default search action
Computers & Security, Volume 106
Volume 106, July 2021
- Han Gao, Shaoyin Cheng, Weiming Zhang:
GDroid: Android malware detection and classification with graph convolutional network. 102264 - Yudhistira Nugraha, Andrew Martin:
Towards a framework for trustworthy data security level agreement in cloud procurement. 102266 - Khando Khando, Shang Gao, Sirajul M. Islam, Ali Salman:
Enhancing employees information security awareness in private and public organisations: A systematic literature review. 102267 - Benjamin Appiah, Zhiguang Qin, Mighty Abra Ayidzoe, Ansuura JohnBosco Aristotle Kanpogninge:
Decision tree pairwise metric learning against adversarial attacks. 102268 - Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin:
A novel workload scheduling framework for intrusion detection system in NFV scenario. 102271 - Pan Jun Sun:
A tripartite game model of trust cooperation in cloud service. 102272 - Peng Wang, Zhijie Tang, Junfeng Wang:
A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling. 102273 - Ashraf Neisari, Luis Rueda, Sherif Saad:
Spam review detection using self-organizing maps and convolutional neural networks. 102274 - Yilin Kang, Yong Liu, Ben Niu, Weiping Wang:
Weighted distributed differential privacy ERM: Convex and non-convex. 102275 - Shimon Harush, Yair Meidan, Asaf Shabtai:
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection. 102276 - William Aiken, Hyoungshick Kim, Simon S. Woo, Jungwoo Ryoo:
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks. 102277 - Samantha Bax, Tanya Jane McGill, Valerie Hobbs:
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs. 102278 - Zhen Xiang, David J. Miller, George Kesidis:
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing. 102280 - Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
"Get a red-hot poker and open up my eyes, it's so boring"1: Employee perceptions of cybersecurity training. 102281 - Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen, Wei Ruan:
Threat detection and investigation with system-level provenance graphs: A survey. 102282 - Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee, Chih-Lung Chen, Kuo-Yu Tsai:
Preserving indomitable DDoS vitality through resurrection social hybrid botnet. 102284 - Sen Zhang, Weiwei Ni, Nan Fu:
Differentially private graph publishing with degree distribution preservation. 102285 - Marcus Botacin, Fabricio Ceschin, Ruimin Sun, Daniela Oliveira, André Grégio:
Challenges and pitfalls in malware research. 102287 - Li Zhang, Vrizlynn L. L. Thing:
Three decades of deception techniques in active cyber defense - Retrospect and outlook. 102288 - Jingmei Liu, Yuanbo Gao, Fengjie Hu:
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. 102289 - Manoel Domingues Junior, Nelson F. F. Ebecken:
A new WAF architecture with machine learning for resource-efficient use. 102290 - Susil Kumar Mohanty, Somanath Tripathy:
n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks. 102291 - Michal Kucab, Piotr Borylo, Piotr Cholda:
Remote attestation and integrity measurements with Intel SGX for virtual machines. 102300 - Domenico Cotroneo, Luigi De Simone, Roberto Natella:
Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification. 102307 - Sanghoon Jeon, Huy Kang Kim:
AutoVAS: An automated vulnerability analysis system with a deep learning approach. 102308 - Simon Vrhovec, Anze Mihelic:
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. 102309 - Malak Alfosail, Peter Norris:
Tor forensics: Proposed workflow for client memory artefacts. 102311 - Karl van der Schyff, Stephen Flowerday:
Mediating effects of information security awareness. 102313
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.