![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 137
Volume 137, February 2024
- Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner:
Withdrawal notice to 'Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures' [Computers & Security, 97 (2020) 101931]. 103393 - Jiacheng Xu, Chengxiang Tan:
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks. 103565 - Hongsong Chen
, Xingyu Li
, Wenmao Liu:
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. 103581 - Austin Brown, Maanak Gupta, Mahmoud Abdelsalam
:
Automated machine learning for deep learning based malware detection. 103582 - Xiaoyu Wang, Xiaobo Yang, Xueping Liang
, Xiu Zhang, Wei Zhang, Xiaorui Gong:
Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection. 103583 - Juanjuan Weng
, Zhiming Luo
, Dazhen Lin, Shaozi Li:
Learning transferable targeted universal adversarial perturbations by sequential meta-learning. 103584 - Tanguy Gernot
, Christophe Rosenberger
:
Robust biometric scheme against replay attacks using one-time biometric templates. 103586 - Anil V. Turukmane, Ramkumar Devendiran:
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. 103587 - Waheed G. Gadallah, Hosny M. Ibrahim, Nagwa M. Omar:
A deep learning technique to detect distributed denial of service attacks in software-defined networks. 103588 - Naomi Woods, Mikko T. Siponen:
How memory anxiety can influence password security behavior. 103589 - Dimitri Van Landuyt
, Vincent Wijshoff, Wouter Joosen:
A study of NoSQL query injection in Neo4j. 103590 - Susanne Durst
, Christoph Hinteregger, Malgorzata Zieba:
The effect of environmental turbulence on cyber security risk management and organizational resilience. 103591 - Antonio Giovanni Schiavone
:
Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites. 103592 - Nilufer Tuptuk, Stephen Hailes:
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation. 103593 - Jiayi Chen, Urs Hengartner, Hassan Khan:
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. 103594 - Jiaxuan Geng
, Junfeng Wang
, Zhiyang Fang
, Yingjie Zhou, Di Wu, Wenhan Ge
:
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. 103595 - Pedro Miguel Sánchez Sánchez
, Alberto Huertas Celdrán, Gérôme Bovet
, Gregorio Martínez Pérez:
Single-board device individual authentication based on hardware performance and autoencoder transformer models. 103596 - Roberto Doriguzzi Corin
, Domenico Siracusa
:
FLAD: Adaptive Federated Learning for DDoS attack detection. 103597 - Jahongir Azimjonov
, Taehong Kim
:
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. 103598 - Rafal Kozik, Massimo Ficco
, Aleksandra Pawlicka
, Marek Pawlicki, Francesco Palmieri
, Michal Choras:
When explainability turns into a threat - using xAI to fool a fake news detection method. 103599 - Sibi Chakkaravarthy Sethuraman, Devi Priya V. S, Tarun Reddi, Mulka Sai Tharun Reddy
, Muhammad Khurram Khan:
A comprehensive examination of email spoofing: Issues and prospects for email security. 103600 - Peng Chen, Xin Du, Zhihui Lu, Hongfeng Chai:
Universal adversarial backdoor attacks to fool vertical federated learning. 103601 - Alyzia Maria Konsta
, Alberto Lluch-Lafuente
, Beatrice Spiga, Nicola Dragoni
:
Survey: Automatic generation of attack trees and attack graphs. 103602 - Rongwei Yu, Yong Wang, Wang Wang:
AMAD: Active learning-based multivariate time series anomaly detection for large-scale IT systems. 103603 - Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li:
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. 103604 - Soumia Zohra El Mestari
, Gabriele Lenzini
, Hüseyin Demirci:
Preserving data privacy in machine learning systems. 103605 - Binghui Zou
, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun:
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification. 103606 - Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela:
Personal CAPTCHA-based authentication protocol. 103613 - Domna Bilika
, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis
:
Hello me, meet the real me: Voice synthesis attacks on voice assistants. 103617 - Huang Li
, Yiqin Sang
, Hongjuan Ge, Jie Yan
, Shijia Li:
Anomaly detection of aviation data bus based on SAE and IMD. 103619 - Benjamin Maximilian Berens
