首页 文献索引 SCI期刊 AI助手
期刊目录筛选

期刊名:Computers & security

缩写:COMPUT SECUR

ISSN:0167-4048

e-ISSN:1872-6208

IF/分区:5.4/Q1

文章目录 更多期刊信息

共收录本刊相关文章索引15
Clinical Trial Case Reports Meta-Analysis RCT Review Systematic Review
Classical Article Case Reports Clinical Study Clinical Trial Clinical Trial Protocol Comment Comparative Study Editorial Guideline Letter Meta-Analysis Multicenter Study Observational Study Randomized Controlled Trial Review Systematic Review
Gaurav Madkaikar,Karthikeya S M Yelisetty,Shamik Sural et al. Gaurav Madkaikar et al.
A policy comprised of a set of rules forms the backbone of Attribute-based Access Control (ABAC) systems. Every incoming request is checked against such a policy and if at least one rule grants the access, it is allowed. Else, access is den...
David Harborth,Sebastian Pape David Harborth
The SARS-CoV-2 pandemic is a pressing societal issue today. The German government promotes a contract tracing app named Corona-Warn-App (CWA), aiming to change citizens' health behaviors during the pandemic by raising awareness about potent...
Randi Jiang,Jianru Zhang Randi Jiang
As businesses have had to change how they operate due to the coronavirus pandemic, the need for remote work has risen. With the continuous advancements in technology and increases in typical job demands, employees need to increase their wor...
Raphael Hoheisel,Guido van Capelleveen,Dipti K Sarmah et al. Raphael Hoheisel et al.
To design preventive policy measures for email phishing, it is helpful to be aware of the phishing schemes and trends that are currently applied. How phishing schemes and patterns emerge and adapt is an ongoing field of study. Existing phis...
Harjinder Singh Lallie,Lynsay A Shepherd,Jason R C Nurse et al. Harjinder Singh Lallie et al.
The COVID-19 pandemic was a remarkable, unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. As...
Pietro Colombo,Elena Ferrari,Engin Deniz Tümer Pietro Colombo
Recent emergencies, such as the COVID-19 pandemic have shown how timely information sharing is essential to promptly and effectively react to emergencies. Internet of Things has magnified the possibility of acquiring information from differ...
Rajesh Kumar,Siddharth Sharma,Chirag Vachhani et al. Rajesh Kumar et al.
This paper examines the transition in the cyber-security discipline induced by the ongoing COVID-19 pandemic. Using the classical information retrieval techniques, a more than twenty thousand documents are analyzed for the cyber content. In...
Filipo Sharevski,Raniem Alsaadi,Peter Jachim et al. Filipo Sharevski et al.
Twitter, prompted by the rapid spread of alternative narratives, started actively warning users about the spread of COVID-19 misinformation. This form of soft moderation comes in two forms: as an interstitial cover before the Tweet is displ...
Craig Beaman,Ashley Barkworth,Toluwalope David Akande et al. Craig Beaman et al.
The COVID-19 pandemic has witnessed a huge surge in the number of ransomware attacks. Different institutions such as healthcare, financial, and government have been targeted. There can be numerous reasons for such a sudden rise in attacks, ...
Jason N Doctor,Jaideep Vaidya,Xiaoqian Jiang et al. Jason N Doctor et al.
Secure computation of equivalence has fundamental application in many different areas, including health-care. We study this problem in the context of matching an individual's identity to link medical records across systems under the sociali...