Search dblp for Publications

export results for "toc:db/journals/compsec/compsec97.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlashwaliSM20,
  author       = {Eman Salem Alashwali and
                  Pawel Szalachowski and
                  Andrew Martin},
  title        = {Exploring {HTTPS} security inconsistencies: {A} cross-regional perspective},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101975},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101975},
  doi          = {10.1016/J.COSE.2020.101975},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlashwaliSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArendSIKB20a,
  author       = {Isabel Arend and
                  Asaf Shabtai and
                  Tali Idan and
                  Ruty Keinan and
                  Yoella Bereby{-}Meyer},
  title        = {Passive- and not active-risk tendencies predict cyber security behavior},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101964},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101964},
  doi          = {10.1016/J.COSE.2020.101964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArendSIKB20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArshadOAA20,
  author       = {Humaira Arshad and
                  Esther Omolara and
                  Isaac Oludare Abiodun and
                  Abdulhai Aminu},
  title        = {A semi-automated forensic investigation model for online social networks},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101946},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101946},
  doi          = {10.1016/J.COSE.2020.101946},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArshadOAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AshrafuzzamanDC20,
  author       = {Mohammad Ashrafuzzaman and
                  Saikat Das and
                  Yacine Chakhchoukh and
                  Sajjan G. Shiva and
                  Frederick T. Sheldon},
  title        = {Detecting stealthy false data injection attacks in the smart grid
                  using ensemble-based machine learning},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101994},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101994},
  doi          = {10.1016/J.COSE.2020.101994},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AshrafuzzamanDC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoranMH20,
  author       = {Tudor Boran and
                  Muhamet Martinaj and
                  Md. Hossain},
  title        = {Authorship identification on limited samplings},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101943},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101943},
  doi          = {10.1016/J.COSE.2020.101943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoranMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChamikaraBKLC20,
  author       = {Mahawaga Arachchige Pathum Chamikara and
                  Peter Bert{\'{o}}k and
                  Ibrahim Khalil and
                  Dongxi Liu and
                  Seyit Camtepe},
  title        = {Privacy Preserving Face Recognition Utilizing Differential Privacy},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101951},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101951},
  doi          = {10.1016/J.COSE.2020.101951},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChamikaraBKLC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangC20,
  author       = {Lennon Y. C. Chang and
                  Nicholas Coppel},
  title        = {Building cyber security awareness in a developing country: Lessons
                  from Myanmar},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101959},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101959},
  doi          = {10.1016/J.COSE.2020.101959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChowdhuryAT20,
  author       = {Noman H. Chowdhury and
                  Marc T. P. Adam and
                  Timm Teubner},
  title        = {Time pressure in human cybersecurity behavior: Theoretical framework
                  and countermeasures},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101931},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101931},
  doi          = {10.1016/J.COSE.2020.101931},
  timestamp    = {Mon, 14 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChowdhuryAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChowdhuryAT20a,
  author       = {Noman H. Chowdhury and
                  Marc T. P. Adam and
                  Timm Teubner},
  title        = {Time pressure in human cybersecurity behavior: Theoretical framework
                  and countermeasures},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101963},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101963},
  doi          = {10.1016/J.COSE.2020.101963},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChowdhuryAT20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CompastieBFH20,
  author       = {Maxime Compasti{\'{e}} and
                  R{\'{e}}mi Badonnel and
                  Olivier Festor and
                  Ruan He},
  title        = {From virtualization security issues to cloud protection opportunities:
                  An in-depth analysis of system virtualization models},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101905},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101905},
  doi          = {10.1016/J.COSE.2020.101905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CompastieBFH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DasKSS20,
  author       = {Ayan Kumar Das and
                  Sidra Kalam and
                  Nausheen Sahar and
                  Ditipriya Sinha},
  title        = {{UCFL:} User Categorization using Fuzzy Logic towards {PUF} based
                  Two-Phase Authentication of Fog assisted IoT devices},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101938},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101938},
  doi          = {10.1016/J.COSE.2020.101938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DasKSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DhiebNBOAA20,
  author       = {Thameur Dhieb and
                  Sourour Njah and
