Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec122.bht:"
@article{DBLP:journals/compsec/AdahmanMA22, author = {Zillah Adahman and Asad Waqar Malik and Zahid Anwar}, title = {An analysis of zero-trust architecture and its cost-effectiveness for organizational security}, journal = {Comput. Secur.}, volume = {122}, pages = {102911}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102911}, doi = {10.1016/J.COSE.2022.102911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AdahmanMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-BakaaA22, author = {Aliaa Al{-}Bakaa and Bahaa Al{-}Musawi}, title = {A new intrusion detection system based on using non-linear statistical analysis and features selection techniques}, journal = {Comput. Secur.}, volume = {122}, pages = {102906}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102906}, doi = {10.1016/J.COSE.2022.102906}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-BakaaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BenyahyaCKN22, author = {Meriem Benyahya and Anastasija Collen and Sotiria Kechagia and Niels Alexander Nijdam}, title = {Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments}, journal = {Comput. Secur.}, volume = {122}, pages = {102904}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102904}, doi = {10.1016/J.COSE.2022.102904}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BenyahyaCKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChahalBK22, author = {Navdeep S. Chahal and Preeti Bali and Praveen Kumar Khosla}, title = {A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform}, journal = {Comput. Secur.}, volume = {122}, pages = {102886}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102886}, doi = {10.1016/J.COSE.2022.102886}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ContiKP22, author = {Mauro Conti and Shubham Khandhar and Vinod P.}, title = {A few-shot malware classification approach for unknown family recognition using malware feature visualization}, journal = {Comput. Secur.}, volume = {122}, pages = {102887}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102887}, doi = {10.1016/J.COSE.2022.102887}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ContiKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DesaiDCK22, author = {Nidhi Desai and Manik Lal Das and Payal Chaudhari and Naveen Kumar}, title = {Background knowledge attacks in privacy-preserving data publishing models}, journal = {Comput. Secur.}, volume = {122}, pages = {102874}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102874}, doi = {10.1016/J.COSE.2022.102874}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DesaiDCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DhillonS22, author = {Parveen Dhillon and Manpreet Singh}, title = {An ontology oriented service framework for social IoT}, journal = {Comput. Secur.}, volume = {122}, pages = {102895}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102895}, doi = {10.1016/J.COSE.2022.102895}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DhillonS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuCHCZC22, author = {Xuechao Du and Andong Chen and Boyuan He and Hao Chen and Fan Zhang and Yan Chen}, title = {AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation}, journal = {Comput. Secur.}, volume = {122}, pages = {102889}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102889}, doi = {10.1016/J.COSE.2022.102889}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuCHCZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuanZZZHZZP22, author = {Yexin Duan and Junhua Zou and Xingyu Zhou and Wu Zhang and Zhengyun He and Dazhi Zhan and Jin Zhang and Zhisong Pan}, title = {Adversarial attack via dual-stage network erosion}, journal = {Comput. Secur.}, volume = {122}, pages = {102888}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102888}, doi = {10.1016/J.COSE.2022.102888}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuanZZZHZZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuSYM22, author = {Yeming Gu and Hui Shu and Pan Yang and Rongkuan Ma}, title = {MinSIB: Minimized static instrumentation for fuzzing binaries}, journal = {Comput. Secur.}, volume = {122}, pages = {102894}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102894}, doi = {10.1016/J.COSE.2022.102894}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuSYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuZLZRC22, author = {Xiuting Gu and Tianqing Zhu and Jie Li and Tao Zhang and Wei Ren and Kim{-}Kwang Raymond Choo}, title = {Privacy, accuracy, and model fairness trade-offs in federated learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102907}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102907}, doi = {10.1016/J.COSE.2022.102907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuZLZRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares22a, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi}, title = {On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection}, journal = {Comput. Secur.}, volume = {122}, pages = {102835}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102835}, doi = {10.1016/J.COSE.2022.102835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamidNHRNA22, author = {Nor Hasnul Azirah Abdul Hamid and Normalina Ibrahim @ Mat Nor and Fazlin Marini Hussain and Rajeswari Raju and Humza Naseer and Atif Ahmad}, title = {Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations}, journal = {Comput. Secur.}, volume = {122}, pages = {102893}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102893}, doi = {10.1016/J.COSE.2022.102893}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaoLP22, author = {Jingwei Hao and Senlin Luo and Limin Pan}, title = {{EII-MBS:} Malware family classification via enhanced adversarial instruction behavior semantic learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102905}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102905}, doi = {10.1016/J.COSE.2022.102905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaoLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HartHS22, author = {Stephen Hart and Basel Halak and Vladimiro Sassone}, title = {{CIST:} {A} Serious Game for Hardware Supply Chain}, journal = {Comput. Secur.}, volume = {122}, pages = {102912}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102912}, doi = {10.1016/J.COSE.2022.102912}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HartHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KravchikDBS22, author = {Moshe Kravchik and Luca Demetrio and Battista Biggio and Asaf Shabtai}, title = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems}, journal = {Comput. Secur.