


default search action
Computers & Security, Volume 99
Volume 99, December 2020
- Deanna House, Gabriel A. Giordano:
Politeness in security directives: Insights in browser compliance for the human element. 102007 - Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Malek Alzaqebah
:
An improved rule induction based denial of service attacks classification model. 102008 - Haiping Huang, Peng Zhu, Fu Xiao, Xiang Sun, Qinglong Huang:
A blockchain-based scheme for privacy-preserving and secure sharing of medical data. 102010 - Nattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai:
Detecting personally identifiable information transmission in android applications using light-weight static analysis. 102011 - Cheng Guo, Jing Jia
, Kim-Kwang Raymond Choo
, Yingmo Jie:
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. 102021 - Anthony Kenyon, Lipika Deka
, David A. Elizondo:
Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets. 102022 - Leon Bosnjak, Bostjan Brumen:
Shoulder surfing experiments: A systematic literature review. 102023 - Sultan Alghamdi, Khin Than Win
, Elena Vlahu-Gjorgievska
:
Information security governance challenges and critical success factors: Systematic review. 102030 - Mengqi Zhan, Yang Li, Xinghua Yang, Wenjing Cui, Yulin Fan:
NSAPs: A novel scheme for network security state assessment and attack prediction. 102031 - Hongliang Liang, Zhuosi Xie, Yixiu Chen, Hua Ning, Jianli Wang:
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching. 102032 - Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. 102033 - Dong Bin Oh
, Kyung Ho Park, Huy Kang Kim:
De-Wipimization: Detection of data wiping traces for investigating NTFS file system. 102034 - Annika Andersson
, Fredrik Karlsson
, Karin Hedström
:
Consensus versus warfare - unveiling discourses in de jure information security standard development. 102035 - Richard Knight, Jason R. C. Nurse:
A framework for effective corporate communication after cyber security incidents. 102036 - Sudan Jha
, Deepak Prashar, Hoang Viet Long, David Taniar
:
Recurrent neural network for detecting malware. 102037 - Clay Posey, Robert Folger:
An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities. 102038 - Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system. 102046 - Xiaohui Yang, Wenjie Li
:
A zero-knowledge-proof-based digital identity management scheme in blockchain. 102050 - Krassimir Tzvetanov, Umit Karabiyik:
A first look at forensic analysis of sailfishos. 102054 - M. R. Gauthama Raman
, Wenjie Dong, Aditya Mathur:
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant. 102055 - Ahmed Aleroud, Nisreen Abu-Alsheeh, Emad Al-Shawakfa
:
A graph proximity feature augmentation approach for identifying accounts of terrorists on twitter. 102056 - Xiaoqing Sun, Zhiliang Wang, Jiahai Yang, Xinran Liu:
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks. 102057 - Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Zheng Si, Chao-Hsien Chu:
Differential privacy protection over deep learning: An investigation of its impacted factors. 102061 - Mahendra Prasad
, Sachin Tripathi, Keshav P. Dahal
:
Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. 102062 - Elham Rostami, Fredrik Karlsson
, Shang Gao
:
Requirements for computerized tools to design information security policies. 102063 - Craig Van Slyke
, France Bélanger:
Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective. 102064 - Oluwafemi Akanfe, Rohit Valecha, H. Raghav Rao:
Assessing country-level privacy risk for digital payment systems. 102065 - Laurie Giddens
, Laura C. Amo, Dianna Cichocki:
Gender bias and the impact on managerial evaluation of insider security threats. 102066 - Gerardo Canfora, Andrea Di Sorbo
, Sara Forootani, Antonio Pirozzi, Corrado Aaron Visaggio:
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges. 102067 - Wei Shao, Chunfu Jia, Yunkai Xu, Kefan Qiu, Yan Gao, Yituo He:
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. 102069 - Zhi-Quan Qin, Xing-Kong Ma, Yong-Jun Wang:
ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis. 102070 - Basheer Al-Duwairi
, Öznur Özkasap, Ahmet Uysal
, Ceren Kocaogullar, Kaan Yildirim
:
LogDoS: A Novel logging-based DDoS prevention mechanism in path identifier-Based information centric networks. 102071 - Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang
:
Semantics-aware obfuscation scheme prediction for binary. 102072

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.