


default search action
Computers & Security, Volume 100
Volume 100, January 2021
- Benjamin Harsha, Robert Morton, Jeremiah Blocki
, John A. Springer, Melissa Dark:
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage. 102068 - Christopher M. Rondeau
, Michael A. Temple, J. Addison Betances, Christine M. Schubert-Kabban:
Extending critical infrastructure element longevity using constellation-based ID verification. 102073 - N. Saravanan, A. Umamakeswari:
Lattice based access control for protecting user data in cloud environments with hybrid security. 102074 - Houda Jmila
, Gregory Blanc:
Towards security-Aware 5G slice embedding. 102075 - Guowen Zhang
, Bo Wang, Fei Wei, Kaize Shi, Yue Wang, Xue Sui, Meineng Zhu:
Source camera identification for re-compressed images: A model perspective based on tri-transfer learning. 102076 - Haowen Chen, Qiang Qu
, Yexiong Lin, Xia Chen, Keqin Li:
Authenticity verification on social data outsourcing. 102077 - Mohammad Dabbagh
, Kim-Kwang Raymond Choo
, Amin Beheshti
, Mohammad Tahir
, Nader Sohrabi Safa
:
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities. 102078 - Hui Lin, Yan Wo, Yuanlu Wu, Ke Meng, Guoqiang Han:
Robust source camera identification against adversarial attacks. 102079 - Steven Furnell
:
The cybersecurity workforce and skills. 102080 - Kashif Mehboob Khan, Junaid Arshad, Muhammad Mubashir Khan:
Empirical analysis of transaction malleability within blockchain-based e-Voting. 102081 - Sahar Farshadkhah, Craig Van Slyke, Bryan Fuller
:
Onlooker effect and affective responses in information security violation mitigation. 102082 - Jianyuan Wu, Wei Sun:
Towards multi-operation image anti-forensics with generative adversarial networks. 102083 - Basant Subba, Prakriti Gupta:
A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes. 102084 - Lingru Cai, Yao Li
, Zhi Xiong
:
JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters. 102086 - Shivi Garg
, Niyati Baliyan:
Android security assessment: A review, taxonomy and research gap study. 102087 - Wei Wang, Jing Tian, Fang Lv, Guodong Xin, Yingfan Ma, Bailing Wang:
Mining frequent pyramid patterns from time series transaction data with custom constraints. 102088 - Yunfei Meng, Zhiqiu Huang, Guohua Shen, Changbo Ke
:
A security policy model transformation and verification approach for software defined networking. 102089 - Moneer Alshaikh
, Sean B. Maynard
, Atif Ahmad
:
Applying social marketing to evaluate current security education training and awareness programs in organisations. 102090 - Ehsan Nowroozi
, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo
:
A survey of machine learning techniques in adversarial image forensics. 102092 - Mahdi Madani, Camel Tanougast
:
Optimized and robust implementation of mobile networks confidentiality and integrity functions. 102093 - Maryam Zulfiqar
, Filza Tariq
, Muhammad Umar Janjua, Adnan Noor Mian, Adnan Qayyum, Junaid Qadir, Falak Sher, Muhammad Hassan
:
EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds. 102094 - Adem Tekerek
:
A novel architecture for web-based attack detection using convolutional neural network. 102096 - Damiano De Santo, Claudio Santo Malavenda, Simon Pietro Romano
, Cristian Vecchio:
Exploiting the MIL-STD-1553 avionic data bus with an active cyber device. 102097 - Xinqian Liu, Jiadong Ren, Haitao He, Qian Wang, Chen Song:
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement. 102107 - Ryusei Maeda, Mamoru Mimura
:
Automating post-exploitation with deep reinforcement learning. 102108 - Yusheng Dai, Hui Li, Yekui Qian, Yunling Guo, Ruipeng Yang, Min Zheng:
Using IRP and local alignment method to detect distributed malware. 102109 - Isaac Griswold-Steiner, Zachary LeFevre, Abdul Serwadda:
Smartphone speech privacy concerns from side-channel attacks on facial biomechanics. 102110 - Yexin Duan
, Xingyu Zhou, Junhua Zou, Junyang Qiu, Jin Zhang, Zhisong Pan:
Mask-guided noise restriction adversarial attacks for image classification. 102111

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.