                  Houcine Boubaker and
                  Wael Ouarda and
                  Mounir Ben Ayed and
                  Adel M. Alimi},
  title        = {Towards a novel biometric system for forensic document examination},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101973},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101973},
  doi          = {10.1016/J.COSE.2020.101973},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DhiebNBOAA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DionysiouA20,
  author       = {Antreas Dionysiou and
                  Elias Athanasopoulos},
  title        = {SoK: Machine vs. machine - {A} systematic classification of automated
                  machine learning-based {CAPTCHA} solvers},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101947},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101947},
  doi          = {10.1016/J.COSE.2020.101947},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DionysiouA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoctorVJWSOMOM20,
  author       = {Jason N. Doctor and
                  Jaideep Vaidya and
                  Xiaoqian Jiang and
                  Shuang Wang and
                  Lisa M. Schilling and
                  Toan Ong and
                  Michael E. Matheny and
                  Lucila Ohno{-}Machado and
                  Daniella Meeker},
  title        = {Efficient determination of equivalence for encrypted data},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101939},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101939},
  doi          = {10.1016/J.COSE.2020.101939},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DoctorVJWSOMOM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EstaySBJ20,
  author       = {Daniel A. Sepulveda Estay and
                  Rishikesh Sahay and
                  Michael Bruhn Barfod and
                  Christian Damsgaard Jensen},
  title        = {A systematic review of cyber-resilience assessment frameworks},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101996},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101996},
  doi          = {10.1016/J.COSE.2020.101996},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EstaySBJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EvangelouA20,
  author       = {Marina Evangelou and
                  Niall M. Adams},
  title        = {An anomaly detection framework for cyber-security data},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101941},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101941},
  doi          = {10.1016/J.COSE.2020.101941},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EvangelouA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangXLCLLJY20,
  author       = {Junbin Fang and
                  Guikai Xi and
                  Rong Li and
                  Qian Chen and
                  Puxi Lin and
                  Sijin Li and
                  Zoe Lin Jiang and
                  Siu{-}Ming Yiu},
  title        = {Coarse-to-fine two-stage semantic video carving approach in digital
                  forensics},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101942},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101942},
  doi          = {10.1016/J.COSE.2020.101942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangXLCLLJY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GonenSYUK20,
  author       = {Serkan G{\"{o}}nen and
                  Hasan H{\"{u}}seyin Sayan and
                  Ercan Nurcan Yilmaz and
                  Furkan {\"{U}}st{\"{u}}nsoy and
                  G{\"{o}}k{\c{c}}e Karacayilmaz},
  title        = {False data injection attacks and the insider threat in smart systems},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101955},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101955},
  doi          = {10.1016/J.COSE.2020.101955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GonenSYUK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanHSL20,
  author       = {Jiaxuan Han and
                  Cheng Huang and
                  Fan Shi and
                  Jiayong Liu},
  title        = {Covert timing channel detection method based on time interval and
                  payload length analysis},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101952},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101952},
  doi          = {10.1016/J.COSE.2020.101952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HanHSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinLQCM20,
  author       = {Dongzi Jin and
                  Yiqin Lu and
                  Jiancheng Qin and
                  Zhe Cheng and
                  Zhongshu Mao},
  title        = {SwiftIDS: Real-time intrusion detection system based on LightGBM and
                  parallel intrusion detection mechanism},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101984},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101984},
  doi          = {10.1016/J.COSE.2020.101984},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinLQCM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarbabDDM20a,
  author       = {ElMouatez Billah Karbab and
                  Mourad Debbabi and
                  Abdelouahid Derhab and
                  Djedjiga Mouheb},
  title        = {Scalable and robust unsupervised android malware fingerprinting using
                  community-based network partitioning},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101965},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101965},
  doi          = {10.1016/J.COSE.2020.101965},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarbabDDM20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KleijWH20,
  author       = {Rick van der Kleij and
                  Remco Wijn and
                  Tineke Hof},
  title        = {An application and empirical test of the Capability Opportunity Motivation-Behaviour
                  model to data leakage prevention in financial organizations},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101970},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101970},
