


default search action
Computers & Security, Volume 156
Volume 156, 2025
- Syed Wali
, Yasir Ali Farrukh
, Irfan Khan
, John A. Hamilton Jr.:
Covert penetrations: Analyzing and defending SCADA systems from stealth and Hijacking attacks. 104449 - Léo Lavaur
, Yann Busnel
, Fabien Autrel:
Investigating the Impact of Label-flipping Attacks against Federated Learning for Collaborative Intrusion Detection. 104462 - Hongyu Jin
, Panos Papadimitratos
:
Accountable, Scalable and DoS-resilient Secure Vehicular Communication. 104469 - Mike Da Silva
, Stéphane Mocanu
, Maxime Puys
, Pierre-Henri Thevenon
:
Safety-security convergence: Automation of IEC 62443-3-2. 104477 - Daniel Gibert
, Nikolaos Totosis, Constantinos Patsakis, Quan Le, Giulio Zizzo:
Assessing the impact of packing on static machine learning-based malware detection and classification systems. 104495 - Winnie Bahati Mbaka
, Xinran Zhang
, Yunduo Wang
, Tong Li, Fabio Massacci
, Katja Tuma
:
Assessing the usefulness of Data Flow Diagrams for validating security threats. 104498 - Guang Shi
, Tao Li
, Qinghe Zhou
, Menglin Liu
, Yuan Feng
:
Multi-dimensional assessment for Android application security based on users' evaluation. 104499 - Tong Li
, Fangqi Dong
, Chaoqun Wen:
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model. 104500 - Qingxin Liu, Guihe Qin, Yanhua Liang, Jiaru Song, Wanning Liu, Xue Zhou:
Intrusion detection system for autonomous vehicles using sensor spatio-temporal information. 104502 - Kuldeep Singh:
Industrial internet of things fortify: multi-domain feature learning framework with deepdetectnet++ for improved intrusion detection. 104506 - Roberto Canonico
, Francesco Lista, Annalisa Navarro
, Giancarlo Sperlí
, Andrea Vignali
:
Threat detection in reconfigurable Cyber-Physical Systems through Spatio-Temporal Anomaly Detection using graph attention network. 104509 - Xingyu Gong, Yi Yang, Yi Zhang, Na Li, Yu Guan, Rongkun Jiang:
Feature selection method for network intrusion based on hybrid meta-heuristic dynamic optimization algorithm. 104512 - Yutong Niu, Jian Zhang, Zhangguo Tang, Hao Yan, Min Zhu, Huanzhou Li
:
Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy. 104514 - Arpita Srivastava, Ditipriya Sinha:
ARLHNIDS-IoT: An accurate and robust lightweight hybrid-NIDS for IoT network security. 104515 - Maysa Sinan
, Mojtaba Shahin, Iqbal Gondal
:
Implementing and integrating security controls: A practitioners' perspective. 104516 - James Higgs
, Stephen Flowerday
:
Detecting Cybercrime in Online Video Gaming. 104528 - Gabriela Leite Pereira, Leonardo Silvino Brito, Sidney Marlon Lopes de Lima
:
Antivirus applied to Google Chrome's extension malware. 104465 - Meng Luo, Qiuyun Wang
, Jianrong Zhang, Cheng Yu, Kai Zhou, Baojiang Cui, Zhengwei Jiang:
Who are querying for me? Measuring the dependency and centralization in recursive resolution. 104501 - Aljoscha Dietrich, Kurunandan Jain, Georg Gutjahr, Bianca Steffes, Christoph Sorge:
Retraction notice to "I Recognize you by Your Steps: Privacy Impact of Pedometer Data" [Computers & Security 124 (2022) 102994]. 104505 - Simone Andriani
, Stefano Galantucci
, Andrea Iannacone
, Antonio Maci
, Giuseppe Pirlo:
CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for KNN-based malware image classification. 104507 - Farzana Zahid, Matthew M. Y. Kuo, Roopak Sinha
:
Light-weight slow-rate attack detection framework for resource-constrained Industrial Cyber-Physical Systems. 104508 - Patrik Goldschmidt
, Daniela Chudá:
Network intrusion datasets: A survey, limitations, and recommendations. 104510 - Abdul Samiah
, Muhammad Azmi Umer, Shama Siddiqui
:
Decision tree based invariants for intrusion detection in industrial control system. 104511 - Shaobo Zhang
, Lujie Zhang
, Tao Peng, Qin Liu, Xiong Li:
VADP: Visitor-attribute-based adaptive differential privacy for IoMT data sharing. 104513 - Ting Xu, Xinrui Ge
, Changheng Shao:
PMkR: Privacy-preserving multi-keyword top-k reachability query. 104525 - Edward Chuah
, Arshad Jhumka, Aladdin Ayesh
:
Deep learning-based prediction of reflection attacks using NetFlow data. 104527 - Wanshuang Lin
, Chunhe Xia, Tianbo Wang
, Mengyao Liu
, Yang Li
:
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection. 104529 - Fanchao Meng, Jiaping Gui
, Futai Zou, Yunbo Li, Yue Wu:
DISTR: Detecting multi-stage IoT botnets through contextual traffic and causal analytics. 104531 - Naif Alsharabi, Akashdeep Bhardwaj, Abdulaziz Ayaba, Amr Jadi:
Corrigendum to "Threat hunting for adversary impact inhibiting system recovery" [Computers & Security, Volume 154, July 2025, 104464]. 104532 - Duy Dang-Pham
, Nik Thompson
, Atif Ahmad, Sean B. Maynard
:
Shadow information security practices in organizations: The role of information security transparency, overload, and psychological empowerment. 104538

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.