![](https://dblp1.uni-trier.de/img/logo.ua.320x120.png)
![](https://dblp1.uni-trier.de/img/dropdown.dark.16x16.png)
![](https://dblp1.uni-trier.de/img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Journal of Computer Security, Volume 32
Volume 32, Number 1, 2024
- Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha:
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. 1-30 - Yubao Zhang, Haining Wang, Angelos Stavrou:
A multiview clustering framework for detecting deceptive reviews. 31-52 - Vinod Ramesh Falmari, M. Brindha:
Secure authentication protocols to resist off-line attacks on authentication data table. 53-76
Volume 32, Number 2, 2024
- Isaac Amankona Obiri, Abigail Akosua Addobea, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah:
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud. 77-115 - Jianfeng Zhang, Wensheng Zhang, Jingdong Xu:
StegEraser: Defending cybersecurity against malicious covert communications. 117-139 - Jiale Luo, Zhewngyu Zhang, Jiesi Luo, Pin Yang, Runyu Jing:
Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework. 141-163 - Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao:
Cache attacks on subkey calculation of Blowfish. 165-191
![](https://dblp1.uni-trier.de/img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.