default search action
Computers & Security, Volume 124
Volume 124, January 2023
- Robert J. Joyce, Dev Amlani, Charles Nicholas, Edward Raff:
MOTIF: A Malware Reference Dataset with Ground Truth Family Labels. 102921 - Katie Watson, Mike Just, Tessa Berg:
A comic-based approach to permission request communication. 102942 - Hyun Kwon, Sanghyun Lee:
Erratum to 'Ensemble transfer attack targeting text classification systems' [Computers & Security 117 (2022) 1-8/ 102695]. 102944 - Maialen Eceiza, Jose Luis Flores, Mikel Iturbe:
Improving fuzzing assessment methods through the analysis of metrics and experimental conditions. 102946 - Katarzyna Filus, Joanna Domanska:
Software vulnerabilities in TensorFlow-based deep learning applications. 102948 - Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Henry Ochieng' Dola, Tarmo Korõtko, Kieran McLaughlin, Vahur Kotkas:
Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System. 102950 - Blessing Odeleye, George Loukas, Ryan Heartfield, Georgia Sakellari, Emmanouil Panaousis, Fotios Spyridonis:
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments. 102951 - Anum Khurshid, Shahid Raza:
AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance. 102952 - Xueping Liang, Charalambos Konstantinou, Sachin Shetty, Eranga Bandara, Ruimin Sun:
Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective. 102953 - Ignacio Fernandez De Arroyabe, Carlos F. A. Arranz, Marta F. Arroyabe, Juan Carlos Fernandez de Arroyabe:
Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019. 102954 - Ooi Sian En, Razvan Beuran, Takayuki Kuroda, Takuya Kuwahara, Ryosuke Hotchi, Norihito Fujita, Yasuo Tan:
Intent-Driven Secure System Design: Methodology and Implementation. 102955 - Hang Wang, David J. Miller, George Kesidis:
Anomaly detection of adversarial examples using class-conditional generative adversarial networks. 102956 - Abdullah Alzaqebah, Ibrahim Aljarah, Omar Sultan Al-Kadi:
A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization. 102957 - Jafar Haadi Jafarian, Amirreza Niakanlahiji:
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization. 102958 - Enoch Agyepong, Yulia Cherdantseva, Philipp Reinecke, Pete Burnap:
A systematic method for measuring the performance of a cyber security operations centre analyst. 102959 - Obi Ogbanufe, Robert E. Crossler, David Biros:
The valued coexistence of protection motivation and stewardship in information security behaviors. 102960 - Leilei Qu, Ruojin Xiao, Wenchang Shi:
Interactions of Framing and Timing in Nudging Online Game Security. 102962 - Yuying Li, Rogemar S. Mamon:
Modelling health-data breaches with application to cyber insurance. 102963 - Ahmet Selman Bozkir, Firat Coskun Dalgic, Murat Aydos:
GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings. 102964 - Lin Yao, Jia Li, Jing Deng, Guowei Wu:
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network. 102965 - Qian Chen, Zilong Wang, Wenjing Zhang, Xiaodong Lin:
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks. 102966 - Nan Fu, Weiwei Ni, Sen Zhang, Lihe Hou, Dongyue Zhang:
GC-NLDP: A graph clustering algorithm with local differential privacy. 102967 - Faheem Ahmed Shaikh, Mikko T. Siponen:
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity. 102974 - Bishwajeet K. Pandey, M. R. M. VeeraManickam, Shabeer Ahmad, Ciro Rodriguez Rodriguez, Doris Esenarro Vargas:
ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework. 102975 - Jinwoo Kim, Yeonkeun Kim, Vinod Yegneswaran, Phillip A. Porras, Seungwon Shin, Taejune Park:
Extended data plane architecture for in-network security services in software-defined networks. 102976 - May Bashendy, Ashraf Tantawy, Abdelkarim Erradi:
Intrusion response systems for cyber-physical systems: A comprehensive survey. 102984 - Mohammed Mubarkoot, Jörn Altmann, Morteza Rasti Barzoki, Bernhard Egger, Hyejin Lee:
Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review. 102985 - Christopher Bellman, Paul C. van Oorschot:
Systematic analysis and comparison of security advice as datasets. 102989 - Tianle Hu, Chonghai Xu, Shenwen Zhang, Shuangshuang Tao, Luqun Li:
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism. 102990 - Akshay Aggarwal, Ram Kumar Dhurkari:
Association between stress and information security policy non-compliance behavior: A meta-analysis. 102991 - Yunfan Huang, Maode Ma:
ILL-IDS: An incremental lifetime learning IDS for VANETs. 102992 - Shiwei Lu, Ruihu Li, Wenbin Liu, Chaofeng Guan, Xiaopeng Yang:
Top-k sparsification with secure aggregation for privacy-preserving federated learning. 102993 - Aljoscha Dietrich, Kurunandan Jain, Georg Gutjahr, Bianca Steffes, Christoph Sorge:
I recognize you by your steps: Privacy impact of pedometer data. 102994 - Ruipeng Wang, Kaixiang Chen, Zulie Pan, Yuwei Li, Qianyu Li, Yang Li, Min Zhang, Chao Zhang:
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration. 102995 - Borja Molina-Coronado, Usue Mori, Alexander Mendiburu, José Miguel-Alonso:
Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning. 102996 - Jesús Esteban Díaz Verdejo, Rafael Estepa, Antonio Jose Estepa Alonso, Germán Madinabeitia:
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges. 102997 - Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757. 102998 - Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj:
When a RF beats a CNN and GRU, together - A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification. 103000 - Amirreza Niakanlahiji, Soeren Orlowski, Alireza Vahid, Jafar Haadi Jafarian:
Toward practical defense against traffic analysis attacks on encrypted DNS traffic. 103001 - Miao Tian, Yushu Zhang, Youwen Zhu, Liangmin Wang, Yong Xiang:
DIVRS: Data integrity verification based on ring signature in cloud storage. 103002 - Lifeng Hu, Fan Zhang, Ziyuan Liang, Ruyi Ding, Xingyu Cai, Zonghui Wang, Wenguang Jin:
FaultMorse: An automated controlled-channel attack via longest recurring sequence. 103003 - Haibin Zheng, Xiaohao Li, Jinyin Chen, Jianfeng Dong, Yan Zhang, Changting Lin:
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning. 103005 - Yisroel Mirsky, Ambra Demontis, Jaidip Kotak, Ram Shankar, Gelei Deng, Liu Yang, Xiangyu Zhang, Maura Pintor, Wenke Lee, Yuval Elovici, Battista Biggio:
The Threat of Offensive AI to Organizations. 103006 - Abubakar Sadiq Mohammed, Eirini Anthi, Omer F. Rana, Neetesh Saxena, Pete Burnap:
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication. 103007 - Xueli Zhao, Zhihua Xia:
Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification. 103011 - El Arbi Abdellaoui Alaoui, Stéphane Cédric Koumétio Tékouabou, Yassine Maleh, Anand Nayyar:
Corrigendum to "Towards to intelligent routing for DTN protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 (2022) 102475]. 103012 - David Nevado Catalán, Sergio Pastrana, Narseo Vallina-Rodriguez, Juan Tapiador:
An analysis of fake social media engagement services. 103013 - Zhonglin Liu, Yong Fang, Cheng Huang, Yijia Xu:
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model. 103015 - Yinghua Han, Hantong Feng, Keke Li, Qiang Zhao:
False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids. 103016
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.