researchr
explore
Tags
Journals
Conferences
Authors
Profiles
Groups
calendar
New Conferences
Events
Deadlines
search
search
You are not signed in
Sign in
Sign up
External Links
Journal: Computers & Security
Home
Index
Info
Issue
Volume
26
, Issue
2
99
--
0
E. Eugene Schultz
.
Windows Vista: Microsoft s brave new world
109
--
119
Nathan L. Clarke
,
Steven Furnell
.
Advanced user authentication for mobile devices
120
--
129
Konstantina Stoupa
,
Athena Vakali
.
Clustering subjects in a credential-based access control framework
130
--
136
Michael Gaiman
,
Rahul Simha
,
Bhagirath Narahari
.
Privacy-preserving programming using sython
137
--
144
Jianhua Yang
,
Shou-Hsuan Stephen Huang
.
Probabilistic analysis of an algorithm to compute TCP packet round-trip time for intrusion detection
145
--
153
Sangkyun Kim
,
Hong Joo Lee
.
A study on decision consolidation methods using analytic models for security systems
154
--
176
Oleksiy Mazhelis
,
Seppo Puuronen
.
A framework for behavior-based detection of user substitution in a mobile context
177
--
182
Ilan Oshri
,
Julia Kotlarsky
,
Corey Hirsch
.
Information security in networkable Windows-based operating system devices: Challenges and solutions
183
--
185
Christopher J. Novak
.
Investigative response: After the breach