2020 export record
dblp key:
journals/compsec/AlashwaliSM20 share record
persistent URL:
Eman Salem Alashwali , Pawel Szalachowski , Andrew Martin : Exploring HTTPS security inconsistencies: A cross-regional perspective. Comput. Secur. 97 : 101975 (2020 )export record
dblp key:
journals/compsec/ArendSIKB20a share record
persistent URL:
Isabel Arend , Asaf Shabtai , Tali Idan , Ruty Keinan , Yoella Bereby-Meyer : Passive- and not active-risk tendencies predict cyber security behavior. Comput. Secur. 97 : 101964 (2020 )export record
dblp key:
journals/compsec/ArshadOAA20 share record
persistent URL:
Humaira Arshad , Esther Omolara , Isaac Oludare Abiodun , Abdulhai Aminu : A semi-automated forensic investigation model for online social networks. Comput. Secur. 97 : 101946 (2020 )export record
dblp key:
journals/compsec/AshrafuzzamanDC20 share record
persistent URL:
Mohammad Ashrafuzzaman , Saikat Das , Yacine Chakhchoukh , Sajjan G. Shiva , Frederick T. Sheldon : Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. Comput. Secur. 97 : 101994 (2020 )export record
dblp key:
journals/compsec/BoranMH20 share record
persistent URL:
Tudor Boran , Muhamet Martinaj , Md. Hossain : Authorship identification on limited samplings. Comput. Secur. 97 : 101943 (2020 )export record
dblp key:
journals/compsec/ChamikaraBKLC20 share record
persistent URL:
Mahawaga Arachchige Pathum Chamikara , Peter Bertók , Ibrahim Khalil , Dongxi Liu , Seyit Camtepe : Privacy Preserving Face Recognition Utilizing Differential Privacy. Comput. Secur. 97 : 101951 (2020 )export record
dblp key:
journals/compsec/ChangC20 share record
persistent URL:
Lennon Y. C. Chang , Nicholas Coppel : Building cyber security awareness in a developing country: Lessons from Myanmar. Comput. Secur. 97 : 101959 (2020 )export record
dblp key:
journals/compsec/ChowdhuryAT20 share record
persistent URL:
Noman H. Chowdhury , Marc T. P. Adam , Timm Teubner : Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. Comput. Secur. 97 : 101931 (2020 )export record
dblp key:
journals/compsec/ChowdhuryAT20a share record
persistent URL:
Noman H. Chowdhury , Marc T. P. Adam , Timm Teubner : Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. Comput. Secur. 97 : 101963 (2020 )export record
dblp key:
journals/compsec/CompastieBFH20 share record
persistent URL:
Maxime Compastié , Rémi Badonnel , Olivier Festor , Ruan He : From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. Comput. Secur. 97 : 101905 (2020 )export record
dblp key:
journals/compsec/DasKSS20 share record
persistent URL:
Ayan Kumar Das , Sidra Kalam , Nausheen Sahar , Ditipriya Sinha : UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. Comput. Secur. 97 : 101938 (2020 )export record
dblp key:
journals/compsec/DhiebNBOAA20 share record
persistent URL:
Thameur Dhieb , Sourour Njah , Houcine Boubaker , Wael Ouarda , Mounir Ben Ayed , Adel M. Alimi : Towards a novel biometric system for forensic document examination. Comput. Secur. 97 : 101973 (2020 )export record
dblp key:
journals/compsec/DionysiouA20 share record
persistent URL:
Antreas Dionysiou , Elias Athanasopoulos : SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers. Comput. Secur. 97 : 101947 (2020 )export record
dblp key:
journals/compsec/DoctorVJWSOMOM20 share record
persistent URL:
Jason N. Doctor , Jaideep Vaidya , Xiaoqian Jiang , Shuang Wang , Lisa M. Schilling , Toan Ong , Michael E. Matheny , Lucila Ohno-Machado , Daniella Meeker : Efficient determination of equivalence for encrypted data. Comput. Secur. 97 : 101939 (2020 )export record
dblp key:
journals/compsec/EstaySBJ20 share record
persistent URL:
