Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec120.bht:"
@article{DBLP:journals/compsec/AliKAQ22, author = {Hassan Ali and Muhammad Suleman Khan and Ala I. Al{-}Fuqaha and Junaid Qadir}, title = {Tamp-X: Attacking explainable natural language classifiers through tampered activations}, journal = {Comput. Secur.}, volume = {120}, pages = {102791}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102791}, doi = {10.1016/J.COSE.2022.102791}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliKAQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarrosCOQR22, author = {Pedro H. Barros and Eduarda T. C. Chagas and Leonardo B. Oliveira and Fabiane Queiroz and Heitor S. Ramos}, title = {Malware-SMELL: {A} zero-shot learning strategy for detecting zero-day vulnerabilities}, journal = {Comput. Secur.}, volume = {120}, pages = {102785}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102785}, doi = {10.1016/J.COSE.2022.102785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarrosCOQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaskervilleKS22, author = {Richard L. Baskerville and Jongwoo Kim and Carl Stucke}, title = {The cybersecurity risk estimation engine: {A} tool for possibility based risk analysis}, journal = {Comput. Secur.}, volume = {120}, pages = {102752}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102752}, doi = {10.1016/J.COSE.2022.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaskervilleKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeamanRMH22, author = {Craig Beaman and Michael Redbourne and J. Darren Mummery and Saqib Hakak}, title = {Fuzzing vulnerability discovery techniques: Survey, challenges and future directions}, journal = {Comput. Secur.}, volume = {120}, pages = {102813}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102813}, doi = {10.1016/J.COSE.2022.102813}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeamanRMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuckleyHWE22, author = {Oliver Buckley and Duncan Hodges and Jonathan Windle and Sally Earl}, title = {{CLICKA:} Collecting and leveraging identity cues with keystroke dynamics}, journal = {Comput. Secur.}, volume = {120}, pages = {102780}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102780}, doi = {10.1016/J.COSE.2022.102780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuckleyHWE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChagantiRP22, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {Deep learning based cross architecture internet of things malware detection and classification}, journal = {Comput. Secur.}, volume = {120}, pages = {102779}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102779}, doi = {10.1016/J.COSE.2022.102779}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChagantiRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChawkiTAB22, author = {El Balmany Chawki and Zakariae Tbatou and Ahmed Asimi and Mohamed Bamarouf}, title = {Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage}, journal = {Comput. Secur.}, volume = {120}, pages = {102815}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102815}, doi = {10.1016/J.COSE.2022.102815}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChawkiTAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenTHZLL22, author = {Li Chen and Cong Tang and Junjiang He and Hui Zhao and Xiaolong Lan and Tao Li}, title = {{XSS} adversarial example attacks based on deep reinforcement learning}, journal = {Comput. Secur.}, volume = {120}, pages = {102831}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102831}, doi = {10.1016/J.COSE.2022.102831}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenTHZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZEWW22, author = {Xuyang Chen and Xiaolu Zhang and Michael Elliot and Xiaoyin Wang and Feng Wang}, title = {Fix the leaking tap: {A} survey of Trigger-Action Programming {(TAP)} security issues, detection techniques and solutions}, journal = {Comput. Secur.}, volume = {120}, pages = {102812}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102812}, doi = {10.1016/J.COSE.2022.102812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZEWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ColomboFT22, author = {Pietro Colombo and Elena Ferrari and Engin Deniz T{\"{u}}mer}, title = {Efficient {ABAC} based information sharing within {MQTT} environments under emergencies}, journal = {Comput. Secur.}, volume = {120}, pages = {102829}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102829}, doi = {10.1016/J.COSE.2022.102829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ColomboFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CuiCHLDL22, author = {Lei Cui and Jiancong Cui and Zhiyu Hao and Lun Li and Zhenquan Ding and Yongji Liu}, title = {An empirical study of vulnerability discovery methods over the past ten years}, journal = {Comput. Secur.}, volume = {120}, pages = {102817}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102817}, doi = {10.1016/J.COSE.2022.102817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CuiCHLDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongTTYD22, author = {Yansong Dong and Long Tang and Cong Tian and Bin Yu and Zhenhua Duan}, title = {Improving transferability of adversarial examples by saliency distribution and data augmentation}, journal = {Comput. Secur.}, volume = {120}, pages = {102811}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102811}, doi = {10.1016/J.COSE.2022.102811}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DongTTYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Furnell22, author = {Steven Furnell}, title = {Assessing website password practices - Unchanged after fifteen years?}, journal = {Comput. Secur.}, volume = {120}, pages = {102790}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102790}, doi = {10.1016/J.COSE.2022.102790}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Furnell22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GoswamiC22, author = {Hemangi Goswami and Hiten Choudhury}, title = {Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network}, journal = {Comput. Secur.}, volume = {120}, pages = {102806}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102806}, doi = {10.1016/J.COSE.2022.102806}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GoswamiC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GrosseLBPBM22, author = {Kathrin Grosse and Taesung Lee and Battista Biggio and Youngja Park and Michael Backes and Ian M. Molloy}, title = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks}, journal = {Comput. Secur.}, volume = {120}, pages = {102814}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102814}, doi = {10.1016/J.COSE.2022.102814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares22, author = {Alejandro Guerra{-}Manzanares and Marcin Luckner and Hayretdin Bahsi}, title = {Concept drift and cross-device behavior: Challenges and implications for effective android malware detection}, journal = {Comput. Secur.}, volume = {120}, pages = {102757}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102757}, doi = {10.1016/J.COSE.2022.102757}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuerraCV22, author = {Jorge L. Guerra and Carlos Adri{\'{a}}n Catania and Eduardo E. Veas}, title = {Datasets are not enough: Challenges in labeling network traffic}, journal = {Comput. Secur.}, volume = {120}, pages = {102810}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102810}, doi = {10.1016/J.COSE.2022.102810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuerraCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HammadHE22, author = {Mohamed Hammad and Nabil M. Hewahi and Wael Elmedany}, title = {{MMM-RF:} {A} novel high accuracy multinomial mixture model for network intrusion detection systems}, journal = {Comput. Secur.}, volume = {120}, pages = {102777}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102777}, doi = {10.1016/J.COSE.2022.102777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HammadHE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangFQHLH22, author = {Shuai Jiang and Cai Fu and Yekui Qian and Shuai He and Jianqiang Lv and Lansheng Han}, title = {IFAttn: Binary code similarity analysis based on interpretable features with attention}, journal = {Comput. Secur.}, volume = {120}, pages = {102804}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102804}, doi = {10.1016/J.COSE.2022.102804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangFQHLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JoLS22, author = {Hyeonseong Jo and Yongjae Lee and Seungwon Shin}, title = {Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text}, journal = {Comput. Secur.}, volume = {120}, pages = {102763}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102763}, doi = {10.1016/J.COSE.2022.102763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JoLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanYKI22, author = {Naurin Farooq Khan and Amber Yaqoob and Muhammad Saud Khan and Naveed Ikram}, title = {The cybersecurity behavioral research: {A} tertiary study}, journal = {Comput. Secur.}, volume = {120}, pages = {102826}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102826}, doi = {10.1016/J.COSE.2022.102826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhanYKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimK22, author = {Jae{-}Yeol Kim and Hyuk{-}Yoon Kwon}, title = {Threat classification model for security information event management focusing on model efficiency}, journal = {Comput. Secur.}, volume = {120}, pages = {102789}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102789}, doi = {10.1016/J.COSE.2022.102789}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarSVY22, author = {Rajesh Kumar and Siddharth Sharma and Chirag Vachhani and Nitish Yadav}, title = {What changed in the cyber-security after COVID-19?}, journal = {Comput. Secur.}, volume = {120}, pages = {102821}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102821}, doi = {10.1016/J.COSE.2022.102821}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarSVY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCBLGL22, author = {Yong{-}Gang Li and Yeh{-}Ching Chung and Yu Bao and Yi Lu and Shanqing Guo and Guoyuan Lin}, title = {KPointer: Keep the code pointers on the stack point to the right code}, journal = {Comput. Secur.}, volume = {120}, pages = {102781}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102781}, doi = {10.1016/J.COSE.2022.102781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCBLGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangCWZZ22, author = {Jianbing Liang and Shuhui Chen and Ziling Wei and Shuang Zhao and Wei Zhao}, title = {HAGDetector: Heterogeneous {DGA} domain name detection model}, journal = {Comput. Secur.}, volume = {120}, pages = {102803}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102803}, doi = {10.1016/J.COSE.2022.102803}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangCWZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LimaLLB22, author = {Milton V. M. Lima and Ricardo Lima and Fernando Lins and Michel S. Bonfim}, title = {Beholder - {A} CEP-based intrusion detection and prevention systems for IoT environments}, journal = {Comput. Secur.}, volume = {120}, pages = {102824}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102824}, doi = {10.1016/J.COSE.2022.102824}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LimaLLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MakhdoomAL22, author = {Imran Makhdoom and Mehran Abolhasan and Justin Lipman}, title = {A comprehensive survey of covert communication techniques, limitations and future challenges}, journal = {Comput. Secur.}, volume = {120}, pages = {102784}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102784}, doi = {10.1016/J.COSE.2022.102784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MakhdoomAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MishraAAG22, author = {Alok Mishra and Yehia Ibrahim Alzoubi and Memoona Javeria Anwar and Asif Qumer Gill}, title = {Attributes impacting cybersecurity policy development: An evidence from seven nations}, journal = {Comput. Secur.}, volume = {120}, pages = {102820}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102820}, doi = {10.1016/J.COSE.2022.102820}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MishraAAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohantyRL22, author = {Hardhik Mohanty and Arousha Haghighian Roudsari and Arash Habibi Lashkari}, title = {Robust stacking ensemble model for darknet traffic classification under adversarial settings}, journal = {Comput. Secur.}, volume = {120}, pages = {102830}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102830}, doi = {10.1016/J.COSE.2022.102830}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MohantyRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaikGJNS22, author = {Nitin Naik and Paul Grace and Paul Jenkins and Kshirasagar Naik and Jingping Song}, title = {An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity}, journal = {Comput. Secur.}, volume = {120}, pages = {102808}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102808}, doi = {10.1016/J.COSE.2022.102808}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NaikGJNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiuZZZPH22, author = {Weina Niu and Jie Zhou and Yibin Zhao and Xiaosong Zhang and Yujie Peng and Cheng Huang}, title = {Uncovering {APT} malware traffic using deep learning combined with time sequence and association analysis}, journal = {Comput. Secur.}, volume = {120}, pages = {102809}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102809}, doi = {10.1016/J.COSE.2022.102809}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiuZZZPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PashamokhtariBG22, author = {Arman Pashamokhtari and Gustavo Batista and Hassan Habibi Gharakheili}, title = {AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks}, journal = {Comput. Secur.}, volume = {120}, pages = {102801}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102801}, doi = {10.1016/J.COSE.2022.102801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PashamokhtariBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RashidKHIWGF22, author = {Md. Mamunur Rashid and Joarder Kamruzzaman and Mohammad Mehedi Hassan and Tasadduq Imam and Santoso Wibowo and Steven Gordon and Giancarlo Fortino}, title = {Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications}, journal = {Comput. Secur.}, volume = {120}, pages = {102783}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102783}, doi = {10.1016/J.COSE.2022.102783}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RashidKHIWGF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RieraHHMM22, author = {Tom{\'{a}}s Sureda Riera and Juan Ram{\'{o}}n Bermejo Higuera and Javier Bermejo Higuera and Jos{\'{e}} Javier Mart{\'{\i}}nez{-}Herr{\'{a}}iz and Juan Antonio Sicilia Montalvo}, title = {A new multi-label dataset for Web attacks {CAPEC} classification using machine learning techniques}, journal = {Comput. Secur.}, volume = {120}, pages = {102788}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102788}, doi = {10.1016/J.COSE.2022.102788}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RieraHHMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaA22, author = {Shwadhin Sharma and Eduardo Aparicio}, title = {Organizational and team culture as antecedents of protection motivation among {IT} employees}, journal = {Comput. Secur.}, volume = {120}, pages = {102774}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102774}, doi = {10.1016/J.COSE.2022.102774}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShowailTZNA22, author = {Ahmad Showail and Rashid Tahir and Muhammad Fareed Zaffar and Muhammad Haris Noor and Mohammed Alkhatib}, title = {An internet of secure and private things: {A} service-oriented architecture}, journal = {Comput. Secur.}, volume = {120}, pages = {102776}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102776}, doi = {10.1016/J.COSE.2022.102776}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShowailTZNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SicariRC22, author = {Sabrina Sicari and Alessandra Rizzardi and Alberto Coen{-}Porisini}, title = {Insights into security and privacy towards fog computing evolution}, journal = {Comput. Secur.}, volume = {120}, pages = {102822}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102822}, doi = {10.1016/J.COSE.2022.102822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SicariRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UmarWL22, author = {Mubarak Umar and Zhenqiang Wu and Xuening Liao}, title = {Authenticating tier-two body area network devices through user-specific signal propagation characteristics}, journal = {Comput. Secur.}, volume = {120}, pages = {102800}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102800}, doi = {10.1016/J.COSE.2022.102800}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UmarWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Villalon-Fonseca22, author = {Ricardo Villal{\'{o}}n{-}Fonseca}, title = {The nature of security: {A} conceptual framework for integral-comprehensive modeling of {IT} security and cybersecurity}, journal = {Comput. Secur.}, volume = {120}, pages = {102805}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102805}, doi = {10.1016/J.COSE.2022.102805}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Villalon-Fonseca22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VorobyevK22, author = {Ivan Vorobyev and Anna Krivitskaya}, title = {Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models}, journal = {Comput. Secur.}, volume = {120}, pages = {102786}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102786}, doi = {10.1016/J.COSE.2022.102786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VorobyevK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLCYW22, author = {Zhi Wang and Chaoge Liu and Xiang Cui and Jie Yin and Xutong Wang}, title = {EvilModel 2.0: Bringing Neural Network Models into Malware Attacks}, journal = {Comput. Secur.}, volume = {120}, pages = {102807}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102807}, doi = {10.1016/J.COSE.2022.102807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLCYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSQLL22, author = {Senmiao Wang and Luli Sun and Su{-}Juan Qin and Wenmin Li and Wentao Liu}, title = {KRTunnel: {DNS} channel detector for mobile devices}, journal = {Comput. Secur.}, volume = {120}, pages = {102818}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102818}, doi = {10.1016/J.COSE.2022.102818}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangSQLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangLH22, author = {Chunkai Zhang and Xiaofeng Luo and Peiyi Han}, title = {On-manifold adversarial attack based on latent space substitute model}, journal = {Comput. Secur.}, volume = {120}, pages = {102770}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102770}, doi = {10.1016/J.COSE.2022.102770}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouFWL22, author = {Zhipeng Zhou and Qiang Fu and Qianjun Wei and Qiang Li}, title = {{LEGO:} {A} hybrid toolkit for efficient 2PC-based privacy-preserving machine learning}, journal = {Comput. Secur.}, volume = {120}, pages = {102782}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102782}, doi = {10.1016/J.COSE.2022.102782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouFWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.