Search dblp for Publications

export results for "toc:db/journals/compsec/compsec106.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AikenKWR21,
  author       = {William Aiken and
                  Hyoungshick Kim and
                  Simon S. Woo and
                  Jungwoo Ryoo},
  title        = {Neural network laundering: Removing black-box backdoor watermarks
                  from deep neural networks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102277},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102277},
  doi          = {10.1016/J.COSE.2021.102277},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AikenKWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlfosailN21,
  author       = {Malak Alfosail and
                  Peter Norris},
  title        = {Tor forensics: Proposed workflow for client memory artefacts},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102311},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102311},
  doi          = {10.1016/J.COSE.2021.102311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlfosailN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AppiahQAK21,
  author       = {Benjamin Appiah and
                  Zhiguang Qin and
                  Mighty Abra Ayidzoe and
                  Ansuura JohnBosco Aristotle Kanpogninge},
  title        = {Decision tree pairwise metric learning against adversarial attacks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102268},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102268},
  doi          = {10.1016/J.COSE.2021.102268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AppiahQAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaxMH21,
  author       = {Samantha Bax and
                  Tanya Jane McGill and
                  Valerie Hobbs},
  title        = {Maladaptive behaviour in response to email phishing threats: The roles
                  of rewards and response costs},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102278},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102278},
  doi          = {10.1016/J.COSE.2021.102278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaxMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BotacinCSOG21,
  author       = {Marcus Botacin and
                  Fabricio Ceschin and
                  Ruimin Sun and
                  Daniela Oliveira and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Challenges and pitfalls in malware research},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102287},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102287},
  doi          = {10.1016/J.COSE.2021.102287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BotacinCSOG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChewCLCT21,
  author       = {Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Jung{-}San Lee and
                  Chih{-}Lung Chen and
                  Kuo{-}Yu Tsai},
  title        = {Preserving indomitable DDoS vitality through resurrection social hybrid
                  botnet},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102284},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102284},
  doi          = {10.1016/J.COSE.2021.102284},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CotroneoSN21,
  author       = {Domenico Cotroneo and
                  Luigi De Simone and
                  Roberto Natella},
  title        = {Timing covert channel analysis of the VxWorks {MILS} embedded hypervisor
                  under the common criteria security certification},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102307},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102307},
  doi          = {10.1016/J.COSE.2021.102307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CotroneoSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GaoCZ21,
  author       = {Han Gao and
                  Shaoyin Cheng and
                  Weiming Zhang},
  title        = {GDroid: Android malware detection and classification with graph convolutional
                  network},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102264},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102264},
  doi          = {10.1016/J.COSE.2021.102264},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GaoCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarushMS21,
  author       = {Shimon Harush and
                  Yair Meidan and
                  Asaf Shabtai},
  title        = {DeepStream: Autoencoder-based stream temporal clustering and anomaly
                  detection},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102276},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102276},
  doi          = {10.1016/J.COSE.2021.102276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarushMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JeonK21,
  author       = {Sanghoon Jeon and
                  Huy Kang Kim},
  title        = {AutoVAS: An automated vulnerability analysis system with a deep learning
                  approach},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102308},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102308},
  doi          = {10.1016/J.COSE.2021.102308},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JeonK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JuniorE21,
  author       = {Manoel Domingues Junior and
                  Nelson F. F. Ebecken},
  title        = {A new {WAF} architecture with machine learning for resource-efficient
                  use},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102290},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102290},
  doi          = {10.1016/J.COSE.2021.102290},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JuniorE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KangLNW21,
  author       = {Yilin Kang and
                  Yong Liu and
                  Ben Niu and
                  Weiping Wang},
  title        = {Weighted distributed differential privacy {ERM:} Convex and non-convex},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102275},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102275},
  doi          = {10.1016/J.COSE.2021.102275},
  timestamp    = {Thu, 15 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KangLNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhandoGIS21,
  author       = {Khando Khando and
                  Shang Gao and
                  Sirajul M. Islam and
                  Ali Salman},
  title        = {Enhancing employees information security awareness in private and
                  public organisations: {A} systematic literature review},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102267},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102267},
  doi          = {10.1016/J.COSE.2021.102267},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhandoGIS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KucabBC21,
  author       = {Michal Kucab and
                  Piotr Borylo and
                  Piotr Cholda},
  title        = {Remote attestation and integrity measurements with Intel {SGX} for
