default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec97.bht:"
@article{DBLP:journals/compsec/AlashwaliSM20, author = {Eman Salem Alashwali and Pawel Szalachowski and Andrew Martin}, title = {Exploring {HTTPS} security inconsistencies: {A} cross-regional perspective}, journal = {Comput. Secur.}, volume = {97}, pages = {101975}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101975}, doi = {10.1016/J.COSE.2020.101975}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlashwaliSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArendSIKB20a, author = {Isabel Arend and Asaf Shabtai and Tali Idan and Ruty Keinan and Yoella Bereby{-}Meyer}, title = {Passive- and not active-risk tendencies predict cyber security behavior}, journal = {Comput. Secur.}, volume = {97}, pages = {101964}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101964}, doi = {10.1016/J.COSE.2020.101964}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArendSIKB20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArshadOAA20, author = {Humaira Arshad and Esther Omolara and Isaac Oludare Abiodun and Abdulhai Aminu}, title = {A semi-automated forensic investigation model for online social networks}, journal = {Comput. Secur.}, volume = {97}, pages = {101946}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101946}, doi = {10.1016/J.COSE.2020.101946}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArshadOAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AshrafuzzamanDC20, author = {Mohammad Ashrafuzzaman and Saikat Das and Yacine Chakhchoukh and Sajjan G. Shiva and Frederick T. Sheldon}, title = {Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning}, journal = {Comput. Secur.}, volume = {97}, pages = {101994}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101994}, doi = {10.1016/J.COSE.2020.101994}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AshrafuzzamanDC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoranMH20, author = {Tudor Boran and Muhamet Martinaj and Md. Hossain}, title = {Authorship identification on limited samplings}, journal = {Comput. Secur.}, volume = {97}, pages = {101943}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101943}, doi = {10.1016/J.COSE.2020.101943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoranMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChamikaraBKLC20, author = {Mahawaga Arachchige Pathum Chamikara and Peter Bert{\'{o}}k and Ibrahim Khalil and Dongxi Liu and Seyit Camtepe}, title = {Privacy Preserving Face Recognition Utilizing Differential Privacy}, journal = {Comput. Secur.}, volume = {97}, pages = {101951}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101951}, doi = {10.1016/J.COSE.2020.101951}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChamikaraBKLC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChangC20, author = {Lennon Y. C. Chang and Nicholas Coppel}, title = {Building cyber security awareness in a developing country: Lessons from Myanmar}, journal = {Comput. Secur.}, volume = {97}, pages = {101959}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101959}, doi = {10.1016/J.COSE.2020.101959}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChangC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChowdhuryAT20, author = {Noman H. Chowdhury and Marc T. P. Adam and Timm Teubner}, title = {Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures}, journal = {Comput. Secur.}, volume = {97}, pages = {101931}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101931}, doi = {10.1016/J.COSE.2020.101931}, timestamp = {Mon, 14 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChowdhuryAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChowdhuryAT20a, author = {Noman H. Chowdhury and Marc T. P. Adam and Timm Teubner}, title = {Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures}, journal = {Comput. Secur.}, volume = {97}, pages = {101963}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101963}, doi = {10.1016/J.COSE.2020.101963}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChowdhuryAT20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CompastieBFH20, author = {Maxime Compasti{\'{e}} and R{\'{e}}mi Badonnel and Olivier Festor and Ruan He}, title = {From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models}, journal = {Comput. Secur.}, volume = {97}, pages = {101905}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101905}, doi = {10.1016/J.COSE.2020.101905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CompastieBFH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DasKSS20, author = {Ayan Kumar Das and Sidra Kalam and Nausheen Sahar and Ditipriya Sinha}, title = {{UCFL:} User Categorization using Fuzzy Logic towards {PUF} based Two-Phase Authentication of Fog assisted IoT devices}, journal = {Comput. Secur.}, volume = {97}, pages = {101938}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101938}, doi = {10.1016/J.COSE.2020.101938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DasKSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DhiebNBOAA20, author = {Thameur Dhieb and Sourour Njah and Houcine Boubaker and Wael Ouarda and Mounir Ben Ayed and Adel M. Alimi}, title = {Towards a novel biometric system for forensic document examination}, journal = {Comput. Secur.