


default search action
Computers & Security, Volume 157
Volume 157, 2025
- Kevin Bergner, Dieter Landes
:
A uniform assessment of host-based intrusion detection data sets. 104503 - Charles Weir
, Cecilia Loureiro-Koechlin, Lucy Hunt, Louise A. Dennis
:
The human factor: Addressing computing risks for critical national infrastructure towards 2040. 104524 - Munmun Swain
, Nikhil Tripathi
, Kamalakanta Sethi
:
Identifying communication sequence anomalies to detect DoS attacks against MQTT. 104526 - Jianzhou Zhao
, Qiang Wei, Xingwei Li, Yunchao Wang, Xixing Li
:
ASIRDetector: Scheduling-driven, asynchronous execution to discover asynchronous improper releases bug in linux kernel. 104530 - Huifang Xiang, Ruimei Zhang, Ziling Wang
, Di Dong:
New results on modeling and hybrid control for malware propagation in cyber-physical systems. 104533 - Mucahit Soylu
, Resul Das
:
Prediction and graph visualization of cyber attacks using graph attention networks. 104534 - Bouthayna El Bouzaidi Tiali
, Said Amari:
Modeling and modular detection of time attacks in cyber-physical systems based on timed automata with guards and dioid algebra. 104535 - Dayoung Choi
, Joohong Rheey
, Hyunggon Park
:
Attack-specific feature analysis framework for NetFlow IoT datasets. 104536 - Kok Onn Chee
, Mengmeng Ge
, Guangdong Bai
, Dan Dongseong Kim
:
Unveiling the evolution of IoT threats: Trends, tactics, and simulation analysis. 104537 - K. Praveen Kumar, N. Suresh Kumar:
Advanced Attack Mitigation in IoT Gateway Protocols. 104539 - Benxiao Tang
, Shilin Zhang
, Fei Zhu
, Aoshuang Ye
:
CAPRA: Context-Aware patch risk assessment for detecting immature vulnerability in open-source software. 104540 - Anagha A. S.
, Ciza Thomas, Balakrishnan Narayanaswamy
:
Optimized intrusion predictions through feature selection methods. 104541 - G. Y. Sree Varshini, S. Latha, Rajaa Vikhram Yohanandhan
:
Impact and detection of cyber attacks in wide area control application of cyber-physical power system (CPPS). 104547 - Yi-Chih Tung, En-Cheng Liou
, Pen-Chih Hu, Cheng-Han Yu:
VWA-6G AI assisted continuous security monitoring over open RAN service management orchestration. 104566 - Chuan Lu, Senlin Luo, Limin Pan
:
High-trigger fuzz testing for microarchitectural speculative execution vulnerability. 104567 - Syed Wali, Yasir Ali Farrukh, Irfan Khan
:
Explainable AI and Random Forest based reliable intrusion detection system. 104542 - Tino Jungebloud
, Nhung H. Nguyen
, Dan Dongseong Kim, Armin Zimmermann
:
Model-based structural and behavioral cybersecurity risk assessment in system designs. 104543 - Tariq Hussain
, Muhammad Nawaz Khan
, Bailin Yang, Razaz Waheeb Attar, Ahmed Alhomoud:
LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving. 104544 - Naomi Woods, Mikko Siponen:
Questioning a security assumption: Are unique passwords harder to remember than reused or modified passwords? 104545 - Zhizhuang Jia, Chao Yang, Pengbin Feng, Xiaoyun Zhao
, Xinghua Li, Jianfeng Ma:
Impact assessment of third-party library vulnerabilities through vulnerability reachability analysis. 104546 - Yucheng Zhang, Xiaolin Ju
, Xiang Chen
, Misbahul Amin
, Zilong Ren:
HGAN4VD: Leveraging Heterogeneous Graph Attention Networks for enhanced Vulnerability Detection. 104548 - Suraj Harsha Kamtam, Qian Lu
, Abdur Rakib
, Muhamad Azfar Ramli, Rakhi Manohar Mepparambath
, Siraj Ahmed Shaikh
, Hoang Nga Nguyen
:
WOLVES: Window of Opportunity attack feasibility likelihood value estimation through a simulation-based approach. 104549 - Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Security of cyber-physical Additive Manufacturing supply chain: Survey, attack taxonomy and solutions. 104557 - Xiao Zhang, Yingxu Lai
, Xinrui Dong, Xinyu Xu:
MER-GCN: Reasoning about attacking group behaviors using industrial control system attack knowledge graphs. 104558 - Awais Yousaf
, Sean Gunawan, Sunil Basnet, Victor Bolbot
, Jianying Zhou, Osiris A. Valdez Banda:
STPA-Cyber: A semi-automated cyber risk assessment framework for maritime cybersecurity. 104559 - Suvrima Datta
, U. Venkanna, Aditya Kotha:
FiPiBox:Development of firewall for IoT networks using P4Pi. 104560 - Daniel Jeremiah
, Husnain Rafiq
, Ta Vinh Thong, Muhammad Usman
, Mohsin Raza, Muhammad Awais
:
NIOM-DGA: Nature-inspired optimised ML-based model for DGA detection. 104561 - Hongpo Zhang
, Zhaozhe Zhang
, Haizhaoyang Huang
, Hehe Yang:
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection. 104562 - Zehui Wang, Hao Li, Yinhao Qi
, Wei Qiao
, Song Liu, Chen Zhang, Bo Jiang
, Zhigang Lu:
PathWatcher: A path-based behavior detection method for attack detection and investigation. 104563 - Jiaqi Li
, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu
, Jiashui Wang:
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution. 104564 - Naser AlDuaij
:
VeracOS: An operating system extension for the veracity of files. 104565 - Mordechai Guri:
PIXHELL: When pixels learn to scream. 104568 - Manuela M. C. de Souza, Camila F. T. Pontes, João J. C. Gondim, Luís Paulo Faina Garcia, Luiz A. DaSilva, Eduardo F. M. Cavalcante, Marcelo Antonio Marotta
:
A novel open set Energy-based Flow Classifier for Network Intrusion Detection. 104569 - Gaoyuan Pan, Huan Li, Jian Wang:
A fast hardware Trojan detection method with parallel clustering for large-scale gate-level netlists. 104570 - Sibo Qiao, Haohao Zhu, Lin Sha, Min Wang, Qiang Guo
:
DynMark: A dynamic packet counting watermarking scheme for robust traffic tracing in network flows. 104571 - Jakub Suchorab, Sebastian Plamowski, Maciej Lawrynczuk:
Anomaly detection system for Modbus data based on an open source tool. 104572 - P. V. V. S. Srinivas, Nikhil Yadavalli, Venkata Durga, Karthik Kumar, Prateesh Raju:
Enhanced biometric template protection schemes using distance based fuzzy extractor. 104573 - Arthur Dantas Mangussi
, Ricardo Cardoso Pereira
, Ana Carolina Lorena
, Miriam Seoane Santos, Pedro Henriques Abreu
:
Studying the robustness of data imputation methodologies against adversarial attacks. 104574 - Steffi Haag, Nils Siegfried, Nane Winkler
:
Informal control responses to information security policy violations: A factorial survey on insurance employees' moral licensing of insider threats. 104575 - Alessandro Palma
, Silvia Bonomi:
Behind the scenes of attack graphs: Vulnerable network generator for in-depth experimental evaluation of attack graph scalability. 104576 - R. Hannah Jessie Rani, Amit Barve, Ashwini Malviya, Vivek Ranjan, Rubal Jeet, Nilesh Bhosle:
Enhancing detection rates in intrusion detection systems using fuzzy integration and computational intelligence. 104577 - Manuel Suarez-Roman
, Juan Tapiador
:
Attack structure matters: Causality-preserving metrics for Provenance-based Intrusion Detection Systems. 104578 - Iván Abellán Álvarez
, Joaquín Delgado Fernández
, Sergio Potenciano Menci
:
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series. 104579 - Man Zhou
, Lansheng Han, Xin Che:
Strengthening edge defense: A differential game-based edge intelligence strategy against APT attacks. 104580 - Xiangpu Song, Yingpei Zeng
, Jianliang Wu, Hao Li, Chaoshun Zuo, Qingchuan Zhao, Shanqing Guo:
CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback. 104581 - Yun-Che Yu, Ci-Yi Hung, Li-Der Chou:
Kernel-level hidden rootkit detection based on eBPF. 104582 - David Cevallos-Salas, José Estrada-Jiménez, Danny S. Guamán
, Luis Urquiza-Aguiar
:
Ransomware dynamics: Mitigating personal data exfiltration through the SCIRAS lens. 104583 - Renato Solimar Alves, Jady Pamella Barbacena da Silva
, Luiz Antônio Ribeiro Júnior, Rafael Rabelo Nunes:
Enhancing cybersecurity in the judiciary: Integrating additional controls into the CIS framework. 104584 - Zhen Li, Qi Liao:
To insure or not to insure: How attackers exploit cyber-insurance via game theory. 104585 - Kai Yang, Yingjun Zhang, Ting Li, Limin Sun:
ASIDS: Acoustic side-channel based intrusion detection system for industrial robotic arms. 104586 - Yinhao Qi
, Chuyi Yan, Zehui Wang, Chen Zhang, Song Liu, Zhigang Lu, Bo Jiang
:
ATHITD: Attention-based temporal heterogeneous graph neural network for insider threat detection. 104587 - Hongmei Li, Tiantian Zhu
, Jie Ying, Tieming Chen, Mingqi Lv, Jian-Ping Mei, Zhengqiu Weng, Lili Shi:
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection. 104588 - Weiping Wang, Chenyu Wang, Hong Song, Kai Chen, Shigeng Zhang:
ProvGOutLiner: A lightweight anomaly detection method based on process behavior features within provenance graphs. 104589 - Ting He:
Physical-layer identity-authentication mechanism for network time synchronisation using network and precision time protocols. 104590 - Andong Chen, Zhaoxuan Jin
, Zhenyuan Li
, Yan Chen
, Yu Ning, Ying Wang:
