JCS - volume 27 - 2019 论文列表 |
点击这里查看 Journal of Computer Security 的JCR分区、影响因子等信息 |
Thang Hoang Attila A. Yavuz F. Betül Durak Jorge Guajardo
Decoupling coding habits from functionality for effective binary authorship attribution.Saed Alrabaee Paria Shirani Lingyu Wang Mourad Debbabi Aiman Hanna
How persuasive is a phishing email? A phishing game for phishing awareness.Ziqiang Ma Quanwei Cai Jingqiang Lin Bo Luo Jiwu Jing
Tracking APTs in industrial ecosystems: A proof of concept.Juan E. Rubio Rodrigo Roman Cristina Alcaraz Yan Zhang
Using side channel TCP features for real-time detection of malware connections.George Stergiopoulos Georgia Chronopoulou Evangelos Bitsikas Nikolaos Tsalis Dimitris Gritzalis
Gunjan Batra Vijayalakshmi Atluri Jaideep Vaidya Shamik Sural
Analyzing leakage of personal information by malware.Tobias Urban Dennis Tatang Thorsten Holz Norbert Pohlmann
Mitigating the insider threat of remote administrators in clouds through maintenance task assignments.Nawaf Alhebaishi Lingyu Wang Sushil Jajodia Anoop Singhal
PILOT: Password and PIN information leakage from obfuscated typing videos.Kiran S. Balagani Matteo Cardaioli Mauro Conti Paolo Gasti Martin Georgiev Tristan Gurtler Daniele Lain Charissa Miller Kendall Molas Nikita Samarin Eugen Saraci Gene Tsudik Lynn Wu
Xingjie Yu Michael Thang Shiwen Yingjiu Li Robert Huijie Deng
Last man standing: Static, decremental and dynamic resiliency via controller synthesis. A method for unbounded verification of privacy-type properties.Yangguang Tian Yingjiu Li Guomin Yang Willy Susilo Yi Mu Hui Cui Yinghui Zhang
Sub-session hijacking on the web: Root causes and prevention.Stefano Calzavara Alvise Rabitti Michele Bugliesi
Secure authentication in the grid: A formal analysis of DNP3 SAv5.Cas Cremers Martin Dehnel-Wild Kevin Milner
Learning probabilistic dependencies among events for proactive security auditing in clouds.Suryadipta Majumdar Azadeh Tabiban Yosr Jarraya Momen Oqaily Amir Alimohammadifar Makan Pourzandi Lingyu Wang Mourad Debbabi
Sandrine Blazy David Pichardie Alix Trieu
Privacy implications of room climate data.Frederik Armknecht Zinaida Benenson Philipp Morgner Christian Müller Christian Riess
Per-session security: Password-based cryptography revisited.Grégory Demay Peter Gazi Ueli Maurer Björn Tackmann
A catalogue associating security patterns and attack steps to design secure applications.Sébastien Salva Loukmen Regainia
Group ORAM for privacy and access control in outsourced personal records.Matteo Maffei Giulio Malavolta Manuel Reinert Dominique Schröder