default search action
Computers & Security, Volume 120
Volume 120, September 2022
- Richard L. Baskerville, Jongwoo Kim, Carl Stucke:
The cybersecurity risk estimation engine: A tool for possibility based risk analysis. 102752 - Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection. 102757 - Hyeonseong Jo, Yongjae Lee, Seungwon Shin:
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. 102763 - Chunkai Zhang, Xiaofeng Luo, Peiyi Han:
On-manifold adversarial attack based on latent space substitute model. 102770 - Shwadhin Sharma, Eduardo Aparicio:
Organizational and team culture as antecedents of protection motivation among IT employees. 102774 - Ahmad Showail, Rashid Tahir, Muhammad Fareed Zaffar, Muhammad Haris Noor, Mohammed Alkhatib:
An internet of secure and private things: A service-oriented architecture. 102776 - Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems. 102777 - Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham:
Deep learning based cross architecture internet of things malware detection and classification. 102779 - Oliver Buckley, Duncan Hodges, Jonathan Windle, Sally Earl:
CLICKA: Collecting and leveraging identity cues with keystroke dynamics. 102780 - Yong-Gang Li, Yeh-Ching Chung, Yu Bao, Yi Lu, Shanqing Guo, Guoyuan Lin:
KPointer: Keep the code pointers on the stack point to the right code. 102781 - Zhipeng Zhou, Qiang Fu, Qianjun Wei, Qiang Li:
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning. 102782 - Md. Mamunur Rashid, Joarder Kamruzzaman, Mohammad Mehedi Hassan, Tasadduq Imam, Santoso Wibowo, Steven Gordon, Giancarlo Fortino:
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications. 102783 - Imran Makhdoom, Mehran Abolhasan, Justin Lipman:
A comprehensive survey of covert communication techniques, limitations and future challenges. 102784 - Pedro H. Barros, Eduarda T. C. Chagas, Leonardo B. Oliveira, Fabiane Queiroz, Heitor S. Ramos:
Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities. 102785 - Ivan Vorobyev, Anna Krivitskaya:
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models. 102786 - Tomás Sureda Riera, Juan Ramón Bermejo Higuera, Javier Bermejo Higuera, José Javier Martínez-Herráiz, Juan Antonio Sicilia Montalvo:
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques. 102788 - Jae-Yeol Kim, Hyuk-Yoon Kwon:
Threat classification model for security information event management focusing on model efficiency. 102789 - Steven Furnell:
Assessing website password practices - Unchanged after fifteen years? 102790 - Hassan Ali, Muhammad Suleman Khan, Ala I. Al-Fuqaha, Junaid Qadir:
Tamp-X: Attacking explainable natural language classifiers through tampered activations. 102791 - Mubarak Umar, Zhenqiang Wu, Xuening Liao:
Authenticating tier-two body area network devices through user-specific signal propagation characteristics. 102800 - Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili:
AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks. 102801 - Jianbing Liang, Shuhui Chen, Ziling Wei, Shuang Zhao, Wei Zhao:
HAGDetector: Heterogeneous DGA domain name detection model. 102803 - Shuai Jiang, Cai Fu, Yekui Qian, Shuai He, Jianqiang Lv, Lansheng Han:
IFAttn: Binary code similarity analysis based on interpretable features with attention. 102804 - Ricardo Villalón-Fonseca:
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity. 102805 - Hemangi Goswami, Hiten Choudhury:
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network. 102806 - Zhi Wang, Chaoge Liu, Xiang Cui, Jie Yin, Xutong Wang:
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks. 102807 - Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. 102808 - Weina Niu, Jie Zhou, Yibin Zhao, Xiaosong Zhang, Yujie Peng, Cheng Huang:
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis. 102809 - Jorge L. Guerra, Carlos Adrián Catania, Eduardo E. Veas:
Datasets are not enough: Challenges in labeling network traffic. 102810 - Yansong Dong, Long Tang, Cong Tian, Bin Yu, Zhenhua Duan:
Improving transferability of adversarial examples by saliency distribution and data augmentation. 102811 - Xuyang Chen, Xiaolu Zhang, Michael Elliot, Xiaoyin Wang, Feng Wang:
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions. 102812 - Craig Beaman, Michael Redbourne, J. Darren Mummery, Saqib Hakak:
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions. 102813 - Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. 102814 - El Balmany Chawki, Zakariae Tbatou, Ahmed Asimi, Mohamed Bamarouf:
Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage. 102815 - Lei Cui, Jiancong Cui, Zhiyu Hao, Lun Li, Zhenquan Ding, Yongji Liu:
An empirical study of vulnerability discovery methods over the past ten years. 102817 - Senmiao Wang, Luli Sun, Su-Juan Qin, Wenmin Li, Wentao Liu:
KRTunnel: DNS channel detector for mobile devices. 102818 - Alok Mishra, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, Asif Qumer Gill:
Attributes impacting cybersecurity policy development: An evidence from seven nations. 102820 - Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, Nitish Yadav:
What changed in the cyber-security after COVID-19? 102821 - Sabrina Sicari, Alessandra Rizzardi, Alberto Coen-Porisini:
Insights into security and privacy towards fog computing evolution. 102822 - Milton V. M. Lima, Ricardo Lima, Fernando Lins, Michel S. Bonfim:
Beholder - A CEP-based intrusion detection and prevention systems for IoT environments. 102824 - Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, Naveed Ikram:
The cybersecurity behavioral research: A tertiary study. 102826 - Pietro Colombo, Elena Ferrari, Engin Deniz Tümer:
Efficient ABAC based information sharing within MQTT environments under emergencies. 102829 - Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari:
Robust stacking ensemble model for darknet traffic classification under adversarial settings. 102830 - Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. 102831
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.