Search dblp for Publications

export results for "toc:db/journals/compsec/compsec140.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AliA24,
  author       = {Hala S. Ali and
                  Irfan Ahmed},
  title        = {{LAAKA:} Lightweight Anonymous Authentication and Key Agreement Scheme
                  for Secure Fog-Driven IoT Systems},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103770},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103770},
  doi          = {10.1016/J.COSE.2024.103770},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlkofahiAS24,
  author       = {Hamza Alkofahi and
                  Heba Alawneh and
                  Anthony Skjellum},
  title        = {MitM attacks on intellectual property and integrity of additive manufacturing
                  systems: {A} security analysis},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103810},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103810},
  doi          = {10.1016/J.COSE.2024.103810},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlkofahiAS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArceWB24,
  author       = {Daniel G. Arce and
                  Daniel W. Woods and
                  Rainer B{\"{o}}hme},
  title        = {Economics of incident response panels in cyber insurance},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103742},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103742},
  doi          = {10.1016/J.COSE.2024.103742},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArceWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaltuttisTA24,
  author       = {Dennik Baltuttis and
                  Timm Teubner and
                  Marc T. P. Adam},
  title        = {A typology of cybersecurity behavior among knowledge workers},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103741},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103741},
  doi          = {10.1016/J.COSE.2024.103741},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaltuttisTA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhardwajLDB24,
  author       = {Sonam Bhardwaj and
                  Adrian Shuai Li and
                  Mayank Dave and
                  Elisa Bertino},
  title        = {Overcoming the lack of labeled data: Training malware detection models
                  using adversarial domain adaptation},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103769},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103769},
  doi          = {10.1016/J.COSE.2024.103769},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhardwajLDB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhattarP24,
  author       = {Poornachandratejasvi Laxman Bhattar and
                  Naran M. Pindoriya},
  title        = {False Data Injection Attack with Max-Min Optimization in Smart Grid},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103761},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103761},
  doi          = {10.1016/J.COSE.2024.103761},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhattarP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuccafurriALP24,
  author       = {Francesco Buccafurri and
                  Vincenzo De Angelis and
                  Sara Lazzaro and
                  Andrea Pugliese},
  title        = {Enforcing security policies on interacting authentication systems},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103771},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103771},
  doi          = {10.1016/J.COSE.2024.103771},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuccafurriALP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuiAMGSCPBIICGSBY24,
  author       = {Hang Thanh Bui and
                  Hamed Aboutorab and
                  Arash Mahboubi and
                  Yansong Gao and
                  Nazatul Haque Sultan and
                  Aufeef Chauhan and
                  Mohammad Zavid Parvez and
                  Michael Bewong and
                  Rafiqul Islam and
                  Zahidul Islam and
                  Seyit Ahmet {\c{C}}amtepe and
                  Praveen Gauravaram and
                  Dineshkumar Singh and
                  Muhammad Ali Babar and
                  Shihao Yan},
  title        = {Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources
                  and techniques in smart farming ecosystems},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103754},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103754},
  doi          = {10.1016/J.COSE.2024.103754},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuiAMGSCPBIICGSBY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaiCLLW24,
  author       = {Liujia Cai and
                  Guangying Cai and
                  Siqi Lu and
                  Guangsong Li and
                  Yongjuan Wang},
  title        = {Observational equivalence and security games: Enhancing the formal
                  analysis of security protocols},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103785},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103785},
  doi          = {10.1016/J.COSE.2024.103785},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaiCLLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CasarilG24,
  author       = {Francesco Casaril and
                  Letterio Galletta},
  title        = {Securing SatCom user segment: {A} study on cybersecurity challenges
                  in view of {IRIS}},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103799},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103799},
  doi          = {10.1016/J.COSE.2024.103799},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CasarilG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWXYXJXY24,
  author       = {Zuohui Chen and
                  Renxuan Wang and
                  Jingyang Xiang and
                  Yue Yu and
                  Xin Xia and
                  Shouling Ji and
                  Qi Xuan and
                  Xiaoniu Yang},
  title        = {{GGT:} Graph-guided testing for adversarial sample detection of deep
                  neural network},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103710},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103710},
  doi          = {10.1016/J.COSE.2024.103710},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWXYXJXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChrysanthouPP24,
  author       = {Anargyros Chrysanthou and
                  Yorgos Pantis and
                  Constantinos Patsakis},