                  virtual machines},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102300},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102300},
  doi          = {10.1016/J.COSE.2021.102300},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KucabBC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCYCR21,
  author       = {Zhenyuan Li and
                  Qi Alfred Chen and
                  Runqing Yang and
                  Yan Chen and
                  Wei Ruan},
  title        = {Threat detection and investigation with system-level provenance graphs:
                  {A} survey},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102282},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102282},
  doi          = {10.1016/J.COSE.2021.102282},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCYCR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLYL21,
  author       = {Chenxi Li and
                  Jia Li and
                  Jiahai Yang and
                  Jinlei Lin},
  title        = {A novel workload scheduling framework for intrusion detection system
                  in {NFV} scenario},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102271},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102271},
  doi          = {10.1016/J.COSE.2021.102271},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuGH21,
  author       = {Jingmei Liu and
                  Yuanbo Gao and
                  Fengjie Hu},
  title        = {A fast network intrusion detection system using adaptive synthetic
                  oversampling and LightGBM},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102289},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102289},
  doi          = {10.1016/J.COSE.2021.102289},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohantyT21,
  author       = {Susil Kumar Mohanty and
                  Somanath Tripathy},
  title        = {n-HTLC: Neo hashed time-Lock commitment to defend against wormhole
                  attack in payment channel networks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102291},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102291},
  doi          = {10.1016/J.COSE.2021.102291},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MohantyT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NeisariRS21,
  author       = {Ashraf Neisari and
                  Luis Rueda and
                  Sherif Saad},
  title        = {Spam review detection using self-organizing maps and convolutional
                  neural networks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102274},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102274},
  doi          = {10.1016/J.COSE.2021.102274},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NeisariRS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NugrahaM21,
  author       = {Yudhistira Nugraha and
                  Andrew Martin},
  title        = {Towards a framework for trustworthy data security level agreement
                  in cloud procurement},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102266},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102266},
  doi          = {10.1016/J.COSE.2021.102266},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NugrahaM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ReevesCD21,
  author       = {Andrew Reeves and
                  Dragana Calic and
                  Paul H. Delfabbro},
  title        = {"Get a red-hot poker and open up my eyes, it's so boring"\({}^{\mbox{1}}\):
                  Employee perceptions of cybersecurity training},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102281},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102281},
  doi          = {10.1016/J.COSE.2021.102281},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ReevesCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchyffF21,
  author       = {Karl van der Schyff and
                  Stephen Flowerday},
  title        = {Mediating effects of information security awareness},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102313},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102313},
  doi          = {10.1016/J.COSE.2021.102313},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sun21,
  author       = {Pan Jun Sun},
  title        = {A tripartite game model of trust cooperation in cloud service},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102272},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102272},
  doi          = {10.1016/J.COSE.2021.102272},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sun21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VrhovecM21,
  author       = {Simon Vrhovec and
                  Anze Mihelic},
  title        = {Redefining threat appraisals of organizational insiders and exploring
                  the moderating role of fear in cyberattack protection motivation},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102309},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102309},
  doi          = {10.1016/J.COSE.2021.102309},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VrhovecM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangTW21,
  author       = {Peng Wang and
                  Zhijie Tang and
                  Junfeng Wang},
  title        = {A novel few-shot malware classification approach for unknown family
                  recognition with multi-prototype modeling},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102273},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102273},
  doi          = {10.1016/J.COSE.2021.102273},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiangMK21,
  author       = {Zhen Xiang and
                  David J. Miller and
                  George Kesidis},
  title        = {Reverse engineering imperceptible backdoor attacks on deep neural
                  networks for detection and training set cleansing},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102280},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102280},
  doi          = {10.1016/J.COSE.2021.102280},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiangMK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangNF21,
  author       = {Sen Zhang and
                  Weiwei Ni and
                  Nan Fu},
  title        = {Differentially private graph publishing with degree distribution preservation},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102285},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102285},
  doi          = {10.1016/J.COSE.2021.102285},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangNF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangT21,
  author       = {Li Zhang and
                  Vrizlynn L. L. Thing},
  title        = {Three decades of deception techniques in active cyber defense - Retrospect
                  and outlook},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102288},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102288},
  doi          = {10.1016/J.COSE.2021.102288},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics