![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 136
Volume 136, January 2024
- Samanta Mikuletic
, Simon Vrhovec
, Brigita Skela-Savic
, Bostjan Zvanut
:
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. 103489 - Meng Wang, Yahao Zhang
, WeiPing Wen:
Improved capsule networks based on Nash equilibrium for malicious code classification. 103503 - Xingsheng Qin
, Frank Jiang
, Chengzu Dong, Robin Doss:
A hybrid cyber defense framework for reconnaissance attack in industrial control systems. 103506 - Benjamin Maximilian Berens
, Mark Bohlender, Heike Dietmann, Chiara Krisam
, Oksana Kulyk
, Melanie Volkamer:
Cookie disclaimers: Dark patterns and lack of transparency. 103507 - Haina Song
, Hua Shen, Nan Zhao, Zhangqing He, Minghu Wu, Wei Xiong, Mingwu Zhang
:
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing. 103517 - Tieming Chen, Huan Zeng, Mingqi Lv
, Tiantian Zhu
:
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. 103518 - Pejman Najafi
, Wenzel Pünter
, Feng Cheng
, Christoph Meinel:
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation. 103519 - Ying He
, Zhili Shen
, Chang Xia, Jingyu Hua, Wei Tong
, Sheng Zhong:
SGBA: A stealthy scapegoat backdoor attack against deep neural networks. 103523 - Xiaojuan Zhao
, Rong Jiang
, Yue Han, Aiping Li, Zhichao Peng:
A survey on cybersecurity knowledge graph construction. 103524 - R. Reka, R. Karthick
, R. Saravana Ram, Gurkirpal Singh
:
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET. 103526 - Wenbo Wang
, Peng Yi, Junfang Jiang, Peng Zhang, Xiang Chen:
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack. 103533 - Kok Onn Chee
, Mengmeng Ge, Guangdong Bai, Dan Dongseong Kim
:
IoTSecSim: A framework for modelling and simulation of security in Internet of things. 103534 - Xinlong He, Yang Xu, Sicong Zhang
, Weida Xu, Jiale Yan:
Enhance membership inference attacks in federated learning. 103535 - Charles-Henry Bertrand Van Ouytsel
, Khanh-Huu-The Dam
, Axel Legay:
Analysis of machine learning approaches to packing detection. 103536 - Quan Shen
, Yanming Shen:
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach. 103537 - Rudolf Mayer
, Markus Hittmeir
, Andreas Ekelhart:
Distance-based linkage of personal microbiome records for identification and its privacy implications. 103538 - Ruoxi Chen, Haibo Jin, Jinyin Chen
, Haibin Zheng
, Shilian Zheng, Xiaoniu Yang, Xing Yang
:
AdvCheck: Characterizing adversarial examples via local gradient checking. 103540 - Jiahao Huang
, Mi Wen, Minjie Wei, Yanbing Bi:
Enhancing the transferability of adversarial samples with random noise techniques. 103541 - Ming Liu, Xiao Song, Yong Li, Wenxin Li:
Correlated differential privacy based logistic regression for supplier data protection. 103542 - Shaymaa Mamdouh Khalil
, Hayretdin Bahsi
, Tarmo Korõtko
:
Threat modeling of industrial control systems: A systematic literature review. 103543 - Xuan Zhao, Jia Yu, Xinrui Ge
, Rong Hao:
Towards efficient Secure Boolean Range Query over encrypted spatial data. 103544 - Arvind Prasad
, Shalini Chandra:
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. 103545 - Antonio Paya
, Sergio Arroni
, Vicente García-Díaz
, Alberto Gómez
:
Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems. 103546 - Zihan Ma
, Tianchong Gao:
Federated learning backdoor attack detection with persistence diagram. 103557 - Liliana Ribeiro
, Inês Sousa Guedes, Carla Sofia Cardoso:
Which factors predict susceptibility to phishing? An empirical study. 103558 - Kamal Taha
, Paul D. Yoo
, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun:
Learning a deep-feature clustering model for gait-based individual identification. 103559 - Umesh Kumar Lilhore, Surjeet Dalal
, Sarita Simaiya:
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning. 103560 - Erzhou Zhu
, Kang Cheng, Zhizheng Zhang, Huabin Wang
:
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. 103561 - Yuxian Huang
, Geng Yang, Hao Zhou, Hua Dai
, Dong Yuan, Shui Yu
:
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. 103562 - Chuang Liang, Jie Huang, Zeping Zhang
, Shuaishuai Zhang:
Defending against model extraction attacks with OOD feature learning and decision boundary confusion. 103563 - Furqan Rustam
, Anca Delia Jurcut
:
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches. 103564 - Jesús García Rodríguez
, Stephan Krenn, Daniel Slamanig
:
To pass or not to pass: Privacy-preserving physical access control. 103566 - Hoang V. Vo
, Hanh Phuong Du
, Hoa Ngoc Nguyen
:
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning. 103567 - Wonwoo Choi
, Minjae Seo
, Seongman Lee
, Brent ByungHoon Kang:
SuM: Efficient shadow stack protection on ARM Cortex-M. 103568 - Jyh-haw Yeh
, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao:
Integrity coded databases - protecting data integrity for outsourced databases. 103569 - Shi Chen
, Wennan Wang, Yubin Zhong, Zuobin Ying
, Weixuan Tang, Zijie Pan
:
HP-MIA: A novel membership inference attack scheme for high membership prediction precision. 103571 - Eun Hee Park, Jongwoo Kim
, Young Soon Park, Kyung Hee Chun
:
Facilitating and impeding factors to insiders' prosocial rule breaking in South Korea. 103572 - Wenjie Wang, Yuanhai Shao, Yiju Wang:
Optimization-based adversarial perturbations against twin support vector machines. 103573 - Snofy D. Dunston
, V. Mary Anita Rajam
:
AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability. 103574 - Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao:
Protocol clustering of unknown traffic based on embedding of protocol specification. 103575 - Juanjuan Weng
, Zhiming Luo
, Dazhen Lin, Shaozi Li:
Comparative evaluation of recent universal adversarial perturbations in image classification. 103576 - Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu, Bin Zhang, Qixu Liu
, Xiapu Luo:
A comprehensive analysis of website fingerprinting defenses on Tor. 103577 - Zhengwei Zhu, Miaojie Chen, Chenyang Zhu
, Yanping Zhu:
Effective defense strategies in network security using improved double dueling deep Q-network. 103578 - Kashan Ahmed
, Syed Khaldoon Khurshid
, Sadaf Hina
:
CyberEntRel: Joint extraction of cyber entities and relations using deep learning. 103579 - Saihua Cai
, Han Xu
, Mingjie Liu, Zhilin Chen, Guofeng Zhang
:
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. 103580 - Julia Prümmer
, Tommy van Steen
, Bibi van den Berg:
A systematic review of current cybersecurity training methods. 103585
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.