Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec106.bht:"
@article{DBLP:journals/compsec/AikenKWR21, author = {William Aiken and Hyoungshick Kim and Simon S. Woo and Jungwoo Ryoo}, title = {Neural network laundering: Removing black-box backdoor watermarks from deep neural networks}, journal = {Comput. Secur.}, volume = {106}, pages = {102277}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102277}, doi = {10.1016/J.COSE.2021.102277}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AikenKWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlfosailN21, author = {Malak Alfosail and Peter Norris}, title = {Tor forensics: Proposed workflow for client memory artefacts}, journal = {Comput. Secur.}, volume = {106}, pages = {102311}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102311}, doi = {10.1016/J.COSE.2021.102311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlfosailN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AppiahQAK21, author = {Benjamin Appiah and Zhiguang Qin and Mighty Abra Ayidzoe and Ansuura JohnBosco Aristotle Kanpogninge}, title = {Decision tree pairwise metric learning against adversarial attacks}, journal = {Comput. Secur.}, volume = {106}, pages = {102268}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102268}, doi = {10.1016/J.COSE.2021.102268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AppiahQAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaxMH21, author = {Samantha Bax and Tanya Jane McGill and Valerie Hobbs}, title = {Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs}, journal = {Comput. Secur.}, volume = {106}, pages = {102278}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102278}, doi = {10.1016/J.COSE.2021.102278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaxMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BotacinCSOG21, author = {Marcus Botacin and Fabricio Ceschin and Ruimin Sun and Daniela Oliveira and Andr{\'{e}} Gr{\'{e}}gio}, title = {Challenges and pitfalls in malware research}, journal = {Comput. Secur.}, volume = {106}, pages = {102287}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102287}, doi = {10.1016/J.COSE.2021.102287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BotacinCSOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChewCLCT21, author = {Chit{-}Jie Chew and Ying{-}Chin Chen and Jung{-}San Lee and Chih{-}Lung Chen and Kuo{-}Yu Tsai}, title = {Preserving indomitable DDoS vitality through resurrection social hybrid botnet}, journal = {Comput. Secur.}, volume = {106}, pages = {102284}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102284}, doi = {10.1016/J.COSE.2021.102284}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CotroneoSN21, author = {Domenico Cotroneo and Luigi De Simone and Roberto Natella}, title = {Timing covert channel analysis of the VxWorks {MILS} embedded hypervisor under the common criteria security certification}, journal = {Comput. Secur.}, volume = {106}, pages = {102307}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102307}, doi = {10.1016/J.COSE.2021.102307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CotroneoSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GaoCZ21, author = {Han Gao and Shaoyin Cheng and Weiming Zhang}, title = {GDroid: Android malware detection and classification with graph convolutional network}, journal = {Comput. Secur.}, volume = {106}, pages = {102264}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102264}, doi = {10.1016/J.COSE.2021.102264}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GaoCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarushMS21, author = {Shimon Harush and Yair Meidan and Asaf Shabtai}, title = {DeepStream: Autoencoder-based stream temporal clustering and anomaly detection}, journal = {Comput. Secur.}, volume = {106}, pages = {102276}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102276}, doi = {10.1016/J.COSE.2021.102276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarushMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JeonK21, author = {Sanghoon Jeon and Huy Kang Kim}, title = {AutoVAS: An automated vulnerability analysis system with a deep learning approach}, journal = {Comput. Secur.}, volume = {106}, pages = {102308}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102308}, doi = {10.1016/J.COSE.2021.102308}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JeonK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JuniorE21, author = {Manoel Domingues Junior and Nelson F. F. Ebecken}, title = {A new {WAF} architecture with machine learning for resource-efficient use}, journal = {Comput. Secur.}, volume = {106}, pages = {102290}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102290}, doi = {10.1016/J.COSE.2021.102290}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JuniorE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KangLNW21, author = {Yilin Kang and Yong Liu and Ben Niu and Weiping Wang}, title = {Weighted distributed differential privacy {ERM:} Convex and non-convex}, journal = {Comput. Secur.}, volume = {106}, pages = {102275}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102275}, doi = {10.1016/J.COSE.2021.102275}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KangLNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhandoGIS21, author = {Khando Khando and Shang Gao and Sirajul M. Islam and Ali Salman}, title = {Enhancing employees information security awareness in private and public organisations: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {106}, pages = {102267}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102267}, doi = {10.1016/J.COSE.2021.102267}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhandoGIS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KucabBC21, author = {Michal Kucab and Piotr Borylo and Piotr Cholda}, title = {Remote attestation and integrity measurements with Intel {SGX} for virtual machines}, journal = {Comput. Secur.}, volume = {106}, pages = {102300}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102300}, doi = {10.1016/J.COSE.2021.102300}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KucabBC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCYCR21, author = {Zhenyuan Li and Qi Alfred Chen and Runqing Yang and Yan Chen and Wei Ruan}, title = {Threat detection and investigation with system-level provenance graphs: {A} survey}, journal = {Comput. Secur.}, volume = {106}, pages = {102282}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102282}, doi = {10.1016/J.COSE.2021.102282}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCYCR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLYL21, author = {Chenxi Li and Jia Li and Jiahai Yang and Jinlei Lin}, title = {A novel workload scheduling framework for intrusion detection system in {NFV} scenario}, journal = {Comput. Secur.}, volume = {106}, pages = {102271}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102271}, doi = {10.1016/J.COSE.2021.102271}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuGH21, author = {Jingmei Liu and Yuanbo Gao and Fengjie Hu}, title = {A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM}, journal = {Comput. Secur.}, volume = {106}, pages = {102289}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102289}, doi = {10.1016/J.COSE.2021.102289}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohantyT21, author = {Susil Kumar Mohanty and Somanath Tripathy}, title = {n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks}, journal = {Comput. Secur.}, volume = {106}, pages = {102291}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102291}, doi = {10.1016/J.COSE.2021.102291}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MohantyT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NeisariRS21, author = {Ashraf Neisari and Luis Rueda and Sherif Saad}, title = {Spam review detection using self-organizing maps and convolutional neural networks}, journal = {Comput. Secur.}, volume = {106}, pages = {102274}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102274}, doi = {10.1016/J.COSE.2021.102274}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NeisariRS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NugrahaM21, author = {Yudhistira Nugraha and Andrew Martin}, title = {Towards a framework for trustworthy data security level agreement in cloud procurement}, journal = {Comput. Secur.}, volume = {106}, pages = {102266}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102266}, doi = {10.1016/J.COSE.2021.102266}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NugrahaM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ReevesCD21, author = {Andrew Reeves and Dragana Calic and Paul H. Delfabbro}, title = {"Get a red-hot poker and open up my eyes, it's so boring"\({}^{\mbox{1}}\): Employee perceptions of cybersecurity training}, journal = {Comput. Secur.}, volume = {106}, pages = {102281}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102281}, doi = {10.1016/J.COSE.2021.102281}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ReevesCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchyffF21, author = {Karl van der Schyff and Stephen Flowerday}, title = {Mediating effects of information security awareness}, journal = {Comput. Secur.}, volume = {106}, pages = {102313}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102313}, doi = {10.1016/J.COSE.2021.102313}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sun21, author = {Pan Jun Sun}, title = {A tripartite game model of trust cooperation in cloud service}, journal = {Comput. Secur.}, volume = {106}, pages = {102272}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102272}, doi = {10.1016/J.COSE.2021.102272}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sun21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VrhovecM21, author = {Simon Vrhovec and Anze Mihelic}, title = {Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation}, journal = {Comput. Secur.}, volume = {106}, pages = {102309}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102309}, doi = {10.1016/J.COSE.2021.102309}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VrhovecM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangTW21, author = {Peng Wang and Zhijie Tang and Junfeng Wang}, title = {A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling}, journal = {Comput. Secur.}, volume = {106}, pages = {102273}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102273}, doi = {10.1016/J.COSE.2021.102273}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiangMK21, author = {Zhen Xiang and David J. Miller and George Kesidis}, title = {Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing}, journal = {Comput. Secur.}, volume = {106}, pages = {102280}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102280}, doi = {10.1016/J.COSE.2021.102280}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiangMK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangNF21, author = {Sen Zhang and Weiwei Ni and Nan Fu}, title = {Differentially private graph publishing with degree distribution preservation}, journal = {Comput. Secur.}, volume = {106}, pages = {102285}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102285}, doi = {10.1016/J.COSE.2021.102285}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangNF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangT21, author = {Li Zhang and Vrizlynn L. L. Thing}, title = {Three decades of deception techniques in active cyber defense - Retrospect and outlook}, journal = {Comput. Secur.}, volume = {106}, pages = {102288}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102288}, doi = {10.1016/J.COSE.2021.102288}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.