Search dblp for Publications

export results for "toc:db/journals/compsec/compsec133.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AbuabedAT23,
  author       = {Zaina Abuabed and
                  Ahmad S. Alsadeh and
                  Adel Taweel},
  title        = {{STRIDE} threat model-based framework for assessing the vulnerabilities
                  of modern vehicles},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103391},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103391},
  doi          = {10.1016/J.COSE.2023.103391},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbuabedAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhnL23,
  author       = {Na{-}Young Ahn and
                  Dong Hoon Lee},
  title        = {IoT security: On-chip secure deletion scheme using {ECC} modulation
                  in IoT appliances},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103422},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103422},
  doi          = {10.1016/J.COSE.2023.103422},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhnL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AkiyamaSFYSY23,
  author       = {Mitsuaki Akiyama and
                  Shugo Shiraishi and
                  Akifumi Fukumoto and
                  Ryota Yoshimoto and
                  Eitaro Shioji and
                  Toshihiro Yamauchi},
  title        = {Seeing is not always believing: Insights on IoT manufacturing from
                  firmware composition analysis and vendor survey},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103389},
  doi          = {10.1016/J.COSE.2023.103389},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {XMal: {A} lightweight memory-based explainable obfuscated-malware
                  detector},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103409},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103409},
  doi          = {10.1016/J.COSE.2023.103409},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoveF23,
  author       = {Davide Bove and
                  Julian Funk},
  title        = {Basic secure services for standard {RISC-V} architectures},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103415},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103415},
  doi          = {10.1016/J.COSE.2023.103415},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoveF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoshiPSS23,
  author       = {Jay Doshi and
                  Kunal Parmar and
                  Raj Sanghavi and
                  Narendra Shekokar},
  title        = {A comprehensive dual-layer architecture for phishing and spam email
                  detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103378},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103378},
  doi          = {10.1016/J.COSE.2023.103378},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoshiPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EspositoMS23,
  author       = {Christian Esposito and
                  Vincenzo Moscato and
                  Giancarlo Sperl{\`{\i}}},
  title        = {Detecting malicious reviews and users affecting social reviewing systems:
                  {A} survey},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103407},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103407},
  doi          = {10.1016/J.COSE.2023.103407},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EspositoMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GandalMRB23,
  author       = {Neil Gandal and
                  Tyler Moore and
                  Michael Riordan and
                  Noa Barnir},
  title        = {Empirically evaluating the effect of security precautions on cyber
                  incidents},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103380},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103380},
  doi          = {10.1016/J.COSE.2023.103380},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GandalMRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GovindarajanSG23,
  author       = {Usharani Hareesh Govindarajan and
                  Dhiraj Kumar Singh and
                  Hardik A. Gohel},
  title        = {Forecasting cyber security threats landscape and associated technical
                  trends in telehealth using Bidirectional Encoder Representations from
                  Transformers {(BERT)}},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103404},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103404},
  doi          = {10.1016/J.COSE.2023.103404},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GovindarajanSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HengstlerKMNT23,
  author       = {Sebastian Hengstler and
                  Stephan Kuehnel and
                  Kristin Masuch and
                  Ilja Nastjuk and
                  Simon Trang},
  title        = {Should i really do that? Using quantile regression to examine the
                  impact of sanctions on information security policy compliance behavior},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103370},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103370},
  doi          = {10.1016/J.COSE.2023.103370},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HengstlerKMNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KampourakisGK23,
  author       = {Vyron Kampourakis and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review on wireless security testbeds in the
                  cyber-physical realm},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103383},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103383},
  doi          = {10.1016/J.COSE.2023.103383},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanAUIRAAA23,
  author       = {Saddam Hussain Khan and
                  Tahani Jaser Alahmadi and
                  Wasi Ullah and
                  Javed Iqbal and
                  Azizur Rahim and
                  Hend Khalid Alkahtani and
                  Wajdi Alghamdi and
                  Alaa Omran Almagrabi},
  title        = {A new deep boosted {CNN} and ensemble learning based IoT malware detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103385},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103385},
  doi          = {10.1016/J.COSE.2023.103385},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanAUIRAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiFHY23,
  author       = {Jiawen Li and
                  Kun Fang and
