


default search action
Computers & Security, Volume 128
Volume 128, May 2023
- Yonghe Tang, Xuyan Qi, Jing Jing, Chunling Liu, Weiyu Dong
:
BHMDC: A byte and hex n-gram based malware detection and classification method. 103118 - Razvan Beuran
, Jan Vykopal
, Daniela Belajová
, Pavel Celeda
, Yasuo Tan, Yoichi Shinoda:
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms. 103120 - Felix Schuckert
, Basel Katt
, Hanno Langweg
:
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code. 103121 - Morteza Safaei Pour
, Christelle Nader, Kurt Friday, Elias Bou-Harb:
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security. 103123 - Yinwei Wu, Meijin Li
, Qi Zeng
, Tao Yang, Junfeng Wang, Zhiyang Fang
, Luyu Cheng:
DroidRL: Feature selection for android malware detection with reinforcement learning. 103126 - Sara Qamar, Zahid Anwar
, Mehreen Afzal:
A systematic threat analysis and defense strategies for the metaverse and extended reality systems. 103127 - Konstantinos Charmanas
, Nikolaos Mittas, Lefteris Angelis:
Topic and influence analysis on technological patents related to security vulnerabilities. 103128 - Ying Xing
, Hui Shu, Fei Kang:
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning. 103129 - Tobias D. Weickert
, Adam N. Joinson, Barnaby Craggs
:
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice. 103130 - Wei Wang, Songlei Jian
, Yusong Tan, Qingbo Wu, Chenlin Huang
:
Robust unsupervised network intrusion detection with self-supervised masked context reconstruction. 103131 - Jianbing Liang
, Suxia Wang
, Shuang Zhao
, Shuhui Chen
:
FECC: DNS tunnel detection model based on CNN and clustering. 103132 - Gabriele Costa, Pierpaolo Degano
, Letterio Galletta
, Simone Soderi
:
Formally verifying security protocols built on watermarking and jamming. 103133 - Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. 103134 - Xianglong He
, Yuezun Li
, Haipeng Qu, Junyu Dong:
Improving transferable adversarial attack via feature-momentum. 103135 - Obi Ogbanufe
, Ling Ge:
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations. 103136 - Andrew Reeves
, Dragana Calic, Paul H. Delfabbro:
"Generic and unusable"1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue. 103137 - Shawn P. Duncan, Hui Chen
:
Detecting network-based internet censorship via latent feature representation learning. 103138 - Haralambos Mouratidis
, Shareeful Islam, Antonio Santos-Olmo
, Luis Enrique Sánchez
, Umar Mukhtar Ismail:
Modelling language for cyber security incident handling for critical infrastructures. 103139 - Ann Yi Wong
, Eyasu Getahun Chekole
, Martín Ochoa, Jianying Zhou
:
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies. 103140 - Wen Ding Xiong, Kai Lun Luo, Rui Li:
AIDTF: Adversarial training framework for network intrusion detection. 103141 - Chen Gao, Jia Yu:
SecureRC: A system for privacy-preserving relation classification using secure multi-party computation. 103142 - Zihao Wang
, Vrizlynn L. L. Thing
:
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms. 103143 - Tianyue Zhang
, Wei Chen
, Yuxiao Liu, Lifa Wu:
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model. 103144 - Peter Aaby
, Mario Valerio Giuffrida
, William J. Buchanan
, Zhiyuan Tan
:
An omnidirectional approach to touch-based continuous authentication. 103146 - Yuzhe Li
, Yong Liu
, Bo Li
, Weiping Wang, Nan Liu:
Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM. 103147 - G. Nirmalapriya, Balajee Maram
, Ramanathan Lakshmanan
, M. Navaneethakrishnan:
ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection. 103155 - Li Li, Tianfeng Li
, Hua Cai
, Jian Zhang
, Jianjun Wang:
I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem. 103156 - Chuan Qin, Jiaqian Peng, Puzhuo Liu
, Yaowen Zheng
, Kai Cheng, Weidong Zhang, Limin Sun:
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router. 103157 - Raphael Hoheisel
, Guido van Capelleveen
, Dipti Kapoor Sarmah
, Marianne Junger
:
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains. 103158 - Haitian Yang, Xiang Meng, Xuan Zhao, Yan Wang, Yuejun Liu, Xiaoyu Kang, Jiahui Shen, Weiqing Huang:
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication. 103159 - Timothy R. McIntosh
, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng, Paul A. Watters:
Applying staged event-driven access control to combat ransomware. 103160 - Gareth Mott
, Sarah Turner
, Jason R. C. Nurse
, Jamie MacColl
, James Sullivan, Anna Cartwright
, Edward J. Cartwright
:
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era. 103162 - Yu Wang
, Liquan Chen
, Ge Wu, Kunliang Yu, Tianyu Lu:
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing. 103163 - Gaurav Bansal
, Jason Thatcher
, Sebastian Walter Schuetz
:
Where authorities fail and experts excel: Influencing internet users' compliance intentions. 103164 - Clemens-Alexander Brust
, Tim Sonnekalb, Bernd Gruner
:
ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language. 103165 - Alessandro Nichelini, Carlo Alberto Pozzoli, Stefano Longari, Michele Carminati
, Stefano Zanero:
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN. 103166 - Giampaolo Bovenzi
, Giuseppe Aceto, Domenico Ciuonzo, Antonio Montieri
, Valerio Persico, Antonio Pescapè:
Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness. 103167 - Kyoungmin Ko, Sunghwan Kim
, Hyun Kwon
:
Multi-targeted audio adversarial example for use against speech recognition systems. 103168 - Sun-Jin Lee
, Yu-Rim Lee, So-Eun Jeon
, Il-Gu Lee
:
Machine learning-based jamming attack classification and effective defense technique. 103169 - Isaac D. Sánchez-García
, Tomás San Feliu Gilabert, José Antonio Calvo-Manzano
:
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review. 103170 - Xueying Han, Susu Cui, Song Liu
, Chen Zhang, Bo Jiang
, Zhigang Lu:
Network intrusion detection based on n-gram frequency and time-aware transformer. 103171 - Ferhat Arat
, Sedat Akleylek
:
Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited. 103174 - Xiuli Ma, Wenbin Zhu, Jieling Wei, Yanliang Jin, Dongsheng Gu, Rui Wang:
EETC: An extended encrypted traffic classification algorithm based on variant resnet network. 103175 - Wang Yang, Mingzhe Gao, Ligeng Chen
, Zhengxuan Liu, Lingyun Ying:
RecMaL: Rectify the malware family label via hybrid analysis. 103177 - Rishikesh Sahay
, Daniel A. Sepulveda Estay
, Weizhi Meng
, Christian Damsgaard Jensen
, Michael Bruhn Barfod
:
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS. 103179 - Yinghui Huang, Wenting Shen
, Jing Qin, Huiying Hou
:
Privacy-preserving certificateless public auditing supporting different auditing frequencies. 103181 - Xiaofan Nie
, Liwei Chen, Haolai Wei, Yuantong Zhang, Ningning Cui, Gang Shi:
KPDFI: Efficient data flow integrity based on key property against data corruption attack. 103183 - Aratrika Ray-Dowling, Daqing Hou
, Stephanie Schuckers:
Stationary mobile behavioral biometrics: A survey. 103184

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
