books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Personal
Book Requests
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 92
Main
Computers & Security
Volume 92
Computers & Security
Volume 92
1
System log clustering approaches for cyber security applications: A survey
Landauer, Max
,
Skopik, Florian
,
Wurzenberger, Markus
,
Rauber, Andreas
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.59 MB
Your tags:
2020
2
Moving target defense in cloud computing: AÂ systematic mapping study
Torquato, Matheus
,
Vieira, Marco
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.01 MB
Your tags:
2020
3
Dynamic facial presentation attack detection for automated border control systems
Ortega, David
,
Fernández-Isabel, Alberto
,
MartÃn de Diego, Isaac
,
Conde, Cristina
,
Cabello, Enrique
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.09 MB
Your tags:
2020
4
Evaluating the strength of a multilingual passphrase policy
Maoneke, Pardon Blessings
,
Flowerday, Stephen
,
Isabirye, Naomi
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.13 MB
Your tags:
2020
5
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
Amer, Eslam
,
Zelinka, Ivan
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 1.86 MB
Your tags:
english, 2020
6
The Ransomware-as-a-Service economy within the darknet
Meland, Per HÃ¥kon
,
Bayoumy, Yara Fareed Fahmy
,
Sindre, Guttorm
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.25 MB
Your tags:
2020
7
Protocol Proxy: An FTE-based covert channel
Oakley, Jonathan
,
Yu, Lu
,
Zhong, Xingsi
,
Venayagamoorthy, Ganesh Kumar
,
Brooks, Richard
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.42 MB
Your tags:
2020
8
Expert system assessing threat level of attacks on a hybrid SSH honeynet
ZuzÄák, Matej
,
Zenka, Milan
Journal:
Computers & Security
Year:
2020
Language:
english
File:
PDF, 2.24 MB
Your tags:
english, 2020
9
A Pufferfish privacy mechanism for monitoring web browsing behavior under temporal correlations
Liang, Wenjuan
,
Chen, Hong
,
Liu, Ruixuan
,
Wu, Yuncheng
,
Li, Cuiping
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.74 MB
Your tags:
2020
10
Editorial Board
Journal:
Computers & Security
Year:
2020
File:
PDF, 55 KB
Your tags:
2020
11
GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot
Gill, Komal Singh
,
Saxena, Sharad
,
Sharma, Anju
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.03 MB
Your tags:
2020
12
Machine Learning Cyberattack and Defense Strategies
Bland, John A.
,
Petty, Mikel D.
,
Whitaker, Tymaine S.
,
Maxwell, Katia P.
,
Cantrell, Walter Alan
Journal:
Computers & Security
Year:
2020
File:
PDF, 4.83 MB
Your tags:
2020
13
A secure and scalable data integrity auditing scheme based on hyperledger fabric
Lu, Ning
,
Zhang, Yongxin
,
Shi, Wenbo
,
Kumari, Saru
,
Choo, Kim-Kwang Raymond
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.69 MB
Your tags:
2020
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×