Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Lena Yuryna Connolly, Michael Lang 0001, J. Doug Tygar |
Investigation of Employee Security Behaviour: A Grounded Theory Approach. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Zhijiao Zhang, Ya-Shuai Lü, Yu Chen 0004, Yongqiang Lu 0001, Yuanchun Shi |
Mitigating Code-Reuse Attacks on CISC Architectures in a Hardware Approach. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Hannes Federrath, Dieter Gollmann (eds.) |
ICT Systems Security and Privacy Protection - 30th IFIP TC 11 International Conference, SEC 2015, Hamburg, Germany, May 26-28, 2015, Proceedings |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nicolai Kuntze, Andreas Fuchs 0002, Carsten Rudolph |
On the Secure Distribution of Vendor-Specific Keys in Deployment Scenarios. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mohammed H. Almeshekah, Mikhail J. Atallah, Eugene H. Spafford |
Enhancing Passwords Security Using Deceptive Covert Communication. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Amrit Kumar 0001, Cédric Lauradoux |
A Survey of Alerting Websites: Risks and Solutions. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Maria B. Line, Nils Brede Moe |
Understanding Collaborative Challenges in IT Security Preparedness Exercises. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Asahiko Yamada |
A Generalization of ISO/IEC 24761 to Enhance Remote Authentication with Trusted Product at Claimant. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | David Lorenzi, Emre Uzun, Jaideep Vaidya, Shamik Sural, Vijayalakshmi Atluri |
Enhancing the Security of Image CAPTCHAs Through Noise Addition. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Gregory Blanc, Hervé Debar, Joaquín García-Alfaro, Dingqi Yang |
Automated Classification of C&C Connections Through Malware URL Clustering. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Jaspreet Kaur, Jernej Tonejc, Steffen Wendzel, Michael Meier 0001 |
Securing BACnet's Pitfalls. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Anna Vapen, Niklas Carlsson, Anirban Mahanti, Nahid Shahmehri |
Information Sharing and User Privacy in the Third-Party Identity Management Landscape. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Dang Vinh Pham, Dogan Kesdogan |
Towards Relations Between the Hitting-Set Attack and the Statistical Disclosure Attack. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Konstantin Knorr, David Aspinall 0001, Maria Wolters |
On the Privacy, Security and Safety of Blood Pressure and Diabetes Apps. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers |
Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Quoc Huy Do 0002, Richard Bubel, Reiner Hähnle |
Exploit Generation for Information Flow Leaks in Object-Oriented Programs. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Wojciech Jamroga, Masoud Tabatabaei |
Strategic Noninterference. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Giampaolo Bella, Rosario Giustolisi, Gabriele Lenzini, Peter Y. A. Ryan |
A Secure Exam Protocol Without Trusted Parties. |
SEC |
2015 |
DBLP DOI BibTeX RDF |
|
1 | Mikhail Strizhov, Indrajit Ray |
Multi-keyword Similarity Search over Encrypted Cloud Data. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Kevin Atighehchi, Alexis Bonnecaze, Traian Muntean |
Authenticated Dictionary Based on Frequency. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Bauereiss, Dieter Hutter |
Compatibility of Safety Properties and Possibilistic Information Flow Security in MAKS. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Michele Carminati, Roberto Caron, Federico Maggi, Ilenia Epifani, Stefano Zanero |
BankSealer: An Online Banking Fraud Analysis and Decision Support System. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gökhan Bal, Kai Rannenberg, Jason I. Hong |
Styx: Design and Evaluation of a New Privacy Risk Communication Method for Smartphones. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jaap-Henk Hoepman |
Privacy Design Strategies - (Extended Abstract). |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Theodoros Spyridopoulos, Ioanna-Aikaterini Topa, Theo Tryfonas, Maria Karyda 0001 |
A Holistic Approach for Cyber Assurance of Critical Infrastructure with the Viable System Model. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Dominik Herrmann, Max Maaß, Hannes Federrath |
