


default search action
Computers & Security, Volume 142
Volume 142, 2024
- Chengyi Yang

, Kun Jia, Deli Kong, Jiayin Qi, Aimin Zhou:
DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning. 103839 - Jiaru Song, Guihe Qin, Yanhua Liang, Jie Yan, Minghui Sun:

SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN. 103847 - Ze Shi

, Hongyi Li, Di Zhao, Chengwei Pan
:
Research on quality assessment methods for cybersecurity knowledge graphs. 103848 - Mingcan Cen

, Xizhen Deng, Frank Jiang
, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. 103849 - Yunfei Meng

, Changbo Ke, Zhiqiu Huang:
A model transformation based security policy automatic management framework for software-defined networking. 103850 - Peihong Lin, Pengfei Wang

, Xu Zhou, Wei Xie
, Kai Lu, Gen Zhang
:
HyperGo: Probability-based directed hybrid fuzzing. 103851 - Yang Hoong, Davar Rezania

:
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. 103852 - Lalitha Chavali

, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula
:
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems. 103854 - Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu

, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. 103855 - Jose Antonio Onieva

, Pablo Pérez Jiménez, Javier López:
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash). 103856 - Akshay Aggarwal

, Shashi Kant Srivastava:
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector. 103857 - Sunil Chaudhary

:
Driving behaviour change with cybersecurity awareness. 103858 - Ying-Dar Lin, Shin-Yi Yang, Didik Sudyana

, Fietyata Yudha
, Yuan-Cheng Lai
, Ren-Hung Hwang
:
Two-stage multi-datasource machine learning for attack technique and lifecycle detection. 103859 - Jayashre K

, Amsaprabhaa M
:
Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos. 103860 - Xi Chen

, Wei Huang
, Ziwen Peng, Wei Guo, Fan Zhang:
Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions. 103861 - Gil Shenderovitz

, Nir Nissim
:
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls. 103862 - Md Sabuj Khan

, Hengjian Li
, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. 103863 - Pascal Maniriho

, Abdun Naser Mahmood
, Mohammad Jabed Morshed Chowdhury
:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. 103864 - Yunlong Tang, Jing Sun, Huan Wang, Junyi Deng, Liang Tong, Wenhong Xu:

A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. 103871 - Zhiying Wang, Guiyun Li, Yajing Diao, Nianxin Wang:

Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity. 103875 - Amber Hayat

, Syed Sadaf Ali, Ashok Kumar Bhateja
, Naoufel Werghi
:
FinTem: A secure and non-invertible technique for fingerprint template protection. 103876 - Siwei Guan

, Zhiwei He
, Shenhui Ma
, Mingyu Gao:
Multivariate time series anomaly detection with variational autoencoder and spatial-temporal graph network. 103877 - Fadhila Tlili

, Samiha Ayed, Lamia Chaari Fourati:
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS). 103878 - Xuefeng Li

, Chensu Zhao, Yi Hu, Honglin Xie, Yuhang Wang, Jingyang Zhao:
Precursor of privacy leakage detection for individual user. 103879 - Andrew William Green

, Dejarvis Oliver
, Amy B. Woszczynski:
To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure. 103880 - Xiuzhen Chen, Weicheng Qiu, Lixing Chen

, Yinghua Ma
, Jin Ma
:
Fast and practical intrusion detection system based on federated learning for VANET. 103881 - Wanping Liu, Baojuan Wang

, Dong Huang, Haolan Luo
, Ling Lu:
CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance. 103882 - Yaser Baseri

, Vikas Chouhan, Abdelhakim Hafid:
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols. 103883 - Saeid Sheikhi

, Panos Kostakos
:
Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection. 103885 - Frank Cremer

, Barry Sheehan
, Martin Mullins, Michael Fortmann, Barry J. Ryan, Stefan Materne:
On the insurability of cyber warfare: An investigation into the German cyber insurance market. 103886 - M. S. Gowtham, M. Ramkumar

, S. Syed Jamaesha, M. Vigenesh:
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks. 103889 - Yufeng Li, Chengjian Huang, Qi Liu, Xiangyu Zheng

, Ke Sun
:
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. 103890 - Kholekile L. Gwebu

, Jing Wang
:
The defining features of a robust information security climate. 103891 - Longtao Guo

, Huakun Huang
, Lingjun Zhao, Peiliang Wang
, Shan Jiang
, Chunhua Su
:
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping. 103894 - Joshua M. Davis

, Deepti Agrawal, Rebekah E. Austin:
Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment. 103896 - Jesús Fernando Cevallos Moreno

, Alessandra Rizzardi
, Sabrina Sicari
, Alberto Coen-Porisini:
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach. 103898

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