AutoSeg: Automatic micro-segmentation policy generation via configuration analysis. 104591 - Peng Xu
, Tingting Rao, Wei Wang
, Zhaojun Lu
, Kaitai Liang
:
Power of union: Federated honey password vaults against differential attack. 104592 - Shengrui Lin
, Shaowei Xu, Binjie He, Hongyan Liu, Dezhang Kong, Xiang Chen, Dong Zhang
, Chunming Wu, Ming Li
, Xuan Liu
, Yuqin Wu, Muhammad Khurram Khan:
NDIF: A distributed framework for efficient in-network neural network inference. 104593 - Zhiming Chu
, Guyue Li, Qingchun Meng, Haobo Li, Yuwei Zeng
:
Privacy-preserving WiFi sensing in WSNs via CSI obfuscation. 104594 - Gajanan Nanaji Tikhe, Pushpinder Singh Patheja:
Feature attention assisted convolutional stacked sparse auto-encoder model for intrusion detection in network function virtualization environment. 104595 - Sijjad Ali
, Dhani Bux Talpur, Adeel Abro, Khulud Salem S. Alshudukhi, Ghadah Naif Alwakid, Mamoona Humayun, Farhan Bashir, Shuaib Ahmed Wadho, Asadullah Shah:
Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions. 104599 - Priva Chassem Kamdem
, Alain B. Zemkoho
, Laurent Njilla, Marcellin Nkenlifack
, Charles A. Kamhoua
:
Multi-domain deception for enhanced security in automotive networks. 104600 - Junbi Xiao, Zhaoyu Yin, Yuhao Zhou, Kai Liu, Jian Wang, Peiying Zhang:
P4Drop: A lightweight security function for filtering TCP spoofing packets on programmable switches. 104601 - Argianto Rahartomo
, Leonel Merino, Mohammad Ghafari:
Metaverse security and privacy research: A systematic review. 104602 - Maxwell Dorgbefu Jnr
, Yaw Marfo Missah, Najim Ussiph, Gaddafi Abdul-Salaam, Oliver Kornyo
, Joseph Mawulorm Mensah:
Hybrid framework of differential privacy and secure multi-party computation for privacy-preserving entity resolution. 104603 - Gizem Kayisoglu
, Emre Duzenli
, Pelin Bolat, Aleksei Bondarenko:
Exploring cyber security threats and security models in cross-border paperless maritime trade system. 104604 - Hiba Hnaini
, Raúl Mazo, Paola Vallejo, Andrés López, Joël Champeau:
Enhancing security requirements specification with SECRET-SCORE: A template-driven and ontology-based approach. 104605 - Allan Nganga
, Joel Scanlan
, Margareta Lützhöft, Steven Mallam:
Cyber risk communication during vessel incident management: A case study. 104607 - Yongyi Chen, Yu-Ling Hsueh
:
A personalized and semantic-aware approach for trajectory protection. 104608 - Zhenwu Xu, Xingshu Chen, Liangguo Chen, Xiao Lan, Hao Ren, Changxiang Shen:
An efficient and commercial proof of storage scheme supporting dynamic data updates. 104609 - Yuling Luo, Yali Wan, Xue Ouyang
, Junxiu Liu, Qiang Fu, Sheng Qin, Ziqi Yuan, Tinghua Hu:
Time series correlated key-value data collection with local differential privacy. 104610 - Haohua Qing, Roliana Ibrahim, Hui Wen Nies:
Location privacy protection method based on social network platform. 104611 - Lynda Kacha:
NKAB: An optimization approach for k-anonymity based on Black Hole Algorithm. 104612 - Ping Guo, Shuilong Xu, Wenfeng Liang:
A cloud-assisted anonymous and privacy-preserving authentication scheme for internet of medical things. 104614 - Xinxin Ye
, Youwen Zhu, Jie Pan, Miao Zhang, Hai Deng:
PrivRS: Differentially private synthetic data generation via role similarity. 104616 - Gianpietro Castiglione
, Daniele Francesco Santamaria, Giampaolo Bella, Laura Brisindi, Gaetano Puccia:
Guiding cybersecurity compliance: An ontology for the NIS 2 directive. 104617 - Andra Cojocaru
:
Aligning regulation and governance for cyber resilience: A theoretical framework for the UK Financial Sector. 104627 - Nikolaos Pitropakis:
IFIP SEC 2023 and 2024 selected papers. 104596 - Nilantha Prasad, Abebe Diro, Matthew J. Warren, Mahesh Fernando:
A survey of cyber threat attribution: Challenges, techniques, and future directions. 104606 - Simeone Pizzi, Samuele Doria, Nicholas Miazzo, Eleonora Losiouk:
VirtualPatch: Distributing Android security patches through Android virtualization. 104615 - Md. Rayhanur Rahman, Setu Kumar Basak, Rezvan Mahdavi-Hezaveh, Laurie A. Williams:
SoK: An empirical investigation of malware techniques in advanced persistent threat attacks. 104618 - Yaser Baseri, Vikas Chouhan, Ali A. Ghorbani, Aaron Chow:
Corrigendum to "Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition" [Computers & Security, 150, 104272]. 104619

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.