![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Computers & Security, Volume 96
Volume 96, September 2020
- Nuray Baltaci Akhuseyinoglu
, James Joshi:
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. 101802 - Bo Yang
:
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks. 101809 - Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallegue:
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. 101838 - Huijuan Lian
, Weidong Qiu, Di Yan
, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. 101845 - Moussa Wajdi
, Basty Nadia
, Ghazouani Ines
:
Asymmetric effect and dynamic relationships over the cryptocurrencies market. 101860 - Xiaofeng Lu
, Shengfei Zhang, Pan Hui, Pietro Liò
:
Continuous authentication by free-text keystroke based on CNN and RNN. 101861 - Ashraf Tantawy
, Sherif Abdelwahed, Abdelkarim Erradi, Khaled B. Shaban:
Model-based risk assessment for cyber physical systems security. 101864 - Karl van der Schyff
, Stephen Flowerday
, Steven Furnell:
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. 101866 - George Stergiopoulos
, Panagiotis Dedousis, Dimitris Gritzalis
:
Automatic network restructuring and risk mitigation through business process asset dependency analysis. 101869 - Andrew Case
, Ryan D. Maggio, Md Firoz-Ul-Amin, Mohammad M. Jalalzai, Aisha I. Ali-Gombe
, Mingxuan Sun, Golden G. Richard III
:
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics. 101872 - João Guerreiro
, Rui Moura, João Nuno Silva
:
TEEnder: SGX enclave migration using HSMs. 101874 - Hwee-Joo Kam
, Philip Menard
, Dustin Ormond, Robert E. Crossler
:
Cultivating cybersecurity learning: An integration of self-determination and flow. 101875 - Zhe Sun
, Lihua Yin, Chao Li, Weizhe Zhang, Ang Li, Zhihong Tian
:
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach. 101876 - Yuanfan Yao, Ziyu Wang, Pan Zhou:
Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach. 101886 - Chunpeng Ge
, Changchun Yin
, Zhe Liu, Liming Fang, Juncen Zhu, Huading Ling:
A privacy preserve big data analysis system for wearable wireless sensor network. 101887 - Héber Hwang Arcolezi
, Jean-François Couchot
, Selene Cerna, Christophe Guyeux
, Guillaume Royer, Bechara al Bouna, Xiaokui Xiao
:
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data. 101888 - Chen Fang
, Yuanbo Guo, Na Wang, Ankang Ju:
Highly efficient federated learning with strong privacy preservation in cloud computing. 101889 - Oleksii Konashevych
, Oleg Khovayko
:
Randpay: The technology for blockchain micropayments and transactions which require recipient's consent. 101892 - Abdelaziz Amara Korba, Nouredine Tamani, Yacine Ghamri-Doudane, Nour El Islem Karabadji:
Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI. 101896 - Noura Aleisa, Karen Renaud
, Ivano Bongiovanni
:
The privacy paradox applies to IoT devices too: A Saudi Arabian study. 101897 - Zuchao Ma, Liang Liu, Weizhi Meng
:
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks. 101898 - Liqun Yang, Xiaoming Zhang, Zhi Li, Zhoujun Li
, Yueying He:
Detecting bi-level false data injection attack based on time series analysis method in smart grid. 101899 - Cyril Onwubiko
:
Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud. 101900 - Davide Maiorca
, Ambra Demontis
, Battista Biggio
, Fabio Roli
, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. 101901 - Javier Galbally
:
A new Foe in biometrics: A narrative review of side-channel attacks. 101902 - Waqas Haider, Nour Moustafa
, Marwa Keshk, Amanda S. Fernandez
, Kim-Kwang Raymond Choo
, Abdul Wahab:
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. 101906 - Michael D. Iannacone
, Robert A. Bridges
:
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. 101907 - Nebrase Elmrabit
, Shuang-Hua Yang, Lili Yang, Huiyu Zhou
:
Insider Threat Risk Prediction based on Bayesian Network. 101908 - Jinyin Chen
, Haibin Zheng
, Ruoxi Chen, Hui Xiong:
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours. 101916 - Amit Dvir
, Angelos K. Marnerides
, Ran Dubin
, Nehor Golan, Chen Hajaj
:
Encrypted video traffic clustering demystified. 101917 - Mohammad Amiri-Zarandi, Rozita Dara, Evan D. G. Fraser:
A survey of machine learning-based solutions to protect privacy in the Internet of Things. 101921 - Jiang Xie
, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. 101923 - Bhaveer Bhana, Stephen Flowerday
:
Passphrase and keystroke dynamics authentication: Usable security. 101925 - Kelei Miao
, Xiufang Shi, Wen-an Zhang
:
Attack signal estimation for intrusion detection in industrial control system. 101926 - Kuang-Ming Kuo
, Paul C. Talley, Chi Hsien Huang
:
A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors. 101928 - Isabel Arend, Asaf Shabtai, Tali Idan, Ruty Keinan, Yoella Bereby-Meyer:
Passive- and not active-risk tendencies predict cyber security behavior. 101929 - Zhitao Guan
, Xianwen Sun, Lingyun Shi, Longfei Wu, Xiaojiang Du:
A differentially private greedy decision forest classification algorithm with high utility. 101930 - ElMouatez Billah Karbab, Mourad Debbabi
, Abdelouahid Derhab, Djedjiga Mouheb
:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. 101932 - Zongyuan Xiang, Dong Guo, Qiang Li
:
Detecting mobile advanced persistent threats based on large-scale DNS logs. 101933 - Guangsheng Yu
, Xuan Zha, Xu Wang
, Wei Ni
, Kan Yu, J. Andrew Zhang
, Ren Ping Liu:
A Unified Analytical model for proof-of-X schemes. 101934 - Tanmoy Kanti Das
, Sridhar Adepu, Jianying Zhou
:
Anomaly detection in Industrial Control Systems using Logical Analysis of Data. 101935 - Junfeng Tian, Zhidan Wang:
Fine-grained assured data deletion scheme based on attribute association. 101936 - Denglong Lv, Shibing Zhu:
Achieving secure big data collection based on trust evaluation and true data discovery. 101937
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.