Stop the war!
Остановите войну!
for scientists:
default search action
Computers & Security, Volume 135
Volume 135, December 2023
- Chao Li, Yanan Cheng, Zhaoxin Zhang, Ping Yu:
Configuration anormaly detection and resolution risk assessment of authoritative domain name server. 103426 - Aryan Mohammadi Pasikhani, John A. Clark, Prosanta Gope:
Incremental hybrid intrusion detection for 6LoWPAN. 103447 - Xueyan Liu, Jing Wang, Qiong Liu, Xin Xiong, Shufen Niu:
Bidirectional location privacy protection scheme for epidemiological investigation based on OT. 103453 - Oliver Kornyo, Michael Asante, Richard Opoku, Kwabena Owusu-Agyemang, Benjamin Tei Partey, Emmanuel Kwesi Baah, Nkrumah Boadu:
Botnet attacks classification in AMI networks with recursive feature elimination (RFE) and machine learning algorithms. 103456 - Cristina Cifuentes, François Gauthier, Behnaz Hassanshahi, Padmanabhan Krishnan, Davin McCall:
The role of program analysis in security vulnerability detection: Then and now. 103463 - Ivandro Ortet Lopes, Deqing Zou, Ihsan H. Abdulqadder, Saeed Akbar, Zhen Li, Francis A. Ruambo, Wagner Pereira:
Network intrusion detection based on the temporal convolutional model. 103465 - Leiqi Wang, Xiu Ma, Ning Li, Qiujian Lv, Yan Wang, Weiqing Huang, Haiyan Chen:
TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks. 103466 - Haibin Zheng, Jinyin Chen, Wenchang Shangguan, Zhaoyan Ming, Xing Yang, Zhijun Yang:
GONE: A generic O(1) NoisE layer for protecting privacy of deep neural networks. 103471 - Rahma Trabelsi, Ghofrane Fersi, Mohamed Jmaiel:
Access control in Internet of Things: A survey. 103472 - Ehtesham Zahoor, Maryam Chaudhary, Sabina Akhtar, Olivier Perrin:
A formal approach for the identification of redundant authorization policies in Kubernetes. 103473 - Zhenyuan Guo, Lei Xu, Liehuang Zhu:
FedSIGN: A sign-based federated learning framework with privacy and robustness guarantees. 103474 - Judy Flavia B, Balika J. Chelliah:
Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in P2P cloud environments. 103475 - Ogobuchi Daniel Okey, Ekikere Umoren Udo, Renata Lopes Rosa, Demóstenes Zegarra Rodríguez, João Henrique Kleinschmidt:
Investigating ChatGPT and cybersecurity: A perspective on topic modeling and sentiment analysis. 103476 - Hongyu Sun, Guoliang Ou, Ziqiu Zheng, Lei Liao, He Wang, Yuqing Zhang:
Inconsistent measurement and incorrect detection of software names in security vulnerability reports. 103477 - Alan Mills, Jonathan White, Phil Legg:
Longitudinal risk-based security assessment of docker software container images. 103478 - Zhutian Lin, Xi Xiao, Guangwu Hu, Qing Li, Bin Zhang, Xiapu Luo:
Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning. 103479 - Pengfei Guo, Yingjian Yan, Junjie Wang, Jingxin Zhong, Yanjiang Liu, Jinsong Xu:
Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source RISC-V processor. 103480 - Kyusuk Han, Hyeran Mun, Malavika Balakrishnan, Chan Yeob Yeun:
Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments. 103481 - Huoyuan Dong, Jialiang Dong, Shaohua Wan, Shuai Yuan, Zhitao Guan:
Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models. 103482 - Alper Sarikaya, Banu Günel Kiliç, Mehmet Demirci:
RAIDS: Robust autoencoder-based intrusion detection system model against adversarial attacks. 103483 - Rahat Zarin, Niamat Ullah, Amir Khan, Usa Wannasingha Humphries:
A numerical study of a new non-linear fractal fractional mathematical model of malicious codes propagation in wireless sensor networks. 103484 - Tieming Chen, Chenbin Zheng, Tiantian Zhu, Chunlin Xiong, Jie Ying, Qixuan Yuan, Wenrui Cheng, Mingqi Lv:
System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends. 103485 - Xiao Tan, Qi Xie, Lidong Han, Shengbao Wang, Wenhao Liu:
Proof of retrievability with flexible designated verification for cloud storage. 103486 - Chuan (Annie) Tian, Matthew L. Jensen, Alexandra Durcikova:
Phishing susceptibility across industries: The differential impact of influence techniques. 103487 - Lin Li, Chao Chen, Lei Pan, Leo Yu Zhang, Zhifeng Wang, Jun Zhang, Yang Xiang:
