


default search action
Computers & Security, Volume 93
Volume 93, June 2020
- Yuting Liang, Reza Samavi

:
Optimization-based k-anonymity algorithms. 101753 - Mudassar Aslam

, Bushra Mohsin, Abdul Nasir Khan
, Shahid Raza
:
FoNAC - An automated Fog Node Audit and Certification scheme. 101759 - Yong Fang

, Cheng Huang
, Yu Su, Yaoyao Qiu:
Detecting malicious JavaScript code based on semantic analysis. 101764 - Daniel G. Arce:

Cybersecurity and platform competition in the cloud. 101774 - Stefano Sebastio

, Eduard Baranov, Fabrizio Biondi, Olivier Decourbe, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, Jean Quilbeuf:
Optimizing symbolic execution for malware behavior classification. 101775 - Mari Karjalainen, Mikko T. Siponen

, Suprateek Sarker:
Toward a stage theory of the development of employees' information security behavior. 101782 - Oluwafemi Olukoya

, Lewis Mackenzie, Inah Omoronyia:
Towards using unstructured user input request for malware detection. 101783 - Rong Wang

, Yan Zhu
, Chin-Chen Chang
, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. 101785 - Youcef Imine

, Ahmed Lounis
, Abdelmadjid Bouabdallah:
An accountable privacy-preserving scheme for public information sharing systems. 101786 - Ahmad O. Almashhadani

, Mustafa Kaiiali
, Domhnall Carlin
, Sakir Sezer:
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. 101787 - Amir Jalaly Bidgoly, Hamed Jalaly Bidgoly, Zeynab Arezoumand:

A survey on methods and challenges in EEG based authentication. 101788 - Tengyao Li

, Buhong Wang, Fute Shang, Jiwei Tian
, Kunrui Cao:
Dynamic temporal ADS-B data attack detection based on sHDP-HMM. 101789 - Stephan Berger, Olga Bürger, Maximilian Röglinger:

Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy. 101790 - Xin-jun Pei

, Long Yu
, Shengwei Tian:
AMalNet: A deep learning framework based on graph convolutional networks for malware detection. 101792 - Iman Vakilinia

, Shamik Sengupta:
Vulnerability market as a public-good auction with privacy preservation. 101807 - Chris J. Mitchell

:
The impact of quantum computing on real-world security: A 5G case study. 101825

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














