
M{\'e}lanie Bouroche",
title = "Towards a distributed secure in-vehicle communication
architecture for modern vehicles",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "60--74",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300165X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yang:2014:EDN,
author = "Jie Yang and Hai-tao Liu and Zu-ping Zhang and Jian
Dong",
title = "Extended {DMTP}: a new protocol for improved graylist
categorization",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "75--83",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001430",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2014:APT,
author = "Christos Xenakis and Christoforos Ntantogian",
title = "An advanced persistent threat in {3G} networks:
Attacking the home network from roaming networks",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "84--94",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001685",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bhatia:2014:FGR,
author = "Sajal Bhatia and Desmond Schmidt and George Mohay and
Alan Tickle",
title = "A framework for generating realistic traffic for
Distributed Denial-of-Service attacks and Flash
Events",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "95--107",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001673",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Denning:2014:FPA,
author = "Dorothy E. Denning",
title = "Framework and principles for active cyber defense",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "108--113",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001661",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "40",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001727",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "iii--iii",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000121",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaswamy:2014:E,
author = "Lakshmish Ramaswamy and Barbara Carminati and Lujo
Bauer and Dongwan Shin and James Joshi and Calton Pu
and Dimitris Gritzalis",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "1--2",
month = mar,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.01.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000078",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Le:2014:CEA,
author = "Meixing Le and Krishna Kant and Sushil Jajodia",
title = "Consistency and enforcement of access rules in
cooperative data sharing environment",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "3--18",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001284",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jung:2014:CPB,
author = "Youna Jung and James B. D. Joshi",
title = "{CPBAC}: Property-based access control model for
secure cooperation in online social networks",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "19--39",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001211",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Squicciarini:2014:IHS,
author = "Anna Squicciarini and Sushama Karumanchi and Dan Lin
and Nicole DeSisto",
title = "Identifying hidden social circles for advanced privacy
configuration",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "40--51",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001107",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gupta:2014:FPM,
author = "Aditi Gupta and Michael S. Kirkpatrick and Elisa
Bertino",
title = "A formal proximity model for {RBAC} systems",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "52--67",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001296",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Allahbakhsh:2014:RQU,
author = "Mohammad Allahbakhsh and Aleksandar Ignjatovic and
Boualem Benatallah and Seyed-Mehdi-Reza Beheshti and
Norman Foo and Elisa Bertino",
title = "Representation and querying of unfair evaluations in
social rating systems",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "68--88",
month = mar,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.09.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001375",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "41",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:36 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000091",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "iii--iii",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400039X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ec,
author = "Anonymous",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "iv--v",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400042X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rathgeb:2014:CMB,
author = "C. Rathgeb and C. Busch",
title = "Cancelable multi-biometrics: Mixing iris-codes based
on adaptive {Bloom} filters",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "1--12",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000029",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PM,
author = "Anonymous",
title = "Pages 1--192 ({May 2014})",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "1--192",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schrittwieser:2014:CCH,
author = "Sebastian Schrittwieser and Stefan Katzenbeisser and
Peter Kieseberg and Markus Huber and Manuel Leithner
and Martin Mulazzani and Edgar Weippl",
title = "Covert Computation --- Hiding code in code through
compile-time obfuscation",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "13--26",
month = may,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.12.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000030",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmad:2014:POC,
author = "Atif Ahmad and Rachelle Bosua and Rens Scheepers",
title = "Protecting organizational competitive advantage: a
knowledge leakage perspective",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "27--39",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000054",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Amthor:2014:WWM,
author = "Peter Amthor and Winfried E. K{\"u}hnhauser and Anja
P{\"o}lck",
title = "{WorSE}: a Workbench for Model-based Security
Engineering",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "40--55",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000066",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Allam:2014:SIS,
author = "Sean Allam and Stephen V. Flowerday and Ethan
Flowerday",
title = "{Smartphone} information security awareness: a victim
of operational pressures",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "56--65",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000169",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2014:EPA,
author = "Christoforos Ntantogian and Dimitris Apostolopoulos
and Giannis Marinakis and Christos Xenakis",
title = "Evaluating the privacy of {Android} mobile
applications under forensic analysis",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "66--76",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000157",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{LaBarge:2014:ASR,
author = "Ralph LaBarge and Thomas A. Mazzuchi and Shahram
Sarkani",
title = "An automated system for rapid and secure device
sanitization",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "77--91",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000194",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Goseva-Popstojanova:2014:CCM,
author = "Katerina Goseva-Popstojanova and Goce Anastasovski and
Ana Dimitrijevikj and Risto Pantev and Brandon Miller",
title = "Characterization and classification of malicious {Web}
traffic",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "92--115",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000170",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Park:2014:TOS,
author = "Joon S. Park and Kevin A. Kwiat and Charles A. Kamhoua
and Jonathan White and Sookyung Kim",
title = "Trusted Online Social Network {(OSN)} services with
optimal data management",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "116--136",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000236",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kwon:2014:TAD,
author = "Taekyoung Kwon and Sarang Na",
title = "{TinyLock}: Affordable defense against smudge attacks
on smartphone pattern lock systems",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "137--150",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001697",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2014:AES,
author = "Xin Dong and Jiadi Yu and Yuan Luo and Yingying Chen
and Guangtao Xue and Minglu Li",
title = "Achieving an effective, scalable and
privacy-preserving data sharing service in cloud
computing",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "151--164",
month = may,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2013.12.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001703",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parsons:2014:DEA,
author = "Kathryn Parsons and Agata McCormac and Marcus
Butavicius and Malcolm Pattinson and Cate Jerram",
title = "Determining employee awareness using the Human Aspects
of Information Security Questionnaire {(HAIS-Q)}",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "165--176",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481300179X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Michalopoulos:2014:GRT,
author = "Dimitrios Michalopoulos and Ioannis Mavridis and
Marija Jankovic",
title = "{GARS}: Real-time system for identification,
assessment and control of cyber grooming attacks",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "177--190",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813001806",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Virvilis:2014:ADA,
author = "Nikos Virvilis and Dimitris Gritzalis",
title = "Automatic Defense Against Zero-day Polymorphic Worms
in Communication Networks",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "191--192",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000182",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "42",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000364",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "iii--iii",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000674",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spafford:2014:E,
author = "Eugene H. Spafford",
title = "Editorial",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "iv--iv",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000704",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shabtai:2014:MMD,
author = "A. Shabtai and L. Tenenboim-Chekina and D. Mimran and
L. Rokach and B. Shapira and Y. Elovici",
title = "Mobile malware detection through analysis of
deviations in application network behavior",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "1--18",
month = jun,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.02.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000285",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PJa,
author = "Anonymous",
title = "Pages 1--218 ({June 2014})",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "1--218",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tamjidyamcholo:2014:EMK,
author = "Alireza Tamjidyamcholo and Mohd Sapiyan Bin Baba and
Nor Liyana Mohd Shuib and Vala Ali Rohani",
title = "Evaluation model for knowledge sharing in information
security professional virtual community",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "19--34",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000297",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bou-Harb:2014:FPA,
author = "Elias Bou-Harb and Mourad Debbabi and Chadi Assi",
title = "On fingerprinting probing activities",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "35--48",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000248",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2014:SAB,
author = "Feng Zhu and Jinpeng Wei",
title = "Static analysis based invariant detection for
commodity operating systems",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "49--63",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000273",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kajzer:2014:EIM,
author = "Mitchell Kajzer and John D'Arcy and Charles R. Crowell
and Aaron Striegel and Dirk {Van Bruggen}",
title = "An exploratory investigation of message-person
congruence in information security awareness
campaigns",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "64--76",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000327",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bailey:2014:UIA,
author = "Kyle O. Bailey and James S. Okolica and Gilbert L.
Peterson",
title = "User identification and authentication using
multi-modal behavioral biometrics",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "77--89",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000340",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flores:2014:ISK,
author = "Waldo Rocha Flores and Egil Antonsen and Mathias
Ekstedt",
title = "Information security knowledge sharing in
organizations: Investigating the effect of behavioral
information security governance and national culture",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "90--110",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000339",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rughinis:2014:NVN,
author = "Cosima Rughinis and Razvan Rughinis",
title = "Nothing ventured, nothing gained. {Profiles} of online
activity, cyber-crime exposure, and security measures
of end-users in {European Union}",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "111--125",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000479",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ugarte-Pedrero:2014:AAD,
author = "Xabier Ugarte-Pedrero and Igor Santos and Iv{\'a}n
Garc{\'{\i}}a-Ferreira and Sergio Huerta and Borja Sanz
and Pablo G. Bringas",
title = "On the adoption of anomaly detection for packed
executable filtering",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "126--144",
month = jun,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.03.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000522",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vrakas:2014:OUI,
author = "Nikos Vrakas and Dimitris Geneiatakis and Costas
Lambrinoudakis",
title = "Obscuring users' identity in {VoIP\slash IMS}
environments",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "145--158",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000510",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gonzalez-Manzano:2014:SEU,
author = "Lorena Gonz{\'a}lez-Manzano and Ana I.
Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
Arturo Ribagorda",
title = "{SoNeUCON$_{\rm ABC}$}, an expressive usage control
model for {Web}-Based Social Networks",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "159--187",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000480",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stergiopoulos:2014:BHD,
author = "George Stergiopoulos and Dimitris Gritzalis",
title = "A Bug {Hunter}'s Diary",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "188--188",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000200",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Meng:2014:EEP,
author = "Weizhi Meng and Wenjuan Li and Lam-For Kwok",
title = "{EFM}: Enhancing the performance of signature-based
network intrusion detection systems using enhanced
filter mechanism",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "189--204",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400025X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fang:2014:PBA,
author = "Zheran Fang and Weili Han and Yingjiu Li",
title = "Permission based {Android} security: Issues and
countermeasures",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "205--218",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000261",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "43",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:37 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000649",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "iii--iii",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000777",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:AVR,
author = "Anonymous",
title = "Is Anti-virus Really Dead?",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "iv--iv",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Webb:2014:SAM,
author = "Jeb Webb and Atif Ahmad and Sean B. Maynard and Graeme
Shanks",
title = "A situation awareness model for information security
risk management",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "1--15",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000571",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PJb,
author = "Anonymous",
title = "Pages 1--118 ({July 2014})",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "1--118",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kortesniemi:2014:SCU,
author = "Yki Kortesniemi and Mikko S{\"a}rel{\"a}",
title = "Survey of certificate usage in distributed access
control",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "16--32",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000534",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shmueli:2014:IDE,
author = "Erez Shmueli and Ronen Vaisenberg and Ehud Gudes and
Yuval Elovici",
title = "Implementing a database encryption solution, design
and implementation issues",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "33--50",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000509",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nergiz:2014:HA,
author = "Mehmet Ercan Nergiz and Muhammed Zahit G{\"o}k",
title = "Hybrid $k$-Anonymity",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "51--63",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000455",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kirchner:2014:SCM,
author = "Martin Kirchner and Edgar Weippl",
title = "Securing Cloud and Mobility",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "64--64",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000224",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ding:2014:CFB,
author = "Yuxin Ding and Wei Dai and Shengli Yan and Yumei
Zhang",
title = "Control flow-based opcode behavior analysis for
Malware detection",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "65--74",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000558",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ahmadinejad:2014:UDI,
author = "Seyed Hossein Ahmadinejad and Philip W. L. Fong",
title = "Unintended disclosure of information: Inference
attacks by third-party extensions to Social Network
Systems",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "75--91",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400056X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Peng:2014:PMS,
author = "Sancheng Peng and Min Wu and Guojun Wang and Shui Yu",
title = "Propagation model of smartphone worms based on
semi-{Markov} process and social relationship graph",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "92--103",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000583",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2014:DSI,
author = "Young-Su Jang and Jin-Young Choi",
title = "Detecting {SQL} injection attacks using query result
size",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "104--118",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000595",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "44",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000741",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "iii--iv",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001126",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shameli-Sendi:2014:TIR,
author = "Alireza Shameli-Sendi and Mohamed Cheriet and
Abdelwahab Hamou-Lhadj",
title = "Taxonomy of intrusion risk assessment and response
system",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "1--16",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000613",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PS,
author = "Anonymous",
title = "Pages 1--306 ({September 2014})",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "1--306",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alenezi:2014:UT,
author = "Mohammed N. Alenezi and Martin J. Reed",
title = "Uniform {DoS} traceback",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "17--26",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000601",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hamid:2014:APP,
author = "Isredza Rahmi A. Hamid and Jemal H. Abawajy",
title = "An approach for profiling phishing activities",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "27--41",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000546",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tondel:2014:ISI,
author = "Inger Anne T{\o}ndel and Maria B. Line and Martin
Gilje Jaatun",
title = "Information security incident management: Current
practice as reported in the literature",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "42--57",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lagazio:2014:MLA,
author = "Monica Lagazio and Nazneen Sherif and Mike Cushman",
title = "A multi-level approach to understanding the impact of
cyber crime on the financial sector",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "58--74",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400087X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pieterse:2014:BCC,
author = "Heloise Pieterse and Martin S. Olivier",
title = "{Bluetooth} Command and Control channel",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "75--83",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000881",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nguyen:2014:STB,
author = "Vu Duc Nguyen and Yang-Wai Chow and Willy Susilo",
title = "On the security of text-based {$3$D CAPTCHAs}",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "84--99",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia:2014:ECB,
author = "S. Garc{\'\i}a and M. Grill and J. Stiborek and A.
Zunino",
title = "An empirical comparison of botnet detection methods",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "100--123",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000923",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Razzaq:2014:OAD,
author = "Abdul Razzaq and Zahid Anwar and H. Farooq Ahmad and
Khalid Latif and Faisal Munir",
title = "Ontology for attack detection: an intelligent approach
to web application security",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "124--146",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000868",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Idrus:2014:SBK,
author = "Syed Zulkarnain Syed Idrus and Estelle Cherrier and
Christophe Rosenberger and Patrick Bours",
title = "Soft biometrics for keystroke dynamics: Profiling
individuals while typing passwords",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "147--155",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000893",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2014:PEA,
author = "Chao Shen and Zhongmin Cai and Xiaohong Guan and Roy
Maxion",
title = "Performance evaluation of anomaly-detection algorithms
for mouse dynamics",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "156--171",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Thalmann:2014:CDL,
author = "Stefan Thalmann and Daniel Bachlechner and Lukas
Demetz and Markus Manhart",
title = "Complexity is dead, long live complexity! {How}
software can help service providers manage security and
compliance",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "172--185",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000935",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montenegro:2014:PSS,
author = "Jose A. Montenegro and Javier Lopez",
title = "A practical solution for sealed bid and multi-currency
auctions",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "186--198",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000972",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitrokotsa:2014:LLD,
author = "Aikaterini Mitrokotsa and Cristina Onete and Serge
Vaudenay",
title = "Location leakage in distance bounding: Why location
privacy does not work",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "199--209",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000947",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2014:TON,
author = "Hao Zhang and Nenghai Yu and Yonggang Wen and Weiming
Zhang",
title = "Towards optimal noise distribution for privacy
preserving in data aggregation",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "210--230",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400090X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chitrakar:2014:SCS,
author = "Roshan Chitrakar and Chuanhe Huang",
title = "Selection of Candidate Support Vectors in incremental
{SVM} for network intrusion detection",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "231--241",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000996",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Oza:2014:HAD,
author = "Aditya Oza and Kevin Ross and Richard M. Low and Mark
Stamp",
title = "{HTTP} attack detection using $n$-gram analysis",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "242--254",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000959",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jurcut:2014:DGS,
author = "Anca D. Jurcut and Tom Coffey and Reiner Dojen",
title = "Design guidelines for security protocols to prevent
replay and parallel session attacks",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "255--273",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000911",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Silic:2014:SIV,
author = "Mario Silic and Andrea Back",
title = "Shadow {IT} --- a view from behind the curtain",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "274--283",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400100X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Archibald:2014:CAD,
author = "Rennie Archibald and Dipak Ghosal",
title = "A comparative analysis of detection metrics for covert
timing channels",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "284--292",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000467",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cohen:2014:TSI,
author = "Fred Cohen and Don Cohen",
title = "Time and space interval record schedule consistency
analysis for atomic items without interactions in open
spaces with stationary locations",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "293--304",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000315",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsalis:2014:SCM,
author = "Nikolaos Tsalis and Dimitris Gritzalis",
title = "Securing cloud and mobility: a practitioner's guide",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "305--305",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000212",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "45",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:38 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001096",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "iii--iii",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001278",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2014:RTA,
author = "Amin Hassanzadeh and Radu Stoleru and Michalis
Polychronakis and Geoffrey Xie",
title = "{RAPID}: Traffic-agnostic intrusion detection for
resource-constrained wireless mesh networks",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "1--17",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001047",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:PO,
author = "Anonymous",
title = "Pages 1--174 ({October 2014})",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "1--174",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Franke:2014:CSA,
author = "Ulrik Franke and Joel Brynielsson",
title = "Cyber situational awareness --- a systematic review of
the literature",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "18--31",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001011",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhao:2014:TSU,
author = "Rui Zhao and Chuan Yue",
title = "Toward a secure and usable cloud-based password
manager for web browsers",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "32--47",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001059",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jandel:2014:DSR,
author = "Magnus J{\"a}ndel",
title = "Decision support for releasing anonymised data",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "48--61",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001035",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elhadi:2014:EDM,
author = "Ammar Ahmed E. Elhadi and Mohd Aizaini Maarof and
Bazara I. A. Barry and Hentabli Hamza",
title = "Enhancing the detection of metamorphic malware using
call graphs",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "62--78",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001060",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Luckner:2014:SWS,
author = "Marcin Luckner and Micha{\l} Gad and Pawe{\l}
Sobkowiak",
title = "Stable web spam detection using features based on
lexical items",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "79--93",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001151",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Almalawi:2014:UAB,
author = "Abdulmohsen Almalawi and Xinghuo Yu and Zahir Tari and
Adil Fahad and Ibrahim Khalil",
title = "An unsupervised anomaly-based detection approach for
integrity attacks on {SCADA} systems",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "94--110",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001072",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Diaz:2014:NXB,
author = "Jesus Diaz and David Arroyo and Francisco B.
