Journal of Computer Security

Title Publication Date Language Citations
The economic cost of publicly announced information security breaches: empirical evidence from the stock market*2003/07/0134
Securing vehicular ad hoc networks2007/01/0125
Searchable symmetric encryption: Improved definitions and efficient constructions2011/11/0423
The impact of information security breaches: Has there been a downward shift in costs?2011/02/1411
Intrusion detection using sequences of system calls1998/07/0111
Automatic analysis of malware behavior using machine learning2011/06/208
Practical automated detection of stealthy portscans2002/01/016
Distributed credential chain discovery in trust management*2003/01/015
Secure attribute-based systems2010/08/164
New filtering approaches for phishing email2010/01/014
Toward cost-sensitive modeling for intrusion detection and response2002/01/014
Certificate chain discovery in SPKI/SDSI2001/10/013
Secure set intersection cardinality with application to association rule mining2005/10/043
Reducing Timing Channels with Fuzzy Time1992/10/012
Security of trusted repeater quantum key distribution networks2010/01/012
Practical eavesdropping and skimming attacks on high-frequency RFID tokens2011/03/142
Strand spaces: proving security protocols correct1999/04/012
Automatic verification of correspondences for security protocols*2009/07/022
Constructions of certificate-based signature secure against key replacement attacks*2010/06/012
CookiExt: Patching the browser against session hijacking attacks2015/09/162
Software watermarking in the frequency domain: Implementation, analysis, and attacks2005/12/062
Preserving user query privacy in cloud-based security services2014/12/161
WebCallerID: Leveraging cellular networks for Web authentication2011/11/041
STATL: An attack language for state-based intrusion detection2002/01/011
GKMPAN: An Efficient Group Rekeying Scheme for Secure Multicast in Ad-Hoc Networks*2006/10/201
Neural network Trojan2013/03/011
P 5 : A protocol for scalable anonymous communication2005/12/221
Exploiting open functionality in SMS-capable cellular networks2008/11/031
Towards Operational Measures of Computer Security1993/04/011
Process algebra and non-interference2001/01/011