Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec140.bht:"
@article{DBLP:journals/compsec/AliA24, author = {Hala S. Ali and Irfan Ahmed}, title = {{LAAKA:} Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems}, journal = {Comput. Secur.}, volume = {140}, pages = {103770}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103770}, doi = {10.1016/J.COSE.2024.103770}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlkofahiAS24, author = {Hamza Alkofahi and Heba Alawneh and Anthony Skjellum}, title = {MitM attacks on intellectual property and integrity of additive manufacturing systems: {A} security analysis}, journal = {Comput. Secur.}, volume = {140}, pages = {103810}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103810}, doi = {10.1016/J.COSE.2024.103810}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlkofahiAS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArceWB24, author = {Daniel G. Arce and Daniel W. Woods and Rainer B{\"{o}}hme}, title = {Economics of incident response panels in cyber insurance}, journal = {Comput. Secur.}, volume = {140}, pages = {103742}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103742}, doi = {10.1016/J.COSE.2024.103742}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArceWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaltuttisTA24, author = {Dennik Baltuttis and Timm Teubner and Marc T. P. Adam}, title = {A typology of cybersecurity behavior among knowledge workers}, journal = {Comput. Secur.}, volume = {140}, pages = {103741}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103741}, doi = {10.1016/J.COSE.2024.103741}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaltuttisTA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhardwajLDB24, author = {Sonam Bhardwaj and Adrian Shuai Li and Mayank Dave and Elisa Bertino}, title = {Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation}, journal = {Comput. Secur.}, volume = {140}, pages = {103769}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103769}, doi = {10.1016/J.COSE.2024.103769}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhardwajLDB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhattarP24, author = {Poornachandratejasvi Laxman Bhattar and Naran M. Pindoriya}, title = {False Data Injection Attack with Max-Min Optimization in Smart Grid}, journal = {Comput. Secur.}, volume = {140}, pages = {103761}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103761}, doi = {10.1016/J.COSE.2024.103761}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhattarP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuccafurriALP24, author = {Francesco Buccafurri and Vincenzo De Angelis and Sara Lazzaro and Andrea Pugliese}, title = {Enforcing security policies on interacting authentication systems}, journal = {Comput. Secur.}, volume = {140}, pages = {103771}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103771}, doi = {10.1016/J.COSE.2024.103771}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuccafurriALP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuiAMGSCPBIICGSBY24, author = {Hang Thanh Bui and Hamed Aboutorab and Arash Mahboubi and Yansong Gao and Nazatul Haque Sultan and Aufeef Chauhan and Mohammad Zavid Parvez and Michael Bewong and Rafiqul Islam and Zahidul Islam and Seyit Ahmet {\c{C}}amtepe and Praveen Gauravaram and Dineshkumar Singh and Muhammad Ali Babar and Shihao Yan}, title = {Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems}, journal = {Comput. Secur.}, volume = {140}, pages = {103754}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103754}, doi = {10.1016/J.COSE.2024.103754}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuiAMGSCPBIICGSBY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaiCLLW24, author = {Liujia Cai and Guangying Cai and Siqi Lu and Guangsong Li and Yongjuan Wang}, title = {Observational equivalence and security games: Enhancing the formal analysis of security protocols}, journal = {Comput. Secur.}, volume = {140}, pages = {103785}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103785}, doi = {10.1016/J.COSE.2024.103785}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaiCLLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CasarilG24, author = {Francesco Casaril and Letterio Galletta}, title = {Securing SatCom user segment: {A} study on cybersecurity challenges in view of {IRIS}}, journal = {Comput. Secur.}, volume = {140}, pages = {103799}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103799}, doi = {10.1016/J.COSE.2024.103799}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CasarilG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenWXYXJXY24, author = {Zuohui Chen and Renxuan Wang and Jingyang Xiang and Yue Yu and Xin Xia and Shouling Ji and Qi Xuan and Xiaoniu Yang}, title = {{GGT:} Graph-guided testing for adversarial sample detection of deep neural network}, journal = {Comput. Secur.}, volume = {140}, pages = {103710}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103710}, doi = {10.1016/J.COSE.2024.103710}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenWXYXJXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChrysanthouPP24, author = {Anargyros Chrysanthou and Yorgos Pantis and Constantinos Patsakis}, title = {The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign}, journal = {Comput. Secur.