Search dblp for Publications

export results for "toc:db/journals/compsec/compsec95.bht:"

 download as .bib file

@article{DBLP:journals/compsec/BotacinCGG20,
  author       = {Marcus Botacin and
                  Fabricio Ceschin and
                  Paulo L. de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {We need to talk about antiviruses: challenges {\&} pitfalls of
                  {AV} evaluations},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101859},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101859},
  doi          = {10.1016/J.COSE.2020.101859},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BotacinCGG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BozkirA20,
  author       = {Ahmet Selman Bozkir and
                  Murat Aydos},
  title        = {LogoSENSE: {A} companion {HOG} based logo detection scheme for phishing
                  web page and E-mail brand recognition},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101855},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101855},
  doi          = {10.1016/J.COSE.2020.101855},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BozkirA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CorcoranMG20,
  author       = {Padraig Corcoran and
                  Peter Mooney and
                  Andrei Gagarin},
  title        = {A distributed location obfuscation method for online route planning},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101850},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101850},
  doi          = {10.1016/J.COSE.2020.101850},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CorcoranMG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DileeshS20,
  author       = {E. D. Dileesh and
                  A. P. Shanthi},
  title        = {{M-PIVAD} - Virtual memory based approach against non-control data
                  attacks},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101834},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101834},
  doi          = {10.1016/J.COSE.2020.101834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DileeshS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoucekPSN20,
  author       = {Petr Doucek and
                  Lubos Pavl{\'{\i}}cek and
                  Jir{\'{\i}} Sedl{\'{a}}cek and
                  Lea Nedomov{\'{a}}},
  title        = {Adaptation of password strength estimators to a non-English environment
                  - the Czech experience},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101757},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101757},
  doi          = {10.1016/J.COSE.2020.101757},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoucekPSN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Esmaeilzadeh20,
  author       = {Pouyan Esmaeilzadeh},
  title        = {The effect of the privacy policy of Health Information Exchange {(HIE)}
                  on patients' information disclosure intention},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101819},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101819},
  doi          = {10.1016/J.COSE.2020.101819},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Esmaeilzadeh20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GibertMP20,
  author       = {Daniel Gibert and
                  Carles Mateu and
                  Jordi Planes},
  title        = {{HYDRA:} {A} multimodal deep learning framework for malware classification},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101873},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101873},
  doi          = {10.1016/J.COSE.2020.101873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GibertMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HartMPS20,
  author       = {Stephen Hart and
                  Andrea Margheri and
                  Federica Paci and
                  Vladimiro Sassone},
  title        = {Riskio: {A} Serious Game for Cyber Security Awareness and Education},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101827},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101827},
  doi          = {10.1016/J.COSE.2020.101827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HartMPS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HenryP20,
  author       = {Wayne C. Henry and
                  Gilbert L. Peterson},
  title        = {SensorRE: Provenance support for software reverse engineers},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101865},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101865},
  doi          = {10.1016/J.COSE.2020.101865},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HenryP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZW20,
  author       = {XuKui Li and
                  Wei Chen and
                  Qianru Zhang and
                  Lifa Wu},
  title        = {Building Auto-Encoder Intrusion Detection System based on random forest
                  feature selection},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101851},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101851},
  doi          = {10.1016/J.COSE.2020.101851},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MalatjiMS20,
  author       = {Masike Malatji and
                  Annliz{\'{e}} Marnewick and
                  Sun{\'{e}} von Solms},
  title        = {Validation of a socio-technical management process for optimising
                  cybersecurity practices},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101846},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101846},
  doi          = {10.1016/J.COSE.2020.101846},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MalatjiMS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MenardB20,
  author       = {Philip Menard and
                  Gregory Bott},
  title        = {Analyzing {IOT} users' mobile device privacy concerns: Extracting
                  privacy permissions using a disclosure experiment},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101856},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101856},
  doi          = {10.1016/J.COSE.2020.101856},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MenardB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiaziSAMZ20,
