Search dblp for Publications

export results for "toc:db/journals/compsec/compsec89.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlawamiK20,
  author       = {Mohsen Ali Alawami and
                  Hyoungshick Kim},
  title        = {LocAuth: {A} fine-grained indoor location-based authentication system
                  using wireless networks characteristics},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101683},
  doi          = {10.1016/J.COSE.2019.101683},
  timestamp    = {Sat, 03 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlawamiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlzaylaeeYS20,
  author       = {Mohammed K. Alzaylaee and
                  Suleiman Y. Yerima and
                  Sakir Sezer},
  title        = {DL-Droid: Deep learning based android malware detection using real
                  devices},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101663},
  doi          = {10.1016/J.COSE.2019.101663},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlzaylaeeYS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArshadJHA20,
  author       = {Humaira Arshad and
                  Aman Jantan and
                  Gan Keng Hoon and
                  Oludare Isaac Abiodun},
  title        = {Formal knowledge model for online social network forensics},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101675},
  doi          = {10.1016/J.COSE.2019.101675},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArshadJHA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhamareZEJKM20,
  author       = {Deval Bhamare and
                  Maede Zolanvari and
                  Aiman Erbad and
                  Raj Jain and
                  Khaled M. Khan and
                  Nader Meskin},
  title        = {Cybersecurity for industrial control systems: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101677},
  doi          = {10.1016/J.COSE.2019.101677},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhamareZEJKM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoutignyBBLDJ20,
  author       = {Fran{\c{c}}ois Boutigny and
                  St{\'{e}}phane Betg{\'{e}}{-}Brezetz and
                  Gregory Blanc and
                  Antoine Lavignotte and
                  Herv{\'{e}} Debar and
                  Houda Jmila},
  title        = {Solving security constraints for 5G slice embedding: {A} proof-of-concept},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101662},
  doi          = {10.1016/J.COSE.2019.101662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoutignyBBLDJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoglundLFR20,
  author       = {Joel H{\"{o}}glund and
                  Samuel Lindemer and
                  Martin Furuhed and
                  Shahid Raza},
  title        = {PKI4IoT: Towards public key infrastructure for the Internet of Things},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101658},
  doi          = {10.1016/J.COSE.2019.101658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HoglundLFR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZ20,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {A dynamic games approach to proactive defense strategies against Advanced
                  Persistent Threats in cyber-physical systems},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101660},
  doi          = {10.1016/J.COSE.2019.101660},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JahromiHDCKNP20,
  author       = {Amir Namavar Jahromi and
                  Sattar Hashemi and
                  Ali Dehghantanha and
                  Kim{-}Kwang Raymond Choo and
                  Hadis Karimipour and
                  David Ellis Newton and
                  Reza M. Parizi},
  title        = {An improved two-hidden-layer extreme learning machine for malware
                  hunting},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101655},
  doi          = {10.1016/J.COSE.2019.101655},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JahromiHDCKNP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JawaheriSBE20,
  author       = {Husam Al Jawaheri and
                  Mashael Al Sabah and
                  Yazan Boshmaf and
                  Aiman Erbad},
  title        = {Deanonymizing Tor hidden service users through Bitcoin transactions
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101684},
  doi          = {10.1016/J.COSE.2019.101684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JawaheriSBE20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuLLZ20,
  author       = {Xinbo Liu and
                  Yaping Lin and
                  He Li and
                  Jiliang Zhang},
  title        = {A novel method for malware detection on ML-based visualization technique},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101682},
  doi          = {10.1016/J.COSE.2019.101682},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuLLZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuoZDJLS20,
  author       = {Peng Luo and
                  Deqing Zou and
                  Yajuan Du and
                  Hai Jin and
                  Changming Liu and
                  Jinan Shen},
  title        = {Static detection of real-world buffer overflow induced by loop},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101616},
  doi          = {10.1016/J.COSE.2019.101616},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuoZDJLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MahdaviFA20,
  author       = {Ehsan Mahdavi and
                  Ali Fanian and
                  Fatima Amini},
  title        = {A real-time alert correlation method based on code-books for intrusion
                  detection systems},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101661},
  doi          = {10.1016/J.COSE.2019.101661},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MahdaviFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MalhiBP20,
  author       = {Avleen Kaur Malhi and
                  Shalini Batra and
                  Husanbir Singh Pannu},
  title        = {Security of vehicular ad-hoc networks: {A} comprehensive survey},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101664},
  doi          = {10.1016/J.COSE.2019.101664},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MalhiBP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoiaBH20,
  author       = {Vitor Hugo Galhardo Moia and
                  Frank Breitinger and
                  Marco Aur{\'{e}}lio Amaral Henriques},
  title        = {The impact of excluding common blocks for approximate matching},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101676},
  doi          = {10.1016/J.COSE.2019.101676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoiaBH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OlukoyaMO20,
  author       = {Oluwafemi Olukoya and
                  Lewis Mackenzie and
                  Inah Omoronyia},
  title        = {Security-oriented view of app behaviour using textual descriptions
                  and user-granted permission requests},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101685},
  doi          = {10.1016/J.COSE.2019.101685},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OlukoyaMO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassZ20,
  author       = {Stefan Rass and
                  Quanyan Zhu},
  title        = {Computer {\&} security special issue editorial},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101678},
  doi          = {10.1016/J.COSE.2019.101678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShwartzCSO20,
  author       = {Omer Shwartz and
                  Amir Cohen and
                  Asaf Shabtai and
                  Yossi Oren},
  title        = {Inner conflict: How smart device components can cause harm},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101665},
  doi          = {10.1016/J.COSE.2019.101665},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShwartzCSO20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UpadhyayS20,
  author       = {Darshana Upadhyay and
                  Srinivas Sampalli},
  title        = {{SCADA} (Supervisory Control and Data Acquisition) systems: Vulnerability
                  assessment and security recommendations},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101666},
  doi          = {10.1016/J.COSE.2019.101666},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UpadhyayS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLCZZ20,
  author       = {Ye Wang and
                  Qingbao Li and
                  Zhifeng Chen and
                  Ping Zhang and
                  Guimin Zhang},
  title        = {Shapeshifter: Intelligence-driven data plane randomization resilient
                  to data-oriented programming attacks},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101679},
  doi          = {10.1016/J.COSE.2019.101679},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLCZZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangNF20,
  author       = {Jiali Wang and
                  Martin Neil and
                  Norman E. Fenton},
  title        = {A Bayesian network approach for cybersecurity risk assessment implementing
                  and extending the {FAIR} model},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101659},
  doi          = {10.1016/J.COSE.2019.101659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangNF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangLFYXZ20,
  author       = {Jianwu Zhang and
                  Yu Ling and
                  Xingbing Fu and
                  Xiongkun Yang and
                  Gang Xiong and
                  Rui Zhang},
  title        = {Model of the intrusion detection system based on the integration of
                  spatial-temporal features},
  journal      = {Comput. Secur.},
  volume       = {89},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2019.101681},
  doi          = {10.1016/J.COSE.2019.101681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangLFYXZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics