default search action
Computers & Security, Volume 132
Volume 132, September 2023
- Nathan Fisk, Nicholas M. Kelly, Lorie M. Liebrock:
Cybersecurity communities of practice: Strategies for creating gateways to participation. 103188 - Christin Alex, Giselle Creado, Wesam Almobaideen, Orieb Abu Alghanam, Maha Saadeh:
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms. 103283 - Ramyapandian Vijayakanthan, Irfan Ahmed, Aisha I. Ali-Gombe:
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices. 103298 - Gabriel K. Gegenhuber, Markus Maier, Florian Holzbauer, Wilfried Mayer, Georg Merzdovnik, Edgar R. Weippl, Johanna Ullrich:
An extended view on measuring tor AS-level adversaries. 103302 - Clare M. Patterson, Jason R. C. Nurse, Virginia N. L. Franqueira:
Learning from cyber security incidents: A systematic review and future research agenda. 103309 - Jia-Cheng Huang, Guo-Qiang Zeng, Guang-Gang Geng, Jian Weng, Kang-Di Lu, Yu Zhang:
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems. 103310 - Lorenzo Binosi, Mario Polino, Michele Carminati, Stefano Zanero:
BINO: Automatic recognition of inline binary functions from template classes. 103312 - PLS Jayalaxmi, Rahul Saha, Gulshan Kumar, Mamoun Alazab, Mauro Conti, Xiaochun Cheng:
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things. 103315 - Justin Scott Giboney, Bonnie Brinton Anderson, Geoffrey A. Wright, Shayna Oh, Quincy Taylor, Megan Warren, Kylie Johnson:
Barriers to a cybersecurity career: Analysis across career stage and gender. 103316 - Fernando J. Rendón-Segador, Juan Antonio Álvarez-García, Ángel Jesús Varela-Vaca:
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism. 103318 - Yanli Li, Dong Yuan, Abubakar Sadiq Sani, Wei Bao:
Enhancing federated learning robustness in adversarial environment through clustering Non-IID features. 103319 - Neena Susan Shaji, Tanushree Jain, Raja Muthalagu, Pranav Mothabhau Pawar:
Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks. 103320 - Cataldo Basile, Bjorn De Sutter, Daniele Canavese, Leonardo Regano, Bart Coppens:
Design, implementation, and automation of a risk management approach for man-at-the-End software protection. 103321 - Xuekai Sun, Chunling Liu, Weiyu Dong, Tieming Liu:
Improvements to code2vec: Generating path vectors using RNN. 103322 - Liting Deng, Hui Wen, Mingfeng Xin, Hong Li, Zhiwen Pan, Limin Sun:
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks. 103323 - Marta Beltrán, Miguel Calvo:
A privacy threat model for identity verification based on facial recognition. 103324 - Maryam Rostamipoor, Seyedhamed Ghavamnia, Michalis Polychronakis:
Confine: Fine-grained system call filtering for container attack surface reduction. 103325 - Karen Renaud, Marc J. Dupuis:
Cybersecurity Insights Gleaned from World Religions. 103326 - Syed Rizvi, Tatiana Zwerling, Benjamin Thompson, Shawn Faiola, Shakir Campbell, Stephen Fisanick, Codi Hutnick:
A modular framework for auditing IoT devices and networks. 103327 - Stefan Rass, Sandra König, Jasmin Wachter, Víctor Mayoral Vilches, Emmanouil Panaousis:
Game-theoretic APT defense: An experimental study on robotics. 103328 - P. V. Sai Charan, Gowtham Ratnakaram, Hrushikesh Chunduri, P. Mohan Anand, Sandeep Kumar Shukla:
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence. 103329 - Jie Li, Tianqing Zhu, Wei Ren, Kim-Kwang Raymond Choo:
Improve individual fairness in federated learning via adversarial training. 103336 - David Harborth, Sebastian Pape:
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study. 103338 - Sai Bala Subrahmanyam Singam, Goutham Pooloth, Vasanth Kumar Reddy Ambati, C. V. Bijitha, Hiran V. Nath:
A hybrid method for analysis and detection of malicious executables in IoT network. 103339 - Hudan Studiawan, George Grispos, Kim-Kwang Raymond Choo:
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed. 103340 - Wenxin Tao, Xiaohong Su, Jiayuan Wan, Hongwei Wei, Weining Zheng:
Vulnerability detection through cross-modal feature enhancement and fusion. 103341 - Ricardo Moura, Ricardo Lopes, David R. Matos, Miguel L. Pardal, Miguel Correia:
MultiTLS: using multiple and diverse ciphers for stronger secure channels. 103342 - Matteo Repetto:
Adaptive monitoring, detection, and response for agile digital service chains. 103343 - Guangyi Yang, Xiaoxing Liu, Beixin Li:
Anti-money laundering supervision by intelligent algorithm. 103344 - Yufeng Li, Fengyu Yang, Qi Liu, Jiangtao Li, Chenhong Cao:
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light. 103345 - Shefali Goel, Abhishek Verma, Vinod Kumar Jain:
CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks. 103346 - Shalaka S. Mahadik, Pranav M. Pawar, Raja Muthalagu:
Edge-HetIoT defense against DDoS attack using learning techniques. 103347 - Martín Barrère, Chris Hankin, Dean O'Reilly:
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems. 103348 - Kenan Begovic, Abdulaziz Al-Ali, Qutaibah M. Malluhi:
Cryptographic ransomware encryption detection: Survey. 103349 - Badis Racherache, Paria Shirani, Andrei Soeanu, Mourad Debbabi:
CPID: Insider threat detection using profiling and cyber-persona identification. 103350 - Nouhad Sanoussi, Kaouthar Chetioui, Ghizlane Orhanou, Said El Hajji:
ITC: Intrusion tolerant controller for multicontroller SDN architecture. 103351 - Scott Ainslie, Dean Thompson, Sean B. Maynard, Atif Ahmad:
Cyber-threat intelligence for security decision-making: A review and research agenda for practice. 103352 - Antonio Robles-González, Patricia Arias Cabarcos, Javier Parra-Arnau:
Privacy-centered authentication: A new framework and analysis. 103353 - Xiaoyun Zhao, Chao Yang, Zhizhuang Jia, Yue Wang, Jianfeng Ma:
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily. 103354 - Michele Ianni, Elio Masciari:
SCOUT: Security by computing OUTliers on activity logs. 103355 - Iyyakutti Iyappan Ganapathi, Syed Sadaf Ali, Uttam Sharma, Pradeep Tomar, Muhammad Owais, Naoufel Werghi:
RHEMAT: Robust human ear based multimodal authentication technique. 103356 - Yu Tu, Shuang Liu, Qian Sun:
DNS tunnelling detection by fusing encoding feature and behavioral feature. 103357 - Qianyu Li, Min Zhang, Yi Shen, Ruipeng Wang, Miao Hu, Yang Li, Hao Hao:
A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testing. 103358 - Guangquan Xu, Hongfei Shao, Jingyi Cui, Hongpeng Bai, Jiliang Li, Guangdong Bai, Shaoying Liu, Weizhi Meng, Xi Zheng:
GenDroid: A query-efficient black-box android adversarial attack framework. 103359 - Mohamed Ashraf, Sherine Rady, Tamer Abdelkader, Tarek F. Gharib:
Efficient privacy preserving algorithms for hiding sensitive high utility itemsets. 103360 - Chuan Yu, Shuhui Chen, Ziling Wei, Fei Wang:
SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devices. 103361 - Zhihua Wang, Zhenyu Li, Zeminghui Li, Yingheng Xu, Fazhi Qi, Jinsheng Kong:
A low cost and effective multi-instance abnormal driving behavior detection system under edge computing. 103362 - Ioannis Stylios, Sotirios Chatzis, Olga Thanou, Spyros Kokolakis:
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues. 103363 - Doron Hillman, Yaniv Harel, Eran Toch:
Evaluating organizational phishing awareness training on an enterprise scale. 103364 - Jiaoze Mao, Yaguan Qian, Jianchang Huang, Zejie Lian, Renhui Tao, Bin Wang, Wei Wang, Tengteng Yao:
Object-free backdoor attack and defense on semantic segmentation. 103365 - Chengcheng Zhu, Jiale Zhang, Xiaobing Sun, Bing Chen, Weizhi Meng:
ADFL: Defending backdoor attacks in federated learning via adversarial distillation. 103366 - Hassan Ali, Muhammad Suleman Khan, Amer AlGhadhban, Meshari Alazmi, Ahmed Alzamil, Khaled Al-Utaibi, Junaid Qadir:
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis. 103367 - Brita Munsinger, Nicole Beebe, Turquoise Richardson:
Virtual reality for improving cyber situational awareness in security operations centers. 103368 - Wenhan Ge, Junfeng Wang, Tongcan Lin, Binhui Tang, Xiaohui Li:
Explainable cyber threat behavior identification based on self-adversarial topic generation. 103369 - Yongyan Guo, Zhengyu Liu, Cheng Huang, Nannan Wang, Hai Min, Wenbo Guo, Jiayong Liu:
A framework for threat intelligence extraction and fusion. 103371 - Benoît Dupont, Clifford Shearing, Marilyne Bernier, Eric Rutger Leukfeldt:
The tensions of cyber-resilience: From sensemaking to practice. 103372 - Ricardo J. Rodríguez, Stefano Marrone, Ibai Marcos, Giuseppe Porzio:
MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP. 103373 - Asya Mitseva, Marharyta Aleksandrova, Andriy Panchenko:
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor. 103374 - Kiran Kumar, Dapeng Liu, Lemuria D. Carter:
Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy. 103375 - Thomas Kingo, Diego F. Aranha:
User-centric security analysis of MitID: The Danish passwordless digital identity solution. 103376 - Yong-Gang Li, JiaZhen Cai, Yu Bao, Yeh-Ching Chung:
What you can read is what you can't execute. 103377 - Jiyuan Liu, Bingyi Lu, Mingkang Xiong, Tao Zhang, Huilin Xiong:
Low frequency sparse adversarial attack. 103379 - Run Yang, Hui He, Yulong Wang, Yue Qu, Weizhe Zhang:
Dependable federated learning for IoT intrusion detection against poisoning attacks. 103381 - Massimiliano Albanese, Ibifubara Iganibo, Olutola Adebiyi:
A framework for designing vulnerability metrics. 103382 - Imran Makhdoom, Mehran Abolhasan, Daniel Robert Franklin, Justin Lipman, Christian Zimmermann, Massimo Piccardi, Negin Shariati:
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward. 103384 - Muriel Frank, Vanessa Kohn:
Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory. 103386 - Bilal Naqvi, Kseniia Perova, Ali Farooq, Imran Makhdoom, Shola Oyedeji, Jari Porras:
Mitigation strategies against the phishing attacks: A systematic literature review. 103387
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.