default search action
Computers & Security, Volume 112
Volume 112, January 2022
- Tao Liu, He Wang, Yuqing Zhang:
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network. 102467 - Abiodun Esther Omolara, Abdullah A. Alabdulatif, Oludare Isaac Abiodun, Moatsum Alawida, Abdulatif Alabdulatif, Wafa' Hamdan Alshoura, Humaira Arshad:
The internet of things security: A survey encompassing unexplored areas and new insights. 102494 - Jon Vadillo, Roberto Santana:
On the human evaluation of universal audio adversarial perturbations. 102495 - Rory Coulter, Jun Zhang, Lei Pan, Yang Xiang:
Domain adaptation for Windows advanced persistent threat detection. 102496 - Jianyuan Wu, Tianyao Tong, Yifang Chen, Xiangui Kang, Wei Sun:
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics. 102497 - Boyu Kuang, Anmin Fu, Willy Susilo, Shui Yu, Yansong Gao:
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects. 102498 - Neha Gupta, Vinita Jindal, Punam Bedi:
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems. 102499 - Marcus Botacin, Felipe Duarte Domingues, Fabrício Ceschin, Raphael Machnicki, Marco Antonio Zanata Alves, Paulo Lício de Geus, André Grégio:
AntiViruses under the microscope: A hands-on perspective. 102500 - Jin-Young Kim, Sung-Bae Cho:
Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features. 102501 - Kristin Masuch, Maike Greve, Simon Trang, Lutz M. Kolbe:
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? 102502 - Haiyang Liu, Hanlin Zhang, Li Guo, Jia Yu, Jie Lin:
Privacy-Preserving cloud-Aided broad learning system. 102503 - Jie Sun, Lingchen Zhao, Zhuotao Liu, Qi Li, Xinhao Deng, Qian Wang, Yong Jiang:
Practical differentially private online advertising. 102504 - Duy Dang-Pham, Karlheinz Kautz, Ai-Phuong Hoang, Siddhi Pittayachawan:
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis. 102505 - Stefan Rass, Sandra König, Jasmin Wachter, Manuel Egger, Manuel Hobisch:
Supervised Machine Learning with Plausible Deniability. 102506 - Andrea Salvi, Paolo Spagnoletti, Nadia Saad Noori:
Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem. 102507 - Yaman Roumani:
Detection time of data breaches. 102508 - Wenxi Pu, Siyuan Li, Gregory Bott, Marie Esposito, Jason Bennett Thatcher:
To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency. 102509 - DaeHee Jang:
Badaslr: Exceptional cases of ASLR aiding exploitation. 102510 - Tony Nasr, Sadegh Torabi, Elias Bou-Harb, Claude Fachkha, Chadi Assi:
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems. 102511 - Seungkwang Lee, Nam-Su Jho, Doyoung Chung, Yousung Kang, Myungchul Kim:
Rcryptect: Real-time detection of cryptographic function in the user-space filesystem. 102512 - Fan Ou, Jian Xu:
S3Feature: A static sensitive subgraph-based feature for android malware detection. 102513 - Ke Kong, Zhichao Zhang, Ziyuan Yang, Zhaoxin Zhang:
FCSCNN: Feature centralized Siamese CNN-based android malware identification. 102514 - Adem Tekerek, Muhammed Mutlu Yapici:
A novel malware classification and augmentation model based on convolutional neural network. 102515 - Gaurav Dave, Gaurav Choudhary, Vikas Sihag, Ilsun You, Kim-Kwang Raymond Choo:
Cyber security challenges in aviation communication, navigation, and surveillance. 102516 - Haina Song, Fangfang Yin, Xinyu Han, Tao Luo, Jianfeng Li:
MPDS-RCA: Multi-level privacy-preserving data sharing for resisting collusion attacks based on an integration of CP-ABE and LDP. 102523 - Ramin Fadaei Fouladi, Orhan Ermis, Emin Anarim:
A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network. 102524 - Alexander J. McLeod Jr., Diane Dolezel:
Information security policy non-compliance: Can capitulation theory explain user behaviors? 102526 - Vitor Graveto, Tiago Cruz, Paulo Simões:
Security of Building Automation and Control Systems: Survey and future research directions. 102527 - Dilara Acarali, K. Rajesh Rao, Muttukrishnan Rajarajan, Doron Chema, Mark Ginzburg:
Modelling smart grid IT-OT dependencies for DDoS impact propagation. 102528 - Atif Ahmad, Sean B. Maynard, Richard L. Baskerville:
Editorial. 102530 - Henry R. K. Skeoch:
Expanding the Gordon-Loeb model to cyber-insurance. 102533 - Sergio López Bernal, Alberto Huertas Celdrán, Gregorio Martínez Pérez:
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities. 102534 - Naeem Firdous Syed, Syed W. Shah, Rolando Trujillo-Rasua, Robin Doss:
Traceability in supply chains: A Cyber security analysis. 102536 - Wei Wang, Songlei Jian, Yusong Tan, Qingbo Wu, Chenlin Huang:
Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions. 102537
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.