Rodriguez",
title = "New X.509-based mechanisms for fair anonymity
management",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "111--125",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001023",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Adamsky:2014:SBB,
author = "Florian Adamsky and Syed Ali Khayam and Rudolf
J{\"a}ger and Muttukrishnan Rajarajan",
title = "Stealing bandwidth from {BitTorrent} seeders",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "126--140",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001205",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2014:CCS,
author = "Ilju Seo and Heejo Lee and Seung Chul Han",
title = "Cylindrical Coordinates Security Visualization for
multiple domain command and control botnet detection",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "141--153",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001187",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jha:2014:SAT,
author = "Sadhana Jha and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "Security analysis of temporal {RBAC} under an
administrative model",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "154--172",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001217",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stavrou:2014:ICN,
author = "Vasilis Stavrou and Dimitris Gritzalis",
title = "Introduction to Computer and Network Security:
Navigating Shades of {Gray}",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "173--173",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000303",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBg,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "46",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001242",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "iii--iii",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001412",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2014:ESI,
author = "Zheng Yan and Guojun Wang and Valtteri Niemi and
Robert H. Deng",
title = "Editorial: Special issue on trust in cyber, physical
and social computing",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "1--2",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001369",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2014:AAG,
author = "Yue Shen and Zheng Yan and Raimo Kantola",
title = "Analysis on the acceptance of Global Trust Management
for unwanted traffic control based on game theory",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "3--25",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000492",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2014:ECQ,
author = "Liang Cheng and Yang Zhang and Zhihui Han and Yi Deng
and Xiaoshan Sun and Dengguo Feng",
title = "Evaluating and comparing the quality of access control
in different operating systems",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "26--40",
month = nov,
year = "2014",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2014.05.001",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000716",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gonzalez-Manzano:2014:CCO,
author = "Lorena Gonz{\'a}lez-Manzano and Ana I.
Gonz{\'a}lez-Tablas and Jos{\'e} M. de Fuentes and
Arturo Ribagorda",
title = "{CooPeD}: {Co}-owned Personal Data management",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "41--65",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000960",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shahriar:2014:EDV,
author = "Hossain Shahriar and Komminist Weldemariam and
Mohammad Zulkernine and Thibaud Lutellier",
title = "Effective detection of vulnerable and malicious
browser extensions",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "66--84",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000984",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2014:HFC,
author = "Yan Dong and Yongna Li and Tingting Sun",
title = "Happy faces considered trustworthy irrespective of
perceiver's mood: Challenges to the mood congruency
effect",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "85--93",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814000625",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2014:EBh,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "47",
number = "??",
pages = "ifc--ifc",
month = nov,
year = "2014",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:39 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001382",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "iii--iv",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001758",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zineddine:2015:VMT,
author = "Mhamed Zineddine",
title = "Vulnerabilities and mitigation techniques toning in
the cloud: a cost and vulnerabilities coverage
optimization approach using Cuckoo search algorithm
with {L{\'e}vy} flights",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "1--18",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001333",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PF,
author = "Anonymous",
title = "Pages 1--298 ({February 2015})",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "1--298",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mesquida:2015:IIS,
author = "Antoni Llu{\'\i}s Mesquida and Antonia Mas",
title = "Implementing information security best practices on
software lifecycle processes: the {{\em ISO\slash IEC
15504 Security Extension}}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "19--34",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001345",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Friedberg:2015:CAP,
author = "Ivo Friedberg and Florian Skopik and Giuseppe Settanni
and Roman Fiedler",
title = "Combating advanced persistent threats: From network
event correlation to incident detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "35--57",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001461",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barnes:2015:LEA,
author = "David J. Barnes and Julio Hernandez-Castro",
title = "On the limits of engine analysis for cheating
detection in chess",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "58--73",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001485",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Do:2015:EDA,
author = "Quang Do and Ben Martini and Kim-Kwang Raymond Choo",
title = "Exfiltrating data from {Android} devices",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "74--91",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400162X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Diaz-Lopez:2015:MXS,
author = "Daniel D{\'\i}az-L{\'o}pez and Gin{\'e}s
D{\'o}lera-Tormo and F{\'e}lix G{\'o}mez-M{\'a}rmol and
Gregorio Mart{\'\i}nez-P{\'e}rez",
title = "Managing {XACML} systems in distributed environments
through Meta-Policies",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "92--115",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001503",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lu:2015:TCA,
author = "Jianfeng Lu and James B. D. Joshi and Lei Jin and
Yiding Liu",
title = "Towards complexity analysis of User Authorization
Query problem in {RBAC}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "116--130",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001497",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2015:DHS,
author = "Shu-Yuan Shen and Li-Hong Huang",
title = "A data hiding scheme using pixel value differencing
and improving exploiting modification directions",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "131--141",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001199",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lin:2015:IAA,
author = "Xi-Jun Lin and Lin Sun and Haipeng Qu",
title = "Insecurity of an anonymous authentication for
privacy-preserving {IoT} target-driven applications",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "142--149",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001229",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kent:2015:AGA,
author = "Alexander D. Kent and Lorie M. Liebrock and Joshua C.
Neil",
title = "Authentication graphs: Analyzing user behavior within
an enterprise network",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "150--166",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001321",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maeng:2015:TAU,
author = "YoungJae Maeng and Aziz Mohaisen and Mun-Kyu Lee and
DaeHun Nyang",
title = "Transaction authentication using complementary
colors",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "167--181",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001473",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Reece:2015:PIS,
author = "R. P. Reece and B. C. Stahl",
title = "The professionalisation of information security:
Perspectives of {UK} practitioners",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "182--195",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001539",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yan:2015:LRP,
author = "Qiang Yan and Jin Han and Yingjiu Li and Jianying Zhou
and Robert H. Deng",
title = "Leakage-resilient password entry: Challenges, design,
and evaluation",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "196--211",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001540",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alam:2015:FMM,
author = "Shahid Alam and R. Nigel Horspool and Issa Traore and
Ibrahim Sogukpinar",
title = "A framework for metamorphic malware analysis and
real-time detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "212--233",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001576",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ozcelik:2015:DEB,
author = "Ilker {\"O}z{\c{c}}elik and Richard R. Brooks",
title = "Deceiving entropy based {DoS} detection",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "234--245",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481400159X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nissim:2015:DMP,
author = "Nir Nissim and Aviad Cohen and Chanan Glezer and Yuval
Elovici",
title = "Detection of malicious {PDF} files and directions for
enhancements: a state-of-the art survey",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "246--266",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001606",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Montesdioca:2015:MUS,
author = "Gustavo Percio Zimmermann Montesdioca and Ant{\^o}nio
Carlos Gastaud Ma{\c{c}}ada",
title = "Measuring user satisfaction with information security
practices",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "267--280",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001618",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dang-Pham:2015:CIA,
author = "Duy Dang-Pham and Siddhi Pittayachawan",
title = "Comparing intention to avoid malware across contexts
in a {BYOD}-enabled {Australian} university: a
Protection Motivation Theory approach",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "281--297",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001643",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBa,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "48",
number = "??",
pages = "ifc--ifc",
