default search action
Computers & Security, Volume 148
Volume 148, 2025
- Konstantinos Mersinas, Maria Bada, Steven Furnell:
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions. 104025 - Zeynep Sahin, Anthony Vance:
What do we need to know about the Chief Information Security Officer? A literature review and research agenda. 104063 - Anuj Rai, Somnath Dey, Pradeep Patidar, Prakhar Rai:
MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection. 104069 - Yaman Roumani, Mais Alraee:
Examining the factors that impact the severity of cyberattacks on critical infrastructures. 104074 - Anthony J. Rose, Christine M. Schubert-Kabban, Scott R. Graham, Wayne C. Henry, Christopher M. Rondeau:
Malware classification through Abstract Syntax Trees and L-moments. 104082 - A. Punitha, P. Ramani, Ezhilarasi P, Sridhar S:
Dynamically stabilized recurrent neural network optimized with intensified sand cat swarm optimization for intrusion detection in wireless sensor network. 104094 - Sita Rani, Aman Kataria, Sachin Kumar, Vinod Karar:
A new generation cyber-physical system: A comprehensive review from security perspective. 104095 - Hao Zhou, Wenting Shen, Jinlu Liu:
Certificate-based multi-copy cloud storage auditing supporting data dynamics. 104096 - Pan Jun Sun, Yi Wan, Zongda Wu, Zhaoxi Fang, Qi Li:
A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions. 104097 - Chen Liang, Qiang Wei, Jiang Du, Yisen Wang, Zirui Jiang:
Survey of source code vulnerability analysis based on deep learning. 104098 - Chiheng Wang, Jianshan Peng, Junhu Zhu, Qingxian Wang:
AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software. 104099 - Shunliang Zhang, Weiqing Huang, Yinlong Liu:
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G. 104100 - Qingyun Li, Wei Chen, Xiaotang Xu, Yiting Zhang, Lifa Wu:
Precision strike: Precise backdoor attack with dynamic trigger. 104101 - Heqing Li, Xinde Li, Fir Dunkin, Zhentong Zhang, Xiaoyan Lu:
Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks. 104108 - Prabhat Kumar, Alireza Jolfaei, A. K. M. Najmul Islam:
An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things. 104109 - Anna Sutton, Lisa Tompson:
Towards a cybersecurity culture-behaviour framework: A rapid evidence review. 104110 - Wei Chen, Zhiyuan Bai, Gaoyuan Pan, Jian Wang:
A fast modularity hardware Trojan detection technique for large scale gate-level netlists. 104111 - Asimina Vasalou, Laura Benton, Ana Luisa Serta, Andrea Gauthier, Ceylan Besevli, Sarah Turner, Rea Gill, Rachael Payler, Etienne B. Roesch, Kevin McAreavey, Kim Bauters, Weiru Liu, Hsueh-Ju Chen, Dennis Ivory, Manos Panaousis, Georgios Loukas:
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices. 104112 - Xiaoqing Wang, Yuanjing Tian, Keman Huang, Bin Liang:
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach. 104113 - Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi:
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection. 104114 - Yu Cheng, Xiaofang Qi, Yanhui Li, Yumeng Wang:
ReckDroid: Detecting red packet fraud in Android apps. 104117 - Jiacheng Li, Yang Xiao, Shuhui Li, Tieshan Li:
Designing accountable IoT systems to overcome IoT storage limitation. 104118 - A. K. M. Mubashwir Alam, Keke Chen:
TEE-MR: Developer-friendly data oblivious programming for trusted execution environments. 104119 - Inoussa Mouiche, Sherif Saad:
Entity and relation extractions for threat intelligence knowledge graphs. 104120 - Saihua Cai, Han Tang, Jinfu Chen, Yikai Hu, Wuhao Guo:
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique. 104121 - Marcus Botacin, Heitor Murilo Gomes:
Towards more realistic evaluations: The impact of label delays in malware detection pipelines. 104122 - Y. Bhanu Prasad, Venkatesulu Dondeti:
PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction. 104123 - Matta Krishna Kumari, Nikhil Tripathi:
Detecting interest flooding attacks in NDN: A probability-based event-driven approach. 104124 - Khang Mai, Jongmin Lee, Razvan Beuran, Ryosuke Hotchi, Ooi Sian En, Takayuki Kuroda, Yasuo Tan:
RAF-AG: Report analysis framework for attack path generation. 104125 - Kexiong Fei, Jiang Zhou, Yucan Zhou, Xiaoyan Gu, Haihui Fan, Bo Li, Weiping Wang, Yong Chen:
LaAeb: A comprehensive log-text analysis based approach for insider threat detection. 104126 - Luchen Zhou, Wei-Chuen Yau, Yee Siang Gan, Sze-Teng Liong:
E-WebGuard: Enhanced neural architectures for precision web attack detection. 104127 - Malka N. Halgamuge, Dusit Niyato:
Adaptive edge security framework for dynamic IoT security policies in diverse environments. 104128 - Daniel Sturman, Jaime C. Auton, Ben W. Morrison:
Security awareness, decision style, knowledge, and phishing email detection: Moderated mediation analyses. 104129
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.