default search action
Computers & Security, Volume 121
Volume 121, October 2022
- Yujia Liu, Ming Jiang, Tingting Jiang:
Transferable adversarial examples based on global smooth perturbations. 102816 - Shiwei Lu, Ruihu Li, Wenbin Liu, Xuan Chen:
Defense against backdoor attack in federated learning. 102819 - Wenbo Guo, Yong Fang, Cheng Huang, Haoran Ou, Chun Lin, Yongyan Guo:
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network. 102823 - Manel Jerbi, Zaineb Chelly Dagdia, Slim Bechikh, Lamjed Ben Said:
Android malware detection as a Bi-level problem. 102825 - Adnan Qayyum, Muhammad Umar Janjua, Junaid Qadir:
Making federated learning robust to adversarial attacks by learning data and model association. 102827 - Kabul Kurniawan, Andreas Ekelhart, Elmar Kiesling, Gerald Quirchmayr, A Min Tjoa:
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data. 102828 - Jaeung Lee, Melchor C. de Guzman, Jingguo Wang, Manish Gupta, H. Raghav Rao:
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach. 102832 - Ali Muzaffar, Hani Ragab Hassen, Michael A. Lones, Hind Zantout:
An in-depth review of machine learning based Android malware detection. 102833 - Xiaochun Yun, Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun:
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features. 102834 - Jiwei Tian, Buhong Wang, Jing Li, Charalambos Konstantinou:
Datadriven false data injection attacks against cyber-physical power systems. 102836 - Yuanzhen Liu, Umair Mujtaba Qureshi, Gerhard Petrus Hancke:
Keypad entry inference with sensor fusion from mobile and smart wearables. 102837 - Ido Finder, Eitam Sheetrit, Nir Nissim:
A time-interval-based active learning framework for enhanced PE malware acquisition and detection. 102838 - Jie Wang, Jiaming Shi, Xin Wen, Liang Xu, Ke Zhao, Fuyang Tao, Wenbiao Zhao, Xiuying Qian:
The effect of signal icon and persuasion strategy on warning design in online fraud. 102839 - Megan Gale, Ivano Bongiovanni, Sergeja Slapnicar:
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead. 102840 - Yael Mathov, Tal Ben Senior, Asaf Shabtai, Yuval Elovici:
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations. 102841 - Yanan Li, Tao Qin, Yongzhong Huang, Jinghong Lan, ZanHao Liang, Tongtong Geng:
HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems. 102842 - Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando:
Beyond robustness: Resilience verification of tree-based classifiers. 102843 - Linan Huang, Quanyan Zhu:
RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks. 102844 - Pedro García-Teodoro, José Antonio Gómez-Hernández, Alberto Abellán-Galera:
Multi-labeling of complex, multi-behavioral malware samples. 102845 - Ferhat Demirkiran, Aykut Çayir, Ugur Ünal, Hasan Dag:
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification. 102846 - Teng Long, Qi Gao, Lili Xu, Zhangbing Zhou:
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions. 102847 - Chuanwang Wang, Junjie Zhang, Ming Xu, Haodong Zhang, Weili Han:
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing. 102848 - Antonio Villalón-Huerta, Hector Marco-Gisbert, Ismael Ripoll-Ripoll:
A Taxonomy for Threat Actors' Persistence Techniques. 102855 - Kehong Li, Wengang Ma, Huawei Duan, Han Xie, Juanxiu Zhu:
Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization. 102856 - Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su:
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning. 102857 - Zhenpeng Liu, Lele Ren, Ruilin Li, Qiannan Liu, Yonggang Zhao:
ID-based sanitizable signature data integrity auditing scheme with privacy-preserving. 102858 - Elham Arshad, Michele Benolli, Bruno Crispo:
Practical attacks on Login CSRF in OAuth. 102859 - Ahmad O. Almashhadani, Domhnall Carlin, Mustafa Kaiiali, Sakir Sezer:
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection. 102860 - Chunying Zhang, Donghao Jia, Liya Wang, Wenjie Wang, Fengchun Liu, Aimin Yang:
Comparative research on network intrusion detection methods based on machine learning. 102861 - Eugene Frimpong, Antonis Michalas, Amjad Ullah:
Footsteps in the fog: Certificateless fog-based access control. 102866 - Jiang Xie, Shuhao Li, Yongzheng Zhang, Peishuai Sun, Hongbo Xu:
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute. 102867 - Aratrika Ray-Dowling, Daqing Hou, Stephanie Schuckers, Abbie Barbir:
Evaluating multi-modal mobile behavioral biometrics using public datasets. 102868 - Fangtian Zhong, Pengfei Hu, Guoming Zhang, Hong Li, Xiuzhen Cheng:
Reinforcement learning based adversarial malware example generation against black-box detectors. 102869
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.