month = feb,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001722",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "iii--iii",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000103",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ngo:2015:DDX,
author = "Canh Ngo and Yuri Demchenko and Cees de Laat",
title = "Decision Diagrams for {XACML} Policy Evaluation and
Management",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "1--16",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001655",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PMa,
author = "Anonymous",
title = "Pages 1--276 ({March 2015})",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "1--276",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Masdari:2015:TEC,
author = "Mohammad Masdari and Sam Jabbehdari and Jamshid
Bagherzadeh and Ahmad Khadem-Zadeh",
title = "Towards efficient certificate status validations with
{E-ADOPT} in mobile ad hoc networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "17--27",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001667",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abril:2015:SMA,
author = "Daniel Abril and Guillermo Navarro-Arribas and
Vicen{\c{c}} Torra",
title = "Spherical microaggregation: Anonymizing sparse vector
spaces",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "28--44",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001679",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rahman:2015:SIS,
author = "Nurul Hidayah Ab Rahman and Kim-Kwang Raymond Choo",
title = "A survey of information security incident handling in
the cloud",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "45--69",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001680",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Robinson:2015:CWI,
author = "Michael Robinson and Kevin Jones and Helge Janicke",
title = "Cyber warfare: Issues and challenges",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "70--94",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001692",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2015:DFA,
author = "Dae Wook Kim and Peiying Yan and Junjie Zhang",
title = "Detecting fake anti-virus software distribution
webpages",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "95--106",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001709",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Patel:2015:NMT,
author = "Ahmed Patel and Samaher Al-Janabi and Ibrahim
AlShourbaji and Jens Pedersen",
title = "A novel methodology towards a trusted environment in
mashup web applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "107--122",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001552",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Komurcu:2015:EGM,
author = "Giray K{\"o}m{\"u}rc{\"u} and Ali Emre Pusane and
G{\"u}nhan D{\"u}ndar",
title = "An efficient grouping method and error probability
analysis for {RO}-{PUFs}",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "123--131",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001801",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2015:TMP,
author = "Yixuan Zhang and Jingsha He and Bin Zhao and Zhiqing
Huang and Ruohong Liu",
title = "Towards more pro-active access control in computer
systems and networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "132--146",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001813",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Onarlioglu:2015:SSL,
author = "Kaan Onarlioglu and Ahmet Salih Buyukkayhan and
William Robertson and Engin Kirda",
title = "{SENTINEL}: Securing Legacy {Firefox} Extensions",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "147--161",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001825",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{daVeiga:2015:IIS,
author = "Ad{\'e}le da Veiga and Nico Martins",
title = "Improving the information security culture through
monitoring and implementation actions illustrated
through a case study",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "162--176",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001862",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shropshire:2015:PAI,
author = "Jordan Shropshire and Merrill Warkentin and Shwadhin
Sharma",
title = "Personality, attitudes, and intentions: Predicting
initial adoption of information security behavior",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "177--191",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000036",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Geneiatakis:2015:PVA,
author = "Dimitris Geneiatakis and Igor Nai Fovino and Ioannis
Kounelis and Paquale Stirparo",
title = "A Permission verification approach for {Android}
mobile applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "192--205",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001515",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ramaki:2015:RRT,
author = "Ali Ahmadian Ramaki and Morteza Amini and Reza
Ebrahimi Atani",
title = "{RTECA}: Real time episode correlation algorithm for
multi-step attack scenarios detection",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "206--219",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001527",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tormo:2015:TPP,
author = "Gin{\'e}s D{\'o}lera Tormo and F{\'e}lix G{\'o}mez
M{\'a}rmol and Gregorio Mart{\'\i}nez P{\'e}rez",
title = "Towards privacy-preserving reputation management for
hybrid broadcast broadband applications",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "220--238",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001564",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2015:PLA,
author = "Yan Li and Yingjiu Li and Qiang Yan and Robert H.
Deng",
title = "Privacy leakage analysis in online social networks",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "239--254",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001588",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elish:2015:PUT,
author = "Karim O. Elish and Xiaokui Shu and Danfeng (Daphne)
Yao and Barbara G. Ryder and Xuxian Jiang",
title = "Profiling user-trigger dependence for {Android}
malware detection",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "255--273",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001631",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stergiopoulos:2015:HPT,
author = "George Stergiopoulos and Dimitris Gritzalis",
title = "Hacking and Penetration Testing with Low Power
Devices",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "274--275",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000024",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBb,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "49",
number = "??",
pages = "ifc--ifc",
month = mar,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:40 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000073",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "iii--iii",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000280",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shittu:2015:IAP,
author = "Riyanat Shittu and Alex Healing and Robert
Ghanea-Hercock and Robin Bloomfield and Muttukrishnan
Rajarajan",
title = "Intrusion alert prioritisation and attack detection
using post-correlation analysis",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "1--15",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001837",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PMb,
author = "Anonymous",
title = "Pages 1--106 ({May 2015})",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "1--106",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vigil:2015:IAN,
author = "Mart{\'\i}n Vigil and Johannes Buchmann and Daniel
Cabarcas and Christian Weinert and Alexander
Wiesmaier",
title = "Integrity, authenticity, non-repudiation, and proof of
existence for long-term archiving: a survey",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "16--32",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001849",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bouffard:2015:UCF,
author = "Guillaume Bouffard and Jean-Louis Lanet",
title = "The ultimate control flow transfer in a {Java} based
smart card",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "33--46",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/java2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500005X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ibrahim:2015:RJS,
author = "Doaa H. Ibrahim and Emad S. Hassan and Sami A.
El-Dolil",
title = "Relay and jammer selection schemes for improving
physical layer security in two-way cooperative
networks",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "47--59",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000140",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tang:2015:STC,
author = "Changlong Tang and Jiqiang Liu",
title = "Selecting a trusted cloud service provider for your
{SaaS} program",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "60--73",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000139",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2015:DAD,
author = "Xiang Cheng and Sen Su and Shengzhi Xu and Zhengyi
Li",
title = "{DP-Apriori}: a differentially private frequent
itemset mining algorithm based on transaction
splitting",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "74--90",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404814001850",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dong:2015:SSS,
author = "Xin Dong and Jiadi Yu and Yanmin Zhu and Yingying Chen
and Yuan Luo and Minglu Li",
title = "{SECO}: Secure and scalable data collaboration
services in cloud computing",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "91--105",
month = may,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.01.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000048",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBc,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "50",
number = "??",
pages = "ifc--ifc",
month = may,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000255",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "iii--iii",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000498",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cui:2015:PLT,
author = "Baojiang Cui and Fuwei Wang and Tao Guo and Guowei
Dong",
title = "A practical off-line taint analysis framework and its
application in reverse engineering of file format",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "1--15",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000218",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PJa,
author = "Anonymous",
title = "Pages 1--62 ({June 2015})",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "1--62",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maiorca:2015:SAE,
author = "Davide Maiorca and Davide Ariu and Igino Corona and
Marco Aresu and Giorgio Giacinto",
title = "Stealth attacks: an extended insight into the
obfuscation effects on {Android} malware",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "16--31",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500022X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Roumani:2015:TSM,
author = "Yaman Roumani and Joseph K. Nwankpa and Yazan F.
Roumani",
title = "Time series modeling of vulnerabilities",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "32--40",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000358",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{benOthmane:2015:IAC,
author = "Lotfi ben Othmane and Rohit Ranchal and Ruchith
Fernando and Bharat Bhargava and Eric Bodden",
title = "Incorporating attacker capabilities in risk estimation
and mitigation",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "41--61",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000334",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBd,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "51",
number = "??",
pages = "ifc--ifc",
month = jun,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:41 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000462",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "iii--iv",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000772",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cerroni:2015:DDN,
author = "Walter Cerroni and Gianluca Moro and Roberto Pasolini
and Marco Ramilli",
title = "Decentralized detection of network attacks through
{P2P} data clustering of {SNMP} data",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "1--16",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000383",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PJb,
author = "Anonymous",
title = "Pages 1--292 ({July 2015})",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "1--292",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ntantogian:2015:GTF,
author = "Christoforos Ntantogian and Stefanos Malliaros and
Christos Xenakis",
title = "{Gaithashing}: a two-factor authentication scheme
based on gait features",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "17--32",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000413",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fattori:2015:HBM,
author = "Aristide Fattori and Andrea Lanzi and Davide
Balzarotti and Engin Kirda",
title = "Hypervisor-based malware protection with
{AccessMiner}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "33--50",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000395",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhu:2015:DIN,
author = "Erzhou Zhu and Feng Liu and Zuo Wang and Alei Liang
and Yiwen Zhang and Xuejian Li and Xuejun Li",
title = "{Dytaint}: the implementation of a novel lightweight
3-state dynamic taint analysis framework for x86 binary
programs",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "51--69",
month = jul,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.03.008",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000401",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Elyas:2015:DFR,
author = "Mohamed Elyas and Atif Ahmad and Sean B. Maynard and
Andrew Lonie",
title = "Digital forensic readiness: Expert perspectives on a
theoretical framework",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "70--89",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000449",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Virvilis:2015:SBW,
author = "Nikos Virvilis and Alexios Mylonas and Nikolaos Tsalis
and Dimitris Gritzalis",
title = "Security Busters: {Web} browser security vs. rogue
sites",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "90--105",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000590",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:TPC,
author = "Yongzhi Wang and Jinpeng Wei",
title = "Toward protecting control flow confidentiality in
cloud-based computation",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "106--127",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000553",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsohou:2015:ARC,
author = "Aggeliki Tsohou and Maria Karyda and Spyros
Kokolakis",
title = "Analyzing the role of cognitive and cultural biases in
the internalization of information security policies:
Recommendations for information security awareness
programs",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "128--141",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000565",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cowley:2015:ENI,
author = "Jennifer A. Cowley and Frank L. Greitzer and Bronwyn
Woods",
title = "Effect of network infrastructure factors on
information system risk judgments",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "142--158",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000619",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:CDF,
author = "Ting Wang and Dongyao Ji",
title = "Comment on {``Design and formal security evaluation of
NeMHIP''}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "159--161",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404813000345",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EIT,
author = "Anonymous",
title = "Editorial --- {28th IFIP TC-11 International
Information Security and Privacy Conference}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "162--163",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000711",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Krishnan:2015:EPR,
author = "Padmanabhan Krishnan and Kostyantyn Vorobyov",
title = "Enforcement of privacy requirements",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "164--177",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500036X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zwattendorfer:2015:DSP,
author = "Bernd Zwattendorfer and Daniel Slamanig",
title = "Design strategies for a privacy-friendly {Austrian
eID} system in the public cloud",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "178--193",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000346",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Parsons:2015:DPS,
author = "Kathryn Parsons and Agata McCormac and Malcolm
Pattinson and Marcus Butavicius and Cate Jerram",
title = "The design of phishing studies: Challenges for
researchers",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "194--206",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000231",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wessel:2015:IMD,
author = "Sascha Wessel and Manuel Huber and Frederic Stumpf and
Claudia Eckert",
title = "Improving mobile device security with operating
system-level virtualization",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "207--220",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000206",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Fuchs:2015:WMM,
author = "Karl-Peter Fuchs and Dominik Herrmann and Hannes
Federrath",
title = "Workload modelling for mix-based anonymity services",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "221--233",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500019X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2015:SSA,
author = "Jehyun Lee and Suyeon Lee and Heejo Lee",
title = "Screening smartphone applications using malware family
signatures",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "234--249",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000188",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yi:2015:PW,
author = "Jeong Hyun Yi and Kyung-Hyune Rhee and Gail-Joon Ahn",
title = "Preface --- {WISA} 2014",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "250--250",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000723",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mohaisen:2015:AHF,
author = "Aziz Mohaisen and Omar Alrawi and Manar Mohaisen",
title = "{AMAL}: High-fidelity, behavior-based automated
malware analysis and classification",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "251--266",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000425",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2015:DAE,
author = "Eunhyun Kim and Kyungwon Park and Hyoungshick Kim and
Jaeseung Song",
title = "Design and analysis of enumeration attacks on finding
friends with phone numbers: a case study with
{KakaoTalk}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "267--275",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000589",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Seo:2015:MMS,
author = "Hwajeong Seo and Zhe Liu and Yasuyuki Nogami and
Jongseok Choi and Howon Kim",
title = "{Montgomery} multiplication and squaring for Optimal
Prime Fields",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "276--291",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/fparith.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000371",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBe,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "52",
number = "??",
pages = "ifc--ifc",
month = jul,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000747",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "iii--iv",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001066",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Heurix:2015:TPE,
author = "Johannes Heurix and Peter Zimmermann and Thomas
Neubauer and Stefan Fenz",
title = "A taxonomy for privacy enhancing technologies",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "1--17",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000668",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PS,
author = "Anonymous",
title = "Pages 1--246 ({September 2015})",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "1--246",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Holm:2015:EBI,
author = "Hannes Holm and Khalid Khan Afridi",
title = "An expert-based investigation of the Common
Vulnerability Scoring System",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "18--30",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000620",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Serwadda:2015:WMD,
author = "Abdul Serwadda and Vir V. Phoha",
title = "When Mice devour the Elephants: a {DDoS} attack
against size-based scheduling schemes in the
{Internet}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "31--43",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000644",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Wang:2015:SDB,
author = "Yongge Wang and Tony Nicol",
title = "On statistical distance based testing of pseudo random
sequences and experiments with {PHP} and {Debian
OpenSSL}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "44--64",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib;
http://www.math.utah.edu/pub/tex/bib/linux.bib;
http://www.math.utah.edu/pub/tex/bib/prng.bib;
http://www.math.utah.edu/pub/tex/bib/unix.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000693",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Safa:2015:ISC,
author = "Nader Sohrabi Safa and Mehdi Sookhak and Rossouw Von
Solms and Steven Furnell and Norjihan Abdul Ghani and
Tutut Herawan",
title = "Information security conscious care behaviour
formation in organizations",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "65--78",
month = sep,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.05.012",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000863",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alsmadi:2015:SSD,
author = "Izzat Alsmadi and Dianxiang Xu",
title = "Security of Software Defined Networks: a survey",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "79--108",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500070X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Trabelsi:2015:SDS,
author = "Zouheir Trabelsi and Safaa Zeidan and Mohammad M.
Masud and Kilani Ghoudi",
title = "Statistical dynamic splay tree filters towards
multilevel firewall packet filtering enhancement",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "109--131",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500084X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ngoqo:2015:ISB,
author = "Bukelwa Ngoqo and Stephen V. Flowerday",
title = "Information Security Behaviour Profiling Framework
{(ISBPF)} for student mobile phone users",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "132--142",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000851",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2015:IEM,
author = "Chao Shen and Shichao Pei and Zhenyu Yang and Xiaohong
Guan",
title = "Input extraction via motion-sensor behavior analysis
on smartphones",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "143--155",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000991",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Vavilis:2015:AAF,
author = "Sokratis Vavilis and Alexandru Egner and Milan
Petkovi{\'c} and Nicola Zannone",
title = "An anomaly analysis framework for database systems",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "156--173",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000905",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:ESS,
author = "Anonymous",
title = "Editorial --- {SEC'14} special issue on {ICT} systems
security and privacy protection",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "174--174",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001157",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Carminati:2015:BDS,
author = "Michele Carminati and Roberto Caron and Federico Maggi
and Ilenia Epifani and Stefano Zanero",
title = "{BankSealer}: a decision support system for online
banking fraud analysis and investigation",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "175--186",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000437",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bal:2015:SPR,
author = "G{\"o}khan Bal and Kai Rannenberg and Jason I. Hong",
title = "{Styx}: Privacy risk communication for the {Android}
smartphone platform based on apps' data-access behavior
patterns",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "187--202",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000541",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Atighehchi:2015:NME,
author = "Kevin Atighehchi and Alexis Bonnecaze and Gabriel
Risterucci",
title = "New models for efficient authenticated dictionaries",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "203--214",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000607",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shahandashti:2015:RUP,
author = "Siamak F. Shahandashti and Reihaneh Safavi-Naini and
Nashad Ahmed Safa",
title = "Reconciling user privacy and implicit authentication
for mobile devices",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "215--233",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000838",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Saevanee:2015:CUA,
author = "Hataichanok Saevanee and Nathan Clarke and Steven
Furnell and Valerio Biscione",
title = "Continuous user authentication using multi-modal
biometrics",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "234--246",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000875",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:EBf,
author = "Anonymous",
title = "{Editorial Board}",
journal = j-COMPUT-SECUR,
volume = "53",
number = "??",
pages = "ifc--ifc",
month = sep,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:42 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001030",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "iii--iii",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001352",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IA,
author = "Anonymous",
title = "Introduction --- {ARES} 2014",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "1--1",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001558",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Maier:2015:GDM,
author = "Dominik Maier and Mykola Protsenko and Tilo
M{\"u}ller",
title = "A game of Droid and Mouse: the threat of
split-personality malware on {Android}",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "2--15",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000656",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chiew:2015:UWL,
author = "Kang Leng Chiew and Ee Hung Chang and San Nah Sze and
Wei King Tiong",
title = "Utilisation of website logo for phishing detection",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "16--26",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001145",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Scanlon:2015:NIM,
author = "Mark Scanlon and Jason Farina and M-Tahar Kechadi",
title = "Network investigation methodology for {BitTorrent}
Sync: a Peer-to-Peer based file synchronisation
service",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "27--43",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500067X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pang:2015:NAC,
author = "Jun Pang and Yang Zhang",
title = "A new access control scheme for {Facebook}-style
social networks",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "44--59",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000632",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Neisse:2015:SMB,
author = "Ricardo Neisse and Gary Steri and Igor Nai Fovino and
Gianmarco Baldini",
title = "{SecKit}: a Model-based Security Toolkit for the
{Internet of Things}",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "60--76",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000887",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bouabana-Tebibel:2015:PSE,
author = "Thouraya Bouabana-Tebibel and Abdellah Kaci",
title = "Parallel search over encrypted data under attribute
based encryption on the Cloud Computing",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "77--91",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000577",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "54",
number = "??",
pages = "ifc--ifc",
month = oct,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001327",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:Ch,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "iii--iii",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001455",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ruohonen:2015:SGO,
author = "Jukka Ruohonen and Sami Hyrynsalmi and Ville
Lepp{\"a}nen",
title = "The sigmoidal growth of operating system security
vulnerabilities: an empirical revisit",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "1--20",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001005",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:PN,
author = "Anonymous",
title = "Pages 1--280 ({November 2015})",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "1--280",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{El-Emam:2015:NDH,
author = "Nameer N. El-Emam",
title = "New data-hiding algorithm based on adaptive neural
networks with modified particle swarm optimization",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "21--45",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500098X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giot:2015:RPB,
author = "Romain Giot and Bernadette Dorizzi and Christophe
Rosenberger",
title = "A review on the public benchmark databases for static
keystroke dynamics",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "46--61",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000942",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jia:2015:MBC,
author = "Yaoqi Jia and Yue Chen and Xinshu Dong and Prateek
Saxena and Jian Mao and Zhenkai Liang",
title = "Man-in-the-browser-cache: Persisting {HTTPS} attacks
via browser cache poisoning",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "62--80",
month = nov,
year = "2015",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.07.004",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001121",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zahadat:2015:BSE,
author = "Nima Zahadat and Paul Blessner and Timothy Blackburn
and Bill A. Olson",
title = "{BYOD} security engineering: a framework and its
analysis",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "81--99",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000978",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Solic:2015:ISS,
author = "Kresimir Solic and Hrvoje Ocevcic and Marin Golub",
title = "The information systems' security level assessment
model based on an ontology and evidential reasoning
approach",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "100--112",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001212",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsalis:2015:BRH,
author = "Nikolaos Tsalis and Dimitris Gritzalis",
title = "Book Review: {{\booktitle{Hacking Web Intelligence:
Open Source Intelligence and Web Reconnaissance
Concepts and Techniques}}, Sudhanshu Chauhan, Nutan
Kumar Panda, Elsevier Publications, USA (2015)}",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "113--113",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/gnu.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001236",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mouton:2015:NES,
author = "Francois Mouton and Mercia M. Malan and Kai K. Kimppa
and H. S. Venter",
title = "Necessity for ethics in social engineering research",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "114--127",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001224",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stavrou:2015:BRI,
author = "Vasilis Stavrou and Dimitris Gritzalis",
title = "Book Review: {{\booktitle{Introduction to Social Media
Investigation --- a hands-on Approach}}, Jennifer
Golbeck, Elsevier Publications, USA (2015)}",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "128--129",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001194",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Yin:2015:DSC,
author = "Ting Yin and Gaobo Yang and Leida Li and Dengyong
Zhang and Xingming Sun",
title = "Detecting seam carving based image resizing using
local binary patterns",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "130--141",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001248",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Stevanovic:2015:GTP,
author = "Matija Stevanovic and Jens Myrup Pedersen and
Alessandro D'Alconzo and Stefan Ruehrup and Andreas
Berger",
title = "On the ground truth problem of malicious {DNS} traffic
analysis",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "142--158",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500125X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia-Teodoro:2015:AGH,
author = "P. Garcia-Teodoro and J. E. Diaz-Verdejo and J. E.
Tapiador and R. Salazar-Hernandez",
title = "Automatic generation of {HTTP} intrusion signatures by
selective identification of anomalies",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "159--174",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001297",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cheng:2015:DPM,
author = "Xiang Cheng and Sen Su and Shengzhi Xu and Peng Tang
and Zhengyi Li",
title = "Differentially private maximal frequent sequence
mining",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "175--192",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001273",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2015:SSF,
author = "Anton V. Uzunov and Eduardo B. Fernandez and Katrina
Falkner",
title = "Security solution frames and security patterns for
authorization in distributed, collaborative systems",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "193--234",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001200",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cazorla:2015:TSA,
author = "Lorena Cazorla and Cristina Alcaraz and Javier Lopez",
title = "A three-stage analysis of {IDS} for critical
infrastructures",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "235--250",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001133",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2015:RBF,
author = "Bing Liu and Chao-Hsien Chu",
title = "Relationship-based federated access control model for
{EPC} Discovery Service",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "251--270",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000899",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Gope:2015:RLA,
author = "Prosanta Gope and Tzonelih Hwang",
title = "A realistic lightweight authentication protocol
preserving strong anonymity for securing {RFID}
system",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "271--280",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000681",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2015:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "55",
number = "??",
pages = "CO2",
month = nov,
year = "2015",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:43 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500142X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Ca,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "iii--iii",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001728",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Cherdantseva:2016:RCS,
author = "Yulia Cherdantseva and Pete Burnap and Andrew Blyth
and Peter Eden and Kevin Jones and Hugh Soulsby and
Kristan Stoddart",
title = "A review of cyber security risk assessment methods for
{SCADA} systems",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "1--27",
month = feb,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2015.09.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001388",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PF,
author = "Anonymous",
title = "Pages 1--162 ({February 2016})",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "1--162",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pierazzi:2016:ESA,
author = "Fabio Pierazzi and Sara Casolari and Michele Colajanni
and Mirco Marchetti",
title = "Exploratory security analytics for anomaly detection",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "28--49",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001480",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Garcia:2016:FVS,
author = "D. A. L{\'o}pez Garc{\'\i}a",
title = "A flexible e-voting scheme for debate tools",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "50--62",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001546",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Dhillon:2016:IIS,
author = "Gurpreet Dhillon and Romilla Syed and Cristiane
Pedron",
title = "Interpreting information security culture: an
organizational transformation case study",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "63--69",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500139X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Safa:2016:ISP,
author = "Nader Sohrabi Safa and Rossouw {Von Solms} and Steven
Furnell",
title = "Information security policy compliance model in
organizations",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "70--82",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001583",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ogutcu:2016:API,
author = "Gizem {\"O}g{\"u}t{\c{c}}{\"u} and {\"O}zlem M{\"u}ge
Testik and Oumout Chouseinoglou",
title = "Analysis of personal information security behavior and
awareness",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "83--93",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001406",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{DOrazio:2016:AME,
author = "Christian D'Orazio and Kim-Kwang Raymond Choo",
title = "An adversary model to evaluate {DRM} protection of
video contents on {iOS} devices",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "94--110",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000954",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Singh:2016:SRI,
author = "Karanpreet Singh and Paramvir Singh and Krishan
Kumar",
title = "A systematic review of {IP} traceback schemes for
denial of service attacks",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "111--139",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000930",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2016:SBP,
author = "Mun-Kyu Lee and Hyeonjin Nam and Dong Kyue Kim",
title = "Secure bimodal {PIN}-entry method using audio
signals",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "140--150",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000929",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horsman:2016:CSR,
author = "Graeme Horsman",
title = "The challenges surrounding the regulation of anonymous
communication provision in the {United Kingdom}",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "151--162",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815000917",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBa,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "56",
number = "??",
pages = "CO2",
month = feb,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001698",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cb,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "iii--iii",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500190X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Harichandran:2016:CFN,
author = "Vikram S. Harichandran and Frank Breitinger and
Ibrahim Baggili and Andrew Marrington",
title = "A cyber forensics needs analysis survey: Revisiting
the domain's needs a decade later",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "1--13",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001595",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PMa,
author = "Anonymous",
title = "Pages 1--106 ({March 2016})",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "1--106",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shameli-Sendi:2016:TIS,
author = "Alireza Shameli-Sendi and Rouzbeh Aghababaei-Barzegar
and Mohamed Cheriet",
title = "Taxonomy of information security risk assessment
{(ISRA)}",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "14--30",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001650",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Awan:2016:ICR,
author = "Malik Shahzad Kaleem Awan and Pete Burnap and Omer
Rana",
title = "Identifying cyber risk hotspots: a framework for
measuring temporal variance in computer network risk",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "31--46",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001674",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{West:2016:IFF,
author = "Jarrod West and Maumita Bhattacharya",
title = "Intelligent financial fraud detection: a comprehensive
review",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "47--66",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001261",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sieklik:2016:ETD,
author = "Boris Sieklik and Richard Macfarlane and William J.
