Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec95.bht:"
@article{DBLP:journals/compsec/BotacinCGG20, author = {Marcus Botacin and Fabricio Ceschin and Paulo L. de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {We need to talk about antiviruses: challenges {\&} pitfalls of {AV} evaluations}, journal = {Comput. Secur.}, volume = {95}, pages = {101859}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101859}, doi = {10.1016/J.COSE.2020.101859}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BotacinCGG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BozkirA20, author = {Ahmet Selman Bozkir and Murat Aydos}, title = {LogoSENSE: {A} companion {HOG} based logo detection scheme for phishing web page and E-mail brand recognition}, journal = {Comput. Secur.}, volume = {95}, pages = {101855}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101855}, doi = {10.1016/J.COSE.2020.101855}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BozkirA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CorcoranMG20, author = {Padraig Corcoran and Peter Mooney and Andrei Gagarin}, title = {A distributed location obfuscation method for online route planning}, journal = {Comput. Secur.}, volume = {95}, pages = {101850}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101850}, doi = {10.1016/J.COSE.2020.101850}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CorcoranMG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DileeshS20, author = {E. D. Dileesh and A. P. Shanthi}, title = {{M-PIVAD} - Virtual memory based approach against non-control data attacks}, journal = {Comput. Secur.}, volume = {95}, pages = {101834}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101834}, doi = {10.1016/J.COSE.2020.101834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DileeshS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoucekPSN20, author = {Petr Doucek and Lubos Pavl{\'{\i}}cek and Jir{\'{\i}} Sedl{\'{a}}cek and Lea Nedomov{\'{a}}}, title = {Adaptation of password strength estimators to a non-English environment - the Czech experience}, journal = {Comput. Secur.}, volume = {95}, pages = {101757}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101757}, doi = {10.1016/J.COSE.2020.101757}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoucekPSN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Esmaeilzadeh20, author = {Pouyan Esmaeilzadeh}, title = {The effect of the privacy policy of Health Information Exchange {(HIE)} on patients' information disclosure intention}, journal = {Comput. Secur.}, volume = {95}, pages = {101819}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101819}, doi = {10.1016/J.COSE.2020.101819}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Esmaeilzadeh20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GibertMP20, author = {Daniel Gibert and Carles Mateu and Jordi Planes}, title = {{HYDRA:} {A} multimodal deep learning framework for malware classification}, journal = {Comput. Secur.}, volume = {95}, pages = {101873}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101873}, doi = {10.1016/J.COSE.2020.101873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GibertMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HartMPS20, author = {Stephen Hart and Andrea Margheri and Federica Paci and Vladimiro Sassone}, title = {Riskio: {A} Serious Game for Cyber Security Awareness and Education}, journal = {Comput. Secur.}, volume = {95}, pages = {101827}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101827}, doi = {10.1016/J.COSE.2020.101827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HartMPS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HenryP20, author = {Wayne C. Henry and Gilbert L. Peterson}, title = {SensorRE: Provenance support for software reverse engineers}, journal = {Comput. Secur.}, volume = {95}, pages = {101865}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101865}, doi = {10.1016/J.COSE.2020.101865}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HenryP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCZW20, author = {XuKui Li and Wei Chen and Qianru Zhang and Lifa Wu}, title = {Building Auto-Encoder Intrusion Detection System based on random forest feature selection}, journal = {Comput. Secur.}, volume = {95}, pages = {101851}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101851}, doi = {10.1016/J.COSE.2020.101851}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MalatjiMS20, author = {Masike Malatji and Annliz{\'{e}} Marnewick and Sun{\'{e}} von Solms}, title = {Validation of a socio-technical management process for optimising cybersecurity practices}, journal = {Comput. Secur.}, volume = {95}, pages = {101846}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101846}, doi = {10.1016/J.COSE.2020.101846}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MalatjiMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MenardB20, author = {Philip Menard and Gregory Bott}, title = {Analyzing {IOT} users' mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment}, journal = {Comput. Secur.