Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 1 of 7376 results
Sort by: relevance publication year

Process mining and hierarchical clustering to help intrusion alert visualization

JOURNAL ARTICLE published March 2018 in Computers & Security

Research funded by Coordenação de Aperfeiçoamento de Pessoal de Nível Superior (1290203)

Authors: Sean Carlisto de Alvarenga | Sylvio Barbon | Rodrigo Sanches Miani | Michel Cukier | Bruno Bogaz Zarpelão

Cyber-attack detection in SCADA systems using temporal pattern recognition techniques

JOURNAL ARTICLE published July 2019 in Computers & Security

Authors: Meir Kalech

WARP: A wormhole-avoidance routing protocol by anomaly detection in mobile ad hoc networks

JOURNAL ARTICLE published March 2010 in Computers & Security

Authors: Ming-Yang Su

Sticky policies approach within cloud computing

JOURNAL ARTICLE published September 2017 in Computers & Security

Authors: Grzegorz Spyra | William J. Buchanan | Elias Ekonomou

Aggregation-based location privacy: An information theoretic approach

JOURNAL ARTICLE published October 2020 in Computers & Security

Authors: Wenjing Zhang | Bo Jiang | Ming Li | Ravi Tandon | Qiao Liu | Hui Li

Malware: Troy revisited

JOURNAL ARTICLE published January 1999 in Computers & Security

Authors: Richard Ford

RTECA: Real time episode correlation algorithm for multi-step attack scenarios detection

JOURNAL ARTICLE published March 2015 in Computers & Security

Authors: Ali Ahmadian Ramaki | Morteza Amini | Reza Ebrahimi Atani

A fast malware detection algorithm based on objective-oriented association mining

JOURNAL ARTICLE published November 2013 in Computers & Security

Authors: Yuxin Ding | Xuebing Yuan | Ke Tang | Xiao Xiao | Yibin Zhang

Information security policy non-compliance: Can capitulation theory explain user behaviors?

JOURNAL ARTICLE published January 2022 in Computers & Security

Authors: Alexander McLeod | Diane Dolezel

Flexible software protection

JOURNAL ARTICLE published May 2022 in Computers & Security

Research funded by Fonds Wetenschappelijk Onderzoek (3G0E2318) | Agentschap voor Innovatie door Wetenschap en Technologie (141758)

Authors: Jens Van den Broeck | Bart Coppens | Bjorn De Sutter

A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges

JOURNAL ARTICLE published January 2023 in Computers & Security

Authors: Jesús E. Díaz-Verdejo | Rafael Estepa Alonso | Antonio Estepa Alonso | German Madinabeitia

From the editor

JOURNAL ARTICLE published July 1992 in Computers & Security

Intrusion detection: Approach and performance issues of the SECURENET system

JOURNAL ARTICLE published 1994 in Computers & Security

Authors: Michel Denault | Dimitris Karagiannis | Dimitris Gritzalis | Paul Spirakis

Compsec 2002: the complete security circle

JOURNAL ARTICLE published November 2002 in Computers & Security

Authors: Stephen Hinde

Conference focuses on reduction of software risks

JOURNAL ARTICLE published April 1988 in Computers & Security

Information technology and dataveillance

JOURNAL ARTICLE published August 1988 in Computers & Security

Authors: Esther H. Highland

Positive alternatives to computer misuse: A report of the proceedings of an ACM panel on hacking

JOURNAL ARTICLE published April 1987 in Computers & Security

Authors: J.A.N. Lee | Gerald Segal

Single unit offers Internet security

JOURNAL ARTICLE published January 1998 in Computers & Security

Authors: Helen Meyer

Planned privacy law weakend

JOURNAL ARTICLE published December 1992 in Computers & Security

International board of referees

JOURNAL ARTICLE published October 1991 in Computers & Security