}, volume = {140}, pages = {103780}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103780}, doi = {10.1016/J.COSE.2024.103780}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChrysanthouPP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuanYW24, author = {Shu{-}Min Duan and Jian{-}Ting Yuan and Bo Wang}, title = {Contextual feature representation for image-based insider threat classification}, journal = {Comput. Secur.}, volume = {140}, pages = {103779}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103779}, doi = {10.1016/J.COSE.2024.103779}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuanYW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EhrenbergSM24, author = {Melanie Ehrenberg and Shahram Sarkani and Thomas A. Mazzuchi}, title = {Python source code vulnerability detection with named entity recognition}, journal = {Comput. Secur.}, volume = {140}, pages = {103802}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103802}, doi = {10.1016/J.COSE.2024.103802}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EhrenbergSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FenechRF24, author = {Joseph Fenech and Debbie Richards and Paul Formosa}, title = {Ethical principles shaping values-based cybersecurity decision-making}, journal = {Comput. Secur.}, volume = {140}, pages = {103795}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103795}, doi = {10.1016/J.COSE.2024.103795}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FenechRF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FengGYWLXM24, author = {Pengbin Feng and Le Gai and Li Yang and Qin Wang and Teng Li and Ning Xi and Jian Feng Ma}, title = {DawnGNN: Documentation augmented windows malware detection using graph neural network}, journal = {Comput. Secur.}, volume = {140}, pages = {103788}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103788}, doi = {10.1016/J.COSE.2024.103788}, timestamp = {Tue, 23 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FengGYWLXM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GlasauerMSA24, author = {Christina Glasauer and Linda Maurer and Carina Spreitzer and Rainer W. Alexandrowicz}, title = {Development {\&} psychometrics of the {SOLID-S} - An inventory assessing software security culture in software development companies}, journal = {Comput. Secur.}, volume = {140}, pages = {103753}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103753}, doi = {10.1016/J.COSE.2024.103753}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GlasauerMSA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuZHLZ24, author = {Jintao Gu and Hongliang Zhu and Zewei Han and Xiangyu Li and Jianjin Zhao}, title = {GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding}, journal = {Comput. Secur.}, volume = {140}, pages = {103807}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103807}, doi = {10.1016/J.COSE.2024.103807}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuZHLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuptaS24, author = {Swechchha Gupta and Buddha Singh}, title = {An intelligent multi-layer framework with {SHAP} integration for botnet detection and classification}, journal = {Comput. Secur.}, volume = {140}, pages = {103783}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103783}, doi = {10.1016/J.COSE.2024.103783}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuptaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangSH24, author = {Haiou Huang and Bangyi Sun and Liang Hu}, title = {A task offloading approach based on risk assessment to mitigate edge DDoS attacks}, journal = {Comput. Secur.}, volume = {140}, pages = {103789}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103789}, doi = {10.1016/J.COSE.2024.103789}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangSH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JavadpourJTSB24, author = {Amir Javadpour and Forough Ja'fari and Tarik Taleb and Mohammad Shojafar and Chafika Benza{\"{\i}}d}, title = {A comprehensive survey on cyber deception techniques to improve honeypot performance}, journal = {Comput. Secur.}, volume = {140}, pages = {103792}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103792}, doi = {10.1016/J.COSE.2024.103792}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JavadpourJTSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JavanmardiGSAC24, author = {Saeed Javanmardi and Meysam Ghahramani and Mohammad Shojafar and Mamoun Alazab and Antonio Caruso}, title = {{M-RL:} {A} mobility and impersonation-aware {IDS} for DDoS {UDP} flooding attacks in IoT-Fog networks}, journal = {Comput. Secur.}, volume = {140}, pages = {103778}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103778}, doi = {10.1016/J.COSE.2024.103778}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JavanmardiGSAC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JayaraoRP24, author = {Guruprasad B. Jayarao and Sanjog Ray and Prabin Kumar Panigrahi}, title = {Information security threats and organizational readiness in nWFH scenarios}, journal = {Comput. Secur.}, volume = {140}, pages = {103745}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103745}, doi = {10.1016/J.COSE.2024.103745}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JayaraoRP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JethavaR24, author = {Gordhan Jethava and Udai Pratap Rao}, title = {Exploring security and trust mechanisms in online social networks: An extensive review}, journal = {Comput. Secur.}, volume = {140}, pages = {103790}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103790}, doi = {10.1016/J.COSE.2024.103790}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JethavaR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JoseGSC24, author = {G. Sahaya Stalin Jose and Sugitha G and Ayshwarya Lakshmi S and Preethi Bangalore Chaluvaraj}, title = {Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing}, journal = {Comput. Secur.}, volume = {140}, pages = {103773}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103773}, doi = {10.1016/J.COSE.2024.103773}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JoseGSC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KatsikeasLJE24, author = {Sotirios Katsikeas and Engla Rencelj Ling and Pontus Johnsson and Mathias Ekstedt}, title = {Empirical evaluation of a threat modeling language as a cybersecurity assessment tool}, journal = {Comput. Secur.}, volume = {140}, pages = {103743}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103743}, doi = {10.1016/J.COSE.2024.103743}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KatsikeasLJE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimJJLL24, author = {Seon Kwon Kim and Hongjoo Jin and Kyungho Joo and Jiwon Lee and Dong Hoon Lee}, title = {{DROPSYS:} Detection of {ROP} attacks using system information}, journal = {Comput. Secur.}, volume = {140}, pages = {103813}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103813}, doi = {10.1016/J.COSE.2024.103813}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimJJLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KongLPWL24, author = {Lingdi Kong and Senlin Luo and Limin Pan and Zhouting Wu and Xinshuai Li}, title = {A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement}, journal = {Comput. Secur.}, volume = {140}, pages = {103787}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103787}, doi = {10.1016/J.COSE.2024.103787}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KongLPWL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LampeM24, author = {Brooke Lampe and Weizhi Meng}, title = {can-train-and-test: {A} curated {CAN} dataset for automotive intrusion detection}, journal = {Comput. Secur.}, volume = {140}, pages = {103777}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103777}, doi = {10.1016/J.COSE.2024.103777}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LampeM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiHC24, author = {Lingzi Li and Cheng Huang and Junren Chen}, title = {Automated discovery and mapping ATT{\&}CK tactics and techniques for unstructured cyber threat intelligence}, journal = {Comput. Secur.}, volume = {140}, pages = {103815}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103815}, doi = {10.1016/J.COSE.2024.103815}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiTZZL24, author = {Wanyu Li and Hailiang Tang and Hailin Zhu and Wenxiao Zhang and Chen Liu}, title = {TS-Mal: Malware detection model using temporal and structural features learning}, journal = {Comput. Secur.}, volume = {140}, pages = {103752}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103752}, doi = {10.1016/J.COSE.2024.103752}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiTZZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuXYZL24, author = {Yaru Liu and Lijuan Xu and Shumian Yang and Dawei Zhao and Xin Li}, title = {Adversarial sample attacks and defenses based on {LSTM-ED} in industrial control systems}, journal = {Comput. Secur.}, volume = {140}, pages = {103750}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103750}, doi = {10.1016/J.COSE.2024.103750}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuXYZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NguyenCN24, author = {Qui Ngoc Nguyen and Nguyen Tan Cam and Kiet Van Nguyen}, title = {{XLMR4MD:} New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models}, journal = {Comput. Secur.}, volume = {140}, pages = {103814}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103814}, doi = {10.1016/J.COSE.2024.103814}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NguyenCN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PanFGXW24, author = {Hongyu Pan and Yong Fang and Wenbo Guo and Yijia Xu and Changhui Wang}, title = {Few-shot graph classification on cross-site scripting attacks detection}, journal = {Comput. Secur.}, volume = {140}, pages = {103749}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103749}, doi = {10.1016/J.COSE.2024.103749}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PanFGXW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatelPGC24, author = {Chintan Patel and Aryan Mohammadi Pasikhani and Prosanta Gope and John A. Clark}, title = {User-empowered secure privacy-preserving authentication scheme for Digital Twin}, journal = {Comput. Secur.}, volume = {140}, pages = {103793}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103793}, doi = {10.1016/J.COSE.2024.103793}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatelPGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PengGPCCS24, author = {Jiaxin Peng and Chun Guo and Yuan Ping and Yunhe Cui and Yi Chen and Guowei Shen}, title = {{SNDMI:} Spyware network traffic detection method based on inducement operations}, journal = {Comput. Secur.}, volume = {140}, pages = {103806}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103806}, doi = {10.1016/J.COSE.2024.103806}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PengGPCCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PriteeAAJKM24, author = {Zinniya Taffannum Pritee and Mehedi Hasan Anik and Saida Binta Alam and Jamin Rahman Jim and Md. Mohsin Kabir and Muhammad Firoz Mridha}, title = {Machine learning and deep learning for user authentication and authorization in cybersecurity: {A} state-of-the-art review}, journal = {Comput. Secur.}, volume = {140}, pages = {103747}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103747}, doi = {10.1016/J.COSE.2024.103747}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PriteeAAJKM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RadivojevicCKB24, author = {Kristina Radivojevic and Nicholas Clark and Anna Klempay and Paul R. Brenner}, title = {Defending novice user privacy: An evaluation of default web browser configurations}, journal = {Comput. Secur.}, volume = {140}, pages = {103784}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103784}, doi = {10.1016/J.COSE.2024.103784}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RadivojevicCKB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RamanCA24, author = {Raghu Raman and Prasad Calyam and Krishnashree Achuthan}, title = {ChatGPT or Bard: Who is a better Certified Ethical Hacker?}, journal = {Comput. Secur.}, volume = {140}, pages = {103804}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103804}, doi = {10.1016/J.COSE.2024.103804}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RamanCA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RaniVS24, author = {B. Selva Rani and S. Vairamuthu and Suresh Subramanian}, title = {Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection}, journal = {Comput. Secur.}, volume = {140}, pages = {103751}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103751}, doi = {10.1016/J.COSE.2024.103751}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RaniVS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RookardK24, author = {Curtis Rookard and Anahita Khojandi}, title = {RRIoT: Recurrent reinforcement learning for cyber threat detection on IoT devices}, journal = {Comput. Secur.}, volume = {140}, pages = {103786}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103786}, doi = {10.1016/J.COSE.2024.103786}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RookardK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RusES24, author = {Adrian{-}Catalin Rus and Mohammad El{-}Hajj and Dipti Kapoor Sarmah}, title = {{NAISS:} {A} reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce}, journal = {Comput. Secur.}, volume = {140}, pages = {103797}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103797}, doi = {10.1016/J.COSE.2024.103797}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RusES24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SabaliauskaiteBJASW24, author = {Giedre Sabaliauskaite and Jeremy W. Bryans and Hesamaldin Jadidbonab and Farhan Ahmad and Siraj A. Shaikh and Paul Wooderson}, title = {{TOMSAC} - Methodology for trade-off management between automotive safety and cyber security}, journal = {Comput. Secur.}, volume = {140}, pages = {103798}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103798}, doi = {10.1016/J.COSE.2024.103798}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SabaliauskaiteBJASW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SadhyaS24, author = {Debanjan Sadhya and Tanya Sahu}, title = {A critical survey of the security and privacy aspects of the Aadhaar framework}, journal = {Comput. Secur.}, volume = {140}, pages = {103782}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103782}, doi = {10.1016/J.COSE.2024.103782}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SadhyaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaM24, author = {Anee Sharma and Ningrinla Marchang}, title = {A review on client-server attacks and defenses in federated learning}, journal = {Comput. Secur.}, volume = {140}, pages = {103801}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103801}, doi = {10.1016/J.COSE.2024.103801}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SheLCS24, author = {Cairui She and Jinfeng Li and Liwei Chen and Gang Shi}, title = {{SCFI:} Efficient forward fine-grained control flow integrity based on coarse-grained {ISA} extensions}, journal = {Comput. Secur.}, volume = {140}, pages = {103800}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103800}, doi = {10.1016/J.COSE.2024.103800}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SheLCS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShibbirRFC24, author = {Md. Neyamul Islam Shibbir and Hasibur Rahman and Md. Sadek Ferdous and Farida Chowdhury}, title = {Evaluating the security of CAPTCHAs utilized on Bangladeshi websites}, journal = {Comput. Secur.