}, volume = {97}, pages = {101973}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101973}, doi = {10.1016/J.COSE.2020.101973}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DhiebNBOAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DionysiouA20, author = {Antreas Dionysiou and Elias Athanasopoulos}, title = {SoK: Machine vs. machine - {A} systematic classification of automated machine learning-based {CAPTCHA} solvers}, journal = {Comput. Secur.}, volume = {97}, pages = {101947}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101947}, doi = {10.1016/J.COSE.2020.101947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DionysiouA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoctorVJWSOMOM20, author = {Jason N. Doctor and Jaideep Vaidya and Xiaoqian Jiang and Shuang Wang and Lisa M. Schilling and Toan Ong and Michael E. Matheny and Lucila Ohno{-}Machado and Daniella Meeker}, title = {Efficient determination of equivalence for encrypted data}, journal = {Comput. Secur.}, volume = {97}, pages = {101939}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101939}, doi = {10.1016/J.COSE.2020.101939}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DoctorVJWSOMOM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EstaySBJ20, author = {Daniel A. Sepulveda Estay and Rishikesh Sahay and Michael Bruhn Barfod and Christian Damsgaard Jensen}, title = {A systematic review of cyber-resilience assessment frameworks}, journal = {Comput. Secur.}, volume = {97}, pages = {101996}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101996}, doi = {10.1016/J.COSE.2020.101996}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EstaySBJ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EvangelouA20, author = {Marina Evangelou and Niall M. Adams}, title = {An anomaly detection framework for cyber-security data}, journal = {Comput. Secur.}, volume = {97}, pages = {101941}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101941}, doi = {10.1016/J.COSE.2020.101941}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EvangelouA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangXLCLLJY20, author = {Junbin Fang and Guikai Xi and Rong Li and Qian Chen and Puxi Lin and Sijin Li and Zoe Lin Jiang and Siu{-}Ming Yiu}, title = {Coarse-to-fine two-stage semantic video carving approach in digital forensics}, journal = {Comput. Secur.}, volume = {97}, pages = {101942}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101942}, doi = {10.1016/J.COSE.2020.101942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangXLCLLJY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GonenSYUK20, author = {Serkan G{\"{o}}nen and Hasan H{\"{u}}seyin Sayan and Ercan Nurcan Yilmaz and Furkan {\"{U}}st{\"{u}}nsoy and G{\"{o}}k{\c{c}}e Karacayilmaz}, title = {False data injection attacks and the insider threat in smart systems}, journal = {Comput. Secur.}, volume = {97}, pages = {101955}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101955}, doi = {10.1016/J.COSE.2020.101955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GonenSYUK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanHSL20, author = {Jiaxuan Han and Cheng Huang and Fan Shi and Jiayong Liu}, title = {Covert timing channel detection method based on time interval and payload length analysis}, journal = {Comput. Secur.}, volume = {97}, pages = {101952}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101952}, doi = {10.1016/J.COSE.2020.101952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HanHSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinLQCM20, author = {Dongzi Jin and Yiqin Lu and Jiancheng Qin and Zhe Cheng and Zhongshu Mao}, title = {SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism}, journal = {Comput. Secur.}, volume = {97}, pages = {101984}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101984}, doi = {10.1016/J.COSE.2020.101984}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinLQCM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarbabDDM20a, author = {ElMouatez Billah Karbab and Mourad Debbabi and Abdelouahid Derhab and Djedjiga Mouheb}, title = {Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning}, journal = {Comput. Secur.}, volume = {97}, pages = {101965}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101965}, doi = {10.1016/J.COSE.2020.101965}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarbabDDM20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KleijWH20, author = {Rick van der Kleij and Remco Wijn and Tineke Hof}, title = {An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations}, journal = {Comput. Secur.}, volume = {97}, pages = {101970}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101970}, doi = {10.1016/J.COSE.2020.101970}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KleijWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KrishnanJRKTS20, author = {R. Santhana Krishnan and Eanoch Golden Julie and Yesudhas Harold Robinson and Raghvendra Kumar and Pham Huy Thong and Le Hoang Son}, title = {Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks}, journal = {Comput. Secur.}, volume = {97}, pages = {101962}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101962}, doi = {10.1016/J.COSE.2020.101962}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KrishnanJRKTS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KuangFZSZ20, author = {Boyu Kuang and Anmin Fu and Lu Zhou and Willy Susilo and Yuqing Zhang}, title = {{DO-RA:} Data-oriented runtime attestation for IoT devices}, journal = {Comput. Secur.}, volume = {97}, pages = {101945}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101945}, doi = {10.1016/J.COSE.2020.101945}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KuangFZSZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarG20, author = {Rakesh Kumar and Rinkaj Goyal}, title = {Modeling continuous security: {A} conceptual model for automated DevSecOps using open-source software over cloud {(ADOC)}}, journal = {Comput. Secur.}, volume = {97}, pages = {101967}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101967}, doi = {10.1016/J.COSE.2020.101967}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LarribaSL20, author = {Antonio M. Larriba and Jos{\'{e}} M. Sempere and Dami{\'{a}}n L{\'{o}}pez}, title = {A two authorities electronic vote scheme}, journal = {Comput. Secur.}, volume = {97}, pages = {101940}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101940}, doi = {10.1016/J.COSE.2020.101940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LarribaSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeK20, author = {Claire Seungeun Lee and Ji Hye Kim}, title = {Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts}, journal = {Comput. Secur.}, volume = {97}, pages = {101995}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101995}, doi = {10.1016/J.COSE.2020.101995}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLGGWF20, author = {Fenghua Li and Yongjun Li and Siyuan Leng and Yunchuan Guo and Kui Geng and Zhen Wang and Liang Fang}, title = {Dynamic countermeasures selection for multi-path attacks}, journal = {Comput. Secur.}, volume = {97}, pages = {101927}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101927}, doi = {10.1016/J.COSE.2020.101927}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLLGGWF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLXA20, author = {Tun Li and Yutian Liu and Yanbing Liu and Yunpeng Xiao and Nguyen Nang An}, title = {Attack plan recognition using hidden Markov and probabilistic inference}, journal = {Comput. Secur.}, volume = {97}, pages = {101974}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101974}, doi = {10.1016/J.COSE.2020.101974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLLXA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuLG20, author = {Hui Liu and Juanru Li and Dawu Gu}, title = {Understanding the security of app-in-the-middle IoT}, journal = {Comput. Secur.}, volume = {97}, pages = {102000}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.102000}, doi = {10.1016/J.COSE.2020.102000}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuLG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuHWWDMLM20, author = {Di Lu and Ruidong Han and Yue Wang and Yongzhi Wang and Xuewen Dong and Xindi Ma and Teng Li and Jianfeng Ma}, title = {A secured {TPM} integration scheme towards smart embedded system based collaboration network}, journal = {Comput. Secur.}, volume = {97}, pages = {101922}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101922}, doi = {10.1016/J.COSE.2020.101922}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuHWWDMLM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MansooriW20, author = {Masood Mansoori and Ian Welch}, title = {How do they find us? {A} study of geolocation tracking techniques of malicious web sites}, journal = {Comput. Secur.}, volume = {97}, pages = {101948}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101948}, doi = {10.1016/J.COSE.2020.101948}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MansooriW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MavroeidisB20, author = {Vasileios Mavroeidis and Joe Brule}, title = {A nonproprietary language for the command and control of cyber defenses - OpenC2}, journal = {Comput. Secur.}, volume = {97}, pages = {101999}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101999}, doi = {10.1016/J.COSE.2020.101999}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MavroeidisB20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeidanSPSES20, author = {Yair Meidan and Vinay Sachidananda and Hongyi Peng and Racheli Sagron and Yuval Elovici and Asaf Shabtai}, title = {A novel approach for detecting vulnerable IoT devices connected behind a home {NAT}}, journal = {Comput. Secur.