Buchanan",
title = "Evaluation of {TFTP DDoS} amplification attack",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "67--92",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001285",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Faria:2016:IPK,
author = "Gerson de Souza Faria and Hae Yong Kim",
title = "Identification of pressed keys by time difference of
arrivals of mechanical vibrations",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "93--105",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001662",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBb,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "57",
number = "??",
pages = "CO2",
month = mar,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:44 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481500187X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cc,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "iii--iv",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300165",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Chen:2016:CCI,
author = "Xiao-Fan Chen and Shun-Zheng Yu",
title = "{CIPA}: a collaborative intrusion prevention
architecture for programmable network and {SDN}",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "1--19",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001856",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PMb,
author = "Anonymous",
title = "Pages 1--284 ({May 2016})",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "1--284",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Horcas:2016:ADM,
author = "Jose-Miguel Horcas and M{\'o}nica Pinto and Lidia
Fuentes and Wissam Mallouli and Edgardo Montes de Oca",
title = "An approach for deploying and monitoring dynamic
security policies",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "20--38",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001832",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Konradt:2016:PEA,
author = "Christian Konradt and Andreas Schilling and Brigitte
Werners",
title = "Phishing: an economic analysis of cybercrime
perpetrators",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "39--46",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001844",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Huang:2016:SWS,
author = "Cheng Huang and JiaYong Liu and Yong Fang and Zheng
Zuo",
title = "A study on {Web} security incidents in {China} by
analyzing vulnerability disclosure platforms",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "47--62",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001820",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Asghar:2016:DIR,
author = "Hira Asghar and Zahid Anwar and Khalid Latif",
title = "A deliberately insecure {RDF}-based {Semantic Web}
application framework for teaching {SPARQL\slash
SPARUL} injection attacks and defense mechanisms",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "63--82",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001807",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{GhasemiGol:2016:CAN,
author = "Mohammad GhasemiGol and Abbas Ghaemi-Bafghi and Hassan
Takabi",
title = "A comprehensive approach for network attack
forecasting",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "83--105",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001819",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Obert:2016:PAE,
author = "James Obert and Inna Pivkina and Hong Huang and
Huiping Cao",
title = "Proactively applied encryption in multipath networks",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "106--124",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001960",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Jang:2016:ADA,
author = "Jae-wook Jang and Hyunjae Kang and Jiyoung Woo and
Aziz Mohaisen and Huy Kang Kim",
title = "{Andro-Dumpsys}: Anti-malware system based on the
similarity of malware creator and malware centric
information",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "125--138",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481600002X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Abazari:2016:EAM,
author = "Farzaneh Abazari and Morteza Analoui and Hassan
Takabi",
title = "Effect of anti-malware software on infectious nodes in
cloud environment",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "139--148",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001959",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:FSL,
author = "Weize Li and Lun Xie and Zulan Deng and Zhiliang
Wang",
title = "False sequential logic attack on {SCADA} system and
its physical impact analysis",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "149--159",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000031",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sadhya:2016:PPS,
author = "Debanjan Sadhya and Sanjay Kumar Singh",
title = "Privacy preservation for soft biometrics based
multimodal recognition system",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "160--179",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000055",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Zhang:2016:CRA,
author = "Hao Zhang and Danfeng (Daphne) Yao and Naren
Ramakrishnan and Zhibin Zhang",
title = "Causality reasoning about network events for detecting
stealthy malware activities",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "180--198",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000043",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ni:2016:FMR,
author = "Siru Ni and Yi Zhuang and Jingjing Gu and Ying Huo",
title = "A formal model and risk assessment method for
security-critical real-time embedded systems",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "199--215",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000079",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Spanos:2016:IIS,
author = "Georgios Spanos and Lefteris Angelis",
title = "The impact of information security events to the stock
market: a systematic literature review",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "216--229",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300013",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ji:2016:CEM,
author = "Yuede Ji and Yukun He and Xinyang Jiang and Jian Cao
and Qiang Li",
title = "Combating the evasion mechanisms of social bots",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "230--249",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300025",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Ulas:2016:ARL,
author = "Cihan Ulas and Ulas Asik and Cant{\"u}rk Karadeniz",
title = "Analysis and reconstruction of laser printer
information leakages in the media of electromagnetic
radiation, power, and signal lines",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "250--267",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300049",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Farina:2016:MBP,
author = "Paolo Farina and Enrico Cambiaso and Gianluca Papaleo
and Maurizio Aiello",
title = "Are mobile botnets a possible threat? {The} case of
{SlowBot Net}",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "268--283",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300086",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBc,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "58",
number = "??",
pages = "CO2",
month = may,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630013X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cd,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "iii--iii",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300396",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Menesidou:2016:AKE,
author = "Sofia Anna Menesidou and Dimitrios Vardalis and
Vasilios Katos",
title = "Automated key exchange protocol evaluation in delay
tolerant networks",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "1--8",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300098",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PJa,
author = "Anonymous",
title = "Pages 1--254 ({June 2016})",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "1--254",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Barton:2016:ISS,
author = "Kevin A. Barton and Gurvirender Tejay and Michael Lane
and Steve Terrell",
title = "Information system security commitment: a study of
external influences on senior management",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "9--25",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300104",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flores:2016:SIR,
author = "Waldo Rocha Flores and Mathias Ekstedt",
title = "Shaping intention to resist social engineering through
transformational leadership, information security
culture and awareness",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "26--44",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000067",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:SER,
author = "Qi Li and Jianfeng Ma and Rui Li and Ximeng Liu and
Jinbo Xiong and Danwei Chen",
title = "Secure, efficient and revocable multi-authority access
control system in cloud storage",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "45--59",
month = jun,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.02.002",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300050",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Lee:2016:UIS,
author = "Chunghun Lee and Choong C. Lee and Suhyun Kim",
title = "Understanding information security stress: Focusing on
the type of information security compliance activity",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "60--70",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300074",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Morovati:2016:NBD,
author = "Kamran Morovati and Sanjay Kadam and Ali Ghorbani",
title = "A network based document management model to prevent
data extrusion",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "71--91",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300062",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Junaid:2016:DDM,
author = "Mohsin Junaid and Donggang Liu and David Kung",
title = "{Dexteroid}: Detecting malicious behaviors in
{Android} apps using reverse-engineered life cycle
models",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "92--117",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300037",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Camacho:2016:PBM,
author = "Jos{\'e} Camacho and Alejandro P{\'e}rez-Villegas and
Pedro Garc{\'\i}a-Teodoro and Gabriel
Maci{\'a}-Fern{\'a}ndez",
title = "{PCA}-based multivariate statistical network
monitoring for anomaly detection",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "118--137",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300116",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tsai:2016:UOS,
author = "Hsin-yi Sandy Tsai and Mengtian Jiang and Saleem
Alhabash and Robert LaRose and Nora J. Rifon and Shelia
R. Cotten",
title = "Understanding online safety behaviors: a protection
motivation theory perspective",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "138--150",
month = jun,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.02.009",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300190",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{El-Hajj:2016:SCW,
author = "Wassim El-Hajj and Ghassen {Ben Brahim} and Hazem Hajj
and Haidar Safa and Ralph Adaimy",
title = "Security-by-construction in web applications
development via database annotations",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "151--165",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404815001972",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Davis:2016:AFE,
author = "Jonathan J. Davis and Ernest Foo",
title = "Automated feature engineering for {HTTP} tunnel
detection",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "166--185",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816000080",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mouton:2016:SEA,
author = "Francois Mouton and Louise Leenen and H. S. Venter",
title = "Social engineering attack examples, templates and
scenarios",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "186--209",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300268",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Teh:2016:STD,
author = "Pin Shen Teh and Ning Zhang and Andrew Beng Jin Teoh
and Ke Chen",
title = "A survey on touch dynamics authentication in mobile
devices",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "210--235",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300256",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pasquale:2016:AEC,
author = "Liliana Pasquale and Sorren Hanvey and Mark Mcgloin
and Bashar Nuseibeh",
title = "Adaptive evidence collection in the cloud using attack
scenarios",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "236--254",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300232",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBd,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "59",
number = "??",
pages = "CO2",
month = jun,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:45 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300360",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Ce,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "iii--iii",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630058X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Alexiou:2016:FSA,
author = "Nikolaos Alexiou and Stylianos Basagiannis and Sophia
Petridou",
title = "Formal security analysis of near field communication
using model checking",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "1--14",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300244",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PJb,
author = "Anonymous",
title = "Pages 1--226 ({July 2016})",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "1--226",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Djamaludin:2016:RUT,
author = "C. I. Djamaludin and E. Foo and S. Camtepe and P.
Corke",
title = "Revocation and update of trust in autonomous delay
tolerant networks",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "15--36",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630030X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Giboney:2016:SEA,
author = "Justin Scott Giboney and Jeffrey Gainer Proudfoot and
Sanjay Goel and Joseph S. Valacich",
title = "The Security Expertise Assessment Measure {(SEAM)}:
Developing a scale for hacker expertise",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "37--51",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300323",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Liu:2016:TRR,
author = "Gang Liu and Runnan Zhang and Huimin Song and Can Wang
and Jinhui Liu and Aijun Liu",
title = "{Ts-RBAC}: a {RBAC} model with transformation",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "52--61",
month = jul,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.03.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300281",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Xenakis:2016:USM,
author = "Christos Xenakis and Christoforos Ntantogian and
Orestis Panos",
title = "{(U)SimMonitor}: a mobile application for security
evaluation of cellular networks",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "62--78",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630027X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Mitra:2016:MTR,
author = "Barsha Mitra and Shamik Sural and Jaideep Vaidya and
Vijayalakshmi Atluri",
title = "Mining temporal roles using many-valued concepts",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "79--94",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300335",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Schryen:2016:DTN,
author = "Guido Schryen and Gerit Wagner and Alexander
Schlegel",
title = "Development of two novel face-recognition {CAPTCHAs}:
a security and usability study",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "95--116",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300293",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Such:2016:IAT,
author = "Jose M. Such and Antonios Gouglidis and William
Knowles and Gaurav Misra and Awais Rashid",
title = "Information assurance techniques: Perceived cost
effectiveness",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "117--133",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300311",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Pisani:2016:ETU,
author = "Paulo Henrique Pisani and Romain Giot and Andr{\'e} C.
P. L. F. de Carvalho and Ana Carolina Lorena",
title = "Enhanced template update: Application to keystroke
dynamics",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "134--153",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630044X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Skopik:2016:PSP,
author = "Florian Skopik and Giuseppe Settanni and Roman
Fiedler",
title = "A problem shared is a problem halved: a survey on the
dimensions of collective cyber defense through security
information sharing",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "154--176",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300347",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Li:2016:MTP,
author = "Wenjuan Li and Weizhi Meng and Xiapu Luo and Lam For
Kwok",
title = "{\em {MVPSys}}: Toward practical multi-view based
false alarm reduction system in network intrusion
detection",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "177--192",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300475",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Sucasas:2016:APP,
author = "Victor Sucasas and Georgios Mantas and Firooz B.
Saghezchi and Ayman Radwan and Jonathan Rodriguez",
title = "An autonomous privacy-preserving authentication scheme
for intelligent transportation systems",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "193--205",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300463",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kar:2016:SDS,
author = "Debabrata Kar and Suvasini Panigrahi and Srikanth
Sundararajan",
title = "{SQLiGoT}: Detecting {SQL} injection attacks using
graph of tokens and {SVM}",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "206--225",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300451",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBe,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "60",
number = "??",
pages = "CO2",
month = jul,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300554",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cf,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "iii--iii",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300815",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Canfora:2016:HSE,
author = "Gerardo Canfora and Francesco Mercaldo and Corrado
Aaron Visaggio",
title = "An {HMM} and structural entropy based detector for
{Android} malware: an empirical study",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "1--18",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300499",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PA,
author = "Anonymous",
title = "Pages 1--184 ({August 2016})",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "1--184",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tran:2016:CRR,
author = "Hiep Tran and Enrique Campos-Nanez and Pavel Fomin and
James Wasek",
title = "Cyber resilience recovery model to combat zero-day
malware attacks",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "19--31",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300505",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bartnes:2016:FIS,
author = "Maria Bartnes and Nils Brede Moe and Poul E.
Heegaard",
title = "The future of information security incident management
training: a case study of electrical power companies",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "32--45",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300530",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kearney:2016:CPD,
author = "W. D. Kearney and H. A. Kruger",
title = "Can perceptual differences account for enigmatic
information security behaviour in an organisation?",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "46--58",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300645",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Rrushi:2016:NDT,
author = "Julian L. Rrushi",
title = "{NIC} displays to thwart malware attacks mounted from
within the {OS}",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "59--71",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300517",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Balachandran:2016:CFO,
author = "Vivek Balachandran and Sufatrio and Darell J. J. Tan
and Vrizlynn L. L. Thing",
title = "Control flow obfuscation for {Android} applications",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "72--93",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300529",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Uzunov:2016:SSS,
author = "Anton V. Uzunov",
title = "A survey of security solutions for distributed
publish\slash subscribe systems",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "94--129",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300487",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Shen:2016:UPP,
author = "Chao Shen and Tianwen Yu and Haodi Xu and Gengshan
Yang and Xiaohong Guan",
title = "User practice in password security: an empirical study
of real-life passwords in the wild",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "130--141",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300657",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Boshmaf:2016:ILV,
author = "Yazan Boshmaf and Dionysios Logothetis and Georgos
Siganos and Jorge Ler{\'{\i}}a and Jose Lorenzo and
Matei Ripeanu and Konstantin Beznosov and Hassan
Halawa",
title = "{{\'I}}ntegro: Leveraging victim prediction for robust
fake account detection in large scale {OSNs}",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "142--168",
month = aug,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.05.005",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300633",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Flowerday:2016:ISP,
author = "Stephen V. Flowerday and Tite Tuyikeze",
title = "Information security policy development and
implementation: the what, how and who",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "169--183",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300670",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:IEBf,
author = "Anonymous",
title = "{IFC} --- Editorial Board",
journal = j-COMPUT-SECUR,
volume = "61",
number = "??",
pages = "CO2",
month = aug,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300785",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:Cg,
author = "Anonymous",
title = "Contents",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "iii--iii",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816301092",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Modic:2016:NET,
author = "Jolanda Modic and Ruben Trapero and Ahmed Taha and
Jesus Luna and Miha Stopar and Neeraj Suri",
title = "Novel efficient techniques for real-time cloud
security assessment",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "1--18",
month = sep,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.06.003",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300682",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Anonymous:2016:PS,
author = "Anonymous",
title = "Pages 1--348 ({September 2016})",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "1--348",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hellal:2016:MCF,
author = "Aya Hellal and Lotfi {Ben Romdhane}",
title = "Minimal contrast frequent pattern mining for malware
detection",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "19--32",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300694",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Kim:2016:DBM,
author = "Yonggon Kim and Ohmin Kwon and Jinsoo Jang and
Seongwook Jin and Hyeongboo Baek and Brent Byunghoon
Kang and Hyunsoo Yoon",
title = "On-demand bootstrapping mechanism for isolated
cryptographic operations on commodity accelerators",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "33--48",
month = sep,
year = "2016",
CODEN = "CPSEDU",
DOI = "https://doi.org/10.1016/j.cose.2016.06.006",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/cryptography2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300712",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{delRio:2016:ABC,
author = "Jose Sanchez del Rio and Daniela Moctezuma and
Cristina Conde and Isaac Martin de Diego and Enrique
Cabello",
title = "Automated border control e-gates and facial
recognition systems",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "49--72",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300736",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{GhasemiGol:2016:FMI,
author = "Mohammad GhasemiGol and Hassan Takabi and Abbas
Ghaemi-Bafghi",
title = "A foresight model for intrusion response management",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "73--94",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300700",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Bajwa:2016:NTN,
author = "Garima Bajwa and Ram Dantu",
title = "{Neurokey}: Towards a new paradigm of cancelable
biometrics-based key generation using
electroencephalograms",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "95--113",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300669",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Hassanzadeh:2016:PPI,
author = "Amin Hassanzadeh and Zhaoyan Xu and Radu Stoleru and
Guofei Gu and Michalis Polychronakis",
title = "{PRIDE}: a practical intrusion detection system for
resource constrained wireless mesh networks",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "114--132",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300724",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Tang:2016:RIH,
author = "Zhenjun Tang and Huan Lao and Xianquan Zhang and Kai
Liu",
title = "Robust image hashing via {DCT} and {LLE}",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "133--148",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib;
http://www.math.utah.edu/pub/tex/bib/hash.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S0167404816300852",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Nunez:2016:EMA,
author = "David Nu{\~n}ez and Carmen Fern{\'a}ndez-Gago and
Jes{\'u}s Luna",
title = "Eliciting metrics for accountability of cloud
systems",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "149--164",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019",
bibsource = "http://www.math.utah.edu/pub/tex/bib/computsecur2010.bib",
URL = "https://www.sciencedirect.com/science/article/pii/S016740481630075X",
acknowledgement = ack-nhfb,
fjournal = "Computers \& Security",
journal-URL = "https://www.sciencedirect.com/science/journal/01674048",
}
@Article{Langer:2016:ONA,
author = "Lucie Langer and Florian Skopik and Paul Smith and
Markus Kammerstetter",
title = "From old to new: Assessing cybersecurity risks for an
evolving smart grid",
journal = j-COMPUT-SECUR,
volume = "62",
number = "??",
pages = "165--176",
month = sep,
year = "2016",
CODEN = "CPSEDU",
ISSN = "0167-4048 (print), 1872-6208 (electronic)",
ISSN-L = "0167-4048",
bibdate = "Mon Sep 23 09:46:46 MDT 2019"