Search dblp for Publications

export results for "toc:db/journals/compsec/compsec122.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AdahmanMA22,
  author       = {Zillah Adahman and
                  Asad Waqar Malik and
                  Zahid Anwar},
  title        = {An analysis of zero-trust architecture and its cost-effectiveness
                  for organizational security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102911},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102911},
  doi          = {10.1016/J.COSE.2022.102911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AdahmanMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-BakaaA22,
  author       = {Aliaa Al{-}Bakaa and
                  Bahaa Al{-}Musawi},
  title        = {A new intrusion detection system based on using non-linear statistical
                  analysis and features selection techniques},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102906},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102906},
  doi          = {10.1016/J.COSE.2022.102906},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-BakaaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BenyahyaCKN22,
  author       = {Meriem Benyahya and
                  Anastasija Collen and
                  Sotiria Kechagia and
                  Niels Alexander Nijdam},
  title        = {Automated city shuttles: Mapping the key challenges in cybersecurity,
                  privacy and standards to future developments},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102904},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102904},
  doi          = {10.1016/J.COSE.2022.102904},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BenyahyaCKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChahalBK22,
  author       = {Navdeep S. Chahal and
                  Preeti Bali and
                  Praveen Kumar Khosla},
  title        = {A Proactive Approach to assess web application security through the
                  integration of security tools in a Security Orchestration Platform},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102886},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102886},
  doi          = {10.1016/J.COSE.2022.102886},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ContiKP22,
  author       = {Mauro Conti and
                  Shubham Khandhar and
                  Vinod P.},
  title        = {A few-shot malware classification approach for unknown family recognition
                  using malware feature visualization},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102887},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102887},
  doi          = {10.1016/J.COSE.2022.102887},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ContiKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DesaiDCK22,
  author       = {Nidhi Desai and
                  Manik Lal Das and
                  Payal Chaudhari and
                  Naveen Kumar},
  title        = {Background knowledge attacks in privacy-preserving data publishing
                  models},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102874},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102874},
  doi          = {10.1016/J.COSE.2022.102874},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DesaiDCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DhillonS22,
  author       = {Parveen Dhillon and
                  Manpreet Singh},
  title        = {An ontology oriented service framework for social IoT},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102895},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102895},
  doi          = {10.1016/J.COSE.2022.102895},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DhillonS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuCHCZC22,
  author       = {Xuechao Du and
                  Andong Chen and
                  Boyuan He and
                  Hao Chen and
                  Fan Zhang and
                  Yan Chen},
  title        = {AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102889},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102889},
  doi          = {10.1016/J.COSE.2022.102889},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuCHCZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuanZZZHZZP22,
  author       = {Yexin Duan and
                  Junhua Zou and
                  Xingyu Zhou and
                  Wu Zhang and
                  Zhengyun He and
                  Dazhi Zhan and
                  Jin Zhang and
                  Zhisong Pan},
  title        = {Adversarial attack via dual-stage network erosion},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102888},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102888},
  doi          = {10.1016/J.COSE.2022.102888},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuanZZZHZZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuSYM22,
  author       = {Yeming Gu and
                  Hui Shu and
                  Pan Yang and
                  Rongkuan Ma},
  title        = {MinSIB: Minimized static instrumentation for fuzzing binaries},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102894},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102894},
  doi          = {10.1016/J.COSE.2022.102894},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuSYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuZLZRC22,
  author       = {Xiuting Gu and
                  Tianqing Zhu and
                  Jie Li and
                  Tao Zhang and
                  Wei Ren and
                  Kim{-}Kwang Raymond Choo},
  title        = {Privacy, accuracy, and model fairness trade-offs in federated learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102907},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102907},
  doi          = {10.1016/J.COSE.2022.102907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuZLZRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares22a,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi},
  title        = {On the relativity of time: Implications and challenges of data drift
                  on long-term effective android malware detection},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102835},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102835},
  doi          = {10.1016/J.COSE.2022.102835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamidNHRNA22,
  author       = {Nor Hasnul Azirah Abdul Hamid and
                  Normalina Ibrahim @ Mat Nor and
                  Fazlin Marini Hussain and
                  Rajeswari Raju and
                  Humza Naseer and
                  Atif Ahmad},
  title        = {Barriers and enablers to adoption of cyber insurance in developing
                  countries: An exploratory study of Malaysian organizations},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102893},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102893},
  doi          = {10.1016/J.COSE.2022.102893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaoLP22,
  author       = {Jingwei Hao and
                  Senlin Luo and
                  Limin Pan},
  title        = {{EII-MBS:} Malware family classification via enhanced adversarial
                  instruction behavior semantic learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102905},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102905},
  doi          = {10.1016/J.COSE.2022.102905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaoLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HartHS22,
  author       = {Stephen Hart and
                  Basel Halak and
                  Vladimiro Sassone},
  title        = {{CIST:} {A} Serious Game for Hardware Supply Chain},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102912},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102912},
  doi          = {10.1016/J.COSE.2022.102912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HartHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KravchikDBS22,
  author       = {Moshe Kravchik and
                  Luca Demetrio and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors
                  in Industrial Control Systems},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102901},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102901},
  doi          = {10.1016/J.COSE.2022.102901},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCCCHK22,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Chih{-}Lung Chen and
                  Thu{-}Nguyet Huynh and
                  Chung{-}Wei Kuo},
  title        = {CoNN-IDS: Intrusion detection system based on collaborative neural
                  networks and agile training},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102908},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102908},
  doi          = {10.1016/J.COSE.2022.102908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZWLWLS22,
  author       = {Ce Li and
                  Zijun Cheng and
                  He Zhu and
                  Leiqi Wang and
                  Qiujian Lv and
                  Yan Wang and
                  Ning Li and
                  Degang Sun},
  title        = {DMalNet: Dynamic malware analysis based on {API} feature engineering
                  and graph learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102872},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102872},
  doi          = {10.1016/J.COSE.2022.102872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZWLWLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LoftHYW22,
  author       = {Paul Loft and
                  Ying He and
                  Iryna Yevseyeva and
                  Isabel Wagner},
  title        = {{CAESAR8:} An agile enterprise architecture approach to managing information
                  security risks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102877},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102877},
  doi          = {10.1016/J.COSE.2022.102877},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LoftHYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MartinezCJP22,
  author       = {David Mart{\'{\i}}nez and
                  Eusebi Calle and
                  Albert Jov{\'{e}} and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}}},
  title        = {Web-tracking compliance: websites' level of confidence in the use
                  of information-gathering technologies},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102873},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102873},
  doi          = {10.1016/J.COSE.2022.102873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MartinezCJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MimranBKKBLES22,
  author       = {Dudu Mimran and
                  Ron Bitton and
                  Yehonatan Kfir and
                  Eitan Klevansky and
                  Oleg Brodt and
                  Heiko Lehmann and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Security of Open Radio Access Networks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102890},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102890},
  doi          = {10.1016/J.COSE.2022.102890},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OzkanEO22,
  author       = {Baris {\"{O}}zkan and
                  Mehmet Erdem and
                  Eren {\"{O}}zceylan},
  title        = {Evaluation of Asian Countries using Data Center Security Index: {A}
                  Spherical Fuzzy AHP-based {EDAS} Approach},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102900},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102900},
  doi          = {10.1016/J.COSE.2022.102900},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OzkanEO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiangYJ22,
  author       = {Weizhong Qiang and
                  Lin Yang and
                  Hai Jin},
  title        = {Efficient and Robust Malware Detection Based on Control Flow Traces
                  Using Deep Neural Networks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102871},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102871},
  doi          = {10.1016/J.COSE.2022.102871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiangYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuXSHQL22,
  author       = {Leilei Qu and
                  Ruojin Xiao and
                  Wenchang Shi and
                  Keman Huang and
                  Bo Qin and
                  Bin Liang},
  title        = {Your Behaviors Reveal What You Need: {A} Practical Scheme Based on
                  User Behaviors for Personalized Security Nudges},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102891},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102891},
  doi          = {10.1016/J.COSE.2022.102891},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QuXSHQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchinaglSK22,
  author       = {Stef Schinagl and
                  Abbas Shahim and
                  Svetlana Khapova},
  title        = {Paradoxical tensions in the implementation of digital security governance:
                  Toward an ambidextrous approach to governing digital security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102903},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102903},
  doi          = {10.1016/J.COSE.2022.102903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchinaglSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SonmezHM22,
  author       = {Ferda {\"{O}}zdemir S{\"{o}}nmez and
                  Chris Hankin and
                  Pasquale Malacaria},
  title        = {Decision support for healthcare cyber security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102865},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102865},
  doi          = {10.1016/J.COSE.2022.102865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SonmezHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TalibNNMAM22,
  author       = {Manar Abu Talib and
                  Qassim Nasir and
                  Ali Bou Nassif and
                  Takua Mokhamed and
                  Nafisa Ahmed and
                  Bayan Mahfood},
  title        = {{APT} beaconing detection: {A} systematic review},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102875},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102875},
  doi          = {10.1016/J.COSE.2022.102875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TalibNNMAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianZZ22,
  author       = {Huan Tian and
                  Tianqing Zhu and
                  Wanlei Zhou},
  title        = {Fairness and privacy preservation for facial images: GAN-based methods},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102902},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102902},
  doi          = {10.1016/J.COSE.2022.102902},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TianZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YaminK22a,
  author       = {Muhammad Mudassar Yamin and
                  Basel Katt},
  title        = {Use of cyber attack and defense agents in cyber ranges: {A} case study},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102892},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102892},
  doi          = {10.1016/J.COSE.2022.102892},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YaminK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLSZW22,
  author       = {Jingcheng Yang and
                  Hongwei Li and
                  Shuo Shao and
                  Futai Zou and
                  Yue Wu},
  title        = {{FS-IDS:} {A} framework for intrusion detection based on few-shot
                  learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102899},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102899},
  doi          = {10.1016/J.COSE.2022.102899},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangM22,
  author       = {Haotian Zhang and
                  Xu Ma},
  title        = {Misleading attention and classification: An adversarial attack to
                  fool object detection models in the real world},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102876},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102876},
  doi          = {10.1016/J.COSE.2022.102876},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics