default search action
Computers & Security, Volume 128
Volume 128, May 2023
- Yonghe Tang, Xuyan Qi, Jing Jing, Chunling Liu, Weiyu Dong:
BHMDC: A byte and hex n-gram based malware detection and classification method. 103118 - Razvan Beuran, Jan Vykopal, Daniela Belajová, Pavel Celeda, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. 103120 - Felix Schuckert, Basel Katt, Hanno Langweg:
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. 103121 - Morteza Safaei Pour, Christelle Nader, Kurt Friday, Elias Bou-Harb:
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. 103123 - Yinwei Wu, Meijin Li, Qi Zeng, Tao Yang, Junfeng Wang, Zhiyang Fang, Luyu Cheng:
DroidRL: Feature selection for android malware detection with reinforcement learning. 103126 - Sara Qamar, Zahid Anwar, Mehreen Afzal:
A systematic threat analysis and defense strategies for the metaverse and extended reality systems. 103127 - Konstantinos Charmanas, Nikolaos Mittas, Lefteris Angelis:
Topic and influence analysis on technological patents related to security vulnerabilities. 103128 - Ying Xing, Hui Shu, Fei Kang:
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning. 103129 - Tobias D. Weickert, Adam N. Joinson, Barnaby Craggs:
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice. 103130 - Wei Wang, Songlei Jian, Yusong Tan, Qingbo Wu, Chenlin Huang:
Robust unsupervised network intrusion detection with self-supervised masked context reconstruction. 103131 - Jianbing Liang, Suxia Wang, Shuang Zhao, Shuhui Chen:
FECC: DNS tunnel detection model based on CNN and clustering. 103132 - Gabriele Costa, Pierpaolo Degano, Letterio Galletta, Simone Soderi:
Formally verifying security protocols built on watermarking and jamming. 103133 - Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. 103134 - Xianglong He, Yuezun Li, Haipeng Qu, Junyu Dong:
Improving transferable adversarial attack via feature-momentum. 103135 - Obi Ogbanufe, Ling Ge:
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations. 103136 - Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
"Generic and unusable"1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. 103137 - Shawn P. Duncan, Hui Chen:
Detecting network-based internet censorship via latent feature representation learning. 103138 - Haralambos Mouratidis, Shareeful Islam, Antonio Santos-Olmo, Luis Enrique Sánchez, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. 103139 - Ann Yi Wong, Eyasu Getahun Chekole, Martín Ochoa, Jianying Zhou:
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. 103140 - Wen Ding Xiong, Kai Lun Luo, Rui Li:
AIDTF: Adversarial training framework for network intrusion detection. 103141 - Chen Gao, Jia Yu:
SecureRC: A system for privacy-preserving relation classification using secure multi-party computation. 103142 - Zihao Wang, Vrizlynn L. L. Thing:
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. 103143 - Tianyue Zhang, Wei Chen, Yuxiao Liu, Lifa Wu:
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model. 103144 - Peter Aaby, Mario Valerio Giuffrida, William J. Buchanan, Zhiyuan Tan:
An omnidirectional approach to touch-based continuous authentication. 103146 - Yuzhe Li, Yong Liu, Bo Li, Weiping Wang, Nan Liu:
Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM. 103147 - G. Nirmalapriya, Balajee Maram, Ramanathan Lakshmanan, M. Navaneethakrishnan:
ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection. 103155 - Li Li, Tianfeng Li, Hua Cai, Jian Zhang, Jianjun Wang:
I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem. 103156 - Chuan Qin, Jiaqian Peng, Puzhuo Liu, Yaowen Zheng, Kai Cheng, Weidong Zhang, Limin Sun:
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. 103157 - Raphael Hoheisel, Guido van Capelleveen, Dipti Kapoor Sarmah, Marianne Junger:
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains. 103158 - Haitian Yang, Xiang Meng, Xuan Zhao, Yan Wang, Yuejun Liu, Xiaoyu Kang, Jiahui Shen, Weiqing Huang:
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. 103159 - Timothy R. McIntosh, A. S. M. Kayes, Yi-Ping Phoebe Chen, Alex Ng, Paul A. Watters:
Applying staged event-driven access control to combat ransomware. 103160 - Gareth Mott, Sarah Turner, Jason R. C. Nurse, Jamie MacColl, James Sullivan, Anna Cartwright, Edward J. Cartwright:
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. 103162 - Yu Wang, Liquan Chen, Ge Wu, Kunliang Yu, Tianyu Lu:
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing. 103163 - Gaurav Bansal, Jason Thatcher, Sebastian Walter Schuetz:
Where authorities fail and experts excel: Influencing internet users' compliance intentions. 103164 - Clemens-Alexander Brust, Tim Sonnekalb, Bernd Gruner:
ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language. 103165 - Alessandro Nichelini, Carlo Alberto Pozzoli, Stefano Longari, Michele Carminati, Stefano Zanero:
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN. 103166 - Giampaolo Bovenzi, Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri, Valerio Persico, Antonio Pescapè:
Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness. 103167 - Kyoungmin Ko, Sunghwan Kim, Hyun Kwon:
Multi-targeted audio adversarial example for use against speech recognition systems. 103168 - Sun-Jin Lee, Yu-Rim Lee, So-Eun Jeon, Il-Gu Lee:
Machine learning-based jamming attack classification and effective defense technique. 103169 - Isaac Daniel Sanchez-Garcia, Tomás San Feliu Gilabert, José Antonio Calvo-Manzano:
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review. 103170 - Xueying Han, Susu Cui, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu:
Network intrusion detection based on n-gram frequency and time-aware transformer. 103171 - Ferhat Arat, Sedat Akleylek:
Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. 103174 - Xiuli Ma, Wenbin Zhu, Jieling Wei, Yanliang Jin, Dongsheng Gu, Rui Wang:
EETC: An extended encrypted traffic classification algorithm based on variant resnet network. 103175 - Wang Yang, Mingzhe Gao, Ligeng Chen, Zhengxuan Liu, Lingyun Ying:
RecMaL: Rectify the malware family label via hybrid analysis. 103177 - Rishikesh Sahay, Daniel A. Sepulveda Estay, Weizhi Meng, Christian Damsgaard Jensen, Michael Bruhn Barfod:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. 103179 - Yinghui Huang, Wenting Shen, Jing Qin, Huiying Hou:
Privacy-preserving certificateless public auditing supporting different auditing frequencies. 103181 - Xiaofan Nie, Liwei Chen, Haolai Wei, Yuantong Zhang, Ningning Cui, Gang Shi:
KPDFI: Efficient data flow integrity based on key property against data corruption attack. 103183 - Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers:
Stationary mobile behavioral biometrics: A survey. 103184
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.