Evaluating the Security of a DNS Query Obfuscation Scheme for Private Web Surfing. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Lena Yuryna Connolly, Michael Lang 0001, J. Doug Tygar |
Managing Employee Security Behaviour in Organisations: The Role of Cultural Factors and Individual Values. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nashad Ahmed Safa, Reihaneh Safavi-Naini, Siamak Fayyaz Shahandashti |
Privacy-Preserving Implicit Authentication. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bastian Braun, Caspar Gries, Benedikt Petschkuhn, Joachim Posegga |
Ghostrail: Ad Hoc Control-Flow Integrity for Web Applications. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Marco Rocchetto, Martín Ochoa, Mohammad Torabi Dashti |
Model-Based Detection of CSRF. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri |
Towards a Framework for Benchmarking Privacy-ABC Technologies. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nizar Kheir, Frédéric Tran, Pierre Caron, Nicolas Deschamps |
Mentor: Positive DNS Reputation to Skim-Off Benign Domains in Botnet C&C Blacklists. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Daniela Pöhn, Stefan Metzger, Wolfgang Hommel |
Géant-TrustBroker: Dynamic, Scalable Management of SAML-Based Inter-federation Authentication and Authorization Infrastructures. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Khalid Nasr, Anas Abou El Kalam |
A Novel Metric for the Evaluation of IDSs Effectiveness. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Yair Diaz-Tellez, Eliane L. Bodanese, Theo Dimitrakos, Michael Turner |
Context-Aware Multifactor Authentication Based on Dynamic Pin. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gabriela Varona Cervantes, Stefan Fenz |
How to Assess Confidentiality Requirements of Corporate Assets? |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Mee-Loong Yang, Adnan Al-Anbuky, William Liu |
Security of the Multiple-Key Blom's Key Agreement Scheme for Sensor Networks. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Miaomiao Tian 0001, Liusheng Huang |
Efficient Identity-Based Signature from Lattices. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Qasim Mahmood Rajpoot, Christian Damsgaard Jensen |
Security and Privacy in Video Surveillance: Requirements and Challenges. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nora Cuppens-Boulahia, Frédéric Cuppens, Sushil Jajodia, Anas Abou El Kalam, Thierry Sans (eds.) |
ICT Systems Security and Privacy Protection - 29th IFIP TC 11 International Conference, SEC 2014, Marrakech, Morocco, June 2-4, 2014. Proceedings |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Bourgeat, Julien Bringer, Hervé Chabanne, Robin Champenois, Jérémie Clément, Houda Ferradi, Marc Heinrich, Paul Melotti, David Naccache, Antoine Voizard |
New Algorithmic Approaches to Point Constellation Recognition. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Bastian Braun, Johannes Köstler, Joachim Posegga, Martin Johns |
A Trusted UI for the Mobile Web. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrea Kolberger, Ingrid Schaumüller-Bichl, Verena Brunner, Martin Deutschmann |
Protection Profile for PUF-Based Devices. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Gurpreet Dhillon, Romilla Chowdhuri, Cristiane Pedron |
Organizational Transformation and Information Security Culture: A Telecom Case Study. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Abdallah Ghourabi, Tarek Abbes, Adel Bouhoula |
Behavior Analysis of Web Service Attacks. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Serif Bahtiyar, Gürkan Gür, Levent Altay |
Security Assessment of Payment Systems under PCI DSS Incompatibilities. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Zacharias Tzermias, Vassilis Prevelakis, Sotiris Ioannidis |
Privacy Risks from Public Data Sources. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Guojun Qin, Constantinos Patsakis, Mélanie Bouroche |
Playing Hide and Seek with Mobile Dating Applications. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andrew Fielder, Emmanouil A. Panaousis, Pasquale Malacaria, Chris Hankin, Fabrizio Smeraldi |
Game Theory Meets Information Security Management. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Xin Sun, Yibing Zhongyang, Zhi Xin, Bing Mao, Li Xie 0001 |
Detecting Code Reuse in Android Applications Using Component-Based Control Flow Graph. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens |
Trusted Computing to Increase Security and Privacy in eID Authentication. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Ibnu Mubarok, Kiryong Lee, Sihyung Lee, Heejo Lee |
Lightweight Resource Management for DDoS Traffic Isolation in a Cloud Environment. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker |
PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Min Yang 0007, Kam-Pui Chow |
Authorship Attribution for Forensic Investigation with Thousands of Authors. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Christoph Bier, Jonas Prior |
Detection and Labeling of Personal Identifiable Information in E-mails. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Hataichanok Saevanee, Nathan L. Clarke, Steven Furnell, Valerio Biscione |
Text-Based Active Authentication for Mobile Devices. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Suhaila Ismail, Elena Sitnikova, Jill Slay |
Towards Developing SCADA Systems Security Measures for Critical Infrastructures against Cyber-Terrorist Attacks. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Alberto Blanco-Justicia, Josep Domingo-Ferrer, Oriol Farràs, David Sánchez 0001 |
Distance Computation between Two Private Preference Functions. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | José Fragoso Santos, Tamara Rezk |
An Information Flow Monitor-Inlining Compiler for Securing a Core of JavaScript. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Nor Athiyah Abdullah, Dai Nishioka, Yuko Tanaka, Yuko Murayama |
A Preliminary Study on User's Decision Making towards Retweet Messages. |
SEC |
2014 |
DBLP DOI BibTeX RDF |
|
1 | Teodor Sommestad, Jonas Hallberg |
A Review of the Theory of Planned Behaviour in the Context of Information Security Policy Compliance. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chris B. Simmons, Sajjan G. Shiva, Harkeerat Singh Bedi, Vivek Shandilya |
ADAPT: A Game Inspired Attack-Defense and Performance Metric Taxonomy. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Ezzat Alqurashi, Gary B. Wills, Lester Gilbert |
A Viable System Model for Information Security Governance: Establishing a Baseline of the Current Information Security Operations System. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Theodoros Spyridopoulos, George C. Oikonomou, Theo Tryfonas, Mengmeng Ge |
Game Theoretic Approach for Cost-Benefit Analysis of Malware Proliferation Prevention. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thang Hoang, Deokjai Choi 0001, Quang Viet Vo, Huy Anh Nguyen, Thuc Dinh Nguyen |
A Lightweight Gait Authentication on Mobile Phone Regardless of Installation Error. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sabrina Kirrane, Alessandra Mileo, Stefan Decker |
Applying DAC Principles to the RDF Graph Data Model. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Mounir Assaf, Julien Signoles, Frédéric Tronel, Eric Totel |
Program Transformation for Non-interference Verification on Programs with Pointers. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sascha Wessel, Frederic Stumpf, Ilja Herdt, Claudia Eckert 0001 |
Improving Mobile Device Security with Operating System-Level Virtualization. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Bernd Zwattendorfer, Daniel Slamanig |
On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Yuxin Meng 0001, Wenjuan Li 0001, Lam-for Kwok |
Enhancing Click-Draw Based Graphical Passwords Using Multi-Touch on Mobile Phones. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Md. Rafiqul Islam 0001, Irfan Altas, Md. Saiful Islam 0003 |
Exploring Timeline-Based Malware Classification. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Chuah Chai Wen, Ed Dawson, Leonie Simpson |
Key Derivation Function: The SCKDF Scheme. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Heidelinde Hobel, Johannes Heurix, Amin Anjomshoaa, Edgar R. Weippl |
Towards Security-Enhanced and Privacy-Preserving Mashup Compositions. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Alessandro Armando, Alessio Merlo, Luca Verderame |
An Empirical Evaluation of the Android Security Framework. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Gurpreet Dhillon, Romilla Chowdhuri, Filipe de Sá-Soares |
