Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec89.bht:"
@article{DBLP:journals/compsec/AlawamiK20, author = {Mohsen Ali Alawami and Hyoungshick Kim}, title = {LocAuth: {A} fine-grained indoor location-based authentication system using wireless networks characteristics}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101683}, doi = {10.1016/J.COSE.2019.101683}, timestamp = {Sat, 03 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlawamiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlzaylaeeYS20, author = {Mohammed K. Alzaylaee and Suleiman Y. Yerima and Sakir Sezer}, title = {DL-Droid: Deep learning based android malware detection using real devices}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101663}, doi = {10.1016/J.COSE.2019.101663}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlzaylaeeYS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArshadJHA20, author = {Humaira Arshad and Aman Jantan and Gan Keng Hoon and Oludare Isaac Abiodun}, title = {Formal knowledge model for online social network forensics}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101675}, doi = {10.1016/J.COSE.2019.101675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArshadJHA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhamareZEJKM20, author = {Deval Bhamare and Maede Zolanvari and Aiman Erbad and Raj Jain and Khaled M. Khan and Nader Meskin}, title = {Cybersecurity for industrial control systems: {A} survey}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101677}, doi = {10.1016/J.COSE.2019.101677}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhamareZEJKM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoutignyBBLDJ20, author = {Fran{\c{c}}ois Boutigny and St{\'{e}}phane Betg{\'{e}}{-}Brezetz and Gregory Blanc and Antoine Lavignotte and Herv{\'{e}} Debar and Houda Jmila}, title = {Solving security constraints for 5G slice embedding: {A} proof-of-concept}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101662}, doi = {10.1016/J.COSE.2019.101662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoutignyBBLDJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HoglundLFR20, author = {Joel H{\"{o}}glund and Samuel Lindemer and Martin Furuhed and Shahid Raza}, title = {PKI4IoT: Towards public key infrastructure for the Internet of Things}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101658}, doi = {10.1016/J.COSE.2019.101658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HoglundLFR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZ20, author = {Linan Huang and Quanyan Zhu}, title = {A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101660}, doi = {10.1016/J.COSE.2019.101660}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JahromiHDCKNP20, author = {Amir Namavar Jahromi and Sattar Hashemi and Ali Dehghantanha and Kim{-}Kwang Raymond Choo and Hadis Karimipour and David Ellis Newton and Reza M. Parizi}, title = {An improved two-hidden-layer extreme learning machine for malware hunting}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101655}, doi = {10.1016/J.COSE.2019.101655}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JahromiHDCKNP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JawaheriSBE20, author = {Husam Al Jawaheri and Mashael Al Sabah and Yazan Boshmaf and Aiman Erbad}, title = {Deanonymizing Tor hidden service users through Bitcoin transactions analysis}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101684}, doi = {10.1016/J.COSE.2019.101684}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JawaheriSBE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuLLZ20, author = {Xinbo Liu and Yaping Lin and He Li and Jiliang Zhang}, title = {A novel method for malware detection on ML-based visualization technique}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101682}, doi = {10.1016/J.COSE.2019.101682}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuLLZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuoZDJLS20, author = {Peng Luo and Deqing Zou and Yajuan Du and Hai Jin and Changming Liu and Jinan Shen}, title = {Static detection of real-world buffer overflow induced by loop}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101616}, doi = {10.1016/J.COSE.2019.101616}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuoZDJLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MahdaviFA20, author = {Ehsan Mahdavi and Ali Fanian and Fatima Amini}, title = {A real-time alert correlation method based on code-books for intrusion detection systems}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101661}, doi = {10.1016/J.COSE.2019.101661}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MahdaviFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MalhiBP20, author = {Avleen Kaur Malhi and Shalini Batra and Husanbir Singh Pannu}, title = {Security of vehicular ad-hoc networks: {A} comprehensive survey}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101664}, doi = {10.1016/J.COSE.2019.101664}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MalhiBP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoiaBH20, author = {Vitor Hugo Galhardo Moia and Frank Breitinger and Marco Aur{\'{e}}lio Amaral Henriques}, title = {The impact of excluding common blocks for approximate matching}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101676}, doi = {10.1016/J.COSE.2019.101676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoiaBH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OlukoyaMO20, author = {Oluwafemi Olukoya and Lewis Mackenzie and Inah Omoronyia}, title = {Security-oriented view of app behaviour using textual descriptions and user-granted permission requests}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101685}, doi = {10.1016/J.COSE.2019.101685}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OlukoyaMO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassZ20, author = {Stefan Rass and Quanyan Zhu}, title = {Computer {\&} security special issue editorial}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101678}, doi = {10.1016/J.COSE.2019.101678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShwartzCSO20, author = {Omer Shwartz and Amir Cohen and Asaf Shabtai and Yossi Oren}, title = {Inner conflict: How smart device components can cause harm}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101665}, doi = {10.1016/J.COSE.2019.101665}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShwartzCSO20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UpadhyayS20, author = {Darshana Upadhyay and Srinivas Sampalli}, title = {{SCADA} (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101666}, doi = {10.1016/J.COSE.2019.101666}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UpadhyayS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLCZZ20, author = {Ye Wang and Qingbao Li and Zhifeng Chen and Ping Zhang and Guimin Zhang}, title = {Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101679}, doi = {10.1016/J.COSE.2019.101679}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLCZZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangNF20, author = {Jiali Wang and Martin Neil and Norman E. Fenton}, title = {A Bayesian network approach for cybersecurity risk assessment implementing and extending the {FAIR} model}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101659}, doi = {10.1016/J.COSE.2019.101659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangNF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangLFYXZ20, author = {Jianwu Zhang and Yu Ling and Xingbing Fu and Xiongkun Yang and Gang Xiong and Rui Zhang}, title = {Model of the intrusion detection system based on the integration of spatial-temporal features}, journal = {Comput. Secur.}, volume = {89}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2019.101681}, doi = {10.1016/J.COSE.2019.101681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangLFYXZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.