Daniel A. Sepulveda Estay , Rishikesh Sahay , Michael Bruhn Barfod , Christian Damsgaard Jensen : A systematic review of cyber-resilience assessment frameworks. Comput. Secur. 97 : 101996 (2020 )export record
dblp key:
journals/compsec/EvangelouA20 share record
persistent URL:
Marina Evangelou , Niall M. Adams : An anomaly detection framework for cyber-security data. Comput. Secur. 97 : 101941 (2020 )export record
dblp key:
journals/compsec/FangXLCLLJY20 share record
persistent URL:
Junbin Fang , Guikai Xi , Rong Li , Qian Chen , Puxi Lin , Sijin Li , Zoe Lin Jiang , Siu-Ming Yiu : Coarse-to-fine two-stage semantic video carving approach in digital forensics. Comput. Secur. 97 : 101942 (2020 )export record
dblp key:
journals/compsec/GonenSYUK20 share record
persistent URL:
Serkan Gönen , Hasan Hüseyin Sayan , Ercan Nurcan Yilmaz , Furkan Üstünsoy , Gökçe Karacayilmaz : False data injection attacks and the insider threat in smart systems. Comput. Secur. 97 : 101955 (2020 )export record
dblp key:
journals/compsec/HanHSL20 share record
persistent URL:
Jiaxuan Han , Cheng Huang , Fan Shi , Jiayong Liu : Covert timing channel detection method based on time interval and payload length analysis. Comput. Secur. 97 : 101952 (2020 )export record
dblp key:
journals/compsec/JinLQCM20 share record
persistent URL:
Dongzi Jin , Yiqin Lu , Jiancheng Qin , Zhe Cheng , Zhongshu Mao : SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. Comput. Secur. 97 : 101984 (2020 )export record
dblp key:
journals/compsec/KarbabDDM20a share record
persistent URL:
ElMouatez Billah Karbab , Mourad Debbabi , Abdelouahid Derhab , Djedjiga Mouheb : Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. Comput. Secur. 97 : 101965 (2020 )export record
dblp key:
journals/compsec/KleijWH20 share record
persistent URL:
Rick van der Kleij , Remco Wijn , Tineke Hof : An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. Comput. Secur. 97 : 101970 (2020 )export record
dblp key:
journals/compsec/KrishnanJRKTS20 share record
persistent URL:
R. Santhana Krishnan , Eanoch Golden Julie , Yesudhas Harold Robinson , Raghvendra Kumar , Pham Huy Thong , Le Hoang Son : Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks. Comput. Secur. 97 : 101962 (2020 )export record
dblp key:
journals/compsec/KuangFZSZ20 share record
persistent URL:
Boyu Kuang , Anmin Fu , Lu Zhou , Willy Susilo , Yuqing Zhang : DO-RA: Data-oriented runtime attestation for IoT devices. Comput. Secur. 97 : 101945 (2020 )export record
dblp key:
journals/compsec/KumarG20 share record
persistent URL:
Rakesh Kumar , Rinkaj Goyal : Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC). Comput. Secur. 97 : 101967 (2020 )export record
dblp key:
journals/compsec/LarribaSL20 share record
persistent URL:
Antonio M. Larriba , José M. Sempere , Damián López : A two authorities electronic vote scheme. Comput. Secur. 97 : 101940 (2020 )share record
persistent URL:
Claire Seungeun Lee , Ji Hye Kim : Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts. Comput. Secur. 97 : 101995 (2020 )export record
dblp key:
journals/compsec/LiLLGGWF20 share record
persistent URL:
Fenghua Li , Yongjun Li , Siyuan Leng , Yunchuan Guo , Kui Geng , Zhen Wang , Liang Fang : Dynamic countermeasures selection for multi-path attacks. Comput. Secur. 97 : 101927 (2020 )export record
dblp key:
journals/compsec/LiLLXA20 share record
persistent URL:
Tun Li , Yutian Liu , Yanbing Liu , Yunpeng Xiao , Nguyen Nang An : Attack plan recognition using hidden Markov and probabilistic inference. Comput. Secur. 97 : 101974 (2020 )share record
persistent URL:
Hui Liu , Juanru Li , Dawu Gu : Understanding the security of app-in-the-middle IoT. Comput. Secur. 97 : 102000 (2020 )