Search dblp for Publications

export results for "toc:db/journals/compsec/compsec144.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlEiadehA24,
  author       = {Mohammad Ryiad Al{-}Eiadeh and
                  Mustafa Abdallah},
  title        = {GeniGraph: {A} genetic-based novel security defense resource allocation
                  method for interdependent systems modeled by attack graphs},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103927},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103927},
  doi          = {10.1016/J.COSE.2024.103927},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlEiadehA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnleyGAP24,
  author       = {Mulualem Bitew Anley and
                  Angelo Genovese and
                  Davide Agostinello and
                  Vincenzo Piuri},
  title        = {Robust DDoS attack detection with adaptive transfer learning},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103962},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103962},
  doi          = {10.1016/J.COSE.2024.103962},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnleyGAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaltuttisT24,
  author       = {Dennik Baltuttis and
                  Timm Teubner},
  title        = {Effects of visual risk indicators on phishing detection behavior:
                  An eye-tracking experiment},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103940},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103940},
  doi          = {10.1016/J.COSE.2024.103940},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaltuttisT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaoLCMWTLW24,
  author       = {Huaifeng Bao and
                  Wenhao Li and
                  Huashan Chen and
                  Han Miao and
                  Qiang Wang and
                  Zixian Tang and
                  Feng Liu and
                  Wen Wang},
  title        = {Stories behind decisions: Towards interpretable malware family classification
                  with hierarchical attention},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103943},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103943},
  doi          = {10.1016/J.COSE.2024.103943},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaoLCMWTLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Berg24,
  author       = {Bibi van den Berg},
  title        = {Dealing with uncertainty in cyberspace},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103939},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103939},
  doi          = {10.1016/J.COSE.2024.103939},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Berg24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BrownBZS24,
  author       = {Dennis Brown and
                  Gunjan Batra and
                  Humayun Zafar and
                  Khawaja Saeed},
  title        = {Reducing fraud in organizations through information security policy
                  compliance: An information security controls perspective},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103958},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103958},
  doi          = {10.1016/J.COSE.2024.103958},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BrownBZS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChangZSW24,
  author       = {Heyu Chang and
                  Xiaobing Zhang and
                  Nianwen Si and
                  Ping Wu},
  title        = {A lightweight packet forwarding verification in {SDN} using sketch},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103906},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103906},
  doi          = {10.1016/J.COSE.2024.103906},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChangZSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenHALWP24,
  author       = {Shengshan Chen and
                  Ren{-}Hung Hwang and
                  Asad Ali and
                  Ying{-}Dar Lin and
                  Yu{-}Chih Wei and
                  Tun{-}Wen Pai},
  title        = {Improving quality of indicators of compromise using {STIX} graphs},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103972},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103972},
  doi          = {10.1016/J.COSE.2024.103972},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenHALWP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWZLLLZ24,
  author       = {Zigang Chen and
                  Zhen Wang and
                  Yuening Zhou and
                  Fan Liu and
                  Yuhong Liu and
                  Tao Leng and
                  Haihua Zhu},
  title        = {A method for recovering adversarial samples with both adversarial
                  attack forensics and recognition accuracy},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103987},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103987},
  doi          = {10.1016/J.COSE.2024.103987},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWZLLLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DenisLC24,
  author       = {Nathana{\"{e}}l Denis and
                  Maryline Laurent and
                  Sophie Chabridon},
  title        = {A decentralized model for usage and information flow control in distributed
                  systems},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103975},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103975},
  doi          = {10.1016/J.COSE.2024.103975},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DenisLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DingMZ24,
  author       = {Hongli Ding and
                  Zhao Ma and
                  Jing Zhu},
  title        = {Local graph smoothing for link prediction against universal attack},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103935},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103935},
  doi          = {10.1016/J.COSE.2024.103935},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DingMZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuanLCSC24,
  author       = {Guoyun Duan and
                  Haopeng Liu and
                  Minjie Cai and
                  Jianhua Sun and
                  Hao Chen},
  title        = {MaDroid: {A} maliciousness-aware multifeatured dataset for detecting
                  android malware},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103969},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103969},
  doi          = {10.1016/J.COSE.2024.103969},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuanLCSC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FarrukhWKB24,
