![](https://dblp.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de/img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 31 matches
- 2022
- Zillah Adahman, Asad Waqar Malik
, Zahid Anwar
:
An analysis of zero-trust architecture and its cost-effectiveness for organizational security. Comput. Secur. 122: 102911 (2022) - Aliaa Al-Bakaa, Bahaa Al-Musawi
:
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques. Comput. Secur. 122: 102906 (2022) - Meriem Benyahya
, Anastasija Collen
, Sotiria Kechagia, Niels Alexander Nijdam
:
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments. Comput. Secur. 122: 102904 (2022) - Navdeep S. Chahal, Preeti Bali, Praveen Kumar Khosla
:
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform. Comput. Secur. 122: 102886 (2022) - Mauro Conti
, Shubham Khandhar, Vinod P.:
A few-shot malware classification approach for unknown family recognition using malware feature visualization. Comput. Secur. 122: 102887 (2022) - Nidhi Desai
, Manik Lal Das, Payal Chaudhari
, Naveen Kumar
:
Background knowledge attacks in privacy-preserving data publishing models. Comput. Secur. 122: 102874 (2022) - Parveen Dhillon, Manpreet Singh:
An ontology oriented service framework for social IoT. Comput. Secur. 122: 102895 (2022) - Xuechao Du
, Andong Chen
, Boyuan He, Hao Chen, Fan Zhang
, Yan Chen:
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation. Comput. Secur. 122: 102889 (2022) - Yexin Duan
, Junhua Zou, Xingyu Zhou, Wu Zhang, Zhengyun He
, Dazhi Zhan
, Jin Zhang, Zhisong Pan:
Adversarial attack via dual-stage network erosion. Comput. Secur. 122: 102888 (2022) - Yeming Gu
, Hui Shu
, Pan Yang, Rongkuan Ma
:
MinSIB: Minimized static instrumentation for fuzzing binaries. Comput. Secur. 122: 102894 (2022) - Xiuting Gu
, Tianqing Zhu
, Jie Li
, Tao Zhang, Wei Ren
, Kim-Kwang Raymond Choo
:
Privacy, accuracy, and model fairness trade-offs in federated learning. Comput. Secur. 122: 102907 (2022) - Alejandro Guerra-Manzanares
, Hayretdin Bahsi
:
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection. Comput. Secur. 122: 102835 (2022) - Nor Hasnul Azirah Abdul Hamid
, Normalina Ibrahim @ Mat Nor, Fazlin Marini Hussain
, Rajeswari Raju
, Humza Naseer
, Atif Ahmad
:
Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations. Comput. Secur. 122: 102893 (2022) - Jingwei Hao
, Senlin Luo, Limin Pan:
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning. Comput. Secur. 122: 102905 (2022) - Stephen Hart
, Basel Halak
, Vladimiro Sassone:
CIST: A Serious Game for Hardware Supply Chain. Comput. Secur. 122: 102912 (2022) - Moshe Kravchik, Luca Demetrio
, Battista Biggio, Asaf Shabtai:
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems. Comput. Secur. 122: 102901 (2022) - Jung-San Lee, Ying-Chin Chen, Chit-Jie Chew, Chih-Lung Chen
, Thu-Nguyet Huynh
, Chung-Wei Kuo:
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training. Comput. Secur. 122: 102908 (2022) - Ce Li, Zijun Cheng
, He Zhu, Leiqi Wang, Qiujian Lv, Yan Wang, Ning Li, Degang Sun:
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning. Comput. Secur. 122: 102872 (2022) - Paul Loft, Ying He
, Iryna Yevseyeva
, Isabel Wagner
:
CAESAR8: An agile enterprise architecture approach to managing information security risks. Comput. Secur. 122: 102877 (2022) - David Martínez
, Eusebi Calle, Albert Jové, Cristina Pérez-Solà
:
Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies. Comput. Secur. 122: 102873 (2022) - Dudu Mimran, Ron Bitton, Yehonatan Kfir, Eitan Klevansky, Oleg Brodt, Heiko Lehmann, Yuval Elovici, Asaf Shabtai:
Security of Open Radio Access Networks. Comput. Secur. 122: 102890 (2022) - Baris Özkan, Mehmet Erdem, Eren Özceylan
:
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach. Comput. Secur. 122: 102900 (2022) - Weizhong Qiang, Lin Yang, Hai Jin:
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks. Comput. Secur. 122: 102871 (2022) - Leilei Qu
, Ruojin Xiao, Wenchang Shi
, Keman Huang, Bo Qin, Bin Liang:
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges. Comput. Secur. 122: 102891 (2022) - Stef Schinagl
, Abbas Shahim, Svetlana Khapova
:
Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security. Comput. Secur. 122: 102903 (2022) - Ferda Özdemir Sönmez
, Chris Hankin
, Pasquale Malacaria:
Decision support for healthcare cyber security. Comput. Secur. 122: 102865 (2022) - Manar Abu Talib, Qassim Nasir, Ali Bou Nassif, Takua Mokhamed
, Nafisa Ahmed, Bayan Mahfood:
APT beaconing detection: A systematic review. Comput. Secur. 122: 102875 (2022) - Huan Tian
, Tianqing Zhu
, Wanlei Zhou:
Fairness and privacy preservation for facial images: GAN-based methods. Comput. Secur. 122: 102902 (2022) - Muhammad Mudassar Yamin, Basel Katt
:
Use of cyber attack and defense agents in cyber ranges: A case study. Comput. Secur. 122: 102892 (2022) - Jingcheng Yang
, Hongwei Li
, Shuo Shao, Futai Zou
, Yue Wu
:
FS-IDS: A framework for intrusion detection based on few-shot learning. Comput. Secur. 122: 102899 (2022)
skipping 1 more match
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-06-15 17:25 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint