Sign in
Comput. Secur.
1982
1996
2010
2024
1982
2024
Keyphrases
Publications
volume 138, 2024
Maoli Wang
,
Xiaodong Zang
,
Jianbo Cao
,
Bowen Zhang
,
Shengbao Li
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network.
Comput. Secur.
138 (2024)
Xixing Li
,
Lei Zhao
,
Qiang Wei
,
Zehui Wu
,
Weiming Shi
,
Yunchao Wang
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices.
Comput. Secur.
138 (2024)
Ziming Zhao
,
Zhaoxuan Li
,
Zhihao Zhou
,
Jiongchi Yu
,
Zhuoxue Song
,
Xiaofei Xie
,
Fan Zhang
,
Rui Zhang
DDoS family: A novel perspective for massive types of DDoS attacks.
Comput. Secur.
138 (2024)
Shouzheng Tao
,
Yezheng Liu
,
Chunhua Sun
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China.
Comput. Secur.
138 (2024)
Henry R. K. Skeoch
Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers & Security Volume 112 (2022) 102533].
Comput. Secur.
138 (2024)
Haitao Xiao
,
Yan Zhu
,
Bin Zhang
,
Zhigang Lu
,
Dan Du
,
Yuling Liu
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis.
Comput. Secur.
138 (2024)
Tom Meurs
,
Edward J. Cartwright
,
Anna Cartwright
,
Marianne Junger
,
Abhishta Abhishta
Deception in double extortion ransomware attacks: An analysis of profitability and credibility.
Comput. Secur.
138 (2024)
Emilio Coppa
,
Sebastian Schrittwieser
Editorial: Special issue on ARES 2022.
Comput. Secur.
138 (2024)
Agata Kruzikova
,
Michal Muzik
,
Lenka Knapova
,
Lenka Dedkova
,
David Smahel
,
Vashek Matyas
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction.
Comput. Secur.
138 (2024)
Yufan Chen
,
Jiahai Yang
,
Susu Cui
,
Cong Dong
,
Bo Jiang
,
Yuling Liu
,
Zhigang Lu
Unveiling encrypted traffic types through hierarchical network characteristics.
Comput. Secur.
138 (2024)
Alejandro Guerra-Manzanares
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives.
Comput. Secur.
138 (2024)
Alyzia Maria Konsta
,
Alberto Lluch-Lafuente
,
Beatrice Spiga
,
Nicola Dragoni
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602].
Comput. Secur.
138 (2024)
Vanlalruata Hnamte
,
Ashfaq Ahmad Najar
,
Hong Nhung-Nguyen
,
Jamal Hussain
,
Manohar Naik Sugali
DDoS attack detection and mitigation using deep neural network in SDN environment.
Comput. Secur.
138 (2024)
Jason A. Williams
,
Humayun Zafar
,
Saurabh Gupta
Fortifying healthcare: An action research approach to developing an effective SETA program.
Comput. Secur.
138 (2024)
Xirong Ma
,
Chuan Ma
,
Yali Jiang
,
Chunpeng Ge
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication.
Comput. Secur.
138 (2024)
Zhimao Gong
,
Junyi Li
,
Yaping Lin
,
Lening Yuan
,
Wen Gao
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing.
Comput. Secur.
138 (2024)
volume 137, 2024
Xiaoyu Wang
,
Xiaobo Yang
,
Xueping Liang
,
Xiu Zhang
,
Wei Zhang
,
Xiaorui Gong
Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection.
Comput. Secur.
137 (2024)
Ran Dubin
Content Disarm and Reconstruction of Microsoft Office OLE files.
Comput. Secur.
137 (2024)
Xiang Li
,
Jiang Xie
,
Qige Song
,
Yafei Sang
,
Yongzheng Zhang
,
Shuhao Li
,
Tianning Zang
Let model keep evolving: Incremental learning for encrypted traffic classification.
Comput. Secur.
137 (2024)
Sibi Chakkaravarthy Sethuraman
,
Devi Priya V. S
,
Tarun Reddi
,
Mulka Sai Tharun Reddy
,
Muhammad Khurram Khan
A comprehensive examination of email spoofing: Issues and prospects for email security.
Comput. Secur.
137 (2024)
Fatima Mavra Khalil
,
Adnan Fazil
,
Muhammad Jawad Hussain
,
Ammar Masood
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems.
Comput. Secur.
137 (2024)
Soumia Zohra El Mestari
,
Gabriele Lenzini
,
Hüseyin Demirci
Preserving data privacy in machine learning systems.
Comput. Secur.
137 (2024)
Nilufer Tuptuk
,
Stephen Hailes
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation.
Comput. Secur.
137 (2024)
Hui Sun
,
Tianqing Zhu
,
Wenhan Chang
,
Wanlei Zhou
A two-stage model extraction attack on GANs with a small collected dataset.
Comput. Secur.
137 (2024)
Hongsong Chen
,
Xingyu Li
,
Wenmao Liu
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model.
Comput. Secur.
137 (2024)
Man Zhou
,
Xin Che
Stealthy attack detection based on controlled invariant subspace for autonomous vehicles.
Comput. Secur.
137 (2024)
Xintong Wang
,
Zixuan Wang
,
Enliang Wang
,
Zhixin Sun
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection.
Comput. Secur.
137 (2024)
Deepa D. Shankar
,
Adresya Suresh Azhakath
,
Nesma Khalil
,
Sajeev J
,
Mahalakshmi T
,
Sheeba K
Data mining for cyber biosecurity risk management - A comprehensive review.
Comput. Secur.
137 (2024)
Rafal Kozik
,
Massimo Ficco
,
Aleksandra Pawlicka
,
Marek Pawlicki
,
Francesco Palmieri
,
Michal Choras
When explainability turns into a threat - using xAI to fool a fake news detection method.
Comput. Secur.
137 (2024)
Longwen Zhang
,
Qiao Yan
Detect malicious websites by building a neural network to capture global and local features of websites.
Comput. Secur.
137 (2024)
Jeff Mitchell
,
Niall McLaughlin
,
Jesús Martínez del Rincón
Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME.
Comput. Secur.
137 (2024)
Peng Chen
,
Xin Du
,
Zhihui Lu
,
Hongfeng Chai
Universal adversarial backdoor attacks to fool vertical federated learning.
Comput. Secur.
137 (2024)
Juanjuan Weng
,
Zhiming Luo
,
Dazhen Lin
,
Shaozi Li
Learning transferable targeted universal adversarial perturbations by sequential meta-learning.
Comput. Secur.
137 (2024)
Junhao Li
,
Junjiang He
,
Wenshan Li
,
Wenbo Fang
,
Geying Yang
,
Tao Li
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM.
Comput. Secur.
137 (2024)
Binghui Zou
,
Chunjie Cao
,
Longjuan Wang
,
Sizheng Fu
,
Tonghua Qiao
,
Jingzhang Sun
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification.
Comput. Secur.
137 (2024)
Tanguy Gernot
,
Christophe Rosenberger
Robust biometric scheme against replay attacks using one-time biometric templates.
Comput. Secur.
137 (2024)
Anil V. Turukmane
,
Ramkumar Devendiran
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning.
Comput. Secur.
137 (2024)
Susanne Durst
,
Christoph Hinteregger
,
Malgorzata Zieba
The effect of environmental turbulence on cyber security risk management and organizational resilience.
Comput. Secur.
137 (2024)
Alyzia Maria Konsta
,
Alberto Lluch-Lafuente
,
Beatrice Spiga
,
Nicola Dragoni
Survey: Automatic generation of attack trees and attack graphs.
Comput. Secur.
137 (2024)
Joakim Kävrestad
,
Jana Rambusch
,
Marcus Nohlberg
Design principles for cognitively accessible cybersecurity training.
Comput. Secur.
137 (2024)
Cheng-kun Jia
,
Min Long
,
Yong-chao Liu
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network.
Comput. Secur.
137 (2024)
Haoxiang Huang
,
Jianbiao Zhang
,
Lei Zhang
,
Jun Hu
,
Yihao Cao
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node.
Comput. Secur.
137 (2024)
Austin Brown
,
Maanak Gupta
,
Mahmoud Abdelsalam
Automated machine learning for deep learning based malware detection.
Comput. Secur.
137 (2024)
Valentina Casola
,
Alessandra De Benedictis
,
Carlo Mazzocca
,
Vittorio Orbinato
Secure software development and testing: A model-based methodology.
Comput. Secur.
137 (2024)
Natalia Krzyworzeka
,
Lidia Ogiela
,
Marek R. Ogiela
Personal CAPTCHA-based authentication protocol.
Comput. Secur.
137 (2024)
Pedro Miguel Sánchez Sánchez
,
Alberto Huertas Celdrán
,
Gérôme Bovet
,
Gregorio Martínez Pérez
Single-board device individual authentication based on hardware performance and autoencoder transformer models.
Comput. Secur.
137 (2024)
Syed Rizvi
,
Iyonna Williams
Analyzing transparency and malicious insiders prevention for cloud computing environment.
Comput. Secur.
137 (2024)
Benyuan Yang
,
Lili Luo
,
Zhimeng Wang
Ensuring secure interoperation of access control in a multidomain environment.
Comput. Secur.
137 (2024)
Domna Bilika
,
Nikoletta Michopoulou
,
Efthimios Alepis
,
Constantinos Patsakis
Hello me, meet the real me: Voice synthesis attacks on voice assistants.
Comput. Secur.
137 (2024)
Rui Zhao
Toward the flow-centric detection of browser fingerprinting.
Comput. Secur.
137 (2024)