default search action
Computers & Security, Volume 140
Volume 140, 2024
- Zuohui Chen, Renxuan Wang, Jingyang Xiang, Yue Yu, Xin Xia, Shouling Ji, Qi Xuan, Xiaoniu Yang:
GGT: Graph-guided testing for adversarial sample detection of deep neural network. 103710 - Dennik Baltuttis, Timm Teubner, Marc T. P. Adam:
A typology of cybersecurity behavior among knowledge workers. 103741 - Daniel G. Arce, Daniel W. Woods, Rainer Böhme:
Economics of incident response panels in cyber insurance. 103742 - Sotirios Katsikeas, Engla Rencelj Ling, Pontus Johnsson, Mathias Ekstedt:
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool. 103743 - Guruprasad B. Jayarao, Sanjog Ray, Prabin Kumar Panigrahi:
Information security threats and organizational readiness in nWFH scenarios. 103745 - Jiebao Zhang, Wenhua Qian, Jinde Cao, Dan Xu:
LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels. 103746 - Zinniya Taffannum Pritee, Mehedi Hasan Anik, Saida Binta Alam, Jamin Rahman Jim, Md. Mohsin Kabir, Muhammad Firoz Mridha:
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review. 103747 - Hao Yue, Tong Li, Di Wu, Runzi Zhang, Zhen Yang:
Detecting APT attacks using an attack intent-driven and sequence-based learning approach. 103748 - Hongyu Pan, Yong Fang, Wenbo Guo, Yijia Xu, Changhui Wang:
Few-shot graph classification on cross-site scripting attacks detection. 103749 - Yaru Liu, Lijuan Xu, Shumian Yang, Dawei Zhao, Xin Li:
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems. 103750 - B. Selva Rani, S. Vairamuthu, Suresh Subramanian:
Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection. 103751 - Wanyu Li, Hailiang Tang, Hailin Zhu, Wenxiao Zhang, Chen Liu:
TS-Mal: Malware detection model using temporal and structural features learning. 103752 - Christina Glasauer, Linda Maurer, Carina Spreitzer, Rainer W. Alexandrowicz:
Development & psychometrics of the SOLID-S - An inventory assessing software security culture in software development companies. 103753 - Hang Thanh Bui, Hamed Aboutorab, Arash Mahboubi, Yansong Gao, Nazatul Haque Sultan, Aufeef Chauhan, Mohammad Zavid Parvez, Michael Bewong, Rafiqul Islam, Zahidul Islam, Seyit Ahmet Çamtepe, Praveen Gauravaram, Dineshkumar Singh, Muhammad Ali Babar, Shihao Yan:
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems. 103754 - Poornachandratejasvi Laxman Bhattar, Naran M. Pindoriya:
False Data Injection Attack with Max-Min Optimization in Smart Grid. 103761 - Zhenghao Zhang, Jianwei Ding, Qi Zhang, Qiyao Deng:
WaTrojan: Wavelet domain trigger injection for backdoor attacks. 103767 - Bruno Sousa, Duarte Dias, Nuno Antunes, Javier Cámara, Ryan Wagner, Bradley R. Schmerl, David Garlan, Pedro Fidalgo:
MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks. 103768 - Sonam Bhardwaj, Adrian Shuai Li, Mayank Dave, Elisa Bertino:
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation. 103769 - Hala S. Ali, Irfan Ahmed:
LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems. 103770 - Francesco Buccafurri, Vincenzo De Angelis, Sara Lazzaro, Andrea Pugliese:
Enforcing security policies on interacting authentication systems. 103771 - Huaqi Sun, Hui Shu, Fei Kang, Yuntian Zhao, Yuyao Huang:
Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques. 103772 - G. Sahaya Stalin Jose, Sugitha G, Ayshwarya Lakshmi S, Preethi Bangalore Chaluvaraj:
Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing. 103773 - Md. Neyamul Islam Shibbir, Hasibur Rahman, Md. Sadek Ferdous, Farida Chowdhury:
Evaluating the security of CAPTCHAs utilized on Bangladeshi websites. 103774 - Guangli Wu, Xingyue Wang, Jing Zhang:
PeerG: A P2P botnet detection method based on representation learning and graph contrastive learning. 103775 - Yitian Xie, Mikko T. Siponen, Gabriella Laatikainen, Gregory D. Moody, Xiaosong Zheng:
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users. 103776 - Brooke Lampe, Weizhi Meng:
can-train-and-test: A curated CAN dataset for automotive intrusion detection. 103777 - Saeed Javanmardi, Meysam Ghahramani, Mohammad Shojafar, Mamoun Alazab, Antonio Caruso:
M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks. 103778 - Shu-Min Duan, Jian-Ting Yuan, Bo Wang:
Contextual feature representation for image-based insider threat classification. 103779 - Anargyros Chrysanthou, Yorgos Pantis, Constantinos Patsakis:
The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign. 103780 - Zhongjun Yang, Qi Wang, Xuejun Zong, Guogang Wang:
Intrusion detection method based on improved social network search algorithm. 103781 - Debanjan Sadhya, Tanya Sahu:
A critical survey of the security and privacy aspects of the Aadhaar framework. 103782 - Swechchha Gupta, Buddha Singh:
An intelligent multi-layer framework with SHAP integration for botnet detection and classification. 103783 - Kristina Radivojevic, Nicholas Clark, Anna Klempay, Paul R. Brenner:
Defending novice user privacy: An evaluation of default web browser configurations. 103784 - Liujia Cai, Guangying Cai, Siqi Lu, Guangsong Li, Yongjuan Wang:
Observational equivalence and security games: Enhancing the formal analysis of security protocols. 103785 - Curtis Rookard, Anahita Khojandi:
RRIoT: Recurrent reinforcement learning for cyber threat detection on IoT devices. 103786 - Lingdi Kong, Senlin Luo, Limin Pan, Zhouting Wu, Xinshuai Li:
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement. 103787 - Pengbin Feng, Le Gai, Li Yang, Qin Wang, Teng Li, Ning Xi, Jian Feng Ma:
DawnGNN: Documentation augmented windows malware detection using graph neural network. 103788 - Haiou Huang, Bangyi Sun, Liang Hu:
A task offloading approach based on risk assessment to mitigate edge DDoS attacks. 103789 - Gordhan Jethava, Udai Pratap Rao:
Exploring security and trust mechanisms in online social networks: An extensive review. 103790 - Amir Javadpour, Forough Ja'fari, Tarik Taleb, Mohammad Shojafar, Chafika Benzaïd:
A comprehensive survey on cyber deception techniques to improve honeypot performance. 103792 - Chintan Patel, Aryan Mohammadi Pasikhani, Prosanta Gope, John A. Clark:
User-empowered secure privacy-preserving authentication scheme for Digital Twin. 103793 - Shouzheng Tao, Yezheng Liu, Chunhua Sun:
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity. 103794 - Joseph Fenech, Debbie Richards, Paul Formosa:
Ethical principles shaping values-based cybersecurity decision-making. 103795 - Zhiquan Wang, Tengyao Li, Meijuan Yin, Xiaoyun Yuan, Xiangyang Luo, Lingling Li:
WF3A: A N-shot website fingerprinting with effective fusion feature attention. 103796 - Adrian-Catalin Rus, Mohammad El-Hajj, Dipti Kapoor Sarmah:
NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce. 103797 - Giedre Sabaliauskaite, Jeremy W. Bryans, Hesamaldin Jadidbonab, Farhan Ahmad, Siraj A. Shaikh, Paul Wooderson:
TOMSAC - Methodology for trade-off management between automotive safety and cyber security. 103798 - Francesco Casaril, Letterio Galletta:
Securing SatCom user segment: A study on cybersecurity challenges in view of IRIS. 103799 - Cairui She, Jinfeng Li, Liwei Chen, Gang Shi:
SCFI: Efficient forward fine-grained control flow integrity based on coarse-grained ISA extensions. 103800 - Anee Sharma, Ningrinla Marchang:
A review on client-server attacks and defenses in federated learning. 103801 - Melanie Ehrenberg, Shahram Sarkani, Thomas A. Mazzuchi:
Python source code vulnerability detection with named entity recognition. 103802 - Weibo Wang, Yifeng Zheng, Songlei Wang, Zhongyun Hua, Lei Xu, Yansong Gao:
BopSkyline: Boosting privacy-preserving skyline query service in the cloud. 103803 - Raghu Raman, Prasad Calyam, Krishnashree Achuthan:
ChatGPT or Bard: Who is a better Certified Ethical Hacker? 103804 - Jiaxin Peng, Chun Guo, Yuan Ping, Yunhe Cui, Yi Chen, Guowei Shen:
SNDMI: Spyware network traffic detection method based on inducement operations. 103806 - Jintao Gu, Hongliang Zhu, Zewei Han, Xiangyu Li, Jianjin Zhao:
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding. 103807 - Zhichao Yin, Xian Kong, Chunyong Yin:
Semi-supervised log anomaly detection based on bidirectional temporal convolution network. 103808 - Hamza Alkofahi, Heba Alawneh, Anthony Skjellum:
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis. 103810 - Seon Kwon Kim, Hongjoo Jin, Kyungho Joo, Jiwon Lee, Dong Hoon Lee:
DROPSYS: Detection of ROP attacks using system information. 103813 - Qui Ngoc Nguyen, Nguyen Tan Cam, Kiet Van Nguyen:
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models. 103814 - Lingzi Li, Cheng Huang, Junren Chen:
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence. 103815
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.