Computers and Security

Research outputs

  1. 2020
  2. Published

    Game theoretical study on client-controlled cloud data deduplication

    Liang, X., Yan, Z. & Deng, R. H., 1 Apr 2020, In : Computers and Security. 91, 101730.

    Research output: Contribution to journalArticle

  3. 2018
  4. Published

    Peek-a-boo: Inferring program behaviors in a virtualized infrastructure without introspection

    Hong, S., Nicolae, A., Srivastava, A. & Dumitraş, T., 1 Nov 2018, In : Computers and Security. 79, p. 190-207 18 p.

    Research output: Contribution to journalArticle

  5. Published

    Automated analysis of freeware installers promoted by download portals

    Geniola, A., Antikainen, M. & Aura, T., 1 Aug 2018, In : Computers and Security. 77, p. 209-225 17 p.

    Research output: Contribution to journalReview Article

  6. Published

    AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo

    Wei, Z., Wu, Y., Yang, Y., Yan, Z., Pei, Q., Xie, Y. & Weng, J., 1 Jul 2018, In : Computers and Security. 76, p. 341-353 13 p.

    Research output: Contribution to journalArticle

  7. 2017
  8. Published

    A pragmatic android malware detection procedure

    Palumbo, P., Sayfullina, L., Komashinskiy, D., Eirola, E. & Karhunen, J., 1 Sep 2017, In : Computers and Security. 70, p. 689-701 13 p.

    Research output: Contribution to journalArticle

  9. Published

    A secure SDN based multi-RANs architecture for future 5G networks

    Fu, Y., Yan, Z., Li, H., Xin, X. L. & Cao, J., 1 Sep 2017, In : Computers and Security. 70, p. 648-662 15 p.

    Research output: Contribution to journalArticle

  10. 2014
  11. Published

    Special issue on trust in cyber, physical and social computing

    Yan, Z., Wang, G., Niemi, V. & Deng, R. H., Nov 2014, In : Computers and Security. 47, p. 1-2 2 p.

    Research output: Contribution to journalEditorial

  12. Published

    Trust in Cyber, Physical and Social Computing: Special issue

    Yan, Z., Wang, G., Niemi, V. & Deng, R. H., Nov 2014, In : Computers and Security. 47, 94 p.

    Research output: Contribution to journalSpecial issue

  13. Published
  14. Published

    Survey of certificate usage in distributed access control

    Kortesniemi, Y. & Särelä, M., 2014, In : Computers and Security. 44, p. 16-32

    Research output: Contribution to journalArticle

ID: 211890