Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 4 of 7417 results
Sort by: relevance publication year

International board of referees

JOURNAL ARTICLE published November 1990 in Computers & Security

IFIP TC11 news

JOURNAL ARTICLE published January 1998 in Computers & Security

Data encryption standard. 1975–January 1987 (citations from the INSPEC: Information Services for the Physics and Engineering Communities Database)

JOURNAL ARTICLE published October 1988 in Computers & Security

The virtuous virus

JOURNAL ARTICLE published December 1992 in Computers & Security

Architectures for C2 DOS/Windows-based Personal Computers — Securing an ‘Undesirable’ Operating System

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Harold Joseph Highland

New member of the International Board of Editors

JOURNAL ARTICLE published March 1985 in Computers & Security

Control flow-based opcode behavior analysis for Malware detection

JOURNAL ARTICLE published July 2014 in Computers & Security

Authors: Yuxin Ding | Wei Dai | Shengli Yan | Yumei Zhang

Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function

JOURNAL ARTICLE published February 2022 in Computers & Security

Authors: Cong Pu | Kim-Kwang Raymond Choo

On Detecting and Classifying DGA Botnets and their Families

JOURNAL ARTICLE published February 2022 in Computers & Security

Authors: Tong Anh Tuan | Hoang Viet Long | David Taniar

Legally “reasonable” security requirements: A 10-year FTC retrospective

JOURNAL ARTICLE published June 2011 in Computers & Security

Authors: Travis D. Breaux | David L. Baumer

Cloud computing security: A survey of service-based models

JOURNAL ARTICLE published March 2022 in Computers & Security

Authors: Fatemeh Khoda Parast | Chandni Sindhav | Seema Nikam | Hadiseh Izadi Yekta | Kenneth B. Kent | Saqib Hakak

Unsupervised malicious domain detection with less labeling effort

JOURNAL ARTICLE published May 2022 in Computers & Security

Authors: Kyung Ho Park | Hyun Min Song | Jeong Do Yoo | Su-Youn Hong | Byoungmo Cho | Kwangsoo Kim | Huy Kang Kim

A systematic review of fuzzing techniques

JOURNAL ARTICLE published June 2018 in Computers & Security

Research funded by National Natural Science Foundation of China (61502536)

Authors: Chen Chen | Baojiang Cui | Jinxin Ma | Runpu Wu | Jianchao Guo | Wenqian Liu

Container security: Precaution levels, mitigation strategies, and research perspectives

JOURNAL ARTICLE published December 2023 in Computers & Security

Authors: Devi Priya V S | Sibi Chakkaravarthy Sethuraman | Muhammad Khurram Khan

Security analysis and new models on the intelligent symmetric key encryption

JOURNAL ARTICLE published January 2019 in Computers & Security

Research funded by National Natural Science Foundation of China (61702212) | MOE (CCNU16A05040)

Authors: Lu Zhou | Jiageng Chen | Yidan Zhang | Chunhua Su | Marino Anthony James

An empirical analysis of the information security culture key factors framework

JOURNAL ARTICLE published September 2021 in Computers & Security

Authors: Alaa Tolah | Steven M. Furnell | Maria Papadaki

Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts

JOURNAL ARTICLE published October 2020 in Computers & Security

Authors: Akash Suresh Patil | Rafik Hamza | Alzubair Hassan | Nan Jiang | Hongyang Yan | Jin Li

Calendar

JOURNAL ARTICLE published January 1999 in Computers & Security

Editorial Board

JOURNAL ARTICLE published September 2019 in Computers & Security

The burglar's viewpoint

JOURNAL ARTICLE published November 1984 in Computers & Security

Authors: W.R.C. van Hoboken