  author       = {Yasir Ali Farrukh and
                  Syed Wali and
                  Irfan Khan and
                  Nathaniel D. Bastian},
  title        = {{AIS-NIDS:} An intelligent and self-sustaining network intrusion detection
                  system},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103982},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103982},
  doi          = {10.1016/J.COSE.2024.103982},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FarrukhWKB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FasciFLQ24,
  author       = {Lara Saidia Fasc{\`{\i}} and
                  Marco Fisichella and
                  Gianluca Lax and
                  Chenyin Qian},
  title        = {Corrigendum to "Disarming visualization-based approaches in malware
                  detection systems" [Computers {\&} Security Volume 126, March
                  2023, 103062]},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103934},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103934},
  doi          = {10.1016/J.COSE.2024.103934},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FasciFLQ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrancisKPRA24,
  author       = {Saneesh P. Francis and
                  Vysakh Kani Kolil and
                  Vipin Pavithran and
                  Indrakshi Ray and
                  Krishnashree Achuthan},
  title        = {Exploring gender dynamics in cybersecurity education: {A} self-determination
                  theory and social cognitive theory perspective},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103968},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103968},
  doi          = {10.1016/J.COSE.2024.103968},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrancisKPRA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GargT24,
  author       = {Sonakshi Garg and
                  Vicen{\c{c}} Torra},
  title        = {Privacy in manifolds: Combining k-anonymity with differential privacy
                  on Fr{\'{e}}chet means},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103983},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103983},
  doi          = {10.1016/J.COSE.2024.103983},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GargT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GlasMP24,
  author       = {Magdalena Glas and
                  Gerhard Messmann and
                  G{\"{u}}nther Pernul},
  title        = {Complex yet attainable? An interdisciplinary approach to designing
                  better cyber range exercises},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103965},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103965},
  doi          = {10.1016/J.COSE.2024.103965},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GlasMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoncalvesZ24,
  author       = {Lu{\'{\i}}s Gon{\c{c}}alves and
                  Cleber Zanchettin},
  title        = {Detecting abnormal logins by discovering anomalous links via graph
                  transformers},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103944},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103944},
  doi          = {10.1016/J.COSE.2024.103944},
  timestamp    = {Sun, 08 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoncalvesZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoYLHWC24,
  author       = {Chunjie Guo and
                  Lin You and
                  Xingyu Li and
                  Gengran Hu and
                  Shengguo Wang and
                  Chengtang Cao},
  title        = {A novel biometric authentication scheme with privacy protection based
                  on {SVM} and {ZKP}},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103995},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103995},
  doi          = {10.1016/J.COSE.2024.103995},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoYLHWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoreGSB24,
  author       = {Soumyadeep Hore and
                  Jalal Ghadermazi and
                  Ankit Shah and
                  Nathaniel D. Bastian},
  title        = {A sequential deep learning framework for a robust and resilient network
                  intrusion detection system},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103928},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103928},
  doi          = {10.1016/J.COSE.2024.103928},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HoreGSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JeongCHS24,
  author       = {Hoyong Jeong and
                  Kiwon Chung and
                  Sung Ju Hwang and
                  Sooel Son},
  title        = {Targeted Model Inversion: Distilling style encoded in predictions},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103967},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103967},
  doi          = {10.1016/J.COSE.2024.103967},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JeongCHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KambleM24,
  author       = {Naresh Kamble and
                  Nilamadhab Mishra},
  title        = {Hybrid optimization enabled squeeze net for phishing attack detection},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103901},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103901},
  doi          = {10.1016/J.COSE.2024.103901},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KambleM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimHG24,
  author       = {Yoonjib Kim and
                  Saqib Hakak and
                  Ali A. Ghorbani},
  title        = {Detecting Distributed Denial-of-Service (DDoS) attacks that generate
                  false authentications on Electric Vehicle {(EV)} charging infrastructure},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103989},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103989},
  doi          = {10.1016/J.COSE.2024.103989},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimHG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZLCM24,
  author       = {Chao Li and
                  Jian Chen and
                  Zhaoxin Zhang and
                  Zhiping Li and
                  Yanan Cheng and
                  Chendi Ma},
  title        = {{DNS} root server resolution anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103946},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103946},
  doi          = {10.1016/J.COSE.2024.103946},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZLCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWSW24,
  author       = {Sicong Li and
                  Jian Wang and