A Survey of PPG's Application in Authentication. 103488 - Devi Priya V. S, Sibi Chakkaravarthy Sethuraman, Muhammad Khurram Khan:
Container security: Precaution levels, mitigation strategies, and research perspectives. 103490 - Pushkar Kishore, Swadhin Kumar Barisal, Durga Prasad Mohapatra, Rajib Mall:
An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection. 103499 - Munan Li, Hongbo Liu, Xiangdong Jiang, Zheng Zhao, Tianhao Zhang:
SENSE: An unsupervised semantic learning model for cross-platform vulnerability search. 103500 - Chunyong Zhang, Yang Xin:
VulGAI: vulnerability detection based on graphs and images. 103501 - Zhengfa Li, Chuanhe Huang, Shuhua Deng, Wanyu Qiu, Xieping Gao:
A soft actor-critic reinforcement learning algorithm for network intrusion detection. 103502 - Jinyin Chen, Mingjun Li, Yao Cheng, Haibin Zheng:
FedRight: An effective model copyright protection for federated learning. 103504 - Davy Preuveneers, Wouter Joosen:
Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections. 103505 - Yeming Gu, Hui Shu, Fei Kang:
BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries. 103508 - Qifan Wang, Lei Zhou, Jianli Bai, Yun Sing Koh, Shujie Cui, Giovanni Russello:
HT2ML: An efficient hybrid framework for privacy-preserving Machine Learning using HE and TEE. 103509 - Alberto Huertas Celdrán, Pedro Miguel Sánchez Sánchez, Jan von der Assen, Dennis Shushack, Ángel Luis Perales Gómez, Gérôme Bovet, Gregorio Martínez Pérez, Burkhard Stiller:
Behavioral fingerprinting to detect ransomware in resource-constrained devices. 103510 - Dyari Mohammad Sharif, Hakem Beitollahi:
Detection of application-layer DDoS attacks using machine learning and genetic algorithms. 103511 - Salam Al-Emari, Yousef K. Sanjalawe, Salam Fraihat:
Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform. 103512 - Hanyu Quan, Boyang Wang, Ming Li, Iraklis Leontiadis:
FastReach: A system for privacy-preserving reachability queries over location data. 103513 - Christian Plappert, Dominik Lorych, Michael Eckel, Lukas Jäger, Andreas Fuchs, Ronald Heddergott:
Evaluating the applicability of hardware trust anchors for automotive applications. 103514 - Daniela Pöhn, Nils Gruschka, Leonhard Ziegler, Andre Büttner:
A framework for analyzing authentication risks in account networks. 103515 - Meihui Zhong, Mingwei Lin, Zhu He:
Dynamic multi-scale topological representation for enhancing network intrusion detection. 103516 - Fares Yousefi, Hoshang Kolivand:
A robust brain pattern for brain-based authentication methods using deep breath. 103520 - Sonam Bhardwaj, Mayank Dave:
Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack. 103521 - Zi Kang, Hui Xia, Rui Zhang, Shuliang Jiang, Xiaolong Shi, Zuming Zhang:
FGDA-GS: Fast guided decision attack based on gradient signs for skeletal action recognition. 103522 - Ayesha Naseer, Humza Naseer, Atif Ahmad, Sean B. Maynard, Adil Masood Siddiqui:
Moving towards agile cybersecurity incident response: A case study exploring the enabling role of big data analytics-embedded dynamic capabilities. 103525 - Thomas Dangl, Stewart Sentanoe, Hans P. Reiser:
VMIFresh: Efficient and fresh caches for virtual machine introspection. 103527 - Zhizhuang Jia, Chao Yang, Xiaoyun Zhao, Xinghua Li, Jian Feng Ma:
Design and implementation of an efficient container tag dynamic taint analysis. 103528 - Joonas Forsberg, Tapio Frantti:
Technical performance metrics of a security operations center. 103529 - Haotian Yan, Haibo Hu, Qingqing Ye:
Partial message verification in fog-based industrial Internet of things. 103530 - Roberto Canonico, Giancarlo Sperlì:
Industrial cyber-physical systems protection: A methodological review. 103531 - Shao-Fang Wen, Basel Katt:
A quantitative security evaluation and analysis model for web applications based on OWASP application security verification standard. 103532
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.