}, volume = {122}, pages = {102901}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102901}, doi = {10.1016/J.COSE.2022.102901}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCCCHK22, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Chih{-}Lung Chen and Thu{-}Nguyet Huynh and Chung{-}Wei Kuo}, title = {CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training}, journal = {Comput. Secur.}, volume = {122}, pages = {102908}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102908}, doi = {10.1016/J.COSE.2022.102908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCZWLWLS22, author = {Ce Li and Zijun Cheng and He Zhu and Leiqi Wang and Qiujian Lv and Yan Wang and Ning Li and Degang Sun}, title = {DMalNet: Dynamic malware analysis based on {API} feature engineering and graph learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102872}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102872}, doi = {10.1016/J.COSE.2022.102872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCZWLWLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LoftHYW22, author = {Paul Loft and Ying He and Iryna Yevseyeva and Isabel Wagner}, title = {{CAESAR8:} An agile enterprise architecture approach to managing information security risks}, journal = {Comput. Secur.}, volume = {122}, pages = {102877}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102877}, doi = {10.1016/J.COSE.2022.102877}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LoftHYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MartinezCJP22, author = {David Mart{\'{\i}}nez and Eusebi Calle and Albert Jov{\'{e}} and Cristina P{\'{e}}rez{-}Sol{\`{a}}}, title = {Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies}, journal = {Comput. Secur.}, volume = {122}, pages = {102873}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102873}, doi = {10.1016/J.COSE.2022.102873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MartinezCJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MimranBKKBLES22, author = {Dudu Mimran and Ron Bitton and Yehonatan Kfir and Eitan Klevansky and Oleg Brodt and Heiko Lehmann and Yuval Elovici and Asaf Shabtai}, title = {Security of Open Radio Access Networks}, journal = {Comput. Secur.}, volume = {122}, pages = {102890}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102890}, doi = {10.1016/J.COSE.2022.102890}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OzkanEO22, author = {Baris {\"{O}}zkan and Mehmet Erdem and Eren {\"{O}}zceylan}, title = {Evaluation of Asian Countries using Data Center Security Index: {A} Spherical Fuzzy AHP-based {EDAS} Approach}, journal = {Comput. Secur.}, volume = {122}, pages = {102900}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102900}, doi = {10.1016/J.COSE.2022.102900}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OzkanEO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiangYJ22, author = {Weizhong Qiang and Lin Yang and Hai Jin}, title = {Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks}, journal = {Comput. Secur.}, volume = {122}, pages = {102871}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102871}, doi = {10.1016/J.COSE.2022.102871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiangYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuXSHQL22, author = {Leilei Qu and Ruojin Xiao and Wenchang Shi and Keman Huang and Bo Qin and Bin Liang}, title = {Your Behaviors Reveal What You Need: {A} Practical Scheme Based on User Behaviors for Personalized Security Nudges}, journal = {Comput. Secur.}, volume = {122}, pages = {102891}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102891}, doi = {10.1016/J.COSE.2022.102891}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QuXSHQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchinaglSK22, author = {Stef Schinagl and Abbas Shahim and Svetlana Khapova}, title = {Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security}, journal = {Comput. Secur.}, volume = {122}, pages = {102903}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102903}, doi = {10.1016/J.COSE.2022.102903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchinaglSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SonmezHM22, author = {Ferda {\"{O}}zdemir S{\"{o}}nmez and Chris Hankin and Pasquale Malacaria}, title = {Decision support for healthcare cyber security}, journal = {Comput. Secur.}, volume = {122}, pages = {102865}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102865}, doi = {10.1016/J.COSE.2022.102865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SonmezHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TalibNNMAM22, author = {Manar Abu Talib and Qassim Nasir and Ali Bou Nassif and Takua Mokhamed and Nafisa Ahmed and Bayan Mahfood}, title = {{APT} beaconing detection: {A} systematic review}, journal = {Comput. Secur.}, volume = {122}, pages = {102875}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102875}, doi = {10.1016/J.COSE.2022.102875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TalibNNMAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianZZ22, author = {Huan Tian and Tianqing Zhu and Wanlei Zhou}, title = {Fairness and privacy preservation for facial images: GAN-based methods}, journal = {Comput. Secur.}, volume = {122}, pages = {102902}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102902}, doi = {10.1016/J.COSE.2022.102902}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TianZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YaminK22a, author = {Muhammad Mudassar Yamin and Basel Katt}, title = {Use of cyber attack and defense agents in cyber ranges: {A} case study}, journal = {Comput. Secur.}, volume = {122}, pages = {102892}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102892}, doi = {10.1016/J.COSE.2022.102892}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YaminK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLSZW22, author = {Jingcheng Yang and Hongwei Li and Shuo Shao and Futai Zou and Yue Wu}, title = {{FS-IDS:} {A} framework for intrusion detection based on few-shot learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102899}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102899}, doi = {10.1016/J.COSE.2022.102899}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangM22, author = {Haotian Zhang and Xu Ma}, title = {Misleading attention and classification: An adversarial attack to fool object detection models in the real world}, journal = {Comput. Secur.}, volume = {122}, pages = {102876}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102876}, doi = {10.1016/J.COSE.2022.102876}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.