}, volume = {97}, pages = {101968}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101968}, doi = {10.1016/J.COSE.2020.101968}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MeidanSPSES20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MejriYMC20, author = {Mohamed Mejri and Hamdi Yahyaoui and Azzam Mourad and Mohamad Chehab}, title = {A rewriting system for the assessment of {XACML} policies relationship}, journal = {Comput. Secur.}, volume = {97}, pages = {101957}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101957}, doi = {10.1016/J.COSE.2020.101957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MejriYMC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengGLWDQ20, author = {Shunmei Meng and Zijian Gao and Qianmu Li and Hao Wang and Hong{-}Ning Dai and Lianyong Qi}, title = {Security-Driven hybrid collaborative recommendation method for cloud-based iot services}, journal = {Comput. Secur.}, volume = {97}, pages = {101950}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101950}, doi = {10.1016/J.COSE.2020.101950}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MengGLWDQ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeyerDR20, author = {Joachim Meyer and Omer Dembinsky and Tal Raviv}, title = {Alerting about possible risks vs. blocking risky choices: {A} quantitative model and its empirical evaluation}, journal = {Comput. Secur.}, volume = {97}, pages = {101944}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101944}, doi = {10.1016/J.COSE.2020.101944}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MeyerDR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MiGZGS20, author = {Tianyue Mi and Mengke Gou and Guangyu Zhou and Yiqun Gan and Ralf Schwarzer}, title = {Effects of planning and action control on smartphone security behavior}, journal = {Comput. Secur.}, volume = {97}, pages = {101954}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101954}, doi = {10.1016/J.COSE.2020.101954}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MiGZGS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParuchuriCR20, author = {Shravya Paruchuri and Andrew Case and Golden G. Richard III}, title = {Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools}, journal = {Comput. Secur.}, volume = {97}, pages = {101986}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101986}, doi = {10.1016/J.COSE.2020.101986}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParuchuriCR20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatilHHJYL20, author = {Akash Suresh Patil and Rafik Hamza and Alzubair Hassan and Nan Jiang and Hongyang Yan and Jin Li}, title = {Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts}, journal = {Comput. Secur.}, volume = {97}, pages = {101958}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101958}, doi = {10.1016/J.COSE.2020.101958}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatilHHJYL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RahmanT20, author = {Rizwan Ur Rahman and Deepak Singh Tomar}, title = {New biostatistics features for detecting web bot activity on web applications}, journal = {Comput. Secur.}, volume = {97}, pages = {102001}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.102001}, doi = {10.1016/J.COSE.2020.102001}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RahmanT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenZ20, author = {Jianguo Ren and Chunming Zhang}, title = {A differential game method against attacks in heterogeneous honeynet}, journal = {Comput. Secur.}, volume = {97}, pages = {101870}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101870}, doi = {10.1016/J.COSE.2020.101870}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RenZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RochaSE20, author = {Thiago S. Rocha and Eduardo Souto and Khalil El{-}Khatib}, title = {Functionality-based mobile application recommendation system with security and privacy awareness}, journal = {Comput. Secur.}, volume = {97}, pages = {101972}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101972}, doi = {10.1016/J.COSE.2020.101972}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RochaSE20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SK20a, author = {Ajish S and K. S. Anil Kumar}, title = {Iris template protection using double bloom filter based feature transformation}, journal = {Comput. Secur.}, volume = {97}, pages = {101985}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101985}, doi = {10.1016/J.COSE.2020.101985}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SK20a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaoSL20, author = {Xiuyan Shao and Mikko T. Siponen and Fufan Liu}, title = {Shall we follow? Impact of reputation concern on information security managers' investment decisions}, journal = {Comput. Secur.}, volume = {97}, pages = {101961}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101961}, doi = {10.1016/J.COSE.2020.101961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaoSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShiHLKKC20, author = {Shuyun Shi and Debiao He and Li Li and Neeraj Kumar and Muhammad Khurram Khan and Kim{-}Kwang Raymond Choo}, title = {Applications of blockchain in ensuring the security and privacy of electronic health record systems: {A} survey}, journal = {Comput. Secur.