


default search action
Computers & Security, Volume 155
Volume 155, 2025
- Bonan Zhang
, Chao Chen, Ickjai Lee, Kyungmi Lee, Kok-Leong Ong:
A survey on security and privacy issues in wearable health monitoring devices. 104453 - Charilaos Skandylas
, Mikael Asplund
:
Automated penetration testing: Formalization and realization. 104454 - Ayodeji James Akande
, Zhe Hou
, Ernest Foo, Qinyi Li:
LTL-based runtime verification framework for cyber-attack anomaly prediction in cyber-physical systems. 104455 - Xuefei Chen, Jinfeng Kou, Haiqiang Li, Yuqi Zhang, Junchao Ma, Chen Li, Bibo Tu:
End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems. 104461 - Ruiyang Ding, Lei Sun, Zhiyi Ding, Weifei Zang, Leyu Dai:
Towards targeted and universal adversarial attacks against network traffic classification. 104470 - Xing Chen, Jingsheng Wang, Song Yan, Zuyin Wang:
Anomalous identity recognition model based on vehicle driving characteristic verification in typical scenarios. 104476 - Yanze Qu
, Hailong Ma, Chaofan Zheng, Yiming Jiang, Wenbo Wang
:
A malware traffic detection method based on Victim-Attacker interaction patterns. 104487 - Fatma Hendaoui
, Rahma Meddeb
, Lamia Trabelsi, Ahlem Ferchichi, Rawia Ahmed:
FLADEN: Federated Learning for Anomaly DEtection in IoT Networks. 104446 - Debasmita Dey, Nirnay Ghosh
:
iQUIC: An intelligent framework for defending QUIC connection ID-based DoS attack using advantage actor-critic RL. 104463 - Matous Kozák
, Luca Demetrio
, Dmitrijs Trizna
, Fabio Roli
:
Updating Windows malware detectors: Balancing robustness and regression against adversarial EXEmples. 104466 - Shanquan Yang, Yansong Gao
, Boyu Kuang
, Yixuan Yang, Anmin Fu:
DFirmSan: A lightweight dynamic memory sanitizer for Linux-based firmware. 104467 - Nicola Bena
, Marco Anisetti
, Ernesto Damiani, Chan Yeob Yeun
, Claudio A. Ardagna
:
Protecting machine learning from poisoning attacks: A risk-based approach. 104468 - Sheema Madhusudhanan
, Arun Cyril Jose
:
Privacy preservation techniques through data lifecycle: A comprehensive literature survey. 104473 - Anit Kumar, Dhanpratap Singh
:
Securing IoT devices in edge computing through reinforcement learning. 104474 - Kiran K. C., Md. Shafaeat Hossain, Carl Haberfeld:
Exploring capacitive swipe gesture for user authentication using a new large dataset. 104475 - Javier Maldonado
, María Cristina Riff:
An evolutionary wrapper to support intrusion detection system configuration. 104478 - Zihui Guo
, Yin Lv
, Ningning Cui, Liwei Chen, Gang Shi:
HScheduler: An execution history-based seed scheduling strategy for hardware fuzzing. 104479 - Jinyuan Li, Guangyu Qian, Wei He
, Wei Zhang:
Industrial control system intrusion detection method based on belief rule base with gradient descent. 104488 - Alimov Abdulboriy Abdulkhay ugli
, Ji Sun Shin:
SAFE-IDS: A privacy-preserving framework for overcoming non-IID challenges in federated intrusion detection. 104492 - Matilda Nkoom
, Sena G. Hounsinou, Garth V. Crosby:
Securing the Internet of Robotic Things (IoRT) against DDoS Attacks: A Federated Learning with Differential Privacy Clustering Approach. 104493 - Viktor Medvedev
, Arnoldas Budzys, Olga Kurasova
:
A decision-making framework for user authentication using keystroke dynamics. 104494 - Yazhuo Gao, Lin Yang, Ran Zhu, Yixuan Wu
, Feng Yang, Yining Cao:
IR-IDS: A network intrusion detection method based on causal feature selection and explainable model optimization. 104496 - Kelly A. Cole, Alexander L. Francis
, Marcus K. Rogers, Joseph Balazs:
Can individual differences in cognitive capacity predict cybersecurity performance? 104497

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.