default search action
Computers & Security, Volume 136
Volume 136, January 2024
- Samanta Mikuletic, Simon Vrhovec, Brigita Skela-Savic, Bostjan Zvanut:
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. 103489 - Meng Wang, Yahao Zhang, WeiPing Wen:
Improved capsule networks based on Nash equilibrium for malicious code classification. 103503 - Xingsheng Qin, Frank Jiang, Chengzu Dong, Robin Doss:
A hybrid cyber defense framework for reconnaissance attack in industrial control systems. 103506 - Benjamin Maximilian Berens, Mark Bohlender, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer:
Cookie disclaimers: Dark patterns and lack of transparency. 103507 - Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Minghu Wu, Wei Xiong, Mingwu Zhang:
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing. 103517 - Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu:
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. 103518 - Pejman Najafi, Wenzel Pünter, Feng Cheng, Christoph Meinel:
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation. 103519 - Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong:
SGBA: A stealthy scapegoat backdoor attack against deep neural networks. 103523 - Xiaojuan Zhao, Rong Jiang, Yue Han, Aiping Li, Zhichao Peng:
A survey on cybersecurity knowledge graph construction. 103524 - R. Reka, R. Karthick, R. Saravana Ram, Gurkirpal Singh:
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET. 103526 - Wenbo Wang, Peng Yi, Junfang Jiang, Peng Zhang, Xiang Chen:
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack. 103533 - Kok Onn Chee, Mengmeng Ge, Guangdong Bai, Dan Dongseong Kim:
IoTSecSim: A framework for modelling and simulation of security in Internet of things. 103534 - Xinlong He, Yang Xu, Sicong Zhang, Weida Xu, Jiale Yan:
Enhance membership inference attacks in federated learning. 103535 - Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay:
Analysis of machine learning approaches to packing detection. 103536 - Quan Shen, Yanming Shen:
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach. 103537 - Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart:
Distance-based linkage of personal microbiome records for identification and its privacy implications. 103538 - Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang:
AdvCheck: Characterizing adversarial examples via local gradient checking. 103540 - Jiahao Huang, Mi Wen, Minjie Wei, Yanbing Bi:
Enhancing the transferability of adversarial samples with random noise techniques. 103541 - Ming Liu, Xiao Song, Yong Li, Wenxin Li:
Correlated differential privacy based logistic regression for supplier data protection. 103542 - Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Tarmo Korõtko:
Threat modeling of industrial control systems: A systematic literature review. 103543 - Xuan Zhao, Jia Yu, Xinrui Ge, Rong Hao:
Towards efficient Secure Boolean Range Query over encrypted spatial data. 103544 - Arvind Prasad, Shalini Chandra:
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. 103545 - Antonio Paya, Sergio Arroni, Vicente García-Díaz, Alberto Gómez:
Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems. 103546 - Zihan Ma, Tianchong Gao:
Federated learning backdoor attack detection with persistence diagram. 103557 - Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso:
Which factors predict susceptibility to phishing? An empirical study. 103558 - Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun:
Learning a deep-feature clustering model for gait-based individual identification. 103559 - Umesh Kumar Lilhore, Surjeet Dalal, Sarita Simaiya:
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. 103560 - Erzhou Zhu, Kang Cheng, Zhizheng Zhang, Huabin Wang:
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. 103561 - Yuxian Huang, Geng Yang, Hao Zhou, Hua Dai, Dong Yuan, Shui Yu:
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. 103562 - Chuang Liang, Jie Huang, Zeping Zhang, Shuaishuai Zhang:
Defending against model extraction attacks with OOD feature learning and decision boundary confusion. 103563 - Furqan Rustam, Anca Delia Jurcut:
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches. 103564 - Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig:
To pass or not to pass: Privacy-preserving physical access control. 103566 - Hoang V. Vo, Hanh Phuong Du, Hoa Ngoc Nguyen:
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning. 103567 - Wonwoo Choi, Minjae Seo, Seongman Lee, Brent ByungHoon Kang:
SuM: Efficient shadow stack protection on ARM Cortex-M. 103568 - Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao:
Integrity coded databases - protecting data integrity for outsourced databases. 103569 - Shi Chen, Wennan Wang, Yubin Zhong, Zuobin Ying, Weixuan Tang, Zijie Pan:
HP-MIA: A novel membership inference attack scheme for high membership prediction precision. 103571 - Eun Hee Park, Jongwoo Kim, Young Soon Park, Kyung Hee Chun:
Facilitating and impeding factors to insiders' prosocial rule breaking in South Korea. 103572 - Wenjie Wang, Yuanhai Shao, Yiju Wang:
Optimization-based adversarial perturbations against twin support vector machines. 103573 - Snofy D. Dunston, V. Mary Anita Rajam:
AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability. 103574 - Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao:
Protocol clustering of unknown traffic based on embedding of protocol specification. 103575 - Juanjuan Weng, Zhiming Luo, Dazhen Lin, Shaozi Li:
Comparative evaluation of recent universal adversarial perturbations in image classification. 103576 - Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. 103577 - Zhengwei Zhu, Miaojie Chen, Chenyang Zhu, Yanping Zhu:
Effective defense strategies in network security using improved double dueling deep Q-network. 103578 - Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina:
CyberEntRel: Joint extraction of cyber entities and relations using deep learning. 103579 - Saihua Cai, Han Xu, Mingjie Liu, Zhilin Chen, Guofeng Zhang:
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. 103580 - Julia Prümmer, Tommy van Steen, Bibi van den Berg:
A systematic review of current cybersecurity training methods. 103585
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.