}, volume = {97}, pages = {101966}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101966}, doi = {10.1016/J.COSE.2020.101966}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShiHLKKC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunWK20, author = {Qizhang Sun and Martijn C. Willemsen and Bart P. Knijnenburg}, title = {Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing}, journal = {Comput. Secur.}, volume = {97}, pages = {101924}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101924}, doi = {10.1016/J.COSE.2020.101924}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunWK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangMLZSM20, author = {Fei Tang and Boyang Ma and Jinku Li and Fengwei Zhang and Jipeng Su and Jianfeng Ma}, title = {RansomSpector: An introspection-based approach to detect crypto ransomware}, journal = {Comput. Secur.}, volume = {97}, pages = {101997}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101997}, doi = {10.1016/J.COSE.2020.101997}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TangMLZSM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TranLK20, author = {Ngoc Hong Tran and Nhien{-}An Le{-}Khac and M. Tahar Kechadi}, title = {Lightweight privacy-Preserving data classification}, journal = {Comput. Secur.}, volume = {97}, pages = {101835}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101835}, doi = {10.1016/J.COSE.2020.101835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TranLK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VermaMS20, author = {Vinita Verma and Sunil Kumar Muttoo and V. B. Singh}, title = {Multiclass malware classification via first- and second-order texture statistics}, journal = {Comput. Secur.}, volume = {97}, pages = {101895}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101895}, doi = {10.1016/J.COSE.2020.101895}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VermaMS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangK20, author = {Nana Wang and Mohan S. Kankanhalli}, title = {Protecting sensitive place visits in privacy-preserving trajectory publishing}, journal = {Comput. Secur.}, volume = {97}, pages = {101949}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101949}, doi = {10.1016/J.COSE.2020.101949}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuFYXL20, author = {Zhijun Wu and Wenzhi Feng and Meng Yue and Xinran Xu and Liang Liu}, title = {Mitigation measures of collusive interest flooding attacks in named data networking}, journal = {Comput. Secur.}, volume = {97}, pages = {101971}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101971}, doi = {10.1016/J.COSE.2020.101971}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuFYXL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangCMM20, author = {Runkai Yang and Xiaolin Chang and Jelena V. Misic and Vojislav B. Misic}, title = {Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views}, journal = {Comput. Secur.}, volume = {97}, pages = {101956}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101956}, doi = {10.1016/J.COSE.2020.101956}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YangCMM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinLY20, author = {Chunyong Yin and Bo Li and Zhichao Yin}, title = {A distributed sensing data anomaly detection scheme}, journal = {Comput. Secur.}, volume = {97}, pages = {101960}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101960}, doi = {10.1016/J.COSE.2020.101960}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJLTLL20, author = {Wenjing Zhang and Bo Jiang and Ming Li and Ravi Tandon and Qiao Liu and Hui Li}, title = {Aggregation-based location privacy: An information theoretic approach}, journal = {Comput. Secur.}, volume = {97}, pages = {101953}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101953}, doi = {10.1016/J.COSE.2020.101953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJLTLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangXZLZW20, author = {Chuan Zhang and Chang Xu and Liehuang Zhu and Yanwei Li and Can Zhang and Huishu Wu}, title = {An efficient and privacy-preserving truth discovery scheme in crowdsensing applications}, journal = {Comput. Secur.}, volume = {97}, pages = {101848}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101848}, doi = {10.1016/J.COSE.2020.101848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangXZLZW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouCJZC20, author = {Yuyang Zhou and Guang Cheng and Shanqing Jiang and Yuyu Zhao and Zihan Chen}, title = {Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes}, journal = {Comput. Secur.}, volume = {97}, pages = {101976}, year = {2020}, url = {https://doi.org/10.1016/j.cose.2020.101976}, doi = {10.1016/J.COSE.2020.101976}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouCJZC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.