


default search action
Computers & Security, Volume 144
Volume 144, 2024
- Naresh Kamble, Nilamadhab Mishra
:
Hybrid optimization enabled squeeze net for phishing attack detection. 103901 - Heyu Chang, Xiaobing Zhang, Nianwen Si, Ping Wu:
A lightweight packet forwarding verification in SDN using sketch. 103906 - Uma Mageswari R, N. Zafar Ali Khan, M. M. Gowthul Alam, S. Jerald Nirmal Kumar:
Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security. 103907 - Tengfei Yang
, Yuansong Qiao, Brian Lee
:
Towards trustworthy cybersecurity operations using Bayesian Deep Learning to improve uncertainty quantification of anomaly detection. 103909 - Yongxin Zhao
, Chundong Wang:
Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree. 103922 - Qihang Zhou
, Wenzhuo Cao
, Xiaoqi Jia, Shengzhi Zhang, Jiayun Chen
, Nan Jiang, Weijuan Zhang, Haichao Du, Zhenyu Song
, Qingjia Huang:
HClave: An isolated execution environment design for hypervisor runtime security. 103923 - Luca De Rose
, Giuseppina Andresini
, Annalisa Appice, Donato Malerba:
VINCENT: Cyber-threat detection through vision transformers and knowledge distillation. 103926 - Mohammad Ryiad Al-Eiadeh
, Mustafa Abdallah
:
GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs. 103927 - Soumyadeep Hore
, Jalal Ghadermazi
, Ankit Shah
, Nathaniel D. Bastian
:
A sequential deep learning framework for a robust and resilient network intrusion detection system. 103928 - Galamo Monkam, Michael J. De Lucia, Nathaniel D. Bastian
:
A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems. 103929 - Weining Zheng
, Xiaohong Su
, Hongwei Wei
, Wenxin Tao:
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms. 103930 - Yunting Tao
, Yuqun Li, Fanyu Kong
, Yuliang Shi, Ming Yang
, Jia Yu, Hanlin Zhang:
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding. 103931 - Jingze Yu, Wenting Shen
, Xi Zhang
:
Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR. 103932 - Lara Saidia Fascì, Marco Fisichella, Gianluca Lax, Chenyin Qian:
Corrigendum to "Disarming visualization-based approaches in malware detection systems" [Computers & Security Volume 126, March 2023, 103062]. 103934 - Hongli Ding
, Zhao Ma, Jing Zhu:
Local graph smoothing for link prediction against universal attack. 103935 - Xuan Li
, Naiyu Wang, Shuai Yuan
, Zhitao Guan
:
FedIMP: Parameter Importance-based Model Poisoning attack against Federated learning system. 103936 - Sicong Li, Jian Wang, Yafei Song
, Shuo Wang:
TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping. 103937 - Anna Zanke, Thorsten Weber
, Peter Dornheim
, Mathias Engel:
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments. 103938 - Bibi van den Berg
:
Dealing with uncertainty in cyberspace. 103939 - Dennik Baltuttis
, Timm Teubner
:
Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment. 103940 - Alaa Nehme
, Meng (Leah) Li
, Merrill Warkentin:
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective. 103941 - Jie Ling, Jinhui Chen
, Honglei Li
:
FDT: Improving the transferability of adversarial examples with frequency domain transformation. 103942 - Huaifeng Bao, Wenhao Li
, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang
, Feng Liu
, Wen Wang:
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention. 103943 - Luís Gonçalves
, Cleber Zanchettin
:
Detecting abnormal logins by discovering anomalous links via graph transformers. 103944 - Zhenduo Wang, Saifei Li, Lijie Zhang, Chunduo Hu, Lianshan Yan:
A Red Team automated testing modeling and online planning method for post-penetration. 103945 - Chao Li
, Jian Chen, Zhaoxin Zhang, Zhiping Li, Yanan Cheng
, Chendi Ma:
DNS root server resolution anomaly detection. 103946 - Haoran Xu
, Yongjun Wang, Zhiyuan Jiang, Shuhui Fan, Shaojing Fu, Peidai Xie:
Fuzzing JavaScript engines with a syntax-aware neural program model. 103947 - Chu-Xiao Zuo
, Jia-Yi Leng, Wu-Jun Li:
SUETA: Speaker-specific utterance ensemble based transfer attack on speaker identification system. 103948 - Huijie Zhang
, Weizhen Sun, Ling Lv:
A frequency-injection backdoor attack against DNN-Based finger vein verification. 103956 - Dennis Brown, Gunjan Batra
, Humayun Zafar
, Khawaja Saeed
:
Reducing fraud in organizations through information security policy compliance: An information security controls perspective. 103958 - Xiaoyan Wang
, Jingjing Yang
, Zixiao Peng
, Shunfang Wang
, Ming Huang:
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection. 103959 - Nan Xiao
, Bo Lang, Ting Wang, Yikai Chen:
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion. 103960 - Fei-Fan Tu, Dongjie Liu, Zhiwei Yan, Xiao-Bo Jin
, Guang-Gang Geng:
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems. 103961 - Mulualem Bitew Anley
, Angelo Genovese
, Davide Agostinello
, Vincenzo Piuri
:
Robust DDoS attack detection with adaptive transfer learning. 103962 - Hassan A. Shafei
, Hongchang Gao, Chiu C. Tan:
Measuring privacy policy compliance in the Alexa ecosystem: In-depth analysis. 103963 - Timothy R. McIntosh
, Teo Susnjak
, Tong Liu
, Paul A. Watters
, Dan Xu
, Dongwei Liu
, Raza Nowrozy
, Malka N. Halgamuge
:
From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models. 103964 - Magdalena Glas
, Gerhard Messmann
, Günther Pernul
:
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises. 103965 - Yukun Ma
, Chunlin Yu, Chuliang Weng:
Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust. 103966 - Hoyong Jeong
, Kiwon Chung, Sung Ju Hwang, Sooel Son
:
Targeted Model Inversion: Distilling style encoded in predictions. 103967 - Saneesh P. Francis
, Vysakh Kani Kolil
, Vipin Pavithran, Indrakshi Ray
, Krishnashree Achuthan
:
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective. 103968 - Guoyun Duan
, Haopeng Liu
, Minjie Cai, Jianhua Sun
, Hao Chen
:
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware. 103969 - R. Sathiya, N. Yuvaraj:
Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET. 103970 - Junjian Ye
, Xincheng Fei, Xavier de Carné de Carnavalet
, Lianying Zhao
, Lifa Wu, Mengyuan Zhang:
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions. 103971 - Shengshan Chen
, Ren-Hung Hwang
, Asad Ali
, Ying-Dar Lin
, Yu-Chih Wei
, Tun-Wen Pai
:
Improving quality of indicators of compromise using STIX graphs. 103972 - Wenpeng Wang
, Zhixiang Chen, Ziyang Zheng, Hui Wang
, Junxing Luo:
MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation. 103973 - Nathanaël Denis
, Maryline Laurent
, Sophie Chabridon
:
A decentralized model for usage and information flow control in distributed systems. 103975 - Yibo Xie
, Gaopeng Gou, Gang Xiong, Zhen Li, Wei Xia:
DomEye: Detecting network covert channel of domain fronting with throughput fluctuation. 103976 - Mor Nahum, Edita Grolman, Inbar Maimon, Dudu Mimran
, Oleg Brodt
, Aviad Elyashar, Yuval Elovici, Asaf Shabtai
:
OSSIntegrity: Collaborative open-source code integrity verification. 103977 - Zhenwu Xu, Xingshu Chen
, Xiao Lan, Rui Tang
, Shuyu Jiang
, Changxiang Shen:
Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion. 103978 - Qiuyun Lyu, Huihui Xie, Wei Wang, Yanyu Cheng, Yongqun Chen, Zhen Wang:
TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor. 103980 - Xiaohui Li
, Xiang Yang, Yizhao Huang, Yue Chen:
Combating temporal composition inference by high-order camouflaged network topology obfuscation. 103981 - Yasir Ali Farrukh
, Syed Wali
, Irfan Khan
, Nathaniel D. Bastian
:
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system. 103982 - Sonakshi Garg
, Vicenç Torra
:
Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet means. 103983 - Yusuf Mothanna, Wael Elmedany
, Mustafa Hammad
, Riadh Ksantini, Mhd Saeed Sharif:
Adopting security practices in software development process: Security testing framework for sustainable smart cities. 103985 - Zigang Chen, Zhen Wang, Yuening Zhou, Fan Liu, Yuhong Liu
, Tao Leng, Haihua Zhu:
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy. 103987 - Yoonjib Kim
, Saqib Hakak, Ali A. Ghorbani:
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure. 103989 - Tianming Zheng
, Haojun Liu, Hang Xu
, Xiang Chen, Ping Yi
, Yue Wu
:
Few-VulD: A Few-shot learning framework for software vulnerability detection. 103992 - Chunjie Guo, Lin You
, Xingyu Li
, Gengran Hu
, Shengguo Wang
, Chengtang Cao
:
A novel biometric authentication scheme with privacy protection based on SVM and ZKP. 103995 - Xiaodi Wang, Zhonglin Liu, Jiayong Liu:
Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity. 104001

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.