books search
books
articles search
articles
Donate
Log In
Log In
to access more features
personal recommendations
Telegram Bot
download history
send to Email or Kindle
manage booklists
save to favorites
Explore
Journals
Contribution
Donate
Litera Library
Donate paper books
Add paper books
Open LITERA Point
Volume 97
Main
Computers & Security
Volume 97
Computers & Security
Volume 97
1
Security-Driven hybrid collaborative recommendation method for cloud-based iot services
Meng, Shunmei
,
Gao, Zijian
,
Li, Qianmu
,
Wang, Hao
,
Dai, Hong-Ning
,
Qi, Lianyong
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.03 MB
Your tags:
2020
2
Efficient determination of equivalence for encrypted data
Doctor, Jason N.
,
Vaidya, Jaideep
,
Jiang, Xiaoqian
,
Wang, Shuang
,
Schilling, Lisa M.
,
Ong, Toan
,
Matheny, Michael E.
,
Ohno-Machado, Lucila
,
Meeker, Daniella
Journal:
Computers & Security
Year:
2020
File:
PDF, 424 KB
Your tags:
2020
3
A semi-automated forensic investigation model for online social networks
Arshad, Humaira
,
Omlara, Esther
,
Abiodun, Isaac Oludare
,
Aminu, Abdulhai
Journal:
Computers & Security
Year:
2020
File:
PDF, 799 KB
Your tags:
2020
4
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
Chowdhury, Noman H.
,
Adam, Marc T.P.
,
Teubner, Timm
Journal:
Computers & Security
Year:
2020
File:
PDF, 1022 KB
Your tags:
2020
5
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations
van der Kleij, Rick
,
Wijn, Remco
,
Hof, Tineke
Journal:
Computers & Security
Year:
2020
File:
PDF, 670 KB
Your tags:
2020
6
A distributed sensing data anomaly detection scheme
Yin, Chunyong
,
Li, Bo
,
Yin, Zhichao
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.88 MB
Your tags:
2020
7
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools
Paruchuri, Shravya
,
Case, Andrew
,
Richard, Golden G.
Journal:
Computers & Security
Year:
2020
File:
PDF, 733 KB
Your tags:
2020
8
Aggregation-based location privacy: An information theoretic approach
Zhang, Wenjing
,
Jiang, Bo
,
Li, Ming
,
Tandon, Ravi
,
Liu, Qiao
,
Li, Hui
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.14 MB
Your tags:
2020
9
Iris template protection using double bloom filter based feature transformation
S, Ajish
,
AnilKumar, K S
Journal:
Computers & Security
Year:
2020
File:
PDF, 4.41 MB
Your tags:
2020
10
Dynamic countermeasures selection for multi-path attacks
Li, Fenghua
,
Li, Yongjun
,
Leng, Siyuan
,
Guo, Yunchuan
,
Geng, Kui
,
Wang, Zhen
,
Fang, Liang
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.63 MB
Your tags:
2020
11
Exploring HTTPS security inconsistencies: A cross-regional perspective
Alashwali, Eman Salem
,
Szalachowski, Pawel
,
Martin, Andrew
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.93 MB
Your tags:
2020
12
A nonproprietary language for the command and control of cyber defenses â OpenC2
Mavroeidis, Vasileios
,
Brule, Joe
Journal:
Computers & Security
Year:
2020
File:
PDF, 1.81 MB
Your tags:
2020
13
Editorial Board
Journal:
Computers & Security
Year:
2020
File:
PDF, 31 KB
Your tags:
2020
14
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing
Sun, Qizhang
,
Willemsen, Martijn C.
,
Knijnenburg, Bart P.
Journal:
Computers & Security
Year:
2020
File:
PDF, 2.58 MB
Your tags:
2020
15
Mitigation measures of collusive interest flooding attacks in named data networking
Wu, Zhijun
,
Feng, Wenzhi
,
Yue, Meng
,
Xu, Xinran
,
Liu, Liang
Journal:
Computers & Security
Year:
2020
File:
PDF, 4.94 MB
Your tags:
2020
16
Shall we follow? Impact of reputation concern on information security managersâ investment decisions
Shao, Xiuyan
,
Siponen, Mikko
,
Liu, Fufan
Journal:
Computers & Security
Year:
2020
File:
PDF, 668 KB
Your tags:
2020
1
Follow
this link
or find "@BotFather" bot on Telegram
2
Send /newbot command
3
Specify a name for your chatbot
4
Choose a username for the bot
5
Copy an entire last message from BotFather and paste it here
×
×