


default search action
Computers & Security, Volume 154
Volume 154, 2025
- Armando Bellante
, Tommaso Fioravanti, Michele Carminati
, Stefano Zanero
, Alessandro Luongo:
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems. 104341 - Ziting Ren
, Yucong Duan, Qi Qi, Lanhua Luo
:
Data-free fingerprinting technology for biometric classifiers. 104386 - Hongle Liu, Ming Liu, Lansheng Han, Haili Sun, Cai Fu:
Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection. 104387 - Yuedi Zhu
, Yong Wang
, Lin Zhou, Yuan Xia:
FC-Trans: Deep learning methods for network intrusion detection in big data environments. 104392 - Willi Lazarov
, Pavel Seda
, Zdenek Martinasek
, Roman Kummel:
Penterep: Comprehensive penetration testing with adaptable interactive checklists. 104399 - Dika Zou
, Jun Tao
, Zuyan Wang:
Semantics-aware location privacy preserving: A differential privacy approach. 104402 - Irfan Khan
, Syed Wali
, Yasir Ali Farrukh
:
RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats. 104403 - Andrew Stewart, Christopher Hobbs
:
Systematic analysis of security advice on the topic of insider threats. 104411 - Yue Hou
, Xinyan Zhou
, Huakang Xia, Jian Wang, Haiming Chen
:
Surf-Snooping: USB crosstalk leakage attacks on wireless charging. 104412 - Tiantian Zhu
, Wenya He, Tieming Chen
, Jiabo Zhang, Mingqi Lv
, Hongmei Li
, Aohan Zheng, Jie Zheng, Mingjun Ma, Xiangyang Zheng, Zhengqiu Weng, Shuying Wu:
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics. 104413 - Nadiah Al-Nomasy, Abdulelah Alamri
, Ahamed Aljuhani
, Prabhat Kumar
:
Transformer-based knowledge distillation for explainable intrusion detection system. 104417 - Nandita Goyal, Kanika Taneja, Shivani Agarwal, Harsh Khatter:
Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment. 104418 - Laurens Sion
, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen
:
Robust and reusable LINDDUN privacy threat knowledge. 104419 - Qiang Zhang
, Cheng Huang
, Jiaxuan Han, Shuyi Jiang
, Jiayong Liu:
LowPTor: A lightweight method for detecting extremely low-proportion darknet traffic. 104420 - Mohammed Asiri
, Arjun Arunasalam
, Neetesh Saxena
, Z. Berkay Celik
:
Frontline responders: Rethinking indicators of compromise for industrial control system security. 104421 - Jinchuan Pei, Yuxiang Hu, Le Tian, Xinglong Pei, Zihao Wang:
Dynamic anomaly detection using In-band Network Telemetry and GCN for cloud-edge collaborative networks. 104422 - Nora Basha
, Bechir Hamdaoui:
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity. 104423 - Mohammad Al-Fawa'reh
, Jumana M. Abu-Khalaf
, Naeem Janjua
, Patryk Szewczyk
:
Detection of on-manifold adversarial attacks via latent space transformation. 104431 - Gaurav Madkaikar
, Karthikeya S. M. Yelisetty
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Performance analysis of dynamic ABAC systems using a queuing theoretic framework. 104432 - Dominic Too
, Louise Axon
, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts. 104433 - Yuling Luo, Tinghua Hu, Xue Ouyang
, Junxiu Liu, Qiang Fu, Sheng Qin, Zhen Min, Xiaoguang Lin:
DPO-Face: Differential privacy obfuscation for facial sensitive regions. 104434 - Iury Araújo
, Marco Vieira
:
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data. 104438 - Pavlos Cheimonidis
, Konstantinos Rantos
:
A novel proactive and dynamic cyber risk assessment methodology. 104439 - Zehuan Li
, Meihua Xiao, Yangping Xu, Fangping Chen, Huaibin Shao, Sufen Yan:
A novel symbolic model for analyzing Internet of Things protocols based on event logic. 104440 - Sanfeng Zhang
, Shangze Li, Juncheng Lu, Wang Yang:
Power-ASTNN: A deobfuscation and AST neural network enabled effective detection method for malicious PowerShell Scripts. 104441 - Shimin Sun, Le Zhou, Ze Wang, Li Han:
Robust intrusion detection based on personalized federated learning for IoT environment. 104442 - Hongsheng Xu, Akeel Qadir
, Saima Sadiq
:
Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity. 104443 - Okba Ben Atia, Mustafa Al Samara
, Ismail Bennis
, Abdelhafid Abouaissa, Jaafar Gaber, Pascal Lorenz
:
M3D-FL: Multi-layer Malicious Model Detection for Federated Learning in IoT networks. 104444 - Chenggang He
, Chris H. Q. Ding:
SecRASP: Next generation web application security protection methodology and framework. 104445 - Qindong Li
, Wenyi Tang
, Xingshu Chen, Hao Ren:
VuldiffFinder: Discovering inconsistencies in unstructured vulnerability information. 104447 - Neeshe Khan
, Steven Furnell, Maria Bada
, Matthew Rand
, Jason R. C. Nurse
:
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises. 104448 - Chaitanya Joshi
, Sergeja Slapnicar, Jinming Yang
, Ryan K. L. Ko
:
Contrasting the optimal resource allocation to cybersecurity controls and cyber insurance using prospect theory versus expected utility theory. 104450 - Aissa Ben Yahya
, Hicham El Akhal
, El Mehdi Ismaili Alaoui
, Abdelbaki El Belrhiti El Alaoui
:
Bayes-based word weighting for enhanced vulnerability classification in critical infrastructure systems. 104451 - Narges Rahimi
, Beth-Anne Schuelke Leech, Mitra Mirhassani:
A comprehensive review of security vulnerabilities in heavy-duty vehicles: Comparative insights and current research gaps. 104452 - Mofareh Waqdan
, Habib Louafi
, Malek Mouhoub
:
Security risk assessment in IoT environments: A taxonomy and survey. 104456 - Luigi Coppolino
, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano
:
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX. 104457 - Anil Sezgin
, Aytug Boyaci:
DecoyPot: A large language model-driven web API honeypot for realistic attacker engagement. 104458 - Ole Höfener
, Qinghua Wang
:
Requirements framework for IoT device authentication using behavioral fingerprinting. 104459 - Jin Wang, Liping Wang:
LR-STGCN: Detecting and mitigating low-rate DDoS attacks in SDN based on spatial-temporal graph neural network. 104460 - Naif Alsharabi, Akashdeep Bhardwaj
, Abdulaziz Ayaba, Amr Jadi:
Threat hunting for adversary impact inhibiting system recovery. 104464 - Onur Sahin, Suleyman Uludag
:
Leveraging inter-arrival time for efficient threat filtering: A parsimonious approach. 104471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.