  title        = {The anatomy of deception: Measuring technical and human factors of
                  a large-scale phishing campaign},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103780},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103780},
  doi          = {10.1016/J.COSE.2024.103780},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChrysanthouPP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuanYW24,
  author       = {Shu{-}Min Duan and
                  Jian{-}Ting Yuan and
                  Bo Wang},
  title        = {Contextual feature representation for image-based insider threat classification},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103779},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103779},
  doi          = {10.1016/J.COSE.2024.103779},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuanYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EhrenbergSM24,
  author       = {Melanie Ehrenberg and
                  Shahram Sarkani and
                  Thomas A. Mazzuchi},
  title        = {Python source code vulnerability detection with named entity recognition},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103802},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103802},
  doi          = {10.1016/J.COSE.2024.103802},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EhrenbergSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FenechRF24,
  author       = {Joseph Fenech and
                  Debbie Richards and
                  Paul Formosa},
  title        = {Ethical principles shaping values-based cybersecurity decision-making},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103795},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103795},
  doi          = {10.1016/J.COSE.2024.103795},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FenechRF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FengGYWLXM24,
  author       = {Pengbin Feng and
                  Le Gai and
                  Li Yang and
                  Qin Wang and
                  Teng Li and
                  Ning Xi and
                  Jian Feng Ma},
  title        = {DawnGNN: Documentation augmented windows malware detection using graph
                  neural network},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103788},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103788},
  doi          = {10.1016/J.COSE.2024.103788},
  timestamp    = {Tue, 23 Jul 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FengGYWLXM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GlasauerMSA24,
  author       = {Christina Glasauer and
                  Linda Maurer and
                  Carina Spreitzer and
                  Rainer W. Alexandrowicz},
  title        = {Development {\&} psychometrics of the {SOLID-S} - An inventory
                  assessing software security culture in software development companies},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103753},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103753},
  doi          = {10.1016/J.COSE.2024.103753},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GlasauerMSA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuZHLZ24,
  author       = {Jintao Gu and
                  Hongliang Zhu and
                  Zewei Han and
                  Xiangyu Li and
                  Jianjin Zhao},
  title        = {GSEDroid: GNN-based Android malware detection framework using lightweight
                  semantic embedding},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103807},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103807},
  doi          = {10.1016/J.COSE.2024.103807},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuZHLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuptaS24,
  author       = {Swechchha Gupta and
                  Buddha Singh},
  title        = {An intelligent multi-layer framework with {SHAP} integration for botnet
                  detection and classification},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103783},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103783},
  doi          = {10.1016/J.COSE.2024.103783},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuptaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangSH24,
  author       = {Haiou Huang and
                  Bangyi Sun and
                  Liang Hu},
  title        = {A task offloading approach based on risk assessment to mitigate edge
                  DDoS attacks},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103789},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103789},
  doi          = {10.1016/J.COSE.2024.103789},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JavadpourJTSB24,
  author       = {Amir Javadpour and
                  Forough Ja'fari and
                  Tarik Taleb and
                  Mohammad Shojafar and
                  Chafika Benza{\"{\i}}d},
  title        = {A comprehensive survey on cyber deception techniques to improve honeypot
                  performance},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103792},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103792},
  doi          = {10.1016/J.COSE.2024.103792},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JavadpourJTSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JavanmardiGSAC24,
  author       = {Saeed Javanmardi and
                  Meysam Ghahramani and
                  Mohammad Shojafar and
                  Mamoun Alazab and
                  Antonio Caruso},
  title        = {{M-RL:} {A} mobility and impersonation-aware {IDS} for DDoS {UDP}
                  flooding attacks in IoT-Fog networks},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103778},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103778},
  doi          = {10.1016/J.COSE.2024.103778},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JavanmardiGSAC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JayaraoRP24,
  author       = {Guruprasad B. Jayarao and
                  Sanjog Ray and
                  Prabin Kumar Panigrahi},
  title        = {Information security threats and organizational readiness in nWFH
                  scenarios},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103745},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103745},
  doi          = {10.1016/J.COSE.2024.103745},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JayaraoRP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JethavaR24,
  author       = {Gordhan Jethava and
                  Udai Pratap Rao},
