


default search action
Journal of Computer Security, Volume 31
Volume 31, Number 1, 2023
- Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:

Secure protocols for cumulative reward maximization in stochastic multi-armed bandits. 1-27 - Kengo Zenitani

:
A scalable algorithm for network reachability analysis with cyclic attack graphs. 29-55 - Stefano Calzavara, Pietro Ferrara

, Claudio Lucchese:
Certifying machine learning models against evasion attacks by program analysis. 57-84 - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:

Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models. 85-105
Volume 31, Number 2, 2023
- Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios:

Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks. 107-128 - Ziyang Han

, Qingqing Ye, Haibo Hu:
OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol. 129-152 - Hammad Afzali, Santiago Torres-Arias

, Reza Curtmola, Justin Cappos:
Towards verifiable web-based code review systems. 153-184
Volume 31, Number 3, 2023
- Asma Salem, Ahmad Abdel-Aziz Sharieh, Riad Jabri:

Online User Authentication System Using Keystroke Dynamics. 185-215 - Tobias Klenze, Christoph Sprenger

, David A. Basin:
IsaNet: A framework for verifying secure data plane protocols. 217-259 - Flávio Neves, Rafael Roque de Souza, Juliana Sousa, Michel S. Bonfim, Vinicius C. Garcia

:
Data privacy in the Internet of Things based on anonymization: A review. 261-291
Volume 31, Number 4, 2023
- Diego Sempreboni, Luca Viganò:

A mutation-based approach for the formal and automated analysis of security ceremonies. 293-364 - Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:

A review on cloud security issues and solutions. 365-391 - Jianfeng Zhang

, Wensheng Zhang, Jingdong Xu:
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception. 393-417
Volume 31, Number 5, 2023
- Stefano Calzavara, David A. Naumann:

Special issue: 35th IEEE Computer Security Symposium - CSF 2022. 419-420 - David Mestel, Johannes Müller

, Pascal Reisert
:
How efficient are replay attacks against vote privacy? A formal quantitative analysis. 421-467 - Constantin Catalin Dragan

, François Dupressoir
, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan
, Peter B. Rønne
, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. 469-499 - Vincent Cheval

, Raphaëlle Crubillé, Steve Kremer
:
Symbolic protocol verification with dice. 501-538 - Natasha Fernandes

, Annabelle McIver
, Catuscia Palamidessi, Ming Ding:
Universal optimality and robust utility bounds for metric differential privacy. 539-580 - Liyi Li

, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A formal model of Checked C. 581-614 - Priyanka Mondal, Maximilian Algehed, Owen Arden:

Flow-limited authorization for consensus, replication, and secret sharing. 615-645
Volume 31, Number 6, 2023
- Shamik Sural, Haibing Lu:

Guest editors' introduction. 647 - Jingzhe Wang, Balaji Palanisamy:

Securing blockchain-based timed data release against adversarial attacks. 649-677 - Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray:

The intrinsic dimensionality of network datasets and its applications. 679-704 - Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:

Con2Mix: A semi-supervised method for imbalanced tabular security data. 705-726 - Anis Bkakria:

Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. 727-760

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














