


default search action
Journal of Computer Security, Volume 32
Volume 32, Number 1, 2024
- Stephen Kahara Wanjau

, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha:
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. 1-30 - Yubao Zhang, Haining Wang, Angelos Stavrou:

A multiview clustering framework for detecting deceptive reviews. 31-52 - Vinod Ramesh Falmari, M. Brindha

:
Secure authentication protocols to resist off-line attacks on authentication data table. 53-76
Volume 32, Number 2, 2024
- Isaac Amankona Obiri, Abigail Akosua Addobea

, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah:
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud. 77-115 - Jianfeng Zhang, Wensheng Zhang, Jingdong Xu:

StegEraser: Defending cybersecurity against malicious covert communications. 117-139 - Jiale Luo, Zhewngyu Zhang, Jiesi Luo, Pin Yang, Runyu Jing:

Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework. 141-163 - Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao:

Cache attacks on subkey calculation of Blowfish. 165-191
Volume 32, Number 3, 2024
- Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun

, Peng Liu:
Analysis of neural network detectors for network attacks. 193-220 - Jin Wei, Ping Chen

:
DSLR-: A low-overhead data structure layout randomization for defending data-oriented programming. 221-246 - David A. Basin, Søren Debois, Thomas T. Hildebrandt:

Proactive enforcement of provisions and obligations. 247-289 - Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:

SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. 291-317
Volume 32, Number 4, 2024
- Prosanta Gope, Zhihui Lin, Yang Yang, Jianting Ning:

E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system. 319-348 - Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel:

Prioritization and exchange chains in privacy-preserving kidney exchange. 349-404 - Yan Gao, Ruizhong Du, Xiaofei Wang, Ruilin Li, Mingyue Li, Ziyuan Wang:

DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing. 405-423
Volume 32, Number 5, 2024
- Liping Zhang, Shukai Chen

, Wei Ren, Geyong Min, Kim-Kwang Raymond Choo:
Accurate authentication based on ECG using deep learning. 425-446 - Danilo Bruschi, Andrea Di Pasquale

, Andrea Lanzi, Elena Pagani
:
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks. 447-475 - Shaila Sharmin

, Hafizah Mansor, Andi Fitriah Abdul Kadir, Normaziah Abdul Aziz:
Benchmarking frameworks and comparative studies of Controller Area Network (CAN) intrusion detection systems: A review. 477-507
Volume 32, Number 6, 2024
- Yiming Li, Shengli Liu:

Identity-based chameleon hash from lattices. 509-531 - Susu Cui, Xueying Han, Cong Dong, Yun Li, Song Liu, Zhigang Lu, Yuling Liu:

MVDet: Encrypted malware traffic detection via multi-view analysis. 533-555 - Garikamukkala Vijaya Kiran

, Vidhya Krishnan:
Adaptive multi-cascaded ResNet-based efficient multimedia steganography framework using hybrid mouth brooding fish-emperor penguin optimization mechanism. 557-588

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














