![](https://dblp.dagstuhl.de/img/logo.ua.320x120.png)
![](https://dblp.dagstuhl.de/img/dropdown.dark.16x16.png)
![](https://dblp.dagstuhl.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
![search dblp](https://dblp.dagstuhl.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 93
Volume 93, June 2020
- Yuting Liang, Reza Samavi
:
Optimization-based k-anonymity algorithms. 101753 - Mudassar Aslam
, Bushra Mohsin, Abdul Nasir Khan
, Shahid Raza
:
FoNAC - An automated Fog Node Audit and Certification scheme. 101759 - Yong Fang
, Cheng Huang
, Yu Su, Yaoyao Qiu:
Detecting malicious JavaScript code based on semantic analysis. 101764 - Daniel G. Arce:
Cybersecurity and platform competition in the cloud. 101774 - Stefano Sebastio
, Eduard Baranov, Fabrizio Biondi, Olivier Decourbe, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, Jean Quilbeuf:
Optimizing symbolic execution for malware behavior classification. 101775 - Mari Karjalainen, Mikko T. Siponen
, Suprateek Sarker:
Toward a stage theory of the development of employees' information security behavior. 101782 - Oluwafemi Olukoya
, Lewis Mackenzie, Inah Omoronyia:
Towards using unstructured user input request for malware detection. 101783 - Rong Wang
, Yan Zhu
, Chin-Chen Chang
, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. 101785 - Youcef Imine
, Ahmed Lounis, Abdelmadjid Bouabdallah:
An accountable privacy-preserving scheme for public information sharing systems. 101786 - Ahmad O. Almashhadani
, Mustafa Kaiiali
, Domhnall Carlin
, Sakir Sezer:
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. 101787 - Amir Jalaly Bidgoly, Hamed Jalaly Bidgoly, Zeynab Arezoumand:
A survey on methods and challenges in EEG based authentication. 101788 - Tengyao Li
, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Dynamic temporal ADS-B data attack detection based on sHDP-HMM. 101789 - Stephan Berger, Olga Bürger, Maximilian Röglinger:
Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy. 101790 - Xin-jun Pei
, Long Yu
, Shengwei Tian:
AMalNet: A deep learning framework based on graph convolutional networks for malware detection. 101792 - Iman Vakilinia
, Shamik Sengupta:
Vulnerability market as a public-good auction with privacy preservation. 101807 - Chris J. Mitchell
:
The impact of quantum computing on real-world security: A 5G case study. 101825
![](https://dblp.dagstuhl.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.