}, volume = {95}, pages = {101856}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101856}, doi = {10.1016/J.COSE.2020.101856}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MenardB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiaziSAMZ20, author = {Mahmood Niazi and Ashraf Mohammed Saeed and Mohammad R. Alshayeb and Sajjad Mahmood and Saad Zafar}, title = {A maturity model for secure requirements engineering}, journal = {Comput. Secur.}, volume = {95}, pages = {101852}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101852}, doi = {10.1016/J.COSE.2020.101852}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiaziSAMZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParvezA20, author = {Mohammad Tanvir Parvez and Suliman A. Alsuhibany}, title = {Segmentation-validation based handwritten Arabic {CAPTCHA} generation}, journal = {Comput. Secur.}, volume = {95}, pages = {101829}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101829}, doi = {10.1016/J.COSE.2020.101829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParvezA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QianMWPWGCZL20, author = {Yaguan Qian and Dan{-}feng Ma and Bin Wang and Jun Pan and Jiamin Wang and Zhaoquan Gu and Jian{-}Hai Chen and Wujie Zhou and Jing{-}Sheng Lei}, title = {Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks}, journal = {Comput. Secur.}, volume = {95}, pages = {101826}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101826}, doi = {10.1016/J.COSE.2020.101826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QianMWPWGCZL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RussoCA20, author = {Enrico Russo and Gabriele Costa and Alessandro Armando}, title = {Building next generation Cyber Ranges with {CRACK}}, journal = {Comput. Secur.}, volume = {95}, pages = {101837}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101837}, doi = {10.1016/J.COSE.2020.101837}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RussoCA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinigagliaCCZ20, author = {Federico Sinigaglia and Roberto Carbone and Gabriele Costa and Nicola Zannone}, title = {A survey on multi-factor authentication for online banking in the wild}, journal = {Comput. Secur.}, volume = {95}, pages = {101745}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101745}, doi = {10.1016/J.COSE.2020.101745}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinigagliaCCZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanCYSAS20, author = {Choon Lin Tan and Kang{-}Leng Chiew and Kelvin S. C. Yong and San{-}Nah Sze and Johari Abdullah and Yakub Sebastian}, title = {A graph-theoretic approach for the detection of phishing webpages}, journal = {Comput. Secur.}, volume = {95}, pages = {101793}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101793}, doi = {10.1016/J.COSE.2020.101793}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TanCYSAS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianJ20, author = {Junfeng Tian and Xuan Jing}, title = {Cloud data integrity verification scheme for associated tags}, journal = {Comput. Secur.}, volume = {95}, pages = {101847}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101847}, doi = {10.1016/J.COSE.2020.101847}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TianJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSCLKK20, author = {Eric Ke Wang and RuiPei Sun and Chien{-}Ming Chen and Zuodong Liang and Saru Kumari and Muhammad Khurram Khan}, title = {Proof of X-repute blockchain consensus protocol for IoT systems}, journal = {Comput. Secur.}, volume = {95}, pages = {101871}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101871}, doi = {10.1016/J.COSE.2020.101871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangSCLKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoNLZCY20, author = {Yi Zhao and Jianting Ning and Kaitai Liang and Yanqi Zhao and Liqun Chen and Bo Yang}, title = {Privacy preserving search services against online attack}, journal = {Comput. Secur.}, volume = {95}, pages = {101836}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101836}, doi = {10.1016/J.COSE.2020.101836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoNLZCY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoYLSHL20, author = {Jun Zhao and Qiben Yan and Jianxin Li and Minglai Shao and Zuti He and Bo Li}, title = {TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data}, journal = {Comput. Secur.}, volume = {95}, pages = {101867}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101867}, doi = {10.1016/J.COSE.2020.101867}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoYLSHL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouHLFA20, author = {Man Zhou and Lansheng Han and Hongwei Lu and Cai Fu and Dezhi An}, title = {Cooperative malicious network behavior recognition algorithm in E-commerce}, journal = {Comput. Secur.}, volume = {95}, pages = {101868}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101868}, doi = {10.1016/J.COSE.2020.101868}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouHLFA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.