                  Yafei Song and
                  Shuo Wang},
  title        = {TriCh-LKRepNet: {A} large kernel convolutional malicious code classification
                  network for structure reparameterisation and triple-channel mapping},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103937},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103937},
  doi          = {10.1016/J.COSE.2024.103937},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWYG24,
  author       = {Xuan Li and
                  Naiyu Wang and
                  Shuai Yuan and
                  Zhitao Guan},
  title        = {FedIMP: Parameter Importance-based Model Poisoning attack against
                  Federated learning system},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103936},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103936},
  doi          = {10.1016/J.COSE.2024.103936},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiYHC24,
  author       = {Xiaohui Li and
                  Xiang Yang and
                  Yizhao Huang and
                  Yue Chen},
  title        = {Combating temporal composition inference by high-order camouflaged
                  network topology obfuscation},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103981},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103981},
  doi          = {10.1016/J.COSE.2024.103981},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiYHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LingCL24,
  author       = {Jie Ling and
                  Jinhui Chen and
                  Honglei Li},
  title        = {{FDT:} Improving the transferability of adversarial examples with
                  frequency domain transformation},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103942},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103942},
  doi          = {10.1016/J.COSE.2024.103942},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LingCL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LyuXWCCW24,
  author       = {Qiuyun Lyu and
                  Huihui Xie and
                  Wei Wang and
                  Yanyu Cheng and
                  Yongqun Chen and
                  Zhen Wang},
  title        = {{TFAN:} {A} Task-adaptive Feature Alignment Network for few-shot website
                  fingerprinting attacks on Tor},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103980},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103980},
  doi          = {10.1016/J.COSE.2024.103980},
  timestamp    = {Wed, 07 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LyuXWCCW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaYW24,
  author       = {Yukun Ma and
                  Chunlin Yu and
                  Chuliang Weng},
  title        = {Morpheus: An efficient timing-based attestation framework for safeguarding
                  hypervisor integrity with dynamic trust},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103966},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103966},
  doi          = {10.1016/J.COSE.2024.103966},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McIntoshSLWXLNH24,
  author       = {Timothy R. McIntosh and
                  Teo Susnjak and
                  Tong Liu and
                  Paul A. Watters and
                  Dan Xu and
                  Dongwei Liu and
                  Raza Nowrozy and
                  Malka N. Halgamuge},
  title        = {From {COBIT} to {ISO} 42001: Evaluating cybersecurity frameworks for
                  opportunities, risks, and regulatory compliance in commercializing
                  large language models},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103964},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103964},
  doi          = {10.1016/J.COSE.2024.103964},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshSLWXLNH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MonkamLB24,
  author       = {Galamo Monkam and
                  Michael J. De Lucia and
                  Nathaniel D. Bastian},
  title        = {A topological data analysis approach for detecting data poisoning
                  attacks against machine learning based network intrusion detection
                  systems},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103929},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103929},
  doi          = {10.1016/J.COSE.2024.103929},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MonkamLB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MothannaEHKS24,
  author       = {Yusuf Mothanna and
                  Wael Elmedany and
                  Mustafa Hammad and
                  Riadh Ksantini and
                  Mhd Saeed Sharif},
  title        = {Adopting security practices in software development process: Security
                  testing framework for sustainable smart cities},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103985},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103985},
  doi          = {10.1016/J.COSE.2024.103985},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MothannaEHKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NahumGMMBEES24,
  author       = {Mor Nahum and
                  Edita Grolman and
                  Inbar Maimon and
                  Dudu Mimran and
                  Oleg Brodt and
                  Aviad Elyashar and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {OSSIntegrity: Collaborative open-source code integrity verification},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103977},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103977},
  doi          = {10.1016/J.COSE.2024.103977},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NahumGMMBEES24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NehmeLW24,
  author       = {Alaa Nehme and
                  Meng (Leah) Li and
                  Merrill Warkentin},
  title        = {Adaptive and maladaptive factors behind password manager use: {A}
                  hope-extended protection motivation perspective},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103941},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103941},
  doi          = {10.1016/J.COSE.2024.103941},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NehmeLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RKAK24,
  author       = {Uma Mageswari R and
                  N. Zafar Ali Khan and
                  M. M. Gowthul Alam and
                  S. Jerald Nirmal Kumar},
  title        = {Addressing security challenges in industry 4.0: {AVA-MA} approach
                  for strengthening SDN-IoT network security},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103907},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103907},
  doi          = {10.1016/J.COSE.2024.103907},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RKAK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RoseAAM24,
  author       = {Luca De Rose and
                  Giuseppina Andresini and
                  Annalisa Appice and
                  Donato Malerba},
  title        = {{VINCENT:} Cyber-threat detection through vision transformers and
                  knowledge distillation},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103926},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103926},
  doi          = {10.1016/J.COSE.2024.103926},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RoseAAM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SathiyaY24,
  author       = {R. Sathiya and
                  N. Yuvaraj},
  title        = {Swarm optimized differential evolution and probabilistic extreme learning
                  based intrusion detection in {MANET}},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103970},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103970},
  doi          = {10.1016/J.COSE.2024.103970},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SathiyaY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShafeiGT24,
  author       = {Hassan A. Shafei and
                  Hongchang Gao and
                  Chiu C. Tan},
  title        = {Measuring privacy policy compliance in the Alexa ecosystem: In-depth
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103963},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103963},
  doi          = {10.1016/J.COSE.2024.103963},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShafeiGT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TaoLKSYYZ24,
  author       = {Yunting Tao and
                  Yuqun Li and
                  Fanyu Kong and
                  Yuliang Shi and
                  Ming Yang and
                  Jia Yu and
                  Hanlin Zhang},
  title        = {Privacy-preserving outsourcing scheme of face recognition based on
                  locally linear embedding},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103931},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103931},
  doi          = {10.1016/J.COSE.2024.103931},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TaoLKSYYZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TuLYJG24,
  author       = {Fei{-}Fan Tu and
                  Dongjie Liu and
                  Zhiwei Yan and
                  Xiao{-}Bo Jin and
                  Guang{-}Gang Geng},
  title        = {{STFT-TCAN:} {A} TCN-attention based multivariate time series anomaly
                  detection architecture with time-frequency analysis for cyber-industrial
                  systems},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103961},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103961},
  doi          = {10.1016/J.COSE.2024.103961},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TuLYJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangCZWL24,
  author       = {Wenpeng Wang and
                  Zhixiang Chen and
                  Ziyang Zheng and
                  Hui Wang and
                  Junxing Luo},
  title        = {{MTA} Fuzzer: {A} low-repetition rate Modbus {TCP} fuzzing method
                  based on Transformer and Mutation Target Adaptation},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103973},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103973},
  doi          = {10.1016/J.COSE.2024.103973},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangCZWL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLL24,
  author       = {Xiaodi Wang and
                  Zhonglin Liu and
                  Jiayong Liu},
  title        = {Joint relational triple extraction with enhanced representation and
                  binary tagging framework in cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {104001},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.104001},
  doi          = {10.1016/J.COSE.2024.104001},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLZHY24,
  author       = {Zhenduo Wang and
                  Saifei Li and
                  Lijie Zhang and
                  Chunduo Hu and
                  Lianshan Yan},
  title        = {A Red Team automated testing modeling and online planning method for
                  post-penetration},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103945},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103945},
  doi          = {10.1016/J.COSE.2024.103945},
  timestamp    = {Mon, 05 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLZHY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangYPWH24,
  author       = {Xiaoyan Wang and
                  Jingjing Yang and
                  Zixiao Peng and
                  Shunfang Wang and
                  Ming Huang},
  title        = {Hilbert signal envelope-based multi-features methods for {GNSS} spoofing
                  detection},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103959},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103959},
  doi          = {10.1016/J.COSE.2024.103959},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangYPWH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaoLWC24,
  author       = {Nan Xiao and
                  Bo Lang and
                  Ting Wang and
                  Yikai Chen},
  title        = {{APT-MMF:} An advanced persistent threat actor attribution method
                  based on multimodal and multilevel feature fusion},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103960},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103960},
  doi          = {10.1016/J.COSE.2024.103960},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaoLWC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XieGXLX24,
  author       = {Yibo Xie and
                  Gaopeng Gou and
                  Gang Xiong and
                  Zhen Li and
                  Wei Xia},
  title        = {DomEye: Detecting network covert channel of domain fronting with throughput
                  fluctuation},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103976},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103976},
  doi          = {10.1016/J.COSE.2024.103976},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XieGXLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuCLTJS24,
  author       = {Zhenwu Xu and
                  Xingshu Chen and
                  Xiao Lan and
                  Rui Tang and
                  Shuyu Jiang and
                  Changxiang Shen},