  author       = {Mahmood Niazi and
                  Ashraf Mohammed Saeed and
                  Mohammad R. Alshayeb and
                  Sajjad Mahmood and
                  Saad Zafar},
  title        = {A maturity model for secure requirements engineering},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101852},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101852},
  doi          = {10.1016/J.COSE.2020.101852},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiaziSAMZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParvezA20,
  author       = {Mohammad Tanvir Parvez and
                  Suliman A. Alsuhibany},
  title        = {Segmentation-validation based handwritten Arabic {CAPTCHA} generation},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101829},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101829},
  doi          = {10.1016/J.COSE.2020.101829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParvezA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QianMWPWGCZL20,
  author       = {Yaguan Qian and
                  Dan{-}feng Ma and
                  Bin Wang and
                  Jun Pan and
                  Jiamin Wang and
                  Zhaoquan Gu and
                  Jian{-}Hai Chen and
                  Wujie Zhou and
                  Jing{-}Sheng Lei},
  title        = {Spot evasion attacks: Adversarial examples for license plate recognition
                  systems with convolutional neural networks},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101826},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101826},
  doi          = {10.1016/J.COSE.2020.101826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QianMWPWGCZL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RussoCA20,
  author       = {Enrico Russo and
                  Gabriele Costa and
                  Alessandro Armando},
  title        = {Building next generation Cyber Ranges with {CRACK}},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101837},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101837},
  doi          = {10.1016/J.COSE.2020.101837},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RussoCA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinigagliaCCZ20,
  author       = {Federico Sinigaglia and
                  Roberto Carbone and
                  Gabriele Costa and
                  Nicola Zannone},
  title        = {A survey on multi-factor authentication for online banking in the
                  wild},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101745},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101745},
  doi          = {10.1016/J.COSE.2020.101745},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinigagliaCCZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanCYSAS20,
  author       = {Choon Lin Tan and
                  Kang{-}Leng Chiew and
                  Kelvin S. C. Yong and
                  San{-}Nah Sze and
                  Johari Abdullah and
                  Yakub Sebastian},
  title        = {A graph-theoretic approach for the detection of phishing webpages},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101793},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101793},
  doi          = {10.1016/J.COSE.2020.101793},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TanCYSAS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianJ20,
  author       = {Junfeng Tian and
                  Xuan Jing},
  title        = {Cloud data integrity verification scheme for associated tags},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101847},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101847},
  doi          = {10.1016/J.COSE.2020.101847},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TianJ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSCLKK20,
  author       = {Eric Ke Wang and
                  RuiPei Sun and
                  Chien{-}Ming Chen and
                  Zuodong Liang and
                  Saru Kumari and
                  Muhammad Khurram Khan},
  title        = {Proof of X-repute blockchain consensus protocol for IoT systems},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101871},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101871},
  doi          = {10.1016/J.COSE.2020.101871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSCLKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoNLZCY20,
  author       = {Yi Zhao and
                  Jianting Ning and
                  Kaitai Liang and
                  Yanqi Zhao and
                  Liqun Chen and
                  Bo Yang},
  title        = {Privacy preserving search services against online attack},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101836},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101836},
  doi          = {10.1016/J.COSE.2020.101836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoNLZCY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoYLSHL20,
  author       = {Jun Zhao and
                  Qiben Yan and
                  Jianxin Li and
                  Minglai Shao and
                  Zuti He and
                  Bo Li},
  title        = {TIMiner: Automatically extracting and analyzing categorized cyber
                  threat intelligence from social data},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101867},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101867},
  doi          = {10.1016/J.COSE.2020.101867},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoYLSHL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouHLFA20,
  author       = {Man Zhou and
                  Lansheng Han and
                  Hongwei Lu and
                  Cai Fu and
                  Dezhi An},
  title        = {Cooperative malicious network behavior recognition algorithm in E-commerce},
  journal      = {Comput. Secur.},
  volume       = {95},
  pages        = {101868},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101868},
  doi          = {10.1016/J.COSE.2020.101868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouHLFA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics