default search action
Computers & Security, Volume 115
Volume 115, April 2022
- Junaid Haseeb, Saif Ur Rehman Malik, Masood Mansoori, Ian Welch:
Probabilistic modelling of deception-based security framework using markov decision process. 102599 - Agata Kruzikova, Lenka Knapova, David Smahel, Lenka Dedkova, Vashek Matyas:
Usable and secure? User perception of four authentication methods for mobile banking. 102603 - Zhang Long, Jinsong Wang:
A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN. 102604 - Daniel W. Woods, Rainer Böhme:
The commodification of consent. 102605 - Payas Awadhutkar, Ahmed Tamrawi, Ryan Goluch, Suresh C. Kothari:
Control flow equivalence method for establishing sanctity of compiling. 102608 - Martin Husák, Lukás Sadlek, Stanislav Spacek, Martin Lastovicka, Michal Javorník, Jana Komárková:
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling. 102609 - Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. 102610 - Heemeng Ho, Ryan K. L. Ko, Lorraine Mazerolle:
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. 102611 - Miguel Calvo, Marta Beltrán:
A Model For risk-Based adaptive security controls. 102612 - Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun, Jiahao Cao:
Enhancing malware analysis sandboxes with emulated user behavior. 102613 - Haiyan Jia, Eric P. S. Baumer:
Birds of a feather: Collective privacy of online social activist groups. 102614 - Pooja Yadav, Neeraj Menon, Vinayakumar Ravi, Sowmya Vishvanathan, Tuan D. Pham:
EfficientNet convolutional neural networks-based Android malware detection. 102622 - Gijs van Dam, Rabiah Abdul Kadir:
Hiding payments in lightning network with approximate differentially private payment channels. 102623 - Xosé Fernández-Fuentes, Tomás F. Pena, José Carlos Cabaleiro:
Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study. 102626 - Amit Sharma, Brij B. Gupta, Awadhesh Kumar Singh, V. K. Saraswat:
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. 102627 - Alejandra Castelblanco, Esteban Rivera, Jesus Solano, Lizzy Tengana, Christian Lopez, Martín Ochoa:
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms. 102629 - Duy-Hien Vu:
Privacy-preserving Naive Bayes classification in semi-fully distributed data model. 102630 - Francesco Zola, Lander Segurola-Gil, Jan Lukas Bruse, Mikel Galar, Raul Orduna Urrutia:
Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing. 102632
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.