


default search action
Computers & Security, Volume 121
Volume 121, October 2022
- Yujia Liu

, Ming Jiang, Tingting Jiang
:
Transferable adversarial examples based on global smooth perturbations. 102816 - Shiwei Lu

, Ruihu Li, Wenbin Liu, Xuan Chen:
Defense against backdoor attack in federated learning. 102819 - Wenbo Guo

, Yong Fang
, Cheng Huang
, Haoran Ou, Chun Lin, Yongyan Guo:
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network. 102823 - Manel Jerbi

, Zaineb Chelly Dagdia
, Slim Bechikh, Lamjed Ben Said:
Android malware detection as a Bi-level problem. 102825 - Adnan Qayyum

, Muhammad Umar Janjua, Junaid Qadir
:
Making federated learning robust to adversarial attacks by learning data and model association. 102827 - Kabul Kurniawan

, Andreas Ekelhart
, Elmar Kiesling, Gerald Quirchmayr, A Min Tjoa:
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data. 102828 - Jaeung Lee, Melchor C. de Guzman, Jingguo Wang

, Manish Gupta, H. Raghav Rao:
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach. 102832 - Ali Muzaffar

, Hani Ragab Hassen
, Michael A. Lones
, Hind Zantout
:
An in-depth review of machine learning based Android malware detection. 102833 - Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:

Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. 102834 - Jiwei Tian

, Buhong Wang, Jing Li, Charalambos Konstantinou
:
Datadriven false data injection attacks against cyber-physical power systems. 102836 - Yuanzhen Liu

, Umair Mujtaba Qureshi
, Gerhard Petrus Hancke
:
Keypad entry inference with sensor fusion from mobile and smart wearables. 102837 - Ido Finder, Eitam Sheetrit, Nir Nissim

:
A time-interval-based active learning framework for enhanced PE malware acquisition and detection. 102838 - Jie Wang

, Jiaming Shi, Xin Wen, Liang Xu
, Ke Zhao, Fuyang Tao, Wenbiao Zhao, Xiuying Qian:
The effect of signal icon and persuasion strategy on warning design in online fraud. 102839 - Megan Gale, Ivano Bongiovanni

, Sergeja Slapnicar
:
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. 102840 - Yael Mathov

, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. 102841 - Yanan Li, Tao Qin, Yongzhong Huang, Jinghong Lan

, ZanHao Liang, Tongtong Geng:
HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems. 102842 - Stefano Calzavara, Lorenzo Cazzaro

, Claudio Lucchese, Federico Marcuzzi
, Salvatore Orlando
:
Beyond robustness: Resilience verification of tree-based classifiers. 102843 - Linan Huang

, Quanyan Zhu:
RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks. 102844 - Pedro García-Teodoro

, José Antonio Gómez-Hernández
, Alberto Abellán-Galera
:
Multi-labeling of complex, multi-behavioral malware samples. 102845 - Ferhat Demirkiran

, Aykut Çayir, Ugur Ünal
, Hasan Dag:
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification. 102846 - Teng Long

, Qi Gao
, Lili Xu, Zhangbing Zhou:
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions. 102847 - Chuanwang Wang

, Junjie Zhang
, Ming Xu
, Haodong Zhang, Weili Han
:
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing. 102848 - Antonio Villalón-Huerta

, Hector Marco-Gisbert
, Ismael Ripoll-Ripoll
:
A Taxonomy for Threat Actors' Persistence Techniques. 102855 - Kehong Li

, Wengang Ma, Huawei Duan, Han Xie, Juanxiu Zhu
:
Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization. 102856 - Yansong Gao, Qun Li

, Yifeng Zheng
, Guohong Wang, Jiannan Wei, Mang Su:
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning. 102857 - Zhenpeng Liu

, Lele Ren, Ruilin Li, Qiannan Liu, Yonggang Zhao
:
ID-based sanitizable signature data integrity auditing scheme with privacy-preserving. 102858 - Elham Arshad

, Michele Benolli, Bruno Crispo:
Practical attacks on Login CSRF in OAuth. 102859 - Ahmad O. Almashhadani

, Domhnall Carlin
, Mustafa Kaiiali, Sakir Sezer:
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection. 102860 - Chunying Zhang, Donghao Jia, Liya Wang

, Wenjie Wang, Fengchun Liu, Aimin Yang:
Comparative research on network intrusion detection methods based on machine learning. 102861 - Eugene Frimpong

, Antonis Michalas
, Amjad Ullah:
Footsteps in the fog: Certificateless fog-based access control. 102866 - Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun

, Hongbo Xu
:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. 102867 - Aratrika Ray-Dowling, Daqing Hou

, Stephanie Schuckers
, Abbie Barbir:
Evaluating multi-modal mobile behavioral biometrics using public datasets. 102868 - Fangtian Zhong

, Pengfei Hu
, Guoming Zhang
, Hong Li
, Xiuzhen Cheng:
Reinforcement learning based adversarial malware example generation against black-box detectors. 102869

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














