


default search action
Computers & Security, Volume 115
Volume 115, April 2022
- Junaid Haseeb

, Saif Ur Rehman Malik
, Masood Mansoori
, Ian Welch:
Probabilistic modelling of deception-based security framework using markov decision process. 102599 - Agata Kruzikova, Lenka Knapova, David Smahel

, Lenka Dedkova
, Vashek Matyas:
Usable and secure? User perception of four authentication methods for mobile banking. 102603 - Zhang Long, Jinsong Wang:

A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN. 102604 - Daniel W. Woods, Rainer Böhme:

The commodification of consent. 102605 - Payas Awadhutkar, Ahmed Tamrawi, Ryan Goluch, Suresh C. Kothari:

Control flow equivalence method for establishing sanctity of compiling. 102608 - Martin Husák, Lukás Sadlek

, Stanislav Spacek, Martin Lastovicka
, Michal Javorník, Jana Komárková:
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling. 102609 - Abubakar Sadiq Sani, Elisa Bertino, Dong Yuan, Ke Meng, Zhao Yang Dong:

SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities. 102610 - Heemeng Ho

, Ryan K. L. Ko
, Lorraine Mazerolle
:
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review. 102611 - Miguel Calvo

, Marta Beltrán
:
A Model For risk-Based adaptive security controls. 102612 - Songsong Liu, Pengbin Feng, Shu Wang

, Kun Sun, Jiahao Cao:
Enhancing malware analysis sandboxes with emulated user behavior. 102613 - Haiyan Jia, Eric P. S. Baumer:

Birds of a feather: Collective privacy of online social activist groups. 102614 - Pooja Yadav

, Neeraj Menon
, Vinayakumar Ravi
, Sowmya Vishvanathan
, Tuan D. Pham:
EfficientNet convolutional neural networks-based Android malware detection. 102622 - Gijs van Dam

, Rabiah Abdul Kadir:
Hiding payments in lightning network with approximate differentially private payment channels. 102623 - Xosé Fernández-Fuentes

, Tomás F. Pena, José Carlos Cabaleiro:
Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study. 102626 - Amit Sharma, Brij B. Gupta

, Awadhesh Kumar Singh, V. K. Saraswat:
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense. 102627 - Alejandra Castelblanco

, Esteban Rivera, Jesus Solano, Lizzy Tengana, Christian Lopez, Martín Ochoa:
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms. 102629 - Duy-Hien Vu

:
Privacy-preserving Naive Bayes classification in semi-fully distributed data model. 102630 - Francesco Zola

, Lander Segurola-Gil, Jan Lukas Bruse
, Mikel Galar, Raul Orduna Urrutia:
Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing. 102632

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














