books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 67
Main
Computers & Security
Volume 67
Computers & Security
Volume 67
1
Challenges in IT security preparedness exercises: A case study
Bartnes, Maria
,
Moe, Nils Brede
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 771 KB
Your tags:
english, 2017
2
Practice-based discourse analysis of information security policies
Karlsson, Fredrik
,
Hedström, Karin
,
Goldkuhl, Göran
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 925 KB
Your tags:
english, 2017
3
Fast revocation of attribute-based credentials for both users and verifiers
Lueks, Wouter
,
Alpár, Gergely
,
Hoepman, Jaap-Henk
,
Vullers, Pim
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.16 MB
Your tags:
english, 2017
4
Automatic detection and demonstrator generation for information flow leaks in object-oriented programs
Do, Quoc Huy
,
Bubel, Richard
,
Hähnle, Reiner
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.50 MB
Your tags:
english, 2017
5
Trustworthy exams without trusted parties
Bella, Giampaolo
,
Giustolisi, Rosario
,
Lenzini, Gabriele
,
Ryan, Peter Y.A.
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.02 MB
Your tags:
english, 2017
6
Data-driven analytics for cyber-threat intelligence and information sharing
Qamar, Sara
,
Anwar, Zahid
,
Rahman, Mohammad Ashiqur
,
Al-Shaer, Ehab
,
Chu, Bei-Tseng
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.43 MB
Your tags:
english, 2017
7
A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS
Wagner, Markus
,
Rind, Alexander
,
Thür, Niklas
,
Aigner, Wolfgang
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 778 KB
Your tags:
english, 2017
8
Towards a system for complex analysis of security events in large-scale networks
Sapegin, Andrey
,
Jaeger, David
,
Cheng, Feng
,
Meinel, Christoph
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 905 KB
Your tags:
english, 2017
9
Protecting personal trajectories of social media users through differential privacy
Wang, Shuo
,
Sinnott, Richard O.
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.16 MB
Your tags:
english, 2017
10
Enhanced PKI authentication with trusted product at claimant
Yamada, Asahiko
,
Ikeda, Tatsuro
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.16 MB
Your tags:
english, 2017
11
A novel access control protocol using proxy signatures for cloud-based health information exchange
Chandrasekhar, Santosh
,
Ibrahim, Ahmed
,
Singhal, Mukesh
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.05 MB
Your tags:
english, 2017
12
Providing robust security measures to Bloom filter based biometric template protection schemes
Sadhya, Debanjan
,
Singh, Sanjay Kumar
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 759 KB
Your tags:
english, 2017
13
Invi-server: Reducing the attack surfaces by making protected server invisible on networks
Park, Jaehyun
,
Noh, Jiseong
,
Kim, Myungchul
,
Kang, Brent Byunghoon
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 784 KB
Your tags:
english, 2017
14
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet
Chen, Yizheng
,
Kintis, Panagiotis
,
Antonakakis, Manos
,
Nadji, Yacin
,
Dagon, David
,
Farrell, Michael
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 959 KB
Your tags:
english, 2017
15
Unified authentication factors and fuzzy service access using interaction provenance
Hasan, Ragib
,
Khan, Rasib
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 981 KB
Your tags:
english, 2017
16
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets
Skračić, Kristian
,
Pale, Predrag
,
Kostanjčar, Zvonko
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.53 MB
Your tags:
english, 2017
17
A novel kill-chain framework for remote security log analysis with SIEM software
Bryant, Blake D.
,
Saiedian, Hossein
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.69 MB
Your tags:
english, 2017
18
Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology
Mohammed, Zareef A.
,
Tejay, Gurvirender P.
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 863 KB
Your tags:
english, 2017
19
Exploring the protection of private browsing in desktop browsers
Tsalis, Nikolaos
,
Mylonas, Alexios
,
Nisioti, Antonia
,
Gritzalis, Dimitris
,
Katos, Vasilios
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 2.43 MB
Your tags:
english, 2017
20
Analyzing research trends in personal information privacy using topic modeling
Choi, Hyo Shin
,
Lee, Won Sang
,
Sohn, So Young
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.12 MB
Your tags:
english, 2017
21
Socialized policy administration
Guo, Zeqing
,
Han, Weili
,
Liu, Liangxing
,
Xu, Wenyuan
,
Ni, Minyue
,
Zhao, Yunlei
,
Wang, Xiaoyang Sean
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.36 MB
Your tags:
english, 2017
22
Towards a causality based analysis of anonymity protection in indeterministic mix systems
Pham, Dang Vinh
,
Kesdogan, Dogan
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 2.59 MB
Your tags:
english, 2017
23
Privacy policies verification in composite services using OWL
Khurat, Assadarat
,
Suntisrivaraporn, Boontawee
,
Gollmann, Dieter
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 1.79 MB
Your tags:
english, 2017
24
Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015)
Herrmann, Dominik
,
Federrath, Hannes
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 270 KB
Your tags:
english, 2017
25
IFC - Editorial Board
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 50 KB
Your tags:
english, 2017
26
Contents
Journal:
Computers & Security
Year:
2017
Language:
english
File:
PDF, 170 KB
Your tags:
english, 2017
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×