


default search action
Computers & Security, Volume 128
Volume 128, May 2023
- Yonghe Tang, Xuyan Qi, Jing Jing, Chunling Liu, Weiyu Dong

:
BHMDC: A byte and hex n-gram based malware detection and classification method. 103118 - Razvan Beuran

, Jan Vykopal
, Daniela Belajová
, Pavel Celeda
, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. 103120 - Felix Schuckert

, Basel Katt
, Hanno Langweg
:
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. 103121 - Morteza Safaei Pour

, Christelle Nader, Kurt Friday, Elias Bou-Harb:
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. 103123 - Yinwei Wu, Meijin Li

, Qi Zeng
, Tao Yang, Junfeng Wang, Zhiyang Fang
, Luyu Cheng:
DroidRL: Feature selection for android malware detection with reinforcement learning. 103126 - Sara Qamar, Zahid Anwar

, Mehreen Afzal:
A systematic threat analysis and defense strategies for the metaverse and extended reality systems. 103127 - Konstantinos Charmanas

, Nikolaos Mittas, Lefteris Angelis:
Topic and influence analysis on technological patents related to security vulnerabilities. 103128 - Ying Xing

, Hui Shu, Fei Kang:
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning. 103129 - Tobias D. Weickert

, Adam N. Joinson
, Barnaby Craggs
:
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice. 103130 - Wei Wang, Songlei Jian

, Yusong Tan, Qingbo Wu, Chenlin Huang
:
Robust unsupervised network intrusion detection with self-supervised masked context reconstruction. 103131 - Jianbing Liang

, Suxia Wang
, Shuang Zhao
, Shuhui Chen
:
FECC: DNS tunnel detection model based on CNN and clustering. 103132 - Gabriele Costa, Pierpaolo Degano

, Letterio Galletta
, Simone Soderi
:
Formally verifying security protocols built on watermarking and jamming. 103133 - Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. 103134 - Xianglong He

, Yuezun Li
, Haipeng Qu, Junyu Dong:
Improving transferable adversarial attack via feature-momentum. 103135 - Obi Ogbanufe

, Ling Ge:
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations. 103136 - Andrew Reeves

, Dragana Calic, Paul H. Delfabbro:
"Generic and unusable"1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. 103137 - Shawn P. Duncan, Hui Chen

:
Detecting network-based internet censorship via latent feature representation learning. 103138 - Haralambos Mouratidis

, Shareeful Islam, Antonio Santos-Olmo
, Luis Enrique Sánchez
, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. 103139 - Ann Yi Wong

, Eyasu Getahun Chekole
, Martín Ochoa, Jianying Zhou
:
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. 103140 - Wen Ding Xiong, Kai Lun Luo, Rui Li:

AIDTF: Adversarial training framework for network intrusion detection. 103141 - Chen Gao, Jia Yu:

SecureRC: A system for privacy-preserving relation classification using secure multi-party computation. 103142 - Zihao Wang

, Vrizlynn L. L. Thing
:
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. 103143 - Tianyue Zhang

, Wei Chen
, Yuxiao Liu, Lifa Wu:
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model. 103144 - Peter Aaby

, Mario Valerio Giuffrida
, William J. Buchanan
, Zhiyuan Tan
:
An omnidirectional approach to touch-based continuous authentication. 103146 - Yuzhe Li

, Yong Liu
, Bo Li
, Weiping Wang
, Nan Liu:
Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM. 103147 - G. Nirmalapriya, Balajee Maram

, Ramanathan Lakshmanan
, M. Navaneethakrishnan:
ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection. 103155 - Li Li, Tianfeng Li

, Hua Cai
, Jian Zhang
, Jianjun Wang:
I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem. 103156 - Chuan Qin, Jiaqian Peng, Puzhuo Liu

, Yaowen Zheng
, Kai Cheng, Weidong Zhang, Limin Sun:
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. 103157 - Raphael Hoheisel

, Guido van Capelleveen
, Dipti Kapoor Sarmah
, Marianne Junger
:
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains. 103158 - Haitian Yang, Xiang Meng, Xuan Zhao, Yan Wang, Yuejun Liu, Xiaoyu Kang, Jiahui Shen, Weiqing Huang:

CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. 103159 - Timothy R. McIntosh

, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng, Paul A. Watters:
Applying staged event-driven access control to combat ransomware. 103160 - Gareth Mott

, Sarah Turner
, Jason R. C. Nurse
, Jamie MacColl
, James Sullivan, Anna Cartwright
, Edward J. Cartwright
:
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. 103162 - Yu Wang

, Liquan Chen
, Ge Wu, Kunliang Yu, Tianyu Lu:
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing. 103163 - Gaurav Bansal

, Jason Thatcher
, Sebastian Walter Schuetz
:
Where authorities fail and experts excel: Influencing internet users' compliance intentions. 103164 - Clemens-Alexander Brust

, Tim Sonnekalb, Bernd Gruner
:
ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language. 103165 - Alessandro Nichelini, Carlo Alberto Pozzoli, Stefano Longari, Michele Carminati

, Stefano Zanero:
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN. 103166 - Giampaolo Bovenzi

, Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri
, Valerio Persico, Antonio Pescapè:
Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness. 103167 - Kyoungmin Ko, Sunghwan Kim

, Hyun Kwon
:
Multi-targeted audio adversarial example for use against speech recognition systems. 103168 - Sun-Jin Lee

, Yu-Rim Lee, So-Eun Jeon
, Il-Gu Lee
:
Machine learning-based jamming attack classification and effective defense technique. 103169 - Isaac D. Sánchez-García

, Tomás San Feliu Gilabert, José Antonio Calvo-Manzano
:
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review. 103170 - Xueying Han, Susu Cui, Song Liu

, Chen Zhang, Bo Jiang
, Zhigang Lu:
Network intrusion detection based on n-gram frequency and time-aware transformer. 103171 - Ferhat Arat

, Sedat Akleylek
:
Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. 103174 - Xiuli Ma, Wenbin Zhu, Jieling Wei, Yanliang Jin, Dongsheng Gu, Rui Wang:

EETC: An extended encrypted traffic classification algorithm based on variant resnet network. 103175 - Wang Yang, Mingzhe Gao

, Ligeng Chen
, Zhengxuan Liu, Lingyun Ying:
RecMaL: Rectify the malware family label via hybrid analysis. 103177 - Rishikesh Sahay

, Daniel A. Sepulveda Estay
, Weizhi Meng
, Christian Damsgaard Jensen
, Michael Bruhn Barfod
:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. 103179 - Yinghui Huang, Wenting Shen

, Jing Qin, Huiying Hou
:
Privacy-preserving certificateless public auditing supporting different auditing frequencies. 103181 - Xiaofan Nie

, Liwei Chen, Haolai Wei, Yuantong Zhang, Ningning Cui, Gang Shi:
KPDFI: Efficient data flow integrity based on key property against data corruption attack. 103183 - Aratrika Ray-Dowling, Daqing Hou

, Stephanie Schuckers:
Stationary mobile behavioral biometrics: A survey. 103184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