                  Xiaolin Huang and
                  Jie Yang},
  title        = {Improving adversarial robustness through a curriculum-guided reliable
                  distillation},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103411},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103411},
  doi          = {10.1016/J.COSE.2023.103411},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiFHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaLZZLGAA23,
  author       = {Hua Ma and
                  Qun Li and
                  Yifeng Zheng and
                  Zhi Zhang and
                  Xiaoning Liu and
                  Yansong Gao and
                  Said F. Al{-}Sarawi and
                  Derek Abbott},
  title        = {MUD-PQFed: Towards Malicious User Detection on model corruption in
                  Privacy-preserving Quantized Federated learning},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103406},
  doi          = {10.1016/J.COSE.2023.103406},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MaLZZLGAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkRPJ23,
  author       = {Ah{-}hyun Park and
                  Hyejin Ryu and
                  Woobeen Park and
                  Doowon Jeong},
  title        = {Forensic investigation framework for cryptocurrency wallet in the
                  end device},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103392},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103392},
  doi          = {10.1016/J.COSE.2023.103392},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkRPJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SantosVST23,
  author       = {Roger Robson dos Santos and
                  Eduardo K. Viegas and
                  Altair O. Santin and
                  Pietro Tedeschi},
  title        = {Federated learning for reliable model updates in network-based intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103413},
  doi          = {10.1016/J.COSE.2023.103413},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SantosVST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Silva23,
  author       = {Joseph Da Silva},
  title        = {Protection, expertise and domination: Cyber masculinity in practice},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103408},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103408},
  doi          = {10.1016/J.COSE.2023.103408},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Silva23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsengC23,
  author       = {Chinyang Henry Tseng and
                  Ya{-}Ting Chang},
  title        = {{EBDM:} Ensemble binary detection models for multi-class wireless
                  intrusion detection based on deep neural network},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103419},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103419},
  doi          = {10.1016/J.COSE.2023.103419},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsengC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsoupidiTP23,
  author       = {Rodothea{-}Myrsini Tsoupidi and
                  Elena Troubitsyna and
                  Panagiotis Papadimitratos},
  title        = {Thwarting code-reuse and side-channel attacks in embedded systems},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103405},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103405},
  doi          = {10.1016/J.COSE.2023.103405},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsoupidiTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZX23,
  author       = {Yongkang Wang and
                  Di{-}Hua Zhai and
                  Yuanqing Xia},
  title        = {{SCFL:} Mitigating backdoor attacks in federated learning based on
                  {SVD} and clustering},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103414},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103414},
  doi          = {10.1016/J.COSE.2023.103414},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YeohLSJ23,
  author       = {William Yeoh and
                  Marina Liu and
                  Malcolm Shore and
                  Frank Jiang},
  title        = {Zero trust cybersecurity: Critical success factors and {A} maturity
                  assessment framework},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103412},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103412},
  doi          = {10.1016/J.COSE.2023.103412},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YeohLSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinHZ23,
  author       = {Ya Yin and
                  Carol Hsu and
                  Zhongyun Zhou},
  title        = {Employees' in-role and extra-role information security behaviors from
                  the {P-E} fit perspective},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103390},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103390},
  doi          = {10.1016/J.COSE.2023.103390},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZakariyyaKA23,
  author       = {Idris Zakariyya and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri},
  title        = {Towards a robust, effective and resource efficient machine learning
                  technique for IoT security monitoring},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103388},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103388},
  doi          = {10.1016/J.COSE.2023.103388},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZakariyyaKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZangGZL23,
  author       = {Xiaodong Zang and
                  Jian Gong and
                  Xinchang Zhang and
                  Guiqing Li},
  title        = {Attack scenario reconstruction via fusing heterogeneous threat intelligence},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103420},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103420},
  doi          = {10.1016/J.COSE.2023.103420},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZangGZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/dAmbrosioPR23,
  author       = {Nicola d'Ambrosio and
                  Gaetano Perrone and
                  Simon Pietro Romano},
  title        = {Including insider threats into risk management through Bayesian threat
                  graph networks},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103410},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103410},
  doi          = {10.1016/J.COSE.2023.103410},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