  title        = {Empowering Data Owners: An Efficient and Verifiable Scheme for Secure
                  Data Deletion},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103978},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103978},
  doi          = {10.1016/J.COSE.2024.103978},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuCLTJS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuWJFFX24,
  author       = {Haoran Xu and
                  Yongjun Wang and
                  Zhiyuan Jiang and
                  Shuhui Fan and
                  Shaojing Fu and
                  Peidai Xie},
  title        = {Fuzzing JavaScript engines with a syntax-aware neural program model},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103947},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103947},
  doi          = {10.1016/J.COSE.2024.103947},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuWJFFX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangQL24,
  author       = {Tengfei Yang and
                  Yuansong Qiao and
                  Brian Lee},
  title        = {Towards trustworthy cybersecurity operations using Bayesian Deep Learning
                  to improve uncertainty quantification of anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103909},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103909},
  doi          = {10.1016/J.COSE.2024.103909},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangQL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YeFCZWZ24,
  author       = {Junjian Ye and
                  Xincheng Fei and
                  Xavier de Carn{\'{e}} de Carnavalet and
                  Lianying Zhao and
                  Lifa Wu and
                  Mengyuan Zhang},
  title        = {Detecting command injection vulnerabilities in Linux-based embedded
                  firmware with LLM-based taint analysis of library functions},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103971},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103971},
  doi          = {10.1016/J.COSE.2024.103971},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YeFCZWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuSZ24,
  author       = {Jingze Yu and
                  Wenting Shen and
                  Xi Zhang},
  title        = {Cloud storage auditing and data sharing with data deduplication and
                  private information protection for cloud-based {EMR}},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103932},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103932},
  doi          = {10.1016/J.COSE.2024.103932},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZankeWDE24,
  author       = {Anna Zanke and
                  Thorsten Weber and
                  Peter Dornheim and
                  Mathias Engel},
  title        = {Assessing information security culture: {A} mixed-methods approach
                  to navigating challenges in international corporate {IT} departments},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103938},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103938},
  doi          = {10.1016/J.COSE.2024.103938},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZankeWDE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangSL24,
  author       = {Huijie Zhang and
                  Weizhen Sun and
                  Ling Lv},
  title        = {A frequency-injection backdoor attack against DNN-Based finger vein
                  verification},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103956},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103956},
  doi          = {10.1016/J.COSE.2024.103956},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangSL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoW24,
  author       = {Yongxin Zhao and
                  Chundong Wang},
  title        = {Protecting privacy and enhancing utility: {A} novel approach for personalized
                  trajectory data publishing using noisy prefix tree},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103922},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103922},
  doi          = {10.1016/J.COSE.2024.103922},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengLXCYW24,
  author       = {Tianming Zheng and
                  Haojun Liu and
                  Hang Xu and
                  Xiang Chen and
                  Ping Yi and
                  Yue Wu},
  title        = {Few-VulD: {A} Few-shot learning framework for software vulnerability
                  detection},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103992},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103992},
  doi          = {10.1016/J.COSE.2024.103992},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengLXCYW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengSWT24,
  author       = {Weining Zheng and
                  Xiaohong Su and
                  Hongwei Wei and
                  Wenxin Tao},
  title        = {SVulDetector: Vulnerability detection based on similarity using tree-based
                  attention and weighted graph embedding mechanisms},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103930},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103930},
  doi          = {10.1016/J.COSE.2024.103930},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengSWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouCJZCJZDSH24,
  author       = {Qihang Zhou and
                  Wenzhuo Cao and
                  Xiaoqi Jia and
                  Shengzhi Zhang and
                  Jiayun Chen and
                  Nan Jiang and
                  Weijuan Zhang and
                  Haichao Du and
                  Zhenyu Song and
                  Qingjia Huang},
  title        = {HClave: An isolated execution environment design for hypervisor runtime
                  security},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103923},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103923},
  doi          = {10.1016/J.COSE.2024.103923},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouCJZCJZDSH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZuoLL24,
  author       = {Chu{-}Xiao Zuo and
                  Jia{-}Yi Leng and
                  Wu{-}Jun Li},
  title        = {{SUETA:} Speaker-specific utterance ensemble based transfer attack
                  on speaker identification system},
  journal      = {Comput. Secur.},
  volume       = {144},
  pages        = {103948},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103948},
  doi          = {10.1016/J.COSE.2024.103948},
  timestamp    = {Thu, 22 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZuoLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}