


default search action
Computers & Security, Volume 163
Volume 163, 2026
- Thomas Oakley Browne, Eric Pardede:

A systematic review on adversarial thinking in cyber security education: Themes and potential frameworks. 104803 - MD Mahady Hassan, Shanto Roy, Reza Rahaeimehr:

Memory under siege: A comprehensive survey of side-Channel attacks on memory. 104810 - Seonghwan Park, Hayoung Kang, Donghyun Kwon:

Beyond address spaces: In-process memory isolation for RISC-V. 104812 - Tengyao Li, Kai-Yue Liu, Shaoyong Du:

A survey on network flow watermarking: A problem-oriented perspective. 104813 - Takahito Yoshizawa, Himanshu Agarwal, Dave Singelée, Bart Preneel:

Certificate revocation - search for a way forward. 104814 - Mikel Egaña Aranguren, Jesualdo Tomás Fernández-Breis, Bidane Leon Balentzia, Markus Rompe, Alexander García Castro:

A comprehensive view of software vulnerability risks through enterprise knowledge graphs. 104815 - Xing Hu, Yang Zhang, Sheng Liu, Xiaowen Chen, Yaohua Wang, Shaoqing Li, Zhenyu Zhao, Keqin Li:

GLRA: Graph-based leakage risk assessment via minimal transmission cost path analysis. 104816 - Wei Wang, Weike Wang, Jiameng Liu, Lin Li, Bingzheng Li, Zirui Liu, Xiang Wang:

Attacks, defenses and perspectives for the runtime security of RISC-V IoT devices: A review. 104817 - Rodney Adriko, Jason R. C. Nurse:

Cybersecurity and Cyber insurance for Small to Medium-sized Enterprises (SMEs): Perceptions, challenges and decision-making dynamics. 104818 - Tadeusz Sawik:

Cybersecurity optimization in supply chains under propagated cyberattacks. 104820 - Haotian Huang, Ruibin Yan, Jian Gao:

SemTaint: A scalable taint analysis approach for JavaWeb frameworks and composite containers. 104821 - Sumin Yang, Hongjoo Jin, Wonsuk Choi, Dong Hoon Lee:

Folded-tag: Enhancing memory safety with efficient hardware-supported memory tagging. 104822 - Christopher A. Ramezan, Mohammad J. Ahmad, Ludwig Christian Schaupp, Frank W. Hatten, Michael A. Starling:

The modern cybersecurity analyst: An international position analysis. 104825 - Xiao Tan, Qi Xie, Lidong Han, Shengbao Wang:

Public auditing with semantic secure data privacy for low-entropy files in cloud storage. 104826 - Bert Abrath, Lennert Franssens, Bjorn De Sutter, Bart Coppens:

Secure and efficient application monitoring and replication without kernel patches. 104833 - Inoussa Mouiche, Sherif Saad:

TI-NERmergerV2: Automating the integration of threat intelligence NER datasets via STIX standard. 104838

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














