default search action
Computers & Security, Volume 127
Volume 127, April 2023
- Martin Vondrácek, Ibrahim M. Baggili, Peter Casey, Mehdi Mekni:
Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. 102923 - Sridhar Manda, Charanjeet Singh:
CVFP: Energy and trust aware data routing protocol based on Competitive Verse Flower Pollination algorithm in IoT. 103035 - Chiara Braghin, Mario Lilli, Elvinia Riccobene:
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study. 103037 - Sabrina De Capitani di Vimercati, Sara Foresti, Sushil Jajodia, Giovanni Livraga, Stefano Paraboschi, Pierangela Samarati:
Distributed query execution under access restrictions. 103056 - Carlos E. Budde, Anni Karinsalo, Silvia Vidor, Jarno Salonen, Fabio Massacci:
Consolidating cybersecurity in Europe: A case study on job profiles assessment. 103082 - Steven Kemp:
Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. 103089 - Yunjiao Song, Xinrui Ge, Jia Yu:
Privacy-preserving reachability query over graphs with result verifiability. 103092 - Ignacio Samuel Crespo-Martínez, Adrián Campazas Vega, Ángel Manuel Guerrero-Higueras, Virginia Riego-Del Castillo, Claudia Álvarez-Aparicio, Camino Fernández Llamas:
SQL injection attack detection in network flow data. 103093 - Chaofan Tang, Lijuan Xu, Bo Yang, Yongwei Tang, Dawei Zhao:
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System. 103094 - Chenming Zheng, Jun Li, Xuanxia Yao:
Design and implementation of trusted boot based on a new trusted computing dual-architecture. 103095 - Pooja Kumari, Ankit Kumar Jain:
A comprehensive study of DDoS attacks over IoT network and their countermeasures. 103096 - Othmane Friha, Mohamed Amine Ferrag, Mohamed Benbouzid, Tarek Berghout, Burak Kantarci, Kim-Kwang Raymond Choo:
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. 103097 - Nhien Rust-Nguyen, Shruti Sharma, Mark Stamp:
Darknet traffic classification and adversarial attacks using machine learning. 103098 - Luuk Bekkers, Susanne van 't Hoff-De Goede, Ellen Misana-ter Huurne, Ynze van Houten, Remco Spithoven, Eric Rutger Leukfeldt:
Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. 103099 - Hongzhaoning Kang, Gang Liu, Quan Wang, Qi Zhang, Jiamin Niu, Nan Luo:
An improved minimal noise role mining algorithm based on role interpretability. 103100 - Ezekiel O. Soremekun, Sakshi Udeshi, Sudipta Chattopadhyay:
Towards Backdoor Attacks and Defense in Robust Machine Learning Models. 103101 - Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu, Yanli Chen, Ming Xu, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. 103102 - Dazhi Zhan, Yexin Duan, Yue Hu, Lujia Yin, Zhisong Pan, Shize Guo:
AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation. 103103 - Bojan Novkovic, Marin Golub:
Improving monolithic kernel security and robustness through intra-kernel sandboxing. 103104 - Kuldeep Singh, Palvi Aggarwal, Prashanth Rajivan, Cleotilde Gonzalez:
Cognitive elements of learning and discriminability in anti-phishing training. 103105 - Gustavo de Carvalho Bertoli, Lourenço Alves Pereira Júnior, Osamu Saotome, Aldri Luiz dos Santos:
Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. 103106 - Tommaso Zoppi, Andrea Ceccarelli, Tommaso Puccetti, Andrea Bondavalli:
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection. 103107 - Sam Maesschalck, Alexander Staves, Richard Derbyshire, Benjamin Green, David Hutchison:
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool. 103116 - Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. 103117 - Francesco Minna, Fabio Massacci:
SoK: Run-time security for cloud microservices. Are we there yet? 103119 - Mingming Hu, Kun Zhang, Ruibang You, Bibo Tu:
AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer. 103122 - Zhongshu Mao, Yiqin Lu, Zhe Cheng, Xiong Shen, Yang Zhang, Jiancheng Qin:
Boosting adversarial attacks with future momentum and future transformation. 103124 - Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren:
Characterization and Detection of Cross-Router Covert Channels. 103125
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.