default search action
Computers & Security, Volume 102
Volume 102, March 2021
- Minglai Shao, Jianxin Li, Yue Chang, Jun Zhao, Xunxun Chen:
MASA: An efficient framework for anomaly detection in multi-attributed networks. 102085 - Hooman Alavizadeh, Jin B. Hong, Dong Seong Kim, Julian Jang-Jaccard:
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud. 102091 - Amani Altarawneh, Fei Sun, Richard R. Brooks, Oluwakemi Hambolu, Lu Yu, Anthony Skjellum:
Availability analysis of a permissioned blockchain with a lightweight consensus protocol. 102098 - Sang-Ok Park, Ohmin Kwon, Yonggon Kim, Sang Kil Cha, Hyunsoo Yoon:
Mind control attack: Undermining deep learning with GPU memory exploitation. 102115 - Kennedy A. Torkura, Muhammad I. H. Sukmana, Feng Cheng, Christoph Meinel:
Continuous auditing and threat detection in multi-cloud infrastructure. 102124 - Nick Ho-Sam-Sooi, Wolter Pieters, Maarten Kroesen:
Investigating the effect of security and privacy on IoT device purchase behaviour. 102132 - Aykut Çayir, Ugur Ünal, Hasan Dag:
Random CapsNet forest model for imbalanced malware type classification task. 102133 - Junjiang He, Tao Li, Beibei Li, Xiaolong Lan, Zhiyong Li, Yunpeng Wang:
An immune-based risk assessment method for digital virtual assets. 102134 - Nikhil Tripathi, Neminath Hubballi:
Preventing time synchronization in NTP broadcast mode. 102135 - Kim-Kwang Raymond Choo, Keke Gai, Luca Chiaraviglio, Qing Yang:
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management. 102136 - Asma Aloufi, Peizhao Hu, Hang Liu, Sherman S. M. Chow, Kim-Kwang Raymond Choo:
Universal location referencing and homomorphic evaluation of geospatial query. 102137 - Xiaoxue Liu, Jiexin Zhang, Peidong Zhu, Qingping Tan, Wei Yin:
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game. 102138 - Snehkumar Shahani, R. Venkateswaran, Jibi Abraham:
Cost-based recommendation of parameters for local differentially private data aggregation. 102144 - Jordan J. Plotnek, Jill Slay:
Cyber terrorism: A homogenized taxonomy and definition. 102145 - Chad A. Bollmann, Murali Tummala, John C. McEachen:
Resilient real-time network anomaly detection using novel non-parametric statistical tests. 102146 - Aaliya Sarfaraz, Ripon K. Chakrabortty, Daryl Essam:
A tree structure-based improved blockchain framework for a secure online bidding system. 102147 - Leon Strous, Suné von Solms, André Zúquete:
Security and privacy of the Internet of Things. 102148 - Dane Brown, T. Owens Walker III, Justin A. Blanco, Robert W. Ives, Hau T. Ngo, James Shey, Ryan N. Rakvic:
Detecting firmware modification on solid state drives via current draw analysis. 102149 - Soroush M. Sohi, Jean-Pierre Seifert, Fatemeh Ganji:
RNNIDS: Enhancing network intrusion detection systems through deep learning. 102151 - Jun Zhao, Xudong Liu, Qiben Yan, Bo Li, Minglai Shao, Hao Peng, Lichao Sun:
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning. 102152 - Amit Shlomo, Meir Kalech, Robert Moskovitch:
Temporal pattern-based malicious activity detection in SCADA systems. 102153 - Valdemar Svábenský, Pavel Celeda, Jan Vykopal, Silvia Brisáková:
Cybersecurity knowledge and skills taught in capture the flag challenges. 102154 - David Garcia Rosado, Julio Moreno, Luis Enrique Sánchez, Antonio Santos-Olmo, Manuel A. Serrano, Eduardo Fernández-Medina:
MARISMA-BiDa pattern: Integrated risk analysis for big data. 102155 - Yongyan Guo, Jiayong Liu, Wenwu Tang, Cheng Huang:
Exsense: Extract sensitive information from unstructured data. 102156 - Yu Wu, Li Pan:
SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks. 102157 - Daniel Gibert, Carles Mateu, Jordi Planes, João Marques-Silva:
Auditing static machine learning anti-Malware tools against metamorphic attacks. 102159 - Anjum Nazir, Rizwan Ahmed Khan:
A novel combinatorial optimization based feature selection method for network intrusion detection. 102164
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.