  title        = {Exploring security and trust mechanisms in online social networks:
                  An extensive review},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103790},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103790},
  doi          = {10.1016/J.COSE.2024.103790},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JethavaR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JoseGSC24,
  author       = {G. Sahaya Stalin Jose and
                  Sugitha G and
                  Ayshwarya Lakshmi S and
                  Preethi Bangalore Chaluvaraj},
  title        = {Self-Attention conditional generative adversarial network optimised
                  with crayfish optimization algorithm for improving cyber security
                  in cloud computing},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103773},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103773},
  doi          = {10.1016/J.COSE.2024.103773},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JoseGSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KatsikeasLJE24,
  author       = {Sotirios Katsikeas and
                  Engla Rencelj Ling and
                  Pontus Johnsson and
                  Mathias Ekstedt},
  title        = {Empirical evaluation of a threat modeling language as a cybersecurity
                  assessment tool},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103743},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103743},
  doi          = {10.1016/J.COSE.2024.103743},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KatsikeasLJE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimJJLL24,
  author       = {Seon Kwon Kim and
                  Hongjoo Jin and
                  Kyungho Joo and
                  Jiwon Lee and
                  Dong Hoon Lee},
  title        = {{DROPSYS:} Detection of {ROP} attacks using system information},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103813},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103813},
  doi          = {10.1016/J.COSE.2024.103813},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimJJLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KongLPWL24,
  author       = {Lingdi Kong and
                  Senlin Luo and
                  Limin Pan and
                  Zhouting Wu and
                  Xinshuai Li},
  title        = {A multi-type vulnerability detection framework with parallel perspective
                  fusion and hierarchical feature enhancement},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103787},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103787},
  doi          = {10.1016/J.COSE.2024.103787},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KongLPWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LampeM24,
  author       = {Brooke Lampe and
                  Weizhi Meng},
  title        = {can-train-and-test: {A} curated {CAN} dataset for automotive intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103777},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103777},
  doi          = {10.1016/J.COSE.2024.103777},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LampeM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiHC24,
  author       = {Lingzi Li and
                  Cheng Huang and
                  Junren Chen},
  title        = {Automated discovery and mapping ATT{\&}CK tactics and techniques
                  for unstructured cyber threat intelligence},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103815},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103815},
  doi          = {10.1016/J.COSE.2024.103815},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiTZZL24,
  author       = {Wanyu Li and
                  Hailiang Tang and
                  Hailin Zhu and
                  Wenxiao Zhang and
                  Chen Liu},
  title        = {TS-Mal: Malware detection model using temporal and structural features
                  learning},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103752},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103752},
  doi          = {10.1016/J.COSE.2024.103752},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiTZZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuXYZL24,
  author       = {Yaru Liu and
                  Lijuan Xu and
                  Shumian Yang and
                  Dawei Zhao and
                  Xin Li},
  title        = {Adversarial sample attacks and defenses based on {LSTM-ED} in industrial
                  control systems},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103750},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103750},
  doi          = {10.1016/J.COSE.2024.103750},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuXYZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NguyenCN24,
  author       = {Qui Ngoc Nguyen and
                  Nguyen Tan Cam and
                  Kiet Van Nguyen},
  title        = {{XLMR4MD:} New Vietnamese dataset and framework for detecting the
                  consistency of description and permission in Android applications
                  using large language models},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103814},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103814},
  doi          = {10.1016/J.COSE.2024.103814},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NguyenCN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PanFGXW24,
  author       = {Hongyu Pan and
                  Yong Fang and
                  Wenbo Guo and
                  Yijia Xu and
                  Changhui Wang},
  title        = {Few-shot graph classification on cross-site scripting attacks detection},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103749},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103749},
  doi          = {10.1016/J.COSE.2024.103749},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PanFGXW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatelPGC24,
  author       = {Chintan Patel and
                  Aryan Mohammadi Pasikhani and
                  Prosanta Gope and
                  John A. Clark},
  title        = {User-empowered secure privacy-preserving authentication scheme for
                  Digital Twin},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103793},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103793},
  doi          = {10.1016/J.COSE.2024.103793},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatelPGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PengGPCCS24,
  author       = {Jiaxin Peng and
                  Chun Guo and
                  Yuan Ping and
                  Yunhe Cui and
                  Yi Chen and
                  Guowei Shen},
  title        = {{SNDMI:} Spyware network traffic detection method based on inducement
                  operations},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103806},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103806},
  doi          = {10.1016/J.COSE.2024.103806},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PengGPCCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PriteeAAJKM24,
  author       = {Zinniya Taffannum Pritee and
                  Mehedi Hasan Anik and
                  Saida Binta Alam and
                  Jamin Rahman Jim and
                  Md. Mohsin Kabir and
                  Muhammad Firoz Mridha},
  title        = {Machine learning and deep learning for user authentication and authorization
                  in cybersecurity: {A} state-of-the-art review},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103747},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103747},
  doi          = {10.1016/J.COSE.2024.103747},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PriteeAAJKM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RadivojevicCKB24,
  author       = {Kristina Radivojevic and
                  Nicholas Clark and
                  Anna Klempay and
                  Paul R. Brenner},
  title        = {Defending novice user privacy: An evaluation of default web browser
                  configurations},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103784},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103784},
  doi          = {10.1016/J.COSE.2024.103784},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RadivojevicCKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RamanCA24,
  author       = {Raghu Raman and
                  Prasad Calyam and
                  Krishnashree Achuthan},
  title        = {ChatGPT or Bard: Who is a better Certified Ethical Hacker?},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103804},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103804},
  doi          = {10.1016/J.COSE.2024.103804},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RamanCA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RaniVS24,
  author       = {B. Selva Rani and
                  S. Vairamuthu and
                  Suresh Subramanian},
  title        = {Archimedes Fire Hawk Optimization enabled feature selection with deep
                  maxout for network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103751},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103751},
  doi          = {10.1016/J.COSE.2024.103751},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RaniVS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RookardK24,
  author       = {Curtis Rookard and
                  Anahita Khojandi},
  title        = {RRIoT: Recurrent reinforcement learning for cyber threat detection
                  on IoT devices},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103786},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103786},
  doi          = {10.1016/J.COSE.2024.103786},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RookardK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RusES24,
  author       = {Adrian{-}Catalin Rus and
                  Mohammad El{-}Hajj and
                  Dipti Kapoor Sarmah},
  title        = {{NAISS:} {A} reverse proxy approach to mitigate MageCart's e-skimmers
                  in e-commerce},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103797},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103797},
  doi          = {10.1016/J.COSE.2024.103797},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RusES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SabaliauskaiteBJASW24,
  author       = {Giedre Sabaliauskaite and
                  Jeremy W. Bryans and
                  Hesamaldin Jadidbonab and
                  Farhan Ahmad and
                  Siraj A. Shaikh and
                  Paul Wooderson},
  title        = {{TOMSAC} - Methodology for trade-off management between automotive
                  safety and cyber security},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103798},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103798},
  doi          = {10.1016/J.COSE.2024.103798},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SabaliauskaiteBJASW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SadhyaS24,
  author       = {Debanjan Sadhya and
                  Tanya Sahu},
  title        = {A critical survey of the security and privacy aspects of the Aadhaar
                  framework},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103782},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103782},
  doi          = {10.1016/J.COSE.2024.103782},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SadhyaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaM24,
  author       = {Anee Sharma and
                  Ningrinla Marchang},
  title        = {A review on client-server attacks and defenses in federated learning},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103801},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103801},
  doi          = {10.1016/J.COSE.2024.103801},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SheLCS24,
  author       = {Cairui She and
                  Jinfeng Li and
                  Liwei Chen and
                  Gang Shi},
  title        = {{SCFI:} Efficient forward fine-grained control flow integrity based
                  on coarse-grained {ISA} extensions},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103800},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103800},
  doi          = {10.1016/J.COSE.2024.103800},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SheLCS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShibbirRFC24,
  author       = {Md. Neyamul Islam Shibbir and
                  Hasibur Rahman and
                  Md. Sadek Ferdous and
                  Farida Chowdhury},
  title        = {Evaluating the security of CAPTCHAs utilized on Bangladeshi websites},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103774},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103774},
  doi          = {10.1016/J.COSE.2024.103774},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShibbirRFC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SousaDACWSGF24,
  author       = {Bruno Sousa and
                  Duarte Dias and
                  Nuno Antunes and
                  Javier C{\'{a}}mara and
                  Ryan Wagner and
                  Bradley R. Schmerl and
                  David Garlan and
                  Pedro Fidalgo},
  title        = {MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G
                  networks},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103768},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103768},
  doi          = {10.1016/J.COSE.2024.103768},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SousaDACWSGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunSKZH24,
  author       = {Huaqi Sun and
                  Hui Shu and
                  Fei Kang and
                  Yuntian Zhao and
                  Yuyao Huang},
  title        = {Malware2ATT{\&}CK: {A} sophisticated model for mapping malware
                  to ATT{\&}CK techniques},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103772},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103772},
  doi          = {10.1016/J.COSE.2024.103772},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunSKZH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TaoLS24a,
  author       = {Shouzheng Tao and
                  Yezheng Liu and
                  Chunhua Sun},
  title        = {Examining the inconsistent effect of privacy control on privacy concerns
                  in e-commerce services: The moderating role of privacy experience
                  and risk propensity},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103794},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103794},
  doi          = {10.1016/J.COSE.2024.103794},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TaoLS24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLYYLL24,
  author       = {Zhiquan Wang and
                  Tengyao Li and
                  Meijuan Yin and
                  Xiaoyun Yuan and
                  Xiangyang Luo and
                  Lingling Li},
  title        = {{WF3A:} {A} N-shot website fingerprinting with effective fusion feature
                  attention},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103796},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103796},
  doi          = {10.1016/J.COSE.2024.103796},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLYYLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZWHXG24,
  author       = {Weibo Wang and
                  Yifeng Zheng and
                  Songlei Wang and
                  Zhongyun Hua and
                  Lei Xu and
                  Yansong Gao},
  title        = {BopSkyline: Boosting privacy-preserving skyline query service in the
                  cloud},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103803},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103803},
  doi          = {10.1016/J.COSE.2024.103803},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZWHXG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuWZ24,
  author       = {Guangli Wu and
                  Xingyue Wang and
                  Jing Zhang},
  title        = {PeerG: {A} {P2P} botnet detection method based on representation learning
                  and graph contrastive learning},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103775},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103775},
  doi          = {10.1016/J.COSE.2024.103775},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XieSLMZ24,
  author       = {Yitian Xie and
                  Mikko T. Siponen and
                  Gabriella Laatikainen and
                  Gregory D. Moody and
                  Xiaosong Zheng},
  title        = {Testing the dominant mediator in {EPPM:} An empirical study on household
                  anti-malware software users},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103776},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103776},
  doi          = {10.1016/J.COSE.2024.103776},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XieSLMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWZW24,
  author       = {Zhongjun Yang and
                  Qi Wang and
                  Xuejun Zong and
                  Guogang Wang},
  title        = {Intrusion detection method based on improved social network search
                  algorithm},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103781},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103781},
  doi          = {10.1016/J.COSE.2024.103781},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinKY24,
  author       = {Zhichao Yin and
                  Xian Kong and
                  Chunyong Yin},
  title        = {Semi-supervised log anomaly detection based on bidirectional temporal
                  convolution network},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103808},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103808},
  doi          = {10.1016/J.COSE.2024.103808},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YueLWZY24,
  author       = {Hao Yue and
                  Tong Li and
                  Di Wu and
                  Runzi Zhang and
                  Zhen Yang},
  title        = {Detecting {APT} attacks using an attack intent-driven and sequence-based
                  learning approach},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103748},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103748},
  doi          = {10.1016/J.COSE.2024.103748},
  timestamp    = {Tue, 18 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YueLWZY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangDZD24,
  author       = {Zhenghao Zhang and
                  Jianwei Ding and
                  Qi Zhang and
                  Qiyao Deng},
  title        = {WaTrojan: Wavelet domain trigger injection for backdoor attacks},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103767},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103767},
  doi          = {10.1016/J.COSE.2024.103767},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangDZD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangQCX24,
  author       = {Jiebao Zhang and
                  Wenhua Qian and
                  Jinde Cao and
                  Dan Xu},
  title        = {{LP-BFGS} attack: An adversarial attack based on the Hessian with
                  limited pixels},
  journal      = {Comput. Secur.},
  volume       = {140},
  pages        = {103746},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103746},
  doi          = {10.1016/J.COSE.2024.103746},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangQCX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics