![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 130
Volume 130, July 2023
- Rahul Kale, Vrizlynn L. L. Thing
:
Few-shot weakly-supervised cybersecurity anomaly detection. 103194 - Yuanhai Fan, Chuanhao Wan
, Cai Fu, Lansheng Han, Hao Xu:
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs. 103247 - Berhanu Aebissa, Gurpreet Dhillon
, Million Meshesha
:
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks. 103248 - Yunxiao Zhang
, Pasquale Malacaria, George Loukas
, Emmanouil Panaousis:
CROSS: A framework for cyber risk optimisation in smart homes. 103250 - Randi Jiang, Jianru Zhang
:
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention. 103253 - Ana Maria Pirca
, Harjinder Singh Lallie
:
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers. 103254 - Peishuai Sun
, Shuhao Li, Jiang Xie, Hongbo Xu
, Zhenyu Cheng
, Rong Yang:
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge. 103257 - Julia Lenz, Zdravko Bozakov
, Steffen Wendzel
, Simon Vrhovec
:
Why people replace their aging smart devices: A push-pull-mooring perspective. 103258 - Han Wang, Zhangguo Tang, Huanzhou Li
, Jian Zhang
, Cheng Cai:
DDOFM: Dynamic malicious domain detection method based on feature mining. 103260 - Constantinos Louca, Adamantini Peratikou
, Stavros Stavrou
:
A novel Evil Twin MiTM attack through 802.11v protocol exploitation. 103261 - Danny S. Guamán
, David Rodríguez Torrado
, José M. del Álamo, Jose M. Such:
Automated GDPR compliance assessment for cross-border personal data transfers in android applications. 103262 - Milad Taleby Ahvanooey
, Mark Xuefang Zhu, Shiyan Ou
, Hassan Dana Mazraeh, Wojciech Mazurczyk, Kim-Kwang Raymond Choo
, Chuan Li
:
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms. 103263 - Shunmei Meng
, Qianmu Li, Lianyong Qi, Xiaolong Xu, Rui Yuan, Xuyun Zhang
:
An intelligent recommendation method based on multi-interest network and adversarial deep learning. 103264 - Caio C. Moreira
, Davi C. Moreira, Claudomiro de S. de Sales Jr.:
Improving ransomware detection based on portable executable header using xception convolutional neural network. 103265 - Joseph K. Nwankpa
, Pratim Milton Datta
:
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers. 103266 - Cong Dong
, Jiahai Yang, Song Liu
, Zhi Wang
, Yuling Liu
, Zhigang Lu:
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement. 103267 - Kimberly J. Ferguson-Walter
, Maxine M. Major
, Chelsea K. Johnson, Craig J. Johnson
, Dakota D. Scott
, Robert S. Gutzwiller
, Temmie Shade:
Cyber expert feedback: Experiences, expectations, and opinions about cyber deception. 103268 - Neelam Dayal
, Shashank Srivastava:
Analyzing effective mitigation of DDoS attack with software defined networking. 103269 - Prajjwal Gupta
, Krishna Yadav, Brij B. Gupta
, Mamoun Alazab, Thippa Reddy Gadekallu
:
A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function. 103270 - Parnika Bhat, Sunny Behal
, Kamlesh Dutta:
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning. 103277 - Esther Villar-Rodriguez, María Arostegi Pérez, Ana I. Torre-Bastida
, Cristina Regueiro Senderos, Juan López-de-Armentia:
Edge intelligence secure frameworks: Current state and future challenges. 103278 - Kun Li
, Wei Guo, Fan Zhang, Jiayu Du:
GAMBD: Generating adversarial malware against MalConv. 103279 - Yuanlu Wu, Yan Wo
, Caiyu Li, Guoqiang Han:
Learning domain-invariant representation for generalizing face forgery detection. 103280 - Wojciech Widel
, Simon Hacks
, Mathias Ekstedt
, Pontus Johnson, Robert Lagerström
:
The meta attack language - a formal description. 103284 - Tanzeela Altaf
, Xu Wang
, Wei Ni
, Ren Ping Liu
, Robin Braun
:
NE-GConv: A lightweight node edge graph convolutional network for intrusion detection. 103285 - Mariam M. Saleh, Muhanned AlSlaiman
, Mohammed I. Salman
, Bin Wang:
Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classification. 103287 - Dongyue Zhang
, Weiwei Ni, Nan Fu
, Lihe Hou
, Ruyu Zhang:
Locally differentially private multi-dimensional data collection via haar transform. 103291
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.