Login / Signup
Comput. Secur.
1982
1997
2007
2024
1982
2024
Keyphrases
Publications
volume 146, 2024
Sotirios Katsikeas
,
Andrei Buhaiu
,
Mathias Ekstedt
,
Zeeshan Afzal
,
Simon Hacks
,
Preetam Mukherjee
Development and validation of coreLang: A threat modeling language for the ICT domain.
Comput. Secur.
146 (2024)
Alireza Zohourian
,
Sajjad Dadkhah
,
Heather Molyneaux
,
Euclides Carlos Pinto Neto
,
Ali A. Ghorbani
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks.
Comput. Secur.
146 (2024)
Jiyun Yang
,
Hanwei Li
,
Lijun He
,
Tao Xiang
,
Yujie Jin
MDADroid: A novel malware detection method by constructing functionality-API mapping.
Comput. Secur.
146 (2024)
Muhammed Maruf Öztürk
A cosine similarity-based labeling technique for vulnerability type detection using source codes.
Comput. Secur.
146 (2024)
Jinyin Chen
,
Zhiqi Cao
,
Ruoxi Chen
,
Haibin Zheng
,
Xiao Li
,
Qi Xuan
,
Xing Yang
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation.
Comput. Secur.
146 (2024)
Zhenhua Yang
,
Jun Kong
Cue-based two factor authentication.
Comput. Secur.
146 (2024)
Ruizhong Du
,
Zhuang Liang
,
Xiaoyan Liang
Privacy-preserving quadratic truth discovery based on Precision partitioning.
Comput. Secur.
146 (2024)
Hanlin Yang
,
Yajun Guo
,
Yimin Guo
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming.
Comput. Secur.
146 (2024)
Alessandro Palma
,
Giacomo Acitelli
,
Andrea Marrella
,
Silvia Bonomi
,
Marco Angelini
A compliance assessment system for Incident Management process.
Comput. Secur.
146 (2024)
Akanksha Dixit
,
Bruno Bogaz Zarpelão
,
Max Smith-Creasey
,
Muttukrishnan Rajarajan
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace.
Comput. Secur.
146 (2024)
Rudri Kalaria
,
A. S. M. Kayes
,
Wenny Rahayu
,
Eric Pardede
,
Ahmad Salehi S.
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks.
Comput. Secur.
146 (2024)
Fan Zhou
,
Dongxia Wang
,
Yanhai Xiong
,
Kun Sun
,
Wenhai Wang
FAMCF: A few-shot Android malware family classification framework.
Comput. Secur.
146 (2024)
Otman Driouch
,
Slimane Bah
,
Zouhair Guennoun
CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic.
Comput. Secur.
146 (2024)
Haibin Hu
,
Renxin Liu
,
Rilong Liu
An intelligent diagnostic model for industrial equipment with privacy protection.
Comput. Secur.
146 (2024)
Sarath Babu
,
Virendra Singh
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier.
Comput. Secur.
146 (2024)
Rahim Taheri
,
Mohammad Shojafar
,
Farzad Arabikhan
,
Alexander E. Gegov
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks.
Comput. Secur.
146 (2024)
Chao Zha
,
Zhiyu Wang
,
Yifei Fan
,
Xingming Zhang
,
Bing Bai
,
Yinjie Zhang
,
Sainan Shi
,
Ruyun Zhang
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture.
Comput. Secur.
146 (2024)
Nilin Prabhaker
,
Ghanshyam S. Bopche
,
Michael Arock
Generation and deployment of honeytokens in relational databases for cyber deception.
Comput. Secur.
146 (2024)
Quanqiang Zhou
,
Cheng Huang
A recommendation attack detection approach integrating CNN with Bagging.
Comput. Secur.
146 (2024)
Bailin Xie
,
Qi Li
,
Yu Wang
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks.
Comput. Secur.
146 (2024)
Zimin Mao
,
Shuiyan Chen
,
Zhuang Miao
,
Heng Li
,
Beihao Xia
,
Junzhe Cai
,
Wei Yuan
,
Xinge You
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks.
Comput. Secur.
146 (2024)
Pejman Najafi
,
Feng Cheng
,
Christoph Meinel
HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity.
Comput. Secur.
146 (2024)
Bo Zhang
,
Yu-Jie Xiong
,
Chunming Xia
,
Yongbin Gao
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention.
Comput. Secur.
146 (2024)
Anja Klauzer
,
Markus Maier
,
Lore Abart-Heriszt
,
Johanna Ullrich
Fostering security research in the energy sector: A validation of open source intelligence for power grid model data.
Comput. Secur.
146 (2024)
Zheng Zhang
,
Jingfeng Xue
,
Thar Baker
,
Tian Chen
,
Yu-an Tan
,
Yuanzhang Li
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module.
Comput. Secur.
146 (2024)
Karl van der Schyff
,
Suzanne Prior
,
Karen Renaud
Privacy policy analysis: A scoping review and research agenda.
Comput. Secur.
146 (2024)
volume 145, 2024
Or Haim Anidjar
,
Revital Marbel
,
Ran Dubin
,
Amit Dvir
,
Chen Hajaj
Extending limited datasets with GAN-like self-supervision for SMS spam detection.
Comput. Secur.
145 (2024)
Arunachalam Rajesh
,
Kanmani Ruby Erode Dhanapal
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection.
Comput. Secur.
145 (2024)
Lata Nautiyal
,
Awais Rashid
A framework for mapping organisational workforce knowledge profile in cyber security.
Comput. Secur.
145 (2024)
Felix Viktor Jedrzejewski
,
Lukas Thode
,
Jannik Fischbach
,
Tony Gorschek
,
Daniel Méndez
,
Niklas Lavesson
Adversarial Machine Learning in Industry: A Systematic Literature Review.
Comput. Secur.
145 (2024)
Rongcun Wang
,
Senlei Xu
,
Yuan Tian
,
Xingyu Ji
,
Xiaobing Sun
,
Shujuan Jiang
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT.
Comput. Secur.
145 (2024)
Zisheng Xu
,
Qiao Yan
Boosting the transferability of adversarial CAPTCHAs.
Comput. Secur.
145 (2024)
Justin Woodring
,
Katherine Perez
,
Aisha I. Ali-Gombe
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models.
Comput. Secur.
145 (2024)
Yi-Wei Ma
,
Chia-Wei Tsou
A novel passive-active detection system for false data injection attacks in industrial control systems.
Comput. Secur.
145 (2024)
Mohammad Hamad
,
Andreas Finkenzeller
,
Michael Kühr
,
Andrew Roberts
,
Olaf Maennel
,
Vassilis Prevelakis
,
Sebastian Steinhorst
REACT: Autonomous intrusion response system for intelligent vehicles.
Comput. Secur.
145 (2024)
Unal Tatar
,
Bilge Karabacak
,
Omer F. Keskin
,
Dominick P. Foti
Charting new waters with CRAMMTS: A survey-driven cybersecurity risk analysis method for maritime stakeholders.
Comput. Secur.
145 (2024)
Malak Annabi
,
Abdelhafid Zeroual
,
Nadhir Messai
Towards zero trust security in connected vehicles: A comprehensive survey.
Comput. Secur.
145 (2024)
Guiqi Zhang
,
Yufeng Li
Voltage inspector: Sender identification for in-vehicle CAN bus using voltage slice.
Comput. Secur.
145 (2024)
Aiyan Qu
,
Qiuhui Shen
,
Gholamreza Ahmadi
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network.
Comput. Secur.
145 (2024)
Marko Niemimaa
Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour.
Comput. Secur.
145 (2024)
Maximilian Wolf
,
Julian Tritscher
,
Dieter Landes
,
Andreas Hotho
,
Daniel Schlör
Benchmarking of synthetic network data: Reviewing challenges and approaches.
Comput. Secur.
145 (2024)
Yang Qin
,
Xiaofan Yang
,
Lu-Xing Yang
,
Kaifan Huang
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach.
Comput. Secur.
145 (2024)
Yuxiang Ma
,
Zhaodi Li
,
Haoming Xue
,
Jike Chang
A balanced supervised contrastive learning-based method for encrypted network traffic classification.
Comput. Secur.
145 (2024)
Fatma Foad Ashrif
,
Elankovan A. Sundararajan
,
Mohammad Kamrul Hasan
,
Rami Ahmad
,
Salwani Abdullah
,
Raniyah Wazirali
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications.
Comput. Secur.
145 (2024)
Nikolaos Lykousas
,
Constantinos Patsakis
Decoding developer password patterns: A comparative analysis of password extraction and selection practices.
Comput. Secur.
145 (2024)
Ali AlSabeh
,
Kurt Friday
,
Elie F. Kfoury
,
Jorge Crichigno
,
Elias Bou-Harb
On DGA Detection and Classification Using P4 Programmable Switches.
Comput. Secur.
145 (2024)
Yiren Chen
,
Mengjiao Cui
,
Ding Wang
,
Yiyang Cao
,
Peian Yang
,
Bo Jiang
,
Zhigang Lu
,
Baoxu Liu
A survey of large language models for cyber threat detection.
Comput. Secur.
145 (2024)
Xinxing Zhao
,
Kar-Wai Fok
,
Vrizlynn L. L. Thing
Enhancing network intrusion detection performance using generative adversarial networks.
Comput. Secur.
145 (2024)
Alladean Chidukwani
,
Sebastian Zander
,
Polychronis Koutsakis
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications.
Comput. Secur.
145 (2024)
Dincy R. Arikkat
,
P. Vinod
,
Rafidha Rehiman K. A.
,
Serena Nicolazzo
,
Antonino Nocera
,
Georgiana Timpau
,
Mauro Conti
OSTIS: A novel Organization-Specific Threat Intelligence System.
Comput. Secur.
145 (2024)