Result Number | Material Type | Add to My Shelf Action | Record Details and Options |
---|---|---|---|
1 |
Material Type: Artigo
|
Predicting phishing websites based on self-structuring neural networkMohammad, Rami M. ; Thabtah, Fadi ; McCluskey, LeeNeural computing & applications, 2014-08, Vol.25 (2), p.443-458 [Periódico revisado por pares]London: Springer LondonTexto completo disponível |
|
2 |
Material Type: Artigo
|
User preference of cyber security awareness delivery methodsAbawajy, JemalBehaviour & information technology, 2014-03, Vol.33 (3), p.237-248 [Periódico revisado por pares]Colchester: Taylor & FrancisTexto completo disponível |
|
3 |
Material Type: Artigo
|
Active authentication for mobile devices utilising behaviour profilingLi, Fudong ; Clarke, Nathan ; Papadaki, Maria ; Dowland, PaulInternational journal of information security, 2014-06, Vol.13 (3), p.229-244 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
4 |
Material Type: Artigo
|
Aggregating vulnerability metrics in enterprise networks using attack graphsHOMER, John ; SU ZHANG ; XINMING OU ; SCHMIDT, David ; YANHUI DU ; RAJ RAJAGOPALAN, S ; SINGHAL, AnoopJournal of computer security, 2013-01, Vol.21 (4), p.561-597 [Periódico revisado por pares]Amsterdam: IOS PressTexto completo disponível |
|
5 |
Material Type: Artigo
|
A conceptual model of security contextJovanovikj, Vladimir ; Gabrijelčič, Dušan ; Klobučar, TomažInternational journal of information security, 2014-11, Vol.13 (6), p.571-581 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
6 |
Material Type: Artigo
|
Analysis of a two-factor graphical password schemeCatuogno, Luigi ; Galdi, ClementeInternational journal of information security, 2014-10, Vol.13 (5), p.421-437 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
7 |
Material Type: Artigo
|
Delay-sensitive approaches for anonymizing numerical streaming dataZakerzadeh, Hessam ; Osborn, Sylvia L.International journal of information security, 2013-10, Vol.12 (5), p.423-437 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
8 |
Material Type: Artigo
|
A formalization of card-based cryptographic protocols via abstract machineMizuki, Takaaki ; Shizuya, HirokiInternational journal of information security, 2014-02, Vol.13 (1), p.15-23 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
9 |
Material Type: Artigo
|
RORI-based countermeasure selection using the OrBAC formalismGonzalez Granadillo, Gustavo ; Belhaouane, Malek ; Debar, Hervé ; Jacob, GrégoireInternational journal of information security, 2014-02, Vol.13 (1), p.63-79 [Periódico revisado por pares]Berlin/Heidelberg: Springer Berlin HeidelbergTexto completo disponível |
|
10 |
Material Type: Artigo
|
Attacking and fixing Helios: An analysis of ballot secrecyCORTIER, Véronique ; SMYTH, BenJournal of computer security, 2013-01, Vol.21 (1), p.89-148 [Periódico revisado por pares]Amsterdam: IOS PressTexto completo disponível |