![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 133
Volume 133, October 2023
- Sebastian Hengstler
, Stephan Kuehnel
, Kristin Masuch
, Ilja Nastjuk, Simon Trang
:
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior. 103370 - Jay Doshi
, Kunal Parmar
, Raj Sanghavi, Narendra Shekokar
:
A comprehensive dual-layer architecture for phishing and spam email detection. 103378 - Neil Gandal, Tyler Moore
, Michael Riordan, Noa Barnir:
Empirically evaluating the effect of security precautions on cyber incidents. 103380 - Vyron Kampourakis
, Vasileios Gkioulos, Sokratis K. Katsikas:
A systematic literature review on wireless security testbeds in the cyber-physical realm. 103383 - Saddam Hussain Khan
, Tahani Jaser Alahmadi
, Wasi Ullah, Javed Iqbal
, Azizur Rahim
, Hend Khalid Alkahtani, Wajdi Alghamdi
, Alaa Omran Almagrabi:
A new deep boosted CNN and ensemble learning based IoT malware detection. 103385 - Idris Zakariyya
, Harsha K. Kalutarage
, M. Omar Al-Kadri
:
Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring. 103388 - Mitsuaki Akiyama
, Shugo Shiraishi, Akifumi Fukumoto, Ryota Yoshimoto, Eitaro Shioji, Toshihiro Yamauchi
:
Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey. 103389 - Ya Yin, Carol Hsu, Zhongyun Zhou:
Employees' in-role and extra-role information security behaviors from the P-E fit perspective. 103390 - Zaina Abuabed, Ahmad S. Alsadeh
, Adel Taweel
:
STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles. 103391 - Ah-hyun Park
, Hyejin Ryu, Woobeen Park
, Doowon Jeong
:
Forensic investigation framework for cryptocurrency wallet in the end device. 103392 - Usharani Hareesh Govindarajan
, Dhiraj Kumar Singh, Hardik A. Gohel:
Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers (BERT). 103404 - Rodothea-Myrsini Tsoupidi
, Elena Troubitsyna, Panagiotis Papadimitratos:
Thwarting code-reuse and side-channel attacks in embedded systems. 103405 - Hua Ma, Qun Li
, Yifeng Zheng
, Zhi Zhang
, Xiaoning Liu
, Yansong Gao
, Said F. Al-Sarawi
, Derek Abbott
:
MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning. 103406 - Christian Esposito
, Vincenzo Moscato, Giancarlo Sperlì
:
Detecting malicious reviews and users affecting social reviewing systems: A survey. 103407 - Joseph Da Silva
:
Protection, expertise and domination: Cyber masculinity in practice. 103408 - Mohammed M. Alani
, Atefeh Mashatan
, Ali Miri
:
XMal: A lightweight memory-based explainable obfuscated-malware detector. 103409 - Nicola d'Ambrosio
, Gaetano Perrone
, Simon Pietro Romano
:
Including insider threats into risk management through Bayesian threat graph networks. 103410 - Jiawen Li
, Kun Fang
, Xiaolin Huang, Jie Yang:
Improving adversarial robustness through a curriculum-guided reliable distillation. 103411 - William Yeoh
, Marina Liu
, Malcolm Shore
, Frank Jiang:
Zero trust cybersecurity: Critical success factors and A maturity assessment framework. 103412 - Roger Robson dos Santos, Eduardo K. Viegas
, Altair O. Santin
, Pietro Tedeschi
:
Federated learning for reliable model updates in network-based intrusion detection. 103413 - Yongkang Wang, Di-Hua Zhai
, Yuanqing Xia
:
SCFL: Mitigating backdoor attacks in federated learning based on SVD and clustering. 103414 - Davide Bove
, Julian Funk:
Basic secure services for standard RISC-V architectures. 103415 - Chinyang Henry Tseng, Ya-Ting Chang
:
EBDM: Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network. 103419 - Xiaodong Zang
, Jian Gong, Xinchang Zhang, Guiqing Li:
Attack scenario reconstruction via fusing heterogeneous threat intelligence. 103420 - Na-Young Ahn
, Dong Hoon Lee:
IoT security: On-chip secure deletion scheme using ECC modulation in IoT appliances. 103422
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.