![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 99
Volume 99, December 2020
- Deanna House, Gabriel A. Giordano:
Politeness in security directives: Insights in browser compliance for the human element. 102007 - Rami Mustafa A. Mohammad, Mutasem K. Alsmadi, Ibrahim Almarashdeh, Malek Alzaqebah
:
An improved rule induction based denial of service attacks classification model. 102008 - Haiping Huang, Peng Zhu, Fu Xiao, Xiang Sun, Qinglong Huang:
A blockchain-based scheme for privacy-preserving and secure sharing of medical data. 102010 - Nattanon Wongwiwatchai, Phannawhat Pongkham, Kunwadee Sripanidkulchai:
Detecting personally identifiable information transmission in android applications using light-weight static analysis. 102011 - Cheng Guo, Jing Jia
, Kim-Kwang Raymond Choo
, Yingmo Jie:
Privacy-preserving image search (PPIS): Secure classification and searching using convolutional neural network over large-scale encrypted medical images. 102021 - Anthony Kenyon, Lipika Deka
, David A. Elizondo:
Are public intrusion datasets fit for purpose characterising the state of the art in intrusion event datasets. 102022 - Leon Bosnjak, Bostjan Brumen:
Shoulder surfing experiments: A systematic literature review. 102023 - Sultan Alghamdi, Khin Than Win
, Elena Vlahu-Gjorgievska
:
Information security governance challenges and critical success factors: Systematic review. 102030 - Mengqi Zhan, Yang Li, Xinghua Yang, Wenjing Cui, Yulin Fan:
NSAPs: A novel scheme for network security state assessment and attack prediction. 102031 - Hongliang Liang, Zhuosi Xie, Yixiu Chen, Hua Ning, Jianli Wang:
FIT: Inspect vulnerabilities in cross-architecture firmware by deep learning and bipartite matching. 102032 - Xinhong Hei, Xinyue Yin, Yichuan Wang, Ju Ren, Lei Zhu:
A trusted feature aggregator federated learning for distributed malicious attack detection. 102033 - Dong Bin Oh
, Kyung Ho Park, Huy Kang Kim:
De-Wipimization: Detection of data wiping traces for investigating NTFS file system. 102034 - Annika Andersson
, Fredrik Karlsson, Karin Hedström
:
Consensus versus warfare - unveiling discourses in de jure information security standard development. 102035 - Richard Knight, Jason R. C. Nurse:
A framework for effective corporate communication after cyber security incidents. 102036 - Sudan Jha
, Deepak Prashar, Hoang Viet Long, David Taniar
:
Recurrent neural network for detecting malware. 102037 - Clay Posey, Robert Folger:
An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities. 102038 - Mingfu Xue, Can He, Jian Wang, Weiqiang Liu:
LOPA: A linear offset based poisoning attack method against adaptive fingerprint authentication system. 102046 - Xiaohui Yang, Wenjie Li
:
A zero-knowledge-proof-based digital identity management scheme in blockchain. 102050 - Krassimir Tzvetanov, Umit Karabiyik:
A first look at forensic analysis of sailfishos. 102054 - M. R. Gauthama Raman
, Wenjie Dong, Aditya Mathur:
Deep autoencoders as anomaly detectors: Method and case study in a distributed water treatment plant. 102055 - Ahmed Aleroud, Nisreen Abu-Alsheeh, Emad Al-Shawakfa
:
A graph proximity feature augmentation approach for identifying accounts of terrorists on twitter. 102056 - Xiaoqing Sun, Zhiliang Wang, Jiahai Yang, Xinran Liu:
Deepdom: Malicious domain detection with scalable and heterogeneous graph convolutional networks. 102057 - Ying Lin, Ling-Yan Bao, Ze-Minghui Li, Shu-Zheng Si, Chao-Hsien Chu:
Differential privacy protection over deep learning: An investigation of its impacted factors. 102061 - Mahendra Prasad
, Sachin Tripathi, Keshav P. Dahal
:
Unsupervised feature selection and cluster center initialization based arbitrary shaped clusters for intrusion detection. 102062 - Elham Rostami, Fredrik Karlsson, Shang Gao
:
Requirements for computerized tools to design information security policies. 102063 - Craig Van Slyke, France Bélanger:
Explaining the interactions of humans and artifacts in insider security behaviors: The mangle of practice perspective. 102064 - Oluwafemi Akanfe, Rohit Valecha, H. Raghav Rao:
Assessing country-level privacy risk for digital payment systems. 102065 - Laurie Giddens, Laura C. Amo, Dianna Cichocki:
Gender bias and the impact on managerial evaluation of insider security threats. 102066 - Gerardo Canfora, Andrea Di Sorbo
, Sara Forootani, Antonio Pirozzi, Corrado Aaron Visaggio:
Investigating the vulnerability fixing process in OSS projects: Peculiarities and challenges. 102067 - Wei Shao, Chunfu Jia, Yunkai Xu, Kefan Qiu, Yan Gao, Yituo He:
AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. 102069 - Zhi-Quan Qin, Xing-Kong Ma, Yong-Jun Wang:
ADSAD: An unsupervised attention-based discrete sequence anomaly detection framework for network security analysis. 102070 - Basheer Al-Duwairi
, Öznur Özkasap, Ahmet Uysal
, Ceren Kocaogullar, Kaan Yildirim
:
LogDoS: A Novel logging-based DDoS prevention mechanism in path identifier-Based information centric networks. 102071 - Yujie Zhao, Zhanyong Tang, Guixin Ye, Dongxu Peng, Dingyi Fang, Xiaojiang Chen, Zheng Wang
:
Semantics-aware obfuscation scheme prediction for binary. 102072
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.