Search dblp for Publications

export results for "toc:db/journals/compsec/compsec120.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AliKAQ22,
  author       = {Hassan Ali and
                  Muhammad Suleman Khan and
                  Ala I. Al{-}Fuqaha and
                  Junaid Qadir},
  title        = {Tamp-X: Attacking explainable natural language classifiers through
                  tampered activations},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102791},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102791},
  doi          = {10.1016/J.COSE.2022.102791},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliKAQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarrosCOQR22,
  author       = {Pedro H. Barros and
                  Eduarda T. C. Chagas and
                  Leonardo B. Oliveira and
                  Fabiane Queiroz and
                  Heitor S. Ramos},
  title        = {Malware-SMELL: {A} zero-shot learning strategy for detecting zero-day
                  vulnerabilities},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102785},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102785},
  doi          = {10.1016/J.COSE.2022.102785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarrosCOQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaskervilleKS22,
  author       = {Richard L. Baskerville and
                  Jongwoo Kim and
                  Carl Stucke},
  title        = {The cybersecurity risk estimation engine: {A} tool for possibility
                  based risk analysis},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102752},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102752},
  doi          = {10.1016/J.COSE.2022.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaskervilleKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeamanRMH22,
  author       = {Craig Beaman and
                  Michael Redbourne and
                  J. Darren Mummery and
                  Saqib Hakak},
  title        = {Fuzzing vulnerability discovery techniques: Survey, challenges and
                  future directions},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102813},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102813},
  doi          = {10.1016/J.COSE.2022.102813},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeamanRMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuckleyHWE22,
  author       = {Oliver Buckley and
                  Duncan Hodges and
                  Jonathan Windle and
                  Sally Earl},
  title        = {{CLICKA:} Collecting and leveraging identity cues with keystroke dynamics},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102780},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102780},
  doi          = {10.1016/J.COSE.2022.102780},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuckleyHWE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChagantiRP22,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {Deep learning based cross architecture internet of things malware
                  detection and classification},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102779},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102779},
  doi          = {10.1016/J.COSE.2022.102779},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChagantiRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChawkiTAB22,
  author       = {El Balmany Chawki and
                  Zakariae Tbatou and
                  Ahmed Asimi and
                  Mohamed Bamarouf},
  title        = {Secure Virtual Machine Image Storage Process into a Trusted Zone-based
                  Cloud Storage},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102815},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102815},
  doi          = {10.1016/J.COSE.2022.102815},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChawkiTAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenTHZLL22,
  author       = {Li Chen and
                  Cong Tang and
                  Junjiang He and
                  Hui Zhao and
                  Xiaolong Lan and
                  Tao Li},
  title        = {{XSS} adversarial example attacks based on deep reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102831},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102831},
  doi          = {10.1016/J.COSE.2022.102831},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenTHZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZEWW22,
  author       = {Xuyang Chen and
                  Xiaolu Zhang and
                  Michael Elliot and
                  Xiaoyin Wang and
                  Feng Wang},
  title        = {Fix the leaking tap: {A} survey of Trigger-Action Programming {(TAP)}
                  security issues, detection techniques and solutions},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102812},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102812},
  doi          = {10.1016/J.COSE.2022.102812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZEWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ColomboFT22,
  author       = {Pietro Colombo and
                  Elena Ferrari and
                  Engin Deniz T{\"{u}}mer},
  title        = {Efficient {ABAC} based information sharing within {MQTT} environments
                  under emergencies},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102829},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102829},
  doi          = {10.1016/J.COSE.2022.102829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ColomboFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CuiCHLDL22,
  author       = {Lei Cui and
                  Jiancong Cui and
                  Zhiyu Hao and
                  Lun Li and
                  Zhenquan Ding and
                  Yongji Liu},
  title        = {An empirical study of vulnerability discovery methods over the past
                  ten years},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102817},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102817},
  doi          = {10.1016/J.COSE.2022.102817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CuiCHLDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongTTYD22,
  author       = {Yansong Dong and
                  Long Tang and
                  Cong Tian and
                  Bin Yu and
                  Zhenhua Duan},
  title        = {Improving transferability of adversarial examples by saliency distribution
                  and data augmentation},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102811},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102811},
  doi          = {10.1016/J.COSE.2022.102811},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DongTTYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Furnell22,
  author       = {Steven Furnell},
  title        = {Assessing website password practices - Unchanged after fifteen years?},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102790},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102790},
  doi          = {10.1016/J.COSE.2022.102790},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Furnell22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoswamiC22,
  author       = {Hemangi Goswami and
                  Hiten Choudhury},
  title        = {Remote Registration and Group Authentication of IoT Devices in 5G
                  Cellular Network},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102806},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102806},
  doi          = {10.1016/J.COSE.2022.102806},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoswamiC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GrosseLBPBM22,
  author       = {Kathrin Grosse and
                  Taesung Lee and
                  Battista Biggio and
                  Youngja Park and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102814},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102814},
  doi          = {10.1016/J.COSE.2022.102814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares22,
  author       = {Alejandro Guerra{-}Manzanares and
                  Marcin Luckner and
                  Hayretdin Bahsi},
  title        = {Concept drift and cross-device behavior: Challenges and implications
                  for effective android malware detection},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102757},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102757},
  doi          = {10.1016/J.COSE.2022.102757},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuerraCV22,
  author       = {Jorge L. Guerra and
                  Carlos Adri{\'{a}}n Catania and
                  Eduardo E. Veas},
  title        = {Datasets are not enough: Challenges in labeling network traffic},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102810},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102810},
  doi          = {10.1016/J.COSE.2022.102810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuerraCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HammadHE22,
  author       = {Mohamed Hammad and
                  Nabil M. Hewahi and
                  Wael Elmedany},
  title        = {{MMM-RF:} {A} novel high accuracy multinomial mixture model for network
                  intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102777},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102777},
  doi          = {10.1016/J.COSE.2022.102777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HammadHE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangFQHLH22,
  author       = {Shuai Jiang and
                  Cai Fu and
                  Yekui Qian and
                  Shuai He and
                  Jianqiang Lv and
                  Lansheng Han},
  title        = {IFAttn: Binary code similarity analysis based on interpretable features
                  with attention},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102804},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102804},
  doi          = {10.1016/J.COSE.2022.102804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangFQHLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JoLS22,
  author       = {Hyeonseong Jo and
                  Yongjae Lee and
                  Seungwon Shin},
  title        = {Vulcan: Automatic extraction and analysis of cyber threat intelligence
                  from unstructured text},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102763},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102763},
  doi          = {10.1016/J.COSE.2022.102763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JoLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanYKI22,
  author       = {Naurin Farooq Khan and
                  Amber Yaqoob and
                  Muhammad Saud Khan and
                  Naveed Ikram},
  title        = {The cybersecurity behavioral research: {A} tertiary study},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102826},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102826},
  doi          = {10.1016/J.COSE.2022.102826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanYKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimK22,
  author       = {Jae{-}Yeol Kim and
                  Hyuk{-}Yoon Kwon},
  title        = {Threat classification model for security information event management
                  focusing on model efficiency},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102789},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102789},
  doi          = {10.1016/J.COSE.2022.102789},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarSVY22,
  author       = {Rajesh Kumar and
                  Siddharth Sharma and
                  Chirag Vachhani and
                  Nitish Yadav},
  title        = {What changed in the cyber-security after COVID-19?},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102821},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102821},
  doi          = {10.1016/J.COSE.2022.102821},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarSVY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCBLGL22,
  author       = {Yong{-}Gang Li and
                  Yeh{-}Ching Chung and
                  Yu Bao and
                  Yi Lu and
                  Shanqing Guo and
                  Guoyuan Lin},
  title        = {KPointer: Keep the code pointers on the stack point to the right code},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102781},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102781},
  doi          = {10.1016/J.COSE.2022.102781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCBLGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangCWZZ22,
  author       = {Jianbing Liang and
                  Shuhui Chen and
                  Ziling Wei and
                  Shuang Zhao and
                  Wei Zhao},
  title        = {HAGDetector: Heterogeneous {DGA} domain name detection model},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102803},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102803},
  doi          = {10.1016/J.COSE.2022.102803},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangCWZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LimaLLB22,
  author       = {Milton V. M. Lima and
                  Ricardo Lima and
                  Fernando Lins and
                  Michel S. Bonfim},
  title        = {Beholder - {A} CEP-based intrusion detection and prevention systems
                  for IoT environments},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102824},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102824},
  doi          = {10.1016/J.COSE.2022.102824},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LimaLLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MakhdoomAL22,
  author       = {Imran Makhdoom and
                  Mehran Abolhasan and
                  Justin Lipman},
  title        = {A comprehensive survey of covert communication techniques, limitations
                  and future challenges},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102784},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102784},
  doi          = {10.1016/J.COSE.2022.102784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MakhdoomAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MishraAAG22,
  author       = {Alok Mishra and
                  Yehia Ibrahim Alzoubi and
                  Memoona Javeria Anwar and
                  Asif Qumer Gill},
  title        = {Attributes impacting cybersecurity policy development: An evidence
                  from seven nations},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102820},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102820},
  doi          = {10.1016/J.COSE.2022.102820},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MishraAAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohantyRL22,
  author       = {Hardhik Mohanty and
                  Arousha Haghighian Roudsari and
                  Arash Habibi Lashkari},
  title        = {Robust stacking ensemble model for darknet traffic classification
                  under adversarial settings},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102830},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102830},
  doi          = {10.1016/J.COSE.2022.102830},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MohantyRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaikGJNS22,
  author       = {Nitin Naik and
                  Paul Grace and
                  Paul Jenkins and
                  Kshirasagar Naik and
                  Jingping Song},
  title        = {An evaluation of potential attack surfaces based on attack tree modelling
                  and risk matrix applied to self-sovereign identity},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102808},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102808},
  doi          = {10.1016/J.COSE.2022.102808},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NaikGJNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiuZZZPH22,
  author       = {Weina Niu and
                  Jie Zhou and
                  Yibin Zhao and
                  Xiaosong Zhang and
                  Yujie Peng and
                  Cheng Huang},
  title        = {Uncovering {APT} malware traffic using deep learning combined with
                  time sequence and association analysis},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102809},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102809},
  doi          = {10.1016/J.COSE.2022.102809},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiuZZZPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PashamokhtariBG22,
  author       = {Arman Pashamokhtari and
                  Gustavo Batista and
                  Hassan Habibi Gharakheili},
  title        = {AdIoTack: Quantifying and refining resilience of decision tree ensemble
                  inference models against adversarial volumetric attacks on IoT networks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102801},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102801},
  doi          = {10.1016/J.COSE.2022.102801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PashamokhtariBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RashidKHIWGF22,
  author       = {Md. Mamunur Rashid and
                  Joarder Kamruzzaman and
                  Mohammad Mehedi Hassan and
                  Tasadduq Imam and
                  Santoso Wibowo and
                  Steven Gordon and
                  Giancarlo Fortino},
  title        = {Adversarial training for deep learning-based cyberattack detection
                  in IoT-based smart city applications},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102783},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102783},
  doi          = {10.1016/J.COSE.2022.102783},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RashidKHIWGF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RieraHHMM22,
  author       = {Tom{\'{a}}s Sureda Riera and
                  Juan Ram{\'{o}}n Bermejo Higuera and
                  Javier Bermejo Higuera and
                  Jos{\'{e}} Javier Mart{\'{\i}}nez{-}Herr{\'{a}}iz and
                  Juan Antonio Sicilia Montalvo},
  title        = {A new multi-label dataset for Web attacks {CAPEC} classification using
                  machine learning techniques},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102788},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102788},
  doi          = {10.1016/J.COSE.2022.102788},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RieraHHMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaA22,
  author       = {Shwadhin Sharma and
                  Eduardo Aparicio},
  title        = {Organizational and team culture as antecedents of protection motivation
                  among {IT} employees},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102774},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102774},
  doi          = {10.1016/J.COSE.2022.102774},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShowailTZNA22,
  author       = {Ahmad Showail and
                  Rashid Tahir and
                  Muhammad Fareed Zaffar and
                  Muhammad Haris Noor and
                  Mohammed Alkhatib},
  title        = {An internet of secure and private things: {A} service-oriented architecture},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102776},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102776},
  doi          = {10.1016/J.COSE.2022.102776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShowailTZNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SicariRC22,
  author       = {Sabrina Sicari and
                  Alessandra Rizzardi and
                  Alberto Coen{-}Porisini},
  title        = {Insights into security and privacy towards fog computing evolution},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102822},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102822},
  doi          = {10.1016/J.COSE.2022.102822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SicariRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UmarWL22,
  author       = {Mubarak Umar and
                  Zhenqiang Wu and
                  Xuening Liao},
  title        = {Authenticating tier-two body area network devices through user-specific
                  signal propagation characteristics},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102800},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102800},
  doi          = {10.1016/J.COSE.2022.102800},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UmarWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Villalon-Fonseca22,
  author       = {Ricardo Villal{\'{o}}n{-}Fonseca},
  title        = {The nature of security: {A} conceptual framework for integral-comprehensive
                  modeling of {IT} security and cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102805},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102805},
  doi          = {10.1016/J.COSE.2022.102805},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Villalon-Fonseca22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VorobyevK22,
  author       = {Ivan Vorobyev and
                  Anna Krivitskaya},
  title        = {Reducing false positives in bank anti-fraud systems based on rule
                  induction in distributed tree-based models},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102786},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102786},
  doi          = {10.1016/J.COSE.2022.102786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VorobyevK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLCYW22,
  author       = {Zhi Wang and
                  Chaoge Liu and
                  Xiang Cui and
                  Jie Yin and
                  Xutong Wang},
  title        = {EvilModel 2.0: Bringing Neural Network Models into Malware Attacks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102807},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102807},
  doi          = {10.1016/J.COSE.2022.102807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLCYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSQLL22,
  author       = {Senmiao Wang and
                  Luli Sun and
                  Su{-}Juan Qin and
                  Wenmin Li and
                  Wentao Liu},
  title        = {KRTunnel: {DNS} channel detector for mobile devices},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102818},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102818},
  doi          = {10.1016/J.COSE.2022.102818},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSQLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangLH22,
  author       = {Chunkai Zhang and
                  Xiaofeng Luo and
                  Peiyi Han},
  title        = {On-manifold adversarial attack based on latent space substitute model},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102770},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102770},
  doi          = {10.1016/J.COSE.2022.102770},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouFWL22,
  author       = {Zhipeng Zhou and
                  Qiang Fu and
                  Qianjun Wei and
                  Qiang Li},
  title        = {{LEGO:} {A} hybrid toolkit for efficient 2PC-based privacy-preserving
                  machine learning},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102782},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102782},
  doi          = {10.1016/J.COSE.2022.102782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouFWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics