default search action
Computers & Security, Volume 93
Volume 93, June 2020
- Yuting Liang, Reza Samavi:
Optimization-based k-anonymity algorithms. 101753 - Mudassar Aslam, Bushra Mohsin, Abdul Nasir Khan, Shahid Raza:
FoNAC - An automated Fog Node Audit and Certification scheme. 101759 - Yong Fang, Cheng Huang, Yu Su, Yaoyao Qiu:
Detecting malicious JavaScript code based on semantic analysis. 101764 - Daniel G. Arce:
Cybersecurity and platform competition in the cloud. 101774 - Stefano Sebastio, Eduard Baranov, Fabrizio Biondi, Olivier Decourbe, Thomas Given-Wilson, Axel Legay, Cassius Puodzius, Jean Quilbeuf:
Optimizing symbolic execution for malware behavior classification. 101775 - Mari Karjalainen, Mikko T. Siponen, Suprateek Sarker:
Toward a stage theory of the development of employees' information security behavior. 101782 - Oluwafemi Olukoya, Lewis Mackenzie, Inah Omoronyia:
Towards using unstructured user input request for malware detection. 101783 - Rong Wang, Yan Zhu, Chin-Chen Chang, Qiang Peng:
Privacy-preserving high-dimensional data publishing for classification. 101785 - Youcef Imine, Ahmed Lounis, Abdelmadjid Bouabdallah:
An accountable privacy-preserving scheme for public information sharing systems. 101786 - Ahmad O. Almashhadani, Mustafa Kaiiali, Domhnall Carlin, Sakir Sezer:
MaldomDetector: A system for detecting algorithmically generated domain names with machine learning. 101787 - Amir Jalaly Bidgoly, Hamed Jalaly Bidgoly, Zeynab Arezoumand:
A survey on methods and challenges in EEG based authentication. 101788 - Tengyao Li, Buhong Wang, Fute Shang, Jiwei Tian, Kunrui Cao:
Dynamic temporal ADS-B data attack detection based on sHDP-HMM. 101789 - Stephan Berger, Olga Bürger, Maximilian Röglinger:
Attacks on the Industrial Internet of Things - Development of a multi-layer Taxonomy. 101790 - Xin-jun Pei, Long Yu, Shengwei Tian:
AMalNet: A deep learning framework based on graph convolutional networks for malware detection. 101792 - Iman Vakilinia, Shamik Sengupta:
Vulnerability market as a public-good auction with privacy preservation. 101807 - Chris J. Mitchell:
The impact of quantum computing on real-world security: A 5G case study. 101825
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.