![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 127
Volume 127, April 2023
- Martin Vondrácek
, Ibrahim M. Baggili, Peter Casey, Mehdi Mekni:
Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack & Defenses. 102923 - Sridhar Manda, Charanjeet Singh:
CVFP: Energy and trust aware data routing protocol based on Competitive Verse Flower Pollination algorithm in IoT. 103035 - Chiara Braghin
, Mario Lilli
, Elvinia Riccobene
:
A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study. 103037 - Sabrina De Capitani di Vimercati
, Sara Foresti
, Sushil Jajodia
, Giovanni Livraga
, Stefano Paraboschi
, Pierangela Samarati
:
Distributed query execution under access restrictions. 103056 - Carlos E. Budde
, Anni Karinsalo
, Silvia Vidor
, Jarno Salonen, Fabio Massacci:
Consolidating cybersecurity in Europe: A case study on job profiles assessment. 103082 - Steven Kemp
:
Exploring public cybercrime prevention campaigns and victimization of businesses: A Bayesian model averaging approach. 103089 - Yunjiao Song, Xinrui Ge, Jia Yu:
Privacy-preserving reachability query over graphs with result verifiability. 103092 - Ignacio Samuel Crespo-Martínez
, Adrián Campazas Vega
, Ángel Manuel Guerrero-Higueras, Virginia Riego-Del Castillo
, Claudia Álvarez-Aparicio
, Camino Fernández Llamas
:
SQL injection attack detection in network flow data. 103093 - Chaofan Tang, Lijuan Xu, Bo Yang, Yongwei Tang, Dawei Zhao:
GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System. 103094 - Chenming Zheng, Jun Li, Xuanxia Yao
:
Design and implementation of trusted boot based on a new trusted computing dual-architecture. 103095 - Pooja Kumari
, Ankit Kumar Jain:
A comprehensive study of DDoS attacks over IoT network and their countermeasures. 103096 - Othmane Friha
, Mohamed Amine Ferrag, Mohamed Benbouzid
, Tarek Berghout
, Burak Kantarci
, Kim-Kwang Raymond Choo
:
2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT. 103097 - Nhien Rust-Nguyen
, Shruti Sharma, Mark Stamp:
Darknet traffic classification and adversarial attacks using machine learning. 103098 - Luuk Bekkers
, Susanne van 't Hoff-De Goede
, Ellen Misana-ter Huurne, Ynze van Houten
, Remco Spithoven, Eric Rutger Leukfeldt:
Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model. 103099 - Hongzhaoning Kang, Gang Liu
, Quan Wang
, Qi Zhang, Jiamin Niu, Nan Luo:
An improved minimal noise role mining algorithm based on role interpretability. 103100 - Ezekiel O. Soremekun
, Sakshi Udeshi
, Sudipta Chattopadhyay
:
Towards Backdoor Attacks and Defense in Robust Machine Learning Models. 103101 - Tong Qiao, Yuyan Ma, Ning Zheng, Hanzhou Wu
, Yanli Chen
, Ming Xu
, Xiangyang Luo:
A novel model watermarking for protecting generative adversarial network. 103102 - Dazhi Zhan
, Yexin Duan
, Yue Hu
, Lujia Yin, Zhisong Pan
, Shize Guo:
AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation. 103103 - Bojan Novkovic
, Marin Golub
:
Improving monolithic kernel security and robustness through intra-kernel sandboxing. 103104 - Kuldeep Singh
, Palvi Aggarwal
, Prashanth Rajivan
, Cleotilde Gonzalez
:
Cognitive elements of learning and discriminability in anti-phishing training. 103105 - Gustavo de Carvalho Bertoli
, Lourenço Alves Pereira Júnior
, Osamu Saotome
, Aldri Luiz dos Santos
:
Generalizing intrusion detection for heterogeneous networks: A stacked-unsupervised federated learning approach. 103106 - Tommaso Zoppi
, Andrea Ceccarelli
, Tommaso Puccetti
, Andrea Bondavalli
:
Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection. 103107 - Sam Maesschalck
, Alexander Staves
, Richard Derbyshire, Benjamin Green, David Hutchison
:
Walking under the ladder logic: PLC-VBS: a PLC control logic vulnerability scanning tool. 103116 - Ali Mustapha, Rida Khatoun, Sherali Zeadally, Fadlallah Chbib, Ahmad Fadlallah, Walid Fahs
, Ali El Attar:
Detecting DDoS attacks using adversarial neural network. 103117 - Francesco Minna
, Fabio Massacci
:
SoK: Run-time security for cloud microservices. Are we there yet? 103119 - Mingming Hu
, Kun Zhang, Ruibang You, Bibo Tu
:
AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using A Convolutional Transformer. 103122 - Zhongshu Mao, Yiqin Lu
, Zhe Cheng, Xiong Shen
, Yang Zhang
, Jiancheng Qin
:
Boosting adversarial attacks with future momentum and future transformation. 103124 - Oren Shvartzman, Adar Ovadya, Kfir Zvi, Omer Shwartz, Rom Ogen, Yakov Mallah, Niv Gilboa, Yossi Oren
:
Characterization and Detection of Cross-Router Covert Channels. 103125
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.