![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 138
Volume 138, March 2024
- Xixing Li
, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang:
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. 103618 - Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong
, Bo Jiang
, Yuling Liu, Zhigang Lu:
Unveiling encrypted traffic types through hierarchical network characteristics. 103645 - Shouzheng Tao
, Yezheng Liu, Chunhua Sun
:
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China. 103646 - Alejandro Guerra-Manzanares
:
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives. 103654 - Jason A. Williams
, Humayun Zafar
, Saurabh Gupta
:
Fortifying healthcare: An action research approach to developing an effective SETA program. 103655 - Henry R. K. Skeoch:
Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers & Security Volume 112 (2022) 102533]. 103657 - Xirong Ma, Chuan Ma
, Yali Jiang, Chunpeng Ge:
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication. 103658 - Zhimao Gong
, Junyi Li
, Yaping Lin, Lening Yuan, Wen Gao:
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing. 103659 - Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni:
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. 103660 - Vanlalruata Hnamte
, Ashfaq Ahmad Najar
, Hong Nhung-Nguyen
, Jamal Hussain
, Manohar Naik Sugali
:
DDoS attack detection and mitigation using deep neural network in SDN environment. 103661 - Emilio Coppa
, Sebastian Schrittwieser:
Editorial: Special issue on ARES 2022. 103662 - Ziming Zhao
, Zhaoxuan Li, Zhihao Zhou
, Jiongchi Yu
, Zhuoxue Song
, Xiaofei Xie
, Fan Zhang
, Rui Zhang:
DDoS family: A novel perspective for massive types of DDoS attacks. 103663 - Haitao Xiao, Yan Zhu, Bin Zhang, Zhigang Lu, Dan Du, Yuling Liu:
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis. 103665 - Agata Kruzikova, Michal Muzik
, Lenka Knapova, Lenka Dedkova
, David Smahel, Vashek Matyas:
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction. 103667 - Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang
, Shengbao Li:
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. 103668 - Tom Meurs
, Edward J. Cartwright
, Anna Cartwright
, Marianne Junger
, Abhishta Abhishta
:
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. 103670
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.