default search action
Computers & Security, Volume 113
Volume 113, February 2022
- Yuncheng Shen, Bing Guo, Yan Shen, Xuliang Duan, Xiangqian Dong, Hong Zhang, Chuanwu Zhang, Yuming Jiang:
Personal big data pricing method based on differential privacy. 102529 - Chengbin Jin, Yongbin Zhou, Xinkuan Qiu, Qi Feng, Qian Zhang:
Breaking real-world COTS USIM cards with unknown side-channel countermeasures. 102531 - Dillon Cheong Lien Sung, M. R. Gauthama Raman, Aditya P. Mathur:
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants. 102532 - Rick van der Kleij, Jan Maarten Schraagen, Beatrice Cadet, Heather Young:
Developing decision support for cybersecurity threat and incident managers. 102535 - Lincy Elizebeth Jim, Nahina Islam, Mark A. Gregory:
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes. 102538 - Christian Rathgeb, Johannes Merkle, Johanna Scholz, Benjamin Tams, Vanessa Nesterowicz:
Deep face fuzzy vault: Implementation and performance. 102539 - Yingxu Lai, Liyao Tong, Jing Liu, Yipeng Wang, Tong Tang, Zijian Zhao, Hua Qin:
Identifying malicious nodes in wireless sensor networks based on correlation detection. 102540 - Cong Pu, Kim-Kwang Raymond Choo:
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function. 102541 - Zihao Wang, Fok Kar Wai, Vrizlynn L. L. Thing:
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. 102542 - Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le:
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning. 102543 - Manika Garg, Anita Goel:
A systematic literature review on online assessment security: Current challenges and integrity strategies. 102544 - Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. 102545 - Vincent Omollo Nyangaresi, Anthony Joachim Rodrigues:
Efficient handover protocol for 5G and beyond networks. 102546 - Islam Obaidat, Meera Sridhar, Khue M. Pham, Phu H. Phung:
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning. 102547 - Sidharth Quamara, Awadhesh Kumar Singh:
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives. 102548 - Tong Anh Tuan, Hoang Viet Long, David Taniar:
On Detecting and Classifying DGA Botnets and their Families. 102549 - Nicola Galloro, Mario Polino, Michele Carminati, Andrea Continella, Stefano Zanero:
A Systematical and longitudinal study of evasive behaviors in windows malware. 102550 - Nabin Chowdhury, Sokratis K. Katsikas, Vasileios Gkioulos:
Modeling effective cybersecurity training frameworks: A delphi method-based study. 102551 - Jincheng Wang, Zhuohua Li, John C. S. Lui, Mingshen Sun:
Topology-theoretic approach to address attribute linkage attacks in differential privacy. 102552 - Tengfei Zheng, Yuchuan Luo, Tongqing Zhou, Zhiping Cai:
Towards differential access control and privacy-preserving for secure media data sharing in the cloud. 102553 - Qiuhua Wang, Hui Yang, Guohua Wu, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren:
Black-box adversarial attacks on XSS attack detection model. 102554 - Mengran Yu, Shiliang Sun:
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks. 102555 - Yueqiang Cheng, Zhi Zhang, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei, Surya Nepal, Yang Xiang:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. 102556 - Hind Alobaidi, Nathan L. Clarke, Fudong Li, Abdulrahman Alruban:
Real-world smartphone-based gait recognition. 102557 - Zongyang Zhang, Jiayuan Yin, Bin Hu, Ting Gao, Weihan Li, Qianhong Wu, Jianwei Liu:
CLTracer: A Cross-Ledger Tracing framework based on address relationships. 102558 - Ruizhong Du, Lin Zhen:
Multiuser physical layer security mechanism in the wireless communication system of the IIOT. 102559 - Ebu Yusuf Güven, Ali Boyaci, Muhammed Ali Aydin:
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data. 102560 - Steven Furnell, Kirsi Helkala, Naomi Woods:
Accessible authentication: Assessing the applicability for users with disabilities. 102561 - Yan Chen, Weidong Xia, Karlene Cousins:
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. 102568 - Yeseul Choi, Yunjong Jeong, DaeHee Jang, Brent ByungHoon Kang, Hojoon Lee:
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM. 102569 - Yaqun Liu, Chang-you Xing, Guomin Zhang, Lihua Song, Hongxiu Lin:
AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference. 102570 - Bo Wang, Yue Wang, Jiayao Hou, Yi Li, Yanqing Guo:
Open-Set source camera identification based on envelope of data clustering optimization (EDCO). 102571 - Chenguang Wang, Tianqing Zhu, Ping Xiong, Wei Ren, Kim-Kwang Raymond Choo:
A privacy preservation method for multiple-source unstructured data in online social networks. 102574 - Andrea Tundis, Samuel Ruppert, Max Mühlhäuser:
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources. 102576
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.