default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec93.bht:"
@article{DBLP:journals/compsec/AlmashhadaniKCS20, author = {Ahmad O. Almashhadani and Mustafa Kaiiali and Domhnall Carlin and Sakir Sezer}, title = {MaldomDetector: {A} system for detecting algorithmically generated domain names with machine learning}, journal = {Comput. Secur.}, volume = {93}, pages = {101787}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101787}, doi = {10.1016/J.COSE.2020.101787}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlmashhadaniKCS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Arce20, author = {Daniel G. Arce}, title = {Cybersecurity and platform competition in the cloud}, journal = {Comput. Secur.}, volume = {93}, pages = {101774}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101774}, doi = {10.1016/J.COSE.2020.101774}, timestamp = {Fri, 14 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Arce20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AslamMKR20, author = {Mudassar Aslam and Bushra Mohsin and Abdul Nasir Khan and Shahid Raza}, title = {FoNAC - An automated Fog Node Audit and Certification scheme}, journal = {Comput. Secur.}, volume = {93}, pages = {101759}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101759}, doi = {10.1016/J.COSE.2020.101759}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AslamMKR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BergerBR20, author = {Stephan Berger and Olga B{\"{u}}rger and Maximilian R{\"{o}}glinger}, title = {Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy}, journal = {Comput. Secur.}, volume = {93}, pages = {101790}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101790}, doi = {10.1016/J.COSE.2020.101790}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BergerBR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BidgolyBA20, author = {Amir Jalaly Bidgoly and Hamed Jalaly Bidgoly and Zeynab Arezoumand}, title = {A survey on methods and challenges in {EEG} based authentication}, journal = {Comput. Secur.}, volume = {93}, pages = {101788}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101788}, doi = {10.1016/J.COSE.2020.101788}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BidgolyBA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangHSQ20, author = {Yong Fang and Cheng Huang and Yu Su and Yaoyao Qiu}, title = {Detecting malicious JavaScript code based on semantic analysis}, journal = {Comput. Secur.}, volume = {93}, pages = {101764}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101764}, doi = {10.1016/J.COSE.2020.101764}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FangHSQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ImineLB20, author = {Youcef Imine and Ahmed Lounis and Abdelmadjid Bouabdallah}, title = {An accountable privacy-preserving scheme for public information sharing systems}, journal = {Comput. Secur.}, volume = {93}, pages = {101786}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101786}, doi = {10.1016/J.COSE.2020.101786}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ImineLB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarjalainenSS20, author = {Mari Karjalainen and Mikko T. Siponen and Suprateek Sarker}, title = {Toward a stage theory of the development of employees' information security behavior}, journal = {Comput. Secur.}, volume = {93}, pages = {101782}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101782}, doi = {10.1016/J.COSE.2020.101782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarjalainenSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiWSTC20, author = {Tengyao Li and Buhong Wang and Fute Shang and Jiwei Tian and Kunrui Cao}, title = {Dynamic temporal {ADS-B} data attack detection based on sHDP-HMM}, journal = {Comput. Secur.}, volume = {93}, pages = {101789}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101789}, doi = {10.1016/J.COSE.2020.101789}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiWSTC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangS20, author = {Yuting Liang and Reza Samavi}, title = {Optimization-based \emph{k}-anonymity algorithms}, journal = {Comput. Secur.}, volume = {93}, pages = {101753}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101753}, doi = {10.1016/J.COSE.2020.101753}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Mitchell20, author = {Chris J. Mitchell}, title = {The impact of quantum computing on real-world security: {A} 5G case study}, journal = {Comput. Secur.}, volume = {93}, pages = {101825}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101825}, doi = {10.1016/J.COSE.2020.101825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Mitchell20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OlukoyaMO20a, author = {Oluwafemi Olukoya and Lewis Mackenzie and Inah Omoronyia}, title = {Towards using unstructured user input request for malware detection}, journal = {Comput. Secur.}, volume = {93}, pages = {101783}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101783}, doi = {10.1016/J.COSE.2020.101783}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OlukoyaMO20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PeiYT20, author = {Xin{-}jun Pei and Long Yu and Shengwei Tian}, title = {AMalNet: {A} deep learning framework based on graph convolutional networks for malware detection}, journal = {Comput. Secur.}, volume = {93}, pages = {101792}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101792}, doi = {10.1016/J.COSE.2020.101792}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PeiYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SebastioBBDGLPQ20, author = {Stefano Sebastio and Eduard Baranov and Fabrizio Biondi and Olivier Decourbe and Thomas Given{-}Wilson and Axel Legay and Cassius Puodzius and Jean Quilbeuf}, title = {Optimizing symbolic execution for malware behavior classification}, journal = {Comput. Secur.}, volume = {93}, pages = {101775}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101775}, doi = {10.1016/J.COSE.2020.101775}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SebastioBBDGLPQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VakiliniaS20, author = {Iman Vakilinia and Shamik Sengupta}, title = {Vulnerability market as a public-good auction with privacy preservation}, journal = {Comput. Secur.}, volume = {93}, pages = {101807}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101807}, doi = {10.1016/J.COSE.2020.101807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VakiliniaS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZCP20, author = {Rong Wang and Yan Zhu and Chin{-}Chen Chang and Qiang Peng}, title = {Privacy-preserving high-dimensional data publishing for classification}, journal = {Comput. Secur.}, volume = {93}, pages = {101785}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101785}, doi = {10.1016/J.COSE.2020.101785}, timestamp = {Wed, 09 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZCP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.