


default search action
Journal of Computer Security, Volume 33
Volume 33, Number 1, 2025
- You Chen, Ning Ding, Dawu Gu, Yang Bian:

Practical multi-party private set intersection cardinality and intersection-sum protocols under arbitrary collusion. 3-36 - Kexiong Fei, Jiang Zhou, Lin Su, Weiping Wang, Yong Chen:

Log2Graph: A graph convolution neural network based method for insider threat detection. 37-56 - Sachin Kumar, Swati Suyal, Ashok Kumar:

Securing Images using Bifid Cipher associated with Arnold Map. 57-76
Volume 33, Number 2, 2025
- Haotian Yan, Haibo Hu, Qingqing Ye, Jianliang Xu:

Multi-hop sanitizable signature for collaborative edge computing. 79-99 - Antonio José Horta Neto, Anderson Fernandes Pereira dos Santos, Ronaldo Ribeiro Goldschmidt:

Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques. 100-115
Volume 33, Number 3, 2025
- Ramadan Abdunabi, Md. Al Amin

, Rejina Basnet:
An authorization framework for body area network: A policy verification and smart contract-based integrity assurance approach. 119-162 - He Kong

, Liqun Yang, Jingguo Ge, Tong Li
, Hui Li
:
ANT-ET: An end-to-end multimodal framework for fine-grained encrypted traffic fingerprinting. 163-179 - Ernest Akpaku

, Jinfu Chen
, Mukhtar Ahmed
, Rexford Nii Ayitey Sosu
, Francis Kwadzo Agbenyegah
, Dominic Kofi Louis
:
eBiTCN: Efficient bidirectional temporal convolution network for encrypted malicious network traffic detection. 180-211
Volume 33, Number 4, 2025
- Haitian Liu, Rong Jiang, Bin Zhou:

An ensemble approach for unsupervised anomaly and cyber attack detection. 215-238 - Héber Hwang Arcolezi

, Karima Makhlouf
, Catuscia Palamidessi
:
Group fairness under obfuscated sensitive information. 239-260 - Yaguan Qian

, Boyuan Ji, Zejie Lian, Renhui Tao, Yaxin Kong, Bin Wang, Wei Wang:
Enhancing robustness of backdoor attacks on real-world object detection systems. 262-280
Volume 33, Number 5, 2025
- Stéphanie Delaune, Joseph Lallemand, Arthur Outrey:

Is one vote really enough? Vote privacy with re-voting and a dishonest ballot box. 283-315 - Xue Tan, Ping Chen

:
FedRAB: Robust federated learning against backdoor attacks based on collaborative defense with smoothing. 316-333 - Jin Wei, Ping Chen

, Jun Dai, Xiaoyan Sun, Zhihao Zhang, Chang Xu, Yi Wang:
HuntFUZZ: Enhancing error handling testing through clustering based fuzzing. 334-359
Volume 33, Number 6, 2025
- Iosif Polenakis, Vasileios Vouronikos, Angjele Merolli, Stavros D. Nikolopoulos:

A PDF watermarking scheme utilizing invisible QR code embedding in the spatial domain. 363-385 - Spiros Chountasis, Dimitrios Pappas, Dimitris Sklavounos:

Network intrusion detection based on a generalized correlation function. 386-401 - Francesca Falzon, Kenneth G. Paterson:

An efficient query recovery attack against a graph encryption scheme. 402-424 - Andreas Viktor Hess, Sebastian Alexander Mödersheim, Achim D. Brucker, Anders Schlichtkrull:

PSPSP: A tool for automated verification of stateful protocols in Isabelle/HOL. 425-469

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