}, volume = {140}, pages = {103774}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103774}, doi = {10.1016/J.COSE.2024.103774}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShibbirRFC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SousaDACWSGF24, author = {Bruno Sousa and Duarte Dias and Nuno Antunes and Javier C{\'{a}}mara and Ryan Wagner and Bradley R. Schmerl and David Garlan and Pedro Fidalgo}, title = {MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks}, journal = {Comput. Secur.}, volume = {140}, pages = {103768}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103768}, doi = {10.1016/J.COSE.2024.103768}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SousaDACWSGF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunSKZH24, author = {Huaqi Sun and Hui Shu and Fei Kang and Yuntian Zhao and Yuyao Huang}, title = {Malware2ATT{\&}CK: {A} sophisticated model for mapping malware to ATT{\&}CK techniques}, journal = {Comput. Secur.}, volume = {140}, pages = {103772}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103772}, doi = {10.1016/J.COSE.2024.103772}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunSKZH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TaoLS24a, author = {Shouzheng Tao and Yezheng Liu and Chunhua Sun}, title = {Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity}, journal = {Comput. Secur.}, volume = {140}, pages = {103794}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103794}, doi = {10.1016/J.COSE.2024.103794}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TaoLS24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLYYLL24, author = {Zhiquan Wang and Tengyao Li and Meijuan Yin and Xiaoyun Yuan and Xiangyang Luo and Lingling Li}, title = {{WF3A:} {A} N-shot website fingerprinting with effective fusion feature attention}, journal = {Comput. Secur.}, volume = {140}, pages = {103796}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103796}, doi = {10.1016/J.COSE.2024.103796}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLYYLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZWHXG24, author = {Weibo Wang and Yifeng Zheng and Songlei Wang and Zhongyun Hua and Lei Xu and Yansong Gao}, title = {BopSkyline: Boosting privacy-preserving skyline query service in the cloud}, journal = {Comput. Secur.}, volume = {140}, pages = {103803}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103803}, doi = {10.1016/J.COSE.2024.103803}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZWHXG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuWZ24, author = {Guangli Wu and Xingyue Wang and Jing Zhang}, title = {PeerG: {A} {P2P} botnet detection method based on representation learning and graph contrastive learning}, journal = {Comput. Secur.}, volume = {140}, pages = {103775}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103775}, doi = {10.1016/J.COSE.2024.103775}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XieSLMZ24, author = {Yitian Xie and Mikko T. Siponen and Gabriella Laatikainen and Gregory D. Moody and Xiaosong Zheng}, title = {Testing the dominant mediator in {EPPM:} An empirical study on household anti-malware software users}, journal = {Comput. Secur.}, volume = {140}, pages = {103776}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103776}, doi = {10.1016/J.COSE.2024.103776}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XieSLMZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWZW24, author = {Zhongjun Yang and Qi Wang and Xuejun Zong and Guogang Wang}, title = {Intrusion detection method based on improved social network search algorithm}, journal = {Comput. Secur.}, volume = {140}, pages = {103781}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103781}, doi = {10.1016/J.COSE.2024.103781}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinKY24, author = {Zhichao Yin and Xian Kong and Chunyong Yin}, title = {Semi-supervised log anomaly detection based on bidirectional temporal convolution network}, journal = {Comput. Secur.}, volume = {140}, pages = {103808}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103808}, doi = {10.1016/J.COSE.2024.103808}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YueLWZY24, author = {Hao Yue and Tong Li and Di Wu and Runzi Zhang and Zhen Yang}, title = {Detecting {APT} attacks using an attack intent-driven and sequence-based learning approach}, journal = {Comput. Secur.}, volume = {140}, pages = {103748}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103748}, doi = {10.1016/J.COSE.2024.103748}, timestamp = {Tue, 18 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YueLWZY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangDZD24, author = {Zhenghao Zhang and Jianwei Ding and Qi Zhang and Qiyao Deng}, title = {WaTrojan: Wavelet domain trigger injection for backdoor attacks}, journal = {Comput. Secur.}, volume = {140}, pages = {103767}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103767}, doi = {10.1016/J.COSE.2024.103767}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangDZD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangQCX24, author = {Jiebao Zhang and Wenhua Qian and Jinde Cao and Dan Xu}, title = {{LP-BFGS} attack: An adversarial attack based on the Hessian with limited pixels}, journal = {Comput. Secur.}, volume = {140}, pages = {103746}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103746}, doi = {10.1016/J.COSE.2024.103746}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangQCX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.