default search action
Computers & Security, Volume 89
Volume 89, February 2020
- Linan Huang, Quanyan Zhu:
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. - Peng Luo, Deqing Zou, Yajuan Du, Hai Jin, Changming Liu, Jinan Shen:
Static detection of real-world buffer overflow induced by loop. - Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu:
Security of vehicular ad-hoc networks: A comprehensive survey. - Jiali Wang, Martin Neil, Norman E. Fenton:
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. - Ehsan Mahdavi, Ali Fanian, Fatima Amini:
A real-time alert correlation method based on code-books for intrusion detection systems. - Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. - François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar, Houda Jmila:
Solving security constraints for 5G slice embedding: A proof-of-concept. - Humaira Arshad, Aman Jantan, Gan Keng Hoon, Oludare Isaac Abiodun:
Formal knowledge model for online social network forensics. - Vitor Hugo Galhardo Moia, Frank Breitinger, Marco Aurélio Amaral Henriques:
The impact of excluding common blocks for approximate matching. - Deval Bhamare, Maede Zolanvari, Aiman Erbad, Raj Jain, Khaled M. Khan, Nader Meskin:
Cybersecurity for industrial control systems: A survey. - Ye Wang, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang:
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks. - Jianwu Zhang, Yu Ling, Xingbing Fu, Xiongkun Yang, Gang Xiong, Rui Zhang:
Model of the intrusion detection system based on the integration of spatial-temporal features. - Darshana Upadhyay, Srinivas Sampalli:
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. - Stefan Rass, Quanyan Zhu:
Computer & security special issue editorial. - Amir Namavar Jahromi, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. - Omer Shwartz, Amir Cohen, Asaf Shabtai, Yossi Oren:
Inner conflict: How smart device components can cause harm. - Joel Höglund, Samuel Lindemer, Martin Furuhed, Shahid Raza:
PKI4IoT: Towards public key infrastructure for the Internet of Things. - Mohsen Ali Alawami, Hyoungshick Kim:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. - Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. - Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad:
Deanonymizing Tor hidden service users through Bitcoin transactions analysis. - Xinbo Liu, Yaping Lin, He Li, Jiliang Zhang:
A novel method for malware detection on ML-based visualization technique.
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.