Secure Outsourcing: An Investigation of the Fit between Clients and Providers. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Markus Gruber, Phillip Wieser, Stefan Nachtnebel, Christian Schanes, Thomas Grechenig |
Extraction of ABNF Rules from RFCs to Enable Automated Test Data Generation. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Kathryn Parsons, Agata McCormac, Malcolm Robert Pattinson, Marcus A. Butavicius, Cate Jerram |
Phishing for the Truth: A Scenario-Based Experiment of Users' Behavioural Response to Emails. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lech J. Janczewski, Henry B. Wolfe, Sujeet Shenoi (eds.) |
Security and Privacy Protection in Information Processing Systems - 28th IFIP TC 11 International Conference, SEC 2013, Auckland, New Zealand, July 8-10, 2013. Proceedings |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Suyeon Lee, Jehyun Lee, Heejo Lee |
Screening Smartphone Applications Using Behavioral Signatures. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Vrizlynn L. L. Thing, Zheng Leong Chua |
Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Thomas Laurenson |
Performance Analysis of File Carving Tools. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lotfi Ben Othmane, Harold Weffers, Rohit Ranchal, Pelin Angin, Bharat K. Bhargava, Mohd Murtadha Mohamad |
A Case for Societal Digital Security Culture. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Lisa Rajbhandari, Einar Snekkenes |
Using the Conflicting Incentives Risk Analysis Method. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Sarah Abughazalah, Konstantinos Markantonakis, Keith Mayes |
A Vulnerability in the Song Authentication Protocol for Low-Cost RFID Tags. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | William J. Caelli, Lam-for Kwok, Dennis Longley |
Evolving a Secure Internet. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Peter Teufl, Thomas Zefferer, Christof Stromberger |
Mobile Device Encryption Systems. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Huafei Zhu, Wee Siong Ng, See-Kiong Ng |
Sustainable Pseudo-random Number Generator. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Karl-Peter Fuchs, Dominik Herrmann, Hannes Federrath |
Generating Realistic Application Workloads for Mix-Based Systems for Controllable, Repeatable and Usable Experimentation. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Jin B. Hong, Dong Seong Kim 0001 |
Performance Analysis of Scalable Attack Representation Models. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Padmanabhan Krishnan, Kostyantyn Vorobyov |
Enforcement of Privacy Requirements. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hartmut Hintze, Benjamin Wiegraefe, Ralf God |
A Security Engineering Process Approach for the Future Development of Complex Aircraft Cabin Systems. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Wayne D. Kearney, Hennie A. Kruger |
Phishing and Organisational Learning. |
SEC |
2013 |
DBLP DOI BibTeX RDF |
|
1 | Hataichanok Saevanee, Nathan L. Clarke, Steven M. Furnell |
Multi-modal Behavioural Biometric Authentication for Mobile Devices. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Yongdong Wu, Zhigang Zhao |
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | David Zhao, Issa Traoré, Ali A. Ghorbani 0001, Bassam Sayed, Sherif Saad, Wei Lu 0018 |
Peer to Peer Botnet Detection Based on Flow Intervals. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Han Jiao, Jixue Liu, Jiuyong Li, Chengfei Liu |
Give Rookies A Chance: A Trust-Based Institutional Online Supplier Recommendation Framework. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Amir Herzberg, Ronen Margulies |
My Authentication Album: Adaptive Images-Based Login Mechanism. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Maria Christofi, Aline Gouget |
Formal Verification of the mERA-Based eServices with Trusted Third Party Protocol. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | John C. John, Shamik Sural, Vijayalakshmi Atluri, Jaideep Vaidya |
Role Mining under Role-Usage Cardinality Constraint. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|
1 | Marco Prandini, Marco Ramilli |
A Browser-Based Distributed System for the Detection of HTTPS Stripping Attacks against Web Pages. |
SEC |
2012 |
DBLP DOI BibTeX RDF |
|