![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 141
Volume 141, 2024
- Qiao Li
, Jing Chen, Kun He, Zijun Zhang
, Ruiying Du, Jisi She, Xinxin Wang
:
Model-agnostic adversarial example detection via high-frequency amplification. 103791 - Matteo Boffa, Idilio Drago
, Marco Mellia, Luca Vassio
, Danilo Giordano, Rodolfo V. Valentim, Zied Ben-Houidi
:
LogPrécis: Unleashing language models for automated malicious log analysis. 103805 - Tao Yi, Xingshu Chen, Qindong Li
, Yi Zhu:
An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP). 103809 - Hanxiao Wanyan, Yingxu Lai
, Jing Liu, Hao Chen:
NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing. 103811 - Jimoh Fatoki, Zixing Shen
, Carlo A. Mora Monge
:
Optimism amid risk: How non-IT employees' beliefs affect cybersecurity behavior. 103812 - Gaigai Tang, Lin Yang, Long Zhang, Hongyu Kuang, Huiqiang Wang:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension. 103816 - Xu Han
, Qiang Li, Hongbo Cao
, Lei Han, Bin Wang, Xuhua Bao, Yufei Han, Wei Wang
:
BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts. 103817 - P. Malini, Dr. K. R. Kavitha:
An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment. 103818 - Narendra Singh, Somanath Tripathy
:
It's too late if exfiltrate: Early stage Android ransomware detection. 103819 - Nitish A
, Hanumanthappa J
, S. P. Shiva Prakash
, Kirill Krinkin
:
Class imbalance and concept drift invariant online botnet threat detection framework for heterogeneous IoT edge. 103820 - Meihui Zhong, Mingwei Lin
, Chao Zhang
, Zeshui Xu:
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. 103821 - Guangshang Jiang, Hanlin Zhang
, Jie Lin, Fanyu Kong, Leyun Yu:
Optimized verifiable delegated private set intersection on outsourced private datasets. 103822 - Hugo Pascual
, José M. del Álamo, David Rodriguez
, Juan C. Dueñas
:
Hunter: Tracing anycast communications to uncover cross-border personal data transfers. 103823 - Gaosheng Wang, Peipei Liu, Jintao Huang
, Haoyu Bin
, Xi Wang, Hongsong Zhu:
KnowCTI: Knowledge-based cyber threat intelligence entity and relation extraction. 103824 - Xue Yang
, Enda Howley, Michael Schukat
:
ADT: Time series anomaly detection for cyber-physical systems via deep reinforcement learning. 103825 - Marta F. Arroyabe
, Carlos F. A. Arranz
, Ignacio Fernandez De Arroyabe, Juan Carlos Fernandez de Arroyabe
:
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. 103826 - Cornelius Itodo
, Murat Ozer:
Multivocal literature review on zero-trust security implementation. 103827 - Oleksandr Kuznetsov
, Dmytro Zakharov
, Emanuele Frontoni, Andrea Maranesi:
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection. 103828 - Peng Luo, Buhong Wang, Jiwei Tian:
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data. 103840 - Liang Liu, Xinyu Kuang
, Lin Liu, Lei Zhang
:
Defend against adversarial attacks in malware detection through attack space management. 103841 - Antonio Galli
, Valerio La Gatta
, Vincenzo Moscato, Marco Postiglione
, Giancarlo Sperlì
:
Explainability in AI-based behavioral malware detection systems. 103842 - Sultan Asiri
, Yang Xiao
, Saleh Alzahrani, Tieshan Li:
PhishingRTDS: A real-time detection system for phishing attacks using a Deep Learning model. 103843 - Manuel Kern
, Max Landauer
, Florian Skopik
, Edgar R. Weippl:
A logging maturity and decision model for the selection of intrusion detection cyber security solutions. 103844 - Saleh H. Aldaajeh
, Saed Alrabaee
:
Strategic cybersecurity. 103845 - Lina Shen, Mengqi Fang, Jian Xu:
GHGDroid: Global heterogeneous graph-based android malware detection. 103846 - Khushnaseeb Roshan
, Aasim Zafar:
Black-box adversarial transferability: An empirical study in cybersecurity perspective. 103853
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.