1. Can perceptual differences account for enigmatic information security behaviour in an organisation?. Issue 61 (August 2016) Authors: Kearney, W.D.; Kruger, H.A. Journal: Computers & security Issue: Issue 61(2016) Page Start: 46 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
2. The future of information security incident management training: A case study of electrical power companies. Issue 61 (August 2016) Authors: Bartnes, Maria; Moe, Nils Brede; Heegaard, Poul E. Journal: Computers & security Issue: Issue 61(2016) Page Start: 32 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
3. NIC displays to thwart malware attacks mounted from within the OS. Issue 61 (August 2016) Authors: Rrushi, Julian L. Journal: Computers & security Issue: Issue 61(2016) Page Start: 59 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
4. Cyber resilience recovery model to combat zero-day malware attacks. Issue 61 (August 2016) Authors: Tran, Hiep; Campos-Nanez, Enrique; Fomin, Pavel; Wasek, James Journal: Computers & security Issue: Issue 61(2016) Page Start: 19 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
5. An HMM and structural entropy based detector for Android malware: An empirical study. Issue 61 (August 2016) Authors: Canfora, Gerardo; Mercaldo, Francesco; Visaggio, Corrado Aaron Journal: Computers & security Issue: Issue 61(2016) Page Start: 1 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
6. Íntegro: Leveraging victim prediction for robust fake account detection in large scale OSNs. Issue 61 (August 2016) Authors: Boshmaf, Yazan; Logothetis, Dionysios; Siganos, Georgos; Lería, Jorge; Lorenzo, Jose; Ripeanu, Matei; Beznosov, Konstantin; Halawa, Hassan Journal: Computers & security Issue: Issue 61(2016) Page Start: 142 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
7. IFC - Editorial Board. Issue 61 (August 2016) Journal: Computers & security Issue: Issue 61(2016) Page Start: CO2 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
8. Control flow obfuscation for Android applications. Issue 61 (August 2016) Authors: Balachandran, Vivek; Sufatrio, ; Tan, Darell J.J.; Thing, Vrizlynn L.L. Journal: Computers & security Issue: Issue 61(2016) Page Start: 72 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
9. A survey of security solutions for distributed publish/subscribe systems. Issue 61 (August 2016) Authors: Uzunov, Anton V. Journal: Computers & security Issue: Issue 61(2016) Page Start: 94 Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗
10. Contents. Issue 61 (August 2016) Journal: Computers & security Issue: Issue 61(2016) Page Start: iii Record Type: Journal Article View Content: Available online (eLD content is only available in our Reading Rooms) ↗