


default search action
Computers & Security, Volume 159
Volume 159, 2025
- Matthew Adams, Tyler Moore

:
How informative are cybersecurity risk disclosures? Empirical analysis of firms targeted by ransomware. 104626 - Jinlong Wang

, Yunhe Cui
, Rongfei He
, Yi Chen
, Chun Guo, Guowei Shen:
FTOA-RP: A 'group'-based flow entry replacement policy probing and flow table overflow attack method. 104629 - Dongni Zhang

, Xiuzhang Yang, Side Liu, Yilin Zhou, Jianming Fu, Guojun Peng:
A survey on Android dynamic evasive malware: Taxonomy, countermeasures and open challenges. 104646 - Fengrui Hao

, Shiyi Zhao, Tianlong Gu, Yan Ma:
dK-DGDP: A differential privacy approach on directed social network graphs. 104647 - Diegof Bustamantev

, Luis Enrique Sánchez
, David Garcia Rosado
, Antonio Santos-Olmo
, Eduardo Fernández-Medina
:
Towards a sustainable cybersecurity framework for Agriculture 4.0 based on a systematic analysis of proposals. 104650 - Sibo Qiao

, Qiang Guo
, Min Wang
, Haohao Zhu
, Joel J. P. C. Rodrigues
, Zhihan Lyu
:
Advances in network flow watermarking: A survey. 104653 - Yahui Yang

, Yangyang Geng
, Qiang Wei
, Man Zhou
, Xin Che
:
Physical semantic inference method for industrial control proprietary protocol data fields. 104654 - Bert Abrath

, Bart Coppens
, Bjorn De Sutter
:
MVX-based mitigation of position-independent code reuse. 104655 - Luca Borzacchiello

, Matteo Cornacchia
, Davide Maiorca
, Giorgio Giacinto
, Emilio Coppa
:
DroidReach++: Exploring the reachability of native code in android applications. 104657 - Jizhe Li

, Haoran Xu
, Yongjun Wang, Zhiyuan Jiang, Huang Chun, Peidai Xie, Yongxin Chen
, Tian Xia:
Fuzzing JavaScript JIT compilers with a high-quality differential test oracle. 104660 - Alessandra Maciel Paz Milani

, Arty Starr, Samantha Hill, Callum Curtis
, Norman Anderson
, David Moreno-Lumbreras
, Margaret-Anne D. Storey:
Fuzzy to clear: Elucidating the threat hunter cognitive process and cognitive support needs. 104651 - Arash Gholami

, Furkan Alaca, Mohammad Zulkernine:
An anomaly detection based approach for continuous authentication with smartwatch inertial sensors. 104656 - Saurabh Sharma

, Jaiteg Singh, Ankur Gupta, Farman Ali
, Sukhjit Singh Sehra
:
PRIVIUM: A differentiated privacy-privilege model for user security and safety in the metaverse. 104658 - Nadisha Madhushanie

, Sugandima Vidanagamachchi, Nalin A. G. Arachchilage:
Real-time privacy vulnerability detection techniques in software development: A Systematic Literature Review. 104659 - Weining Zheng

, Xiaohong Su, Yuan Jiang, Hongwei Wei
, Wenxin Tao:
VDExplainer: Sequential decision-making and probability sampling guided statement-level explanation for vulnerability detection. 104670 - Fang Li

, Gang Wang, Guangjun Liu, Xiao Xue, Deyu Zhou:
Integrity verification scheme for distributed dynamic data in service ecosystems. 104671 - Lige Zhan

, Jiang Ming, Jianming Fu
, Guojun Peng, Letian Sha, Lili Lan:
The hidden complexities of Android TPL detection: An empirical analysis of techniques, challenges, and effectiveness. 104672 - Vyron Kampourakis

, Georgios Kavallieratos
, Vasileios Gkioulos, Sokratis K. Katsikas:
Cracks in the chain: A technical analysis of real-life supply chain security incidents. 104673 - Ahmad Fairuz Mohamed Noor

, Sedigheh Moghavvemi, Farzana Parveen Tajudeen
:
Identifying key factors of cybersecurity readiness in organizations: Insights from Malaysian critical infrastructure. 104674 - Wasim Ahmad

, Aitizaz Ali:
A new era of advanced privacy solutions with a novel IoT framework on IFTTT. 104675 - Ildi Alla, Selma Yahia, Valeria Loscrì:

TRIDENT: Tri-modal Real-time Intrusion Detection Engine for New Targets. 104676 - Visal Dam

, Fariha Tasmin Jaigirdar
, Kallol Krishna Karmakar, Adnan Anwar
:
Security-aware data provenance for multi-domain software-defined networks. 104677 - Amr Adel

, Noor H. S. Alani, Tony Jan
, Mukesh Prasad:
A review of major ICT failures and recovery strategies: Strengthening digital resilience. 104678 - Shudan Yue

, Qingbao Li, Guimin Zhang
, Xiaonan Li, Bocheng Xu, Song Tian:
NPFTaint: Detecting highly exploitable vulnerabilities in Linux-based IoT firmware with network parsing functions. 104679 - Yang Miao, Xiaoyan Hu, Guang Cheng, Ruidong Li

, Hua Wu, Yang Meng:
WEDoHTool: Word embedding based early identification of DoH tunnel tool traffic in dynamic network environments. 104680 - Kayumov Abduaziz

, Chansu Han
, Ji Sun Shin:
Semi-supervised traceability analysis of investigative scanners of darknet traffic. 104681 - Chaoyang Zheng

, Yunchao Wang, Huihui Huang, Yunfeng Wang, Haowen Chen, Qiang Wei:
Survey of network protocol fuzzers: Taxonomy, techniques, and directions. 104683 - Wenfeng Lin, Fangliang Xu, Zhiyuan Jiang, Gang Yang, Zhiwei Li, Chaojing Tang:

RPFUZZ: Efficient network service fuzzing via pruning redundant mutation. 104684 - Ahmet Kilic:

A quantitative framework for physical cybersecurity in public EVSE systems. 104685 - Weiguang Wang, Xiao Zhang, Jinlian Du, Wenbing Zhao:

Robust continuous authentication via multi-channel photoplethysmography signals: A wearable wristband solution for uncontrolled environments. 104686 - Elham Rostami, Fredrik Karlsson

, Ella Kolkowska, Shang Gao
:
Towards software for tailoring information security policies to organisations' different target groups. 104687 - Yuhan Suo, Runqi Chai

, Kaiyuan Chen, Senchun Chai, Wannian Liang, Yuanqing Xia:
Robust set partitioning strategy for malicious information detection in large-scale Internet of Things. 104688 - Jukka Ruohonen

, Kalle Rindell, Simone Busetti
:
From cyber security incident management to cyber security crisis management in the European Union. 104689 - Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam

, Moustafa Saleh:
Intra-section code cave injection for adversarial evasion attacks on windows PE malware file. 104690 - Hao Jiang

, Kang Wang, Yujie Yang, Shan Zhong, Shuai Zhang, Chengjie Liu
, Xiarun Chen, Weiping Wen:
DynamicFuzz: Confidence-based directed greybox fuzzing for programs with unreliable call graphs. 104691 - Jorge Barredo

, Maialen Eceiza
, Jose Luis Flores
, Mikel Iturbe:
GJALLARHORN: A framework for vulnerability detection via electromagnetic side-channel analysis in embedded systems. 104692 - Rodolfo García-Peñas

, Rafael A. Rodríguez-Gómez, Gabriel Maciá-Fernández:
Characterizing Internet Background Traffic from a Spain-Based Network Telescope. 104693 - Yuanfeng Xie

, Hanqing Luo
, Aoxue Ding:
Design of a high-stability QPUF and QRNG circuit based on CCNOT gate. 104694 - Xiaojian Liu

, Zilin Qin, Kehong Liu:
μGAN: A mutation-based cost optimal adversarial malware generation approach against evolving Android malware variants. 104695 - Orestis Tsirakis, Konstantinos Fysarakis

, Vasileios Mavroeidis, Ioannis Papaefstathiou
:
Operationalizing cybersecurity knowledge: Design, implementation & evaluation of a knowledge management system for CACAO playbooks. 104696 - Xianliang He, Junyi Li

, Yaping Lin, Qiao Hu, Xiehua Li:
TDSF: Trajectory-preserving method of dual-strategy fusion with differential privacy in LBS. 104697 - Priyabrata Dash

, Debasis Samanta
, Monalisa Sarma, Ashok Kumar Das
, Athanasios V. Vasilakos
:
Privacy preserving unique robust and revocable passcode generation from fingerprint data. 104698 - Ferney Martínez

, Luis Enrique Sánchez
, Antonio Santos-Olmo
, David Garcia Rosado, Eduardo Fernández-Medina
:
Integrated maritime protection: Innovation for the safeguarding of maritime systems based on MARISMA. 104699 - P. Mohan Anand, P. V. Sai Charan, Hrushikesh Chunduri, Sandeep Kumar Shukla:

LARM: Linux Anti Ransomware Monitor. 104700 - Zhaowang Hu, Jun Ye

, Zhengqi Zhang:
Faster secure and efficient collaborative private data cleaning based on PSI. 104701 - Aidan M. Winkler, Prinkle Sharma

:
Proactive threat detection in enterprise systems using Wazuh: A MITRE ATT&CK Evaluation. 104702

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