, Mattia Mossano
, Melanie Volkamer:
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. 103620 - Benyuan Yang
, Lili Luo, Zhimeng Wang:
Ensuring secure interoperation of access control in a multidomain environment. 103621 - Syed Rizvi
, Iyonna Williams
:
Analyzing transparency and malicious insiders prevention for cloud computing environment. 103622 - Xiyuan Zhang, Gang Xiong, Zhen Li, Chen Yang
, Xinjie Lin
, Gaopeng Gou, Binxing Fang:
Traffic spills the beans: A robust video identification attack against YouTube. 103623 - Xiang Li
, Jiang Xie, Qige Song
, Yafei Sang, Yongzheng Zhang, Shuhao Li, Tianning Zang:
Let model keep evolving: Incremental learning for encrypted traffic classification. 103624 - Peng Zhou
, Yuhan Gao
:
Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs. 103625 - Suman, Raees Ahmad Khan:
An optimized neural network for prediction of security threats on software testing. 103626 - Deepa D. Shankar
, Adresya Suresh Azhakath, Nesma Khalil, Sajeev J, Mahalakshmi T, Sheeba K:
Data mining for cyber biosecurity risk management - A comprehensive review. 103627 - Ben Pi, Chun Guo
, Yunhe Cui, Guowei Shen, Jialong Yang
, Yuan Ping
:
Remote access trojan traffic early detection method based on Markov matrices and deep learning. 103628 - Damien Warren Fernando
, Nikos Komninos
:
FeSAD ransomware detection framework with machine learning using adaption to concept drift. 103629 - Joakim Kävrestad
, Jana Rambusch, Marcus Nohlberg
:
Design principles for cognitively accessible cybersecurity training. 103630 - Markus Wurzenberger
, Georg Höld, Max Landauer
, Florian Skopik
:
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security. 103631 - Ping Guo, Wenfeng Liang, Shuilong Xu:
A privacy preserving four-factor authentication protocol for internet of medical things. 103632 - Fatima Mavra Khalil, Adnan Fazil
, Muhammad Jawad Hussain, Ammar Masood:
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems. 103633 - Hui Sun, Tianqing Zhu
, Wenhan Chang
, Wanlei Zhou:
A two-stage model extraction attack on GANs with a small collected dataset. 103634 - Man Zhou
, Xin Che:
Stealthy attack detection based on controlled invariant subspace for autonomous vehicles. 103635 - Xintong Wang
, Zixuan Wang, Enliang Wang
, Zhixin Sun:
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection. 103636 - Jeff Mitchell
, Niall McLaughlin
, Jesús Martínez del Rincón
:
Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME. 103637 - Valentina Casola
, Alessandra De Benedictis
, Carlo Mazzocca
, Vittorio Orbinato
:
Secure software development and testing: A model-based methodology. 103639 - Chengkun Jia, Min Long, Yongchao Liu
:
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network. 103640 - Longwen Zhang, Qiao Yan
:
Detect malicious websites by building a neural network to capture global and local features of websites. 103641 - Rui Zhao
:
Toward the flow-centric detection of browser fingerprinting. 103642 - Danilo Avola, Luigi Cinque, Maria De Marsico
, Alessio Fagioli
, Gian Luca Foresti
, Maurizio Mancini
, Alessio Mecca
:
Signal enhancement and efficient DTW-based comparison for wearable gait recognition. 103643 - Xinwei Yuan, Shu Han, Wei Huang
, Hongliang Ye, Xianglong Kong, Fan Zhang:
A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system. 103644 - Ran Dubin
:
Content Disarm and Reconstruction of Microsoft Office OLE files. 103647 - Haoxiang Huang, Jianbiao Zhang, Lei Zhang, Jun Hu, Yihao Cao:
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node. 103648 - Cameron John Hoffman
, C. Jordan Howell, Robert C. Perkins, David Maimon, Olena Antonaccio
:
Predicting new hackers' criminal careers: A group-based trajectory approach. 103649 - Yu Cao, Ang Yang
, Hanning Li, Qingcheng Zeng, Jing Gao
:
A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing. 103650 - Hongyu Yang, Youwei Wang, Liang Zhang
, Xiang Cheng, Ze Hu:
A novel Android malware detection method with API semantics extraction. 103651 - Side Liu
, Guojun Peng
, Haitao Zeng, Jianming Fu:
A survey on the evolution of fileless attacks and detection techniques. 103653
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.