


default search action
Computers & Security, Volume 151
Volume 151, 2025
- Shaik Mohammad Rafi
, R. Yogesh, M. Sriram:
Optimized dual access control for cloud-based data storage and distribution using global-context residual recurrent neural network. 104183 - Robert Luh
, Sebastian Eresheim
, Paul Tavolato
, Thomas Petelin, Simon Gmeiner
, Andreas Holzinger
, Sebastian Schrittwieser:
Gamifying information security: Adversarial risk exploration for IT/OT infrastructures. 104287 - Ning Wang, Jian Zhuang, Zhigang Wang, Zhiqiang Wei, Yu Gu, Peng Tang, Ge Yu
:
Multidimensional categorical data collection under shuffled differential privacy. 104301 - Luca Hernández Acosta, Delphine Reinhardt:
"Alexa, how do you protect my privacy?" A quantitative study of user preferences and requirements about smart speaker privacy settings. 104302 - Feng Luo
, Jiajia Wang
, Zhihao Li, Cheng Luo:
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals. 104304 - Roberto J. Mejias, Joshua J. Greer
, Gabrila C. Greer, Morgan M. Shepherd
, Raul Y. Reyes:
A model for information security vulnerability awareness. 104305 - Lalit Kumar Vashishtha
, Kakali Chatterjee:
Strengthening cybersecurity: TestCloudIDS dataset and SparkShield algorithm for robust threat detection. 104308 - Raghavendra Mishra
, Ankita Mishra:
Current research on Internet of Things (IoT) security protocols: A survey. 104310 - Zhaoyang Wang, Yanfei Hu, Yu Wen, Boyang Zhang, Shuailou Li, Wenbo Wang, Zheng Liu, Dan Meng:
FineGCP: Fine-grained dependency graph community partitioning for attack investigation. 104311 - Rory Flynn, Oluwafemi Olukoya
:
Using approximate matching and machine learning to uncover malicious activity in logs. 104312 - Arafat Miah, Fakir Sharif Hossain:
CRO-PUF: Resilience to machine learning and differential power attacks. 104313 - Rong-Teng Lee, Shan-Hsiang Shen
:
Erasure code backup system for data security. 104314 - Nicola d'Ambrosio
, Giulio Capodagli, Gaetano Perrone
, Simon Pietro Romano
:
SCASS: Breaking into SCADA Systems Security. 104315 - Yasin Burak Kurt
, Esma Uflaz
, Emre Akyuz, Rafet Emek Kurt
, Osman Turan
:
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach. 104316 - Santosh Kumar Birthriya
, Priyanka Ahlawat, Ankit Kumar Jain
:
Detection and prevention of spear phishing attacks: A comprehensive survey. 104317 - Chathuranga Sampath Kalutharage
, Xiaodong Liu
, Christos Chrysoulas
:
Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response. 104318 - Jiaxin Li
, Haipeng Peng, Lixiang Li
:
Sublinear smart semantic search based on knowledge graph over encrypted database. 104319 - Jampani Chandra Sekhar
, R. Priyanka, Ashok Kumar Nanda, P. Joel Josephson, M. J. D. Ebinezer
, T. Kalavathi Devi:
Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks. 104320 - Shuaishuai Liu, Gergely Biczók
:
IDPFilter: Mitigating interdependent privacy issues in third-party apps. 104321 - Ying-Dar Lin, Wei-Hsiang Chan
, Yuan-Cheng Lai
, Chia-Mu Yu
, Yu-Sung Wu
, Wei-Bin Lee
:
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks. 104322 - Jingxu Xiao, Chaowen Chang, Ping Wu
, Lu Yuan:
Multi-probability sampling-based detection of malicious switching nodes in SDN. 104324 - Vahide Nida Kiliç
, Esra Sarac Essiz
:
K-Salp Swarm Anomaly Detection (K-SAD): A novel clustering and threshold-based approach for cybersecurity applications. 104325 - Inho Hwang
, Ribin Seo
:
Mitigating security stress: Exploring the contingent role of collaborative communication in enhancing information security compliance. 104326 - James Msughter Adeke
, Guangjie Liu
, Lord Amoah
, Ogonna Joshua Nwali
:
Investigating the impact of feature selection on adversarial transferability in intrusion detection system. 104327 - Yankun Xue
, Chunying Kang, Hongchen Yu:
HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network. 104328 - Fernando Almeida
:
Comparative analysis of EU-based cybersecurity skills frameworks. 104329 - Van Tuan Nguyen
, Razvan Beuran
:
FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection. 104337 - Zhongyuan Qin
, Kefei Lu, Qunfang Zhang, Dinglian Wang, Liquan Chen:
Dynamic privacy loss management: The innovation of α-confidence differential privacy filters and odometers. 104338 - Xueping Liang
, Yilin Xu
:
A novel framework to identify cybersecurity challenges and opportunities for organizational digital transformation in the cloud. 104339 - Giyoon Kim, Soojin Kang, Seungjun Baek
, Kimoon Kim, Jongsung Kim
:
How to decrypt files encrypted by Rhysida ransomware without the attacker's private key. 104340 - Junho Jung
, BeomSeok Kim
, Heeseung Son
, Daehee Jang, Ben Lee, Jinsung Cho:
A Segmented Stack Randomization for bare-metal IoT devices. 104342 - Kaidi Xu, Jia Yu, Wenjing Gao:
Towards privacy-preserving compressed sensing reconstruction in cloud. 104348 - Ameer El-Sayed
, Ahmed A. Toony, Fayez Alqahtani
, Yasser M. Alginahi
, Wael Said:
CO-STOP: A robust P4-powered adaptive framework for comprehensive detection and mitigation of coordinated and multi-faceted attacks in SD-IoT networks. 104349 - Miaomiao Shao
, Yuxin Ding, Jing Cao, Yilin Li:
GraphFVD: Property graph-based fine-grained vulnerability detection. 104350 - Hannes Holm, Teodor Sommestad:
Realistic and balanced automated threat emulation. 104351 - Mohammed Aledhari
, Rehma Razzak, Mohamed Rahouti, Abbas Yazdinejad
, Reza M. Parizi, Basheer Qolomany, Mohsen Guizani, Junaid Qadir, Ala I. Al-Fuqaha:
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses. 104352 - Kaijiao Huang, Lifei Wang, Faisal Mehmood
, Jianxun Liu:
Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks. 104353 - Romilla Syed
, Joti Kaur
, Leiser Silva
:
Exposure of software vulnerabilities on Twitter: Analyzing vendors' behavior of releasing software patches. 104354 - Nitzan Farhi
, Noam Koenigstein
, Yuval Shavitt:
PatchView: Multi-modality detection of security patches. 104356 - Sakib Shahriar
, Rozita Dara, Rajen Akalu:
A comprehensive review of current trends, challenges, and opportunities in text data privacy. 104358

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.