  doi          = {10.1016/J.COSE.2020.101970},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KleijWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KrishnanJRKTS20,
  author       = {R. Santhana Krishnan and
                  Eanoch Golden Julie and
                  Yesudhas Harold Robinson and
                  Raghvendra Kumar and
                  Pham Huy Thong and
                  Le Hoang Son},
  title        = {Enhanced certificate revocation scheme with justification facility
                  in mobile ad-hoc networks},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101962},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101962},
  doi          = {10.1016/J.COSE.2020.101962},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KrishnanJRKTS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KuangFZSZ20,
  author       = {Boyu Kuang and
                  Anmin Fu and
                  Lu Zhou and
                  Willy Susilo and
                  Yuqing Zhang},
  title        = {{DO-RA:} Data-oriented runtime attestation for IoT devices},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101945},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101945},
  doi          = {10.1016/J.COSE.2020.101945},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KuangFZSZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarG20,
  author       = {Rakesh Kumar and
                  Rinkaj Goyal},
  title        = {Modeling continuous security: {A} conceptual model for automated DevSecOps
                  using open-source software over cloud {(ADOC)}},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101967},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101967},
  doi          = {10.1016/J.COSE.2020.101967},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LarribaSL20,
  author       = {Antonio M. Larriba and
                  Jos{\'{e}} M. Sempere and
                  Dami{\'{a}}n L{\'{o}}pez},
  title        = {A two authorities electronic vote scheme},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101940},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101940},
  doi          = {10.1016/J.COSE.2020.101940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LarribaSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeK20,
  author       = {Claire Seungeun Lee and
                  Ji Hye Kim},
  title        = {Latent groups of cybersecurity preparedness in Europe: Sociodemographic
                  factors and country-level contexts},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101995},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101995},
  doi          = {10.1016/J.COSE.2020.101995},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLGGWF20,
  author       = {Fenghua Li and
                  Yongjun Li and
                  Siyuan Leng and
                  Yunchuan Guo and
                  Kui Geng and
                  Zhen Wang and
                  Liang Fang},
  title        = {Dynamic countermeasures selection for multi-path attacks},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101927},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101927},
  doi          = {10.1016/J.COSE.2020.101927},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLGGWF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLXA20,
  author       = {Tun Li and
                  Yutian Liu and
                  Yanbing Liu and
                  Yunpeng Xiao and
                  Nguyen Nang An},
  title        = {Attack plan recognition using hidden Markov and probabilistic inference},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101974},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101974},
  doi          = {10.1016/J.COSE.2020.101974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLXA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuLG20,
  author       = {Hui Liu and
                  Juanru Li and
                  Dawu Gu},
  title        = {Understanding the security of app-in-the-middle IoT},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {102000},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.102000},
  doi          = {10.1016/J.COSE.2020.102000},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuLG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuHWWDMLM20,
  author       = {Di Lu and
                  Ruidong Han and
                  Yue Wang and
                  Yongzhi Wang and
                  Xuewen Dong and
                  Xindi Ma and
                  Teng Li and
                  Jianfeng Ma},
  title        = {A secured {TPM} integration scheme towards smart embedded system based
                  collaboration network},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101922},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101922},
  doi          = {10.1016/J.COSE.2020.101922},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuHWWDMLM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MansooriW20,
  author       = {Masood Mansoori and
                  Ian Welch},
  title        = {How do they find us? {A} study of geolocation tracking techniques
                  of malicious web sites},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101948},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101948},
  doi          = {10.1016/J.COSE.2020.101948},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MansooriW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MavroeidisB20,
  author       = {Vasileios Mavroeidis and
                  Joe Brule},
  title        = {A nonproprietary language for the command and control of cyber defenses
                  - OpenC2},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101999},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101999},
  doi          = {10.1016/J.COSE.2020.101999},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MavroeidisB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeidanSPSES20,
  author       = {Yair Meidan and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Racheli Sagron and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {A novel approach for detecting vulnerable IoT devices connected behind
                  a home {NAT}},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101968},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101968},
  doi          = {10.1016/J.COSE.2020.101968},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MejriYMC20,
  author       = {Mohamed Mejri and
                  Hamdi Yahyaoui and
                  Azzam Mourad and
                  Mohamad Chehab},
  title        = {A rewriting system for the assessment of {XACML} policies relationship},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101957},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101957},
  doi          = {10.1016/J.COSE.2020.101957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MejriYMC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengGLWDQ20,
  author       = {Shunmei Meng and
                  Zijian Gao and
                  Qianmu Li and
                  Hao Wang and
                  Hong{-}Ning Dai and
                  Lianyong Qi},
  title        = {Security-Driven hybrid collaborative recommendation method for cloud-based
                  iot services},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101950},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101950},
  doi          = {10.1016/J.COSE.2020.101950},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MengGLWDQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeyerDR20,
  author       = {Joachim Meyer and
                  Omer Dembinsky and
                  Tal Raviv},
  title        = {Alerting about possible risks vs. blocking risky choices: {A} quantitative
                  model and its empirical evaluation},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101944},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101944},
  doi          = {10.1016/J.COSE.2020.101944},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MeyerDR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MiGZGS20,
  author       = {Tianyue Mi and
                  Mengke Gou and
                  Guangyu Zhou and
                  Yiqun Gan and
                  Ralf Schwarzer},
  title        = {Effects of planning and action control on smartphone security behavior},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101954},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101954},
  doi          = {10.1016/J.COSE.2020.101954},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MiGZGS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParuchuriCR20,
  author       = {Shravya Paruchuri and
                  Andrew Case and
                  Golden G. Richard III},
  title        = {Gaslight revisited: Efficient and powerful fuzzing of digital forensics
                  tools},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101986},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101986},
  doi          = {10.1016/J.COSE.2020.101986},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParuchuriCR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatilHHJYL20,
  author       = {Akash Suresh Patil and
                  Rafik Hamza and
                  Alzubair Hassan and
                  Nan Jiang and
                  Hongyang Yan and
                  Jin Li},
  title        = {Efficient privacy-preserving authentication protocol using PUFs with
                  blockchain smart contracts},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101958},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101958},
  doi          = {10.1016/J.COSE.2020.101958},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatilHHJYL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RahmanT20,
  author       = {Rizwan Ur Rahman and
                  Deepak Singh Tomar},
  title        = {New biostatistics features for detecting web bot activity on web applications},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {102001},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.102001},
  doi          = {10.1016/J.COSE.2020.102001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RahmanT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenZ20,
  author       = {Jianguo Ren and
                  Chunming Zhang},
  title        = {A differential game method against attacks in heterogeneous honeynet},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101870},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101870},
  doi          = {10.1016/J.COSE.2020.101870},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RochaSE20,
  author       = {Thiago S. Rocha and
                  Eduardo Souto and
                  Khalil El{-}Khatib},
  title        = {Functionality-based mobile application recommendation system with
                  security and privacy awareness},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101972},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101972},
  doi          = {10.1016/J.COSE.2020.101972},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RochaSE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SK20a,
  author       = {Ajish S and
                  K. S. Anil Kumar},
  title        = {Iris template protection using double bloom filter based feature transformation},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101985},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101985},
  doi          = {10.1016/J.COSE.2020.101985},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SK20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaoSL20,
  author       = {Xiuyan Shao and
                  Mikko T. Siponen and
                  Fufan Liu},
  title        = {Shall we follow? Impact of reputation concern on information security
                  managers' investment decisions},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101961},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101961},
  doi          = {10.1016/J.COSE.2020.101961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaoSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShiHLKKC20,
  author       = {Shuyun Shi and
                  Debiao He and
                  Li Li and
                  Neeraj Kumar and
                  Muhammad Khurram Khan and
                  Kim{-}Kwang Raymond Choo},
  title        = {Applications of blockchain in ensuring the security and privacy of
                  electronic health record systems: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101966},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101966},
  doi          = {10.1016/J.COSE.2020.101966},
  timestamp    = {Fri, 25 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunWK20,
  author       = {Qizhang Sun and
                  Martijn C. Willemsen and
                  Bart P. Knijnenburg},
  title        = {Unpacking the intention-behavior gap in privacy decision making for
                  the internet of things (IoT) using aspect listing},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101924},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101924},
  doi          = {10.1016/J.COSE.2020.101924},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunWK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangMLZSM20,
  author       = {Fei Tang and
                  Boyang Ma and
                  Jinku Li and
                  Fengwei Zhang and
                  Jipeng Su and
                  Jianfeng Ma},
  title        = {RansomSpector: An introspection-based approach to detect crypto ransomware},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101997},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101997},
  doi          = {10.1016/J.COSE.2020.101997},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TangMLZSM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TranLK20,
  author       = {Ngoc Hong Tran and
                  Nhien{-}An Le{-}Khac and
                  M. Tahar Kechadi},
  title        = {Lightweight privacy-Preserving data classification},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101835},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101835},
  doi          = {10.1016/J.COSE.2020.101835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TranLK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VermaMS20,
  author       = {Vinita Verma and
                  Sunil Kumar Muttoo and
                  V. B. Singh},
  title        = {Multiclass malware classification via first- and second-order texture
                  statistics},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101895},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101895},
  doi          = {10.1016/J.COSE.2020.101895},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VermaMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangK20,
  author       = {Nana Wang and
                  Mohan S. Kankanhalli},
  title        = {Protecting sensitive place visits in privacy-preserving trajectory
                  publishing},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101949},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101949},
  doi          = {10.1016/J.COSE.2020.101949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuFYXL20,
  author       = {Zhijun Wu and
                  Wenzhi Feng and
                  Meng Yue and
                  Xinran Xu and
                  Liang Liu},
  title        = {Mitigation measures of collusive interest flooding attacks in named
                  data networking},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101971},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101971},
  doi          = {10.1016/J.COSE.2020.101971},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuFYXL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangCMM20,
  author       = {Runkai Yang and
                  Xiaolin Chang and
                  Jelena V. Misic and
                  Vojislav B. Misic},
  title        = {Assessing blockchain selfish mining in an imperfect network: Honest
                  and selfish miner views},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101956},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101956},
  doi          = {10.1016/J.COSE.2020.101956},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YangCMM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinLY20,
  author       = {Chunyong Yin and
                  Bo Li and
                  Zhichao Yin},
  title        = {A distributed sensing data anomaly detection scheme},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101960},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101960},
  doi          = {10.1016/J.COSE.2020.101960},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinLY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJLTLL20,
  author       = {Wenjing Zhang and
                  Bo Jiang and
                  Ming Li and
                  Ravi Tandon and
                  Qiao Liu and
                  Hui Li},
  title        = {Aggregation-based location privacy: An information theoretic approach},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101953},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101953},
  doi          = {10.1016/J.COSE.2020.101953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJLTLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangXZLZW20,
  author       = {Chuan Zhang and
                  Chang Xu and
                  Liehuang Zhu and
                  Yanwei Li and
                  Can Zhang and
                  Huishu Wu},
  title        = {An efficient and privacy-preserving truth discovery scheme in crowdsensing
                  applications},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101848},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101848},
  doi          = {10.1016/J.COSE.2020.101848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangXZLZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouCJZC20,
  author       = {Yuyang Zhou and
                  Guang Cheng and
                  Shanqing Jiang and
                  Yuyu Zhao and
                  Zihan Chen},
  title        = {Cost-effective moving target defense against DDoS attacks using trilateral
                  game and multi-objective Markov decision processes},
  journal      = {Comput. Secur.},
  volume       = {97},
  pages        = {101976},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101976},
  doi          = {10.1016/J.COSE.2020.101976},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouCJZC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics