default search action
Computers & Security, Volume 131
Volume 131, August 2023
- Yafei Sang, Jisong Yang, Yongzheng Zhang, Shuhao Li, Peng Chang:
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach. 103145 - Jonathan M. Spring:
An analysis of how many undiscovered vulnerabilities remain in information systems. 103191 - Maysaa Khalil, Moez Esseghir, Leïla Merghem-Boulahia:
Privacy-Preserving federated learning: An application for big data load forecast in buildings. 103211 - Paul Tarwireyi, Alfredo Terzoli, Matthew O. Adigun:
Using multi-audio feature fusion for android malware detection. 103282 - Philipp Kühn, David N. Relke, Christian Reuter:
Common vulnerability scoring system prediction based on open source intelligence information sources. 103286 - Anna Cartwright, Edward J. Cartwright, Esther Solomon Edun:
Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies. 103288 - Yachao Yuan, Yu Huang, Yali Yuan:
PrSLoc: Sybil attack detection for localization with private observers using differential privacy. 103289 - Hamra Afzaal, Muhammad Imran, Muhammad Umar Janjua:
Formal verification of fraud-resilience in a crowdsourcing consensus protocol. 103290 - Carlos A. Barreto, Olof Reinert, Tobias Wiesinger, Ulrik Franke:
Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime. 103292 - Yerkezhan Sartayeva, Henry C. B. Chan:
A survey on indoor positioning security and privacy. 103293 - Benyuan Yang:
Enforcement of separation of duty constraints in attribute-based access control. 103294 - Davide Berardi, Saverio Giallorenzo, Andrea Melis, Simone Melloni, Loris Onori, Marco Prandini:
Data Flooding against Ransomware: Concepts and Implementations. 103295 - Javier Cabrera-Arteaga, Martin Monperrus, Tim Toady, Benoit Baudry:
WebAssembly diversification for malware evasion. 103296 - Muhammad Tayyab, Mohsen Marjani, N. Z. Jhanjhi, Ibrahim Abaker Targio Hashem, Raja Sher Afgun Usmani, Faizan Qamar:
A comprehensive review on deep learning algorithms: Security and privacy issues. 103297 - Xabier Sáez de Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza:
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks. 103299 - Qingjun Yuan, Chang Liu, Wentao Yu, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Gaopeng Gou:
BoAu: Malicious traffic detection with noise labels based on boundary augmentation. 103300 - Karen Renaud, Karl van der Schyff, Stuart MacDonald:
Would US citizens accept cybersecurity deresponsibilization? Perhaps not. 103301 - Andrea Romdhana, Alessio Merlo, Mariano Ceccato, Paolo Tonella:
Assessing the security of inter-app communications in android through reinforcement learning. 103311 - Nathan Beu, Asangi Jayatilaka, Mansooreh Zahedi, Ali Babar, Laura Hartley, Winston Lewinsmith, Irina Baetu:
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation. 103313 - Yimo Ren, Hong Li, Peipei Liu, Jie Liu, Hongsong Zhu, Limin Sun:
CL-GAN: A GAN-based continual learning model for generating and detecting AGDs. 103317
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.