default search action
Computers & Security, Volume 97
Volume 97, October 2020
- Ngoc Hong Tran, Nhien-An Le-Khac, M. Tahar Kechadi:
Lightweight privacy-Preserving data classification. 101835 - Chuan Zhang, Chang Xu, Liehuang Zhu, Yanwei Li, Can Zhang, Huishu Wu:
An efficient and privacy-preserving truth discovery scheme in crowdsensing applications. 101848 - Jianguo Ren, Chunming Zhang:
A differential game method against attacks in heterogeneous honeynet. 101870 - Vinita Verma, Sunil Kumar Muttoo, V. B. Singh:
Multiclass malware classification via first- and second-order texture statistics. 101895 - Maxime Compastié, Rémi Badonnel, Olivier Festor, Ruan He:
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models. 101905 - Di Lu, Ruidong Han, Yue Wang, Yongzhi Wang, Xuewen Dong, Xindi Ma, Teng Li, Jianfeng Ma:
A secured TPM integration scheme towards smart embedded system based collaboration network. 101922 - Qizhang Sun, Martijn C. Willemsen, Bart P. Knijnenburg:
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing. 101924 - Fenghua Li, Yongjun Li, Siyuan Leng, Yunchuan Guo, Kui Geng, Zhen Wang, Liang Fang:
Dynamic countermeasures selection for multi-path attacks. 101927 - Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner:
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. 101931 - Ayan Kumar Das, Sidra Kalam, Nausheen Sahar, Ditipriya Sinha:
UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices. 101938 - Jason N. Doctor, Jaideep Vaidya, Xiaoqian Jiang, Shuang Wang, Lisa M. Schilling, Toan Ong, Michael E. Matheny, Lucila Ohno-Machado, Daniella Meeker:
Efficient determination of equivalence for encrypted data. 101939 - Antonio M. Larriba, José M. Sempere, Damián López:
A two authorities electronic vote scheme. 101940 - Marina Evangelou, Niall M. Adams:
An anomaly detection framework for cyber-security data. 101941 - Junbin Fang, Guikai Xi, Rong Li, Qian Chen, Puxi Lin, Sijin Li, Zoe Lin Jiang, Siu-Ming Yiu:
Coarse-to-fine two-stage semantic video carving approach in digital forensics. 101942 - Tudor Boran, Muhamet Martinaj, Md. Hossain:
Authorship identification on limited samplings. 101943 - Joachim Meyer, Omer Dembinsky, Tal Raviv:
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation. 101944 - Boyu Kuang, Anmin Fu, Lu Zhou, Willy Susilo, Yuqing Zhang:
DO-RA: Data-oriented runtime attestation for IoT devices. 101945 - Humaira Arshad, Esther Omolara, Isaac Oludare Abiodun, Abdulhai Aminu:
A semi-automated forensic investigation model for online social networks. 101946 - Antreas Dionysiou, Elias Athanasopoulos:
SoK: Machine vs. machine - A systematic classification of automated machine learning-based CAPTCHA solvers. 101947 - Masood Mansoori, Ian Welch:
How do they find us? A study of geolocation tracking techniques of malicious web sites. 101948 - Nana Wang, Mohan S. Kankanhalli:
Protecting sensitive place visits in privacy-preserving trajectory publishing. 101949 - Shunmei Meng, Zijian Gao, Qianmu Li, Hao Wang, Hong-Ning Dai, Lianyong Qi:
Security-Driven hybrid collaborative recommendation method for cloud-based iot services. 101950 - Mahawaga Arachchige Pathum Chamikara, Peter Bertók, Ibrahim Khalil, Dongxi Liu, Seyit Camtepe:
Privacy Preserving Face Recognition Utilizing Differential Privacy. 101951 - Jiaxuan Han, Cheng Huang, Fan Shi, Jiayong Liu:
Covert timing channel detection method based on time interval and payload length analysis. 101952 - Wenjing Zhang, Bo Jiang, Ming Li, Ravi Tandon, Qiao Liu, Hui Li:
Aggregation-based location privacy: An information theoretic approach. 101953 - Tianyue Mi, Mengke Gou, Guangyu Zhou, Yiqun Gan, Ralf Schwarzer:
Effects of planning and action control on smartphone security behavior. 101954 - Serkan Gönen, Hasan Hüseyin Sayan, Ercan Nurcan Yilmaz, Furkan Üstünsoy, Gökçe Karacayilmaz:
False data injection attacks and the insider threat in smart systems. 101955 - Runkai Yang, Xiaolin Chang, Jelena V. Misic, Vojislav B. Misic:
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views. 101956 - Mohamed Mejri, Hamdi Yahyaoui, Azzam Mourad, Mohamad Chehab:
A rewriting system for the assessment of XACML policies relationship. 101957 - Akash Suresh Patil, Rafik Hamza, Alzubair Hassan, Nan Jiang, Hongyang Yan, Jin Li:
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts. 101958 - Lennon Y. C. Chang, Nicholas Coppel:
Building cyber security awareness in a developing country: Lessons from Myanmar. 101959 - Chunyong Yin, Bo Li, Zhichao Yin:
A distributed sensing data anomaly detection scheme. 101960 - Xiuyan Shao, Mikko T. Siponen, Fufan Liu:
Shall we follow? Impact of reputation concern on information security managers' investment decisions. 101961 - R. Santhana Krishnan, Eanoch Golden Julie, Yesudhas Harold Robinson, Raghvendra Kumar, Pham Huy Thong, Le Hoang Son:
Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks. 101962 - Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner:
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures. 101963 - Isabel Arend, Asaf Shabtai, Tali Idan, Ruty Keinan, Yoella Bereby-Meyer:
Passive- and not active-risk tendencies predict cyber security behavior. 101964 - ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning. 101965 - Shuyun Shi, Debiao He, Li Li, Neeraj Kumar, Muhammad Khurram Khan, Kim-Kwang Raymond Choo:
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey. 101966 - Rakesh Kumar, Rinkaj Goyal:
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC). 101967 - Yair Meidan, Vinay Sachidananda, Hongyi Peng, Racheli Sagron, Yuval Elovici, Asaf Shabtai:
A novel approach for detecting vulnerable IoT devices connected behind a home NAT. 101968 - Rick van der Kleij, Remco Wijn, Tineke Hof:
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations. 101970 - Zhijun Wu, Wenzhi Feng, Meng Yue, Xinran Xu, Liang Liu:
Mitigation measures of collusive interest flooding attacks in named data networking. 101971 - Thiago S. Rocha, Eduardo Souto, Khalil El-Khatib:
Functionality-based mobile application recommendation system with security and privacy awareness. 101972 - Thameur Dhieb, Sourour Njah, Houcine Boubaker, Wael Ouarda, Mounir Ben Ayed, Adel M. Alimi:
Towards a novel biometric system for forensic document examination. 101973 - Tun Li, Yutian Liu, Yanbing Liu, Yunpeng Xiao, Nguyen Nang An:
Attack plan recognition using hidden Markov and probabilistic inference. 101974 - Eman Salem Alashwali, Pawel Szalachowski, Andrew Martin:
Exploring HTTPS security inconsistencies: A cross-regional perspective. 101975 - Yuyang Zhou, Guang Cheng, Shanqing Jiang, Yuyu Zhao, Zihan Chen:
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes. 101976 - Dongzi Jin, Yiqin Lu, Jiancheng Qin, Zhe Cheng, Zhongshu Mao:
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism. 101984 - Ajish S, K. S. Anil Kumar:
Iris template protection using double bloom filter based feature transformation. 101985 - Shravya Paruchuri, Andrew Case, Golden G. Richard III:
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools. 101986 - Mohammad Ashrafuzzaman, Saikat Das, Yacine Chakhchoukh, Sajjan G. Shiva, Frederick T. Sheldon:
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning. 101994 - Claire Seungeun Lee, Ji Hye Kim:
Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts. 101995 - Daniel A. Sepulveda Estay, Rishikesh Sahay, Michael Bruhn Barfod, Christian Damsgaard Jensen:
A systematic review of cyber-resilience assessment frameworks. 101996 - Fei Tang, Boyang Ma, Jinku Li, Fengwei Zhang, Jipeng Su, Jianfeng Ma:
RansomSpector: An introspection-based approach to detect crypto ransomware. 101997 - Vasileios Mavroeidis, Joe Brule:
A nonproprietary language for the command and control of cyber defenses - OpenC2. 101999 - Hui Liu, Juanru Li, Dawu Gu:
Understanding the security of app-in-the-middle IoT. 102000 - Rizwan Ur Rahman, Deepak Singh Tomar:
New biostatistics features for detecting web bot activity on web applications. 102001
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.