default search action
Computers & Security, Volume 108
Volume 108, September 2021
- Yelena Petrykina, Hadas Schwartz-Chassidim, Eran Toch:
Nudging users towards online safety using gamified environments. 102270 - Han Yan, Senlin Luo, Limin Pan, Yifei Zhang:
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection. 102286 - Christopher Schmitz, Michael Schmid, David Harborth, Sebastian Pape:
Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities. 102306 - Sai Ram Vallam Sudhakar, Namrata Kayastha, Kewei Sha:
ActID: An efficient framework for activity sensor based user identification. 102319 - Quoc-Thông Nguyen, An Mai, Lionel Chagas, Nadège Reverdy-Bruas:
Microscopic printing analysis and application for classification of source printer. 102320 - Peng Zhou, Xiaojing Gu, Surya Nepal, Jianying Zhou:
Modeling social worm propagation for advanced persistent threats. 102321 - Jiachun Li, Guoqian Chen:
A personalized trajectory privacy protection method. 102323 - Colin Topping, Andrew Carl Dwyer, Ola Aleksandra Michalec, Barnaby Craggs, Awais Rashid:
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks. 102324 - Enrique Soriano-Salvador, Gorka Guardiola Muzquiz:
SealFS: Storage-based tamper-evident logging. 102325 - Jing Lin, Kaiqi Xiong:
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation. 102326 - André Brandão, João S. Resende, Rolando Martins:
Hardening cryptographic operations through the use of secure enclaves. 102327 - Nureni Ayofe Azeez, Sanjay Misra, Ihotu Agbo Margaret, Luis Fernández Sanz, Shafii Muhammad Abdulhamid:
Adopting automated whitelist approach for detecting phishing attacks. 102328 - Changhun Jung, Jinchun Choi, Rhongho Jang, David Mohaisen, DaeHun Nyang:
A network-independent tool-based usable authentication system for Internet of Things devices. 102338 - Pedro Marques, Matilda Rhode, Ilir Gashi:
Waste not: Using diverse neural networks from hyperparameter search for improved malware detection. 102339 - Obi Ogbanufe:
Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. 102340 - Marta Catillo, Antonio Pecchia, Massimiliano Rak, Umberto Villano:
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data. 102341 - Jinglei Tan, Hengwei Zhang, Hongqi Zhang, Hao Hu, Cheng Lei, Zhenxiang Qin:
Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model. 102342 - Xinwen Hu, Yi Zhuang, Shangwei Lin, Fuyuan Zhang, Shuanglong Kan, Zining Cao:
A security type verifier for smart contracts. 102343 - Pu Tian, Zheyi Chen, Wei Yu, Weixian Liao:
Towards asynchronous federated learning based threat detection: A DC-Adam approach. 102344 - Abbas Shahim:
Security of the digital transformation. 102345 - Narges Khakpour:
A Field-Sensitive Security Monitor for Object-Oriented Programs. 102349 - Ming Jie Lee, Andrew Beng Jin Teoh, Andreas Uhl, Shiuan-Ni Liang, Zhe Jin:
A Tokenless Cancellable Scheme for Multimodal Biometric Systems. 102350 - Syed W. Shah, Naeem Firdous Syed, Arash Shaghaghi, Adnan Anwar, Zubair A. Baig, Robin Doss:
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA). 102351 - Eirini Anthi, Lowri Williams, Amir Javed, Pete Burnap:
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks. 102352 - Ashish Singh, Kakali Chatterjee:
Securing smart healthcare system with edge computing. 102353 - Alaa Tolah, Steven M. Furnell, Maria Papadaki:
An empirical analysis of the information security culture key factors framework. 102354 - Mansoor Ali, Hadis Karimipour, Muhammad Tariq:
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges. 102355 - Alejandro G. Martín, Marta Beltrán, Alberto Fernández-Isabel, Isaac Martín de Diego:
An approach to detect user behaviour anomalies within identity federations. 102356 - Shuyuan Mary Ho, Melissa R. Gross:
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness. 102357 - Yimin Guo, Yajun Guo:
FogHA: An efficient handover authentication for mobile devices in fog computing. 102358 - Abdelhakim Hannousse, Salima Yahiouche:
Handling webshell attacks: A systematic mapping and survey. 102366 - Luca Borzacchiello, Emilio Coppa, Camil Demetrescu:
FUZZOLIC: Mixing fuzzing and concolic execution. 102368 - Oladayo Olufemi Olakanmi, Kehinde Oluwasesan Odeyemi:
Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services. 102369 - Probidita Roychoudhury, Basav Roychoudhury, Dilip Kr. Saikia:
A secure Device-to-Device communication scheme for massive Machine Type Communication. 102370 - Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding:
I-MAD: Interpretable malware detector using Galaxy Transformer. 102371 - Xi Xiao, Wentao Xiao, Dianyan Zhang, Bin Zhang, Guangwu Hu, Qing Li, Shutao Xia:
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets. 102372 - Rafal Leszczyna:
Review of cybersecurity assessment methods: Applicability perspective. 102376 - Simon R. Davies, Richard Macfarlane, William J. Buchanan:
Differential area analysis for ransomware attack detection within mixed file datasets. 102377
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.