default search action
Computers & Security, Volume 122
Volume 122, November 2022
- Alejandro Guerra-Manzanares, Hayretdin Bahsi:
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection. 102835 - Ferda Özdemir Sönmez, Chris Hankin, Pasquale Malacaria:
Decision support for healthcare cyber security. 102865 - Weizhong Qiang, Lin Yang, Hai Jin:
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks. 102871 - Ce Li, Zijun Cheng, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun:
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. 102872 - David Martínez, Eusebi Calle, Albert Jové, Cristina Pérez-Solà:
Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies. 102873 - Nidhi Desai, Manik Lal Das, Payal Chaudhari, Naveen Kumar:
Background knowledge attacks in privacy-preserving data publishing models. 102874 - Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, Takua Mokhamed, Nafisa Ahmed, Bayan Mahfood:
APT beaconing detection: A systematic review. 102875 - Haotian Zhang, Xu Ma:
Misleading attention and classification: An adversarial attack to fool object detection models in the real world. 102876 - Paul Loft, Ying He, Iryna Yevseyeva, Isabel Wagner:
CAESAR8: An agile enterprise architecture approach to managing information security risks. 102877 - Navdeep S. Chahal, Preeti Bali, Praveen Kumar Khosla:
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform. 102886 - Mauro Conti, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. 102887 - Yexin Duan, Junhua Zou, Xingyu Zhou, Wu Zhang, Zhengyun He, Dazhi Zhan, Jin Zhang, Zhisong Pan:
Adversarial attack via dual-stage network erosion. 102888 - Xuechao Du, Andong Chen, Boyuan He, Hao Chen, Fan Zhang, Yan Chen:
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation. 102889 - Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. 102890 - Leilei Qu, Ruojin Xiao, Wenchang Shi, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. 102891 - Muhammad Mudassar Yamin, Basel Katt:
Use of cyber attack and defense agents in cyber ranges: A case study. 102892 - Nor Hasnul Azirah Abdul Hamid, Normalina Ibrahim @ Mat Nor, Fazlin Marini Hussain, Rajeswari Raju, Humza Naseer, Atif Ahmad:
Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations. 102893 - Yeming Gu, Hui Shu, Pan Yang, Rongkuan Ma:
MinSIB: Minimized static instrumentation for fuzzing binaries. 102894 - Parveen Dhillon, Manpreet Singh:
An ontology oriented service framework for social IoT. 102895 - Jingcheng Yang, Hongwei Li, Shuo Shao, Futai Zou, Yue Wu:
FS-IDS: A framework for intrusion detection based on few-shot learning. 102899 - Baris Özkan, Mehmet Erdem, Eren Özceylan:
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach. 102900 - Moshe Kravchik, Luca Demetrio, Battista Biggio, Asaf Shabtai:
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems. 102901 - Huan Tian, Tianqing Zhu, Wanlei Zhou:
Fairness and privacy preservation for facial images: GAN-based methods. 102902 - Stef Schinagl, Abbas Shahim, Svetlana Khapova:
Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. 102903 - Meriem Benyahya, Anastasija Collen, Sotiria Kechagia, Niels Alexander Nijdam:
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. 102904 - Jingwei Hao, Senlin Luo, Limin Pan:
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning. 102905 - Aliaa Al-Bakaa, Bahaa Al-Musawi:
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. 102906 - Xiuting Gu, Tianqing Zhu, Jie Li, Tao Zhang, Wei Ren, Kim-Kwang Raymond Choo:
Privacy, accuracy, and model fairness trade-offs in federated learning. 102907 - Jung-San Lee, Ying-Chin Chen, Chit-Jie Chew, Chih-Lung Chen, Thu-Nguyet Huynh, Chung-Wei Kuo:
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training. 102908 - Zillah Adahman, Asad Waqar Malik, Zahid Anwar:
An analysis of zero-trust architecture and its cost-effectiveness for organizational security. 102911 - Stephen Hart, Basel Halak, Vladimiro Sassone:
CIST: A Serious Game for Hardware Supply Chain. 102912
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.