![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 129
Volume 129, June 2023
- Muhammad Hassan Nasir
, Junaid Arshad
, Muhammad Mubashir Khan:
Collaborative device-level botnet detection for internet of things. 103172 - Qingyang Zeng
, Mohammad Kavousi
, Yinhong Luo, Ling Jin, Yan Chen
:
Full-stack vulnerability analysis of the cloud-native platform. 103173 - Islam Debicha
, Benjamin Cochez
, Tayeb Kenaza, Thibault Debatty
, Jean-Michel Dricot
, Wim Mees:
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems. 103176 - Chengbin Pang
, Hongbin Liu
, Yifan Wang
, Neil Zhenqiang Gong, Bing Mao, Jun Xu:
Generation-based fuzzing? Don't build a new generator, reuse! 103178 - Antonio Muñoz
, Ruben Rios
, Rodrigo Román
, Javier López:
A survey on the (in)security of trusted execution environments. 103180 - Han Wang
, Luis Muñoz-González
, Muhammad Zaid Hameed
, David Eklund, Shahid Raza:
SparSFA: Towards robust and communication-efficient peer-to-peer federated learning. 103182 - In Lee:
Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method. 103185 - Chenghua Tang, Zheng Du, Mengmeng Yang
, Baohua Qiang:
Android static taint analysis based on multi branch search association. 103186 - Hengwei Zhang
, Yan Mi, Yumeng Fu
, Xiaohu Liu
, Yuchen Zhang
, Jindong Wang
, Jinglei Tan
:
Security defense decision method based on potential differential game for complex networks. 103187 - Bruno Coutinho
, João Ferreira
, Iryna Yevseyeva, Vitor Basto-Fernandes
:
Integrated cybersecurity methodology and supporting tools for healthcare operational information systems. 103189 - Zequn Niu
, Wenjie Guo, Jingfeng Xue, Yong Wang
, Zixiao Kong, Lu Huang:
A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA). 103190 - Maria Rigaki
, Sebastian García:
Stealing and evading malware classifiers and antivirus at low false positive conditions. 103192 - Yuhao Gu
, Yuebin Bai:
LR-BA: Backdoor attack against vertical federated learning using local latent representations. 103193 - Chongbo Wei
, Gaogang Xie, Zulong Diao:
A lightweight deep learning framework for botnet detecting at the IoT edge. 103195 - Jugal Gandhi
, Diksha Shekhawat, M. Santosh, Jai Gopal Pandey:
Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends. 103196 - Wenpeng Wang, Zhixiang Chen, Ziyang Zheng, Hui Wang
:
An adaptive fuzzing method based on transformer and protocol similarity mutation. 103197 - Mahyar Taj Dini
, Volodymyr Sokolov
, Ievgeniia Kuzminykh
, Bogdan Ghita
:
Brainwave-based authentication using features fusion. 103198 - Anna Georgiadou
, Ariadni Michalitsi-Psarrou
, Dimitris Askounis:
A security awareness and competency evaluation in the energy sector. 103199 - Tadeu Freitas
, João Soares
, Manuel Eduardo Correia
, Rolando Martins
:
Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication. 103200 - Robert A. Bridges
, Ashley E. Rice
, Sean Oesch
, Jeffrey A. Nichols, Cory L. Watson, Kevin D. Spakes, Savannah Norem, Mike Huettel, Brian Jewell
, Brian Weber
, Connor Gannon
, Olivia Bizovi, Samuel C. Hollifield, Samantha Erwin
:
Testing SOAR tools in use. 103201 - Linfeng Du, Junjiang He, Tao Li, Yunpeng Wang, Xiaolong Lan, Yunhua Huang:
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range. 103202 - Ricardo de Andrade
, Max Mauro Dias Santos
, João Francisco Justo
, Leopoldo Rideki Yoshioka, Hans-Joachim Hof
, João Henrique Kleinschmidt
:
Security architecture for automotive communication networks with CAN FD. 103203 - Wenjuan Li
, Jiao Tan, Nan Zhu:
Design of double-cross-based smartphone unlock mechanism. 103204 - Yuan-Cheng Lai
, Jheng-Yan Lin, Ying-Dar Lin, Ren-Hung Hwang
, Po-Ching Lin, Hsiao-Kuang Wu, Chung-Kuan Chen:
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection. 103205 - Majid Mollaeefar
, Silvio Ranise:
Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the GDPR. 103206 - Justin Scott Giboney, Ryan M. Schuetzler
, G. Mark Grimes:
Know your enemy: Conversational agents for security, education, training, and awareness at scale. 103207 - Mansour Naser Alraja
, Usman Javed Butt
, Maysam Abbod
:
Information security policies compliance in a global setting: An employee's perspective. 103208 - Harine Rajashree
, K. Sundarakantham, E. Sivasankar, Mercy Shalinie Selvaraj:
A hybrid deep learning framework for privacy preservation in edge computing. 103209 - Marta Catillo, Antonio Pecchia, Umberto Villano:
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders. 103210 - Binhao Ma, Can Zhao, Dejun Wang, Bo Meng:
DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio. 103212 - Munir Geden
, Kasper Rasmussen:
RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks. 103213 - Linfeng Liu
, Yaoze Zhou, Zhiyuan Xi, Jiagao Wu, Jia Xu
:
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN. 103214 - Taran Cyriac John
, Muhammad Shabbir Abbasi
, Harith Al-Sahaf
, Ian Welch
, Julian Jang-Jaccard
:
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution. 103215 - Loïc Desgeorges, Jean-Philippe Georges, Thierry Divoux:
Detection of anomalies of a non-deterministic software-defined networking control. 103228 - Wenjing Lei
, Siqi Hu
, Carol Hsu:
Unveiling the process of phishing precautions taking: The moderating role of optimism bias. 103249 - Sharmin Aktar
, Abdullah Yasin Nur
:
Towards DDoS attack detection using deep learning approach. 103251 - David M. Hull
, Sebastian Walter Schuetz
, Paul Benjamin Lowry
:
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. 103252 - Pengfei Guo
, Yingjian Yan, Fan Zhang
, Chunsheng Zhu
, Lichao Zhang, Zibin Dai:
Extending the classical side-channel analysis framework to access-driven cache attacks. 103255 - Abhishek Sharma
, Sangeeta Sabharwal, Sushama Nagpal:
A hybrid scoring system for prioritization of software vulnerabilities. 103256 - Xiangjuan Li
, Yang Li
, Zhaowen Feng
, Zhaoxuan Wang, Quan Pan:
ATS-O2A: A state-based adversarial attack strategy on deep reinforcement learning. 103259
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.