Metadata Search Funding Data Link References Status API Help
Facet browsing currently unavailable
Page 8 of 7428 results
Sort by: relevance publication year

Achieving Interoperability in a Multiple-Security- Policies Environment

JOURNAL ARTICLE published March 2000 in Computers & Security

Authors: S.A. Kokolakis | E.A. Kiountouzis

Applying security policies and service level agreement to IaaS service model to enhance security and transition

JOURNAL ARTICLE published May 2012 in Computers & Security

Authors: Louay Karadsheh

A taxonomy and survey of attacks on digital signatures

JOURNAL ARTICLE published May 2013 in Computers & Security

Authors: Jorge L. Hernandez-Ardieta | Ana I. Gonzalez-Tablas | Jose M. de Fuentes | Benjamin Ramos

Containing large-scale worm spreading in the Internet by cooperative distribution of traffic filtering policies

JOURNAL ARTICLE published March 2008 in Computers & Security

Authors: Francesco Palmieri | Ugo Fiore

Balancing software and training requirements for information security

JOURNAL ARTICLE published November 2023 in Computers & Security

Research funded by Javna Agencija za Raziskovalno Dejavnost RS (P2-0426) | Univerza v Mariboru (J5-3111)

Authors: Damjan Fujs | Simon Vrhovec | Damjan Vavpotič

Detection of malicious PE files using synthesized DNA artifacts

JOURNAL ARTICLE published November 2023 in Computers & Security

Research funded by Air Force Research Laboratory (83958 AFLR-2021-1805)

Authors: Sunday Cosmos Ngwobia | Anca Ralescu | David Kapp | Temesgen Kebede

Trusted system concepts

JOURNAL ARTICLE published January 1995 in Computers & Security

Authors: Marshall D. Abrams | Michael V. Joyce

A cyber forensics needs analysis survey: Revisiting the domain's needs a decade later

JOURNAL ARTICLE published March 2016 in Computers & Security

Authors: Vikram S. Harichandran | Frank Breitinger | Ibrahim Baggili | Andrew Marrington

An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices

JOURNAL ARTICLE published September 2019 in Computers & Security

Research funded by Ministry of Science and Technology (2–10812)

Authors: Matias Dodel | Gustavo Mesch

Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning

JOURNAL ARTICLE published September 2020 in Computers & Security

Authors: ElMouatez Billah Karbab | Mourad Debbabi | Abdelouahid Derhab | Djedjiga Mouheb

Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533]

JOURNAL ARTICLE published March 2024 in Computers & Security

Authors: Henry R.K. Skeoch

Editorial

JOURNAL ARTICLE published March 2019 in Computers & Security

Authors: Eugene H. Spafford

NASD power dip could recur

JOURNAL ARTICLE published April 1988 in Computers & Security

IFIP technical committee 11

JOURNAL ARTICLE published January 2001 in Computers & Security

Smart cards. January 1983– August 1987

JOURNAL ARTICLE published October 1988 in Computers & Security

Security with unfortunate side effects

JOURNAL ARTICLE published February 2003 in Computers & Security

Authors: Chris Pounder

The new US encryption policy

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Helen Meyer

Random bits & bytes

JOURNAL ARTICLE published January 1996 in Computers & Security

Authors: Harold Joseph Highland

Security views

JOURNAL ARTICLE published July 2004 in Computers & Security

Authors: E Schultz

Treating viral fever

JOURNAL ARTICLE published June 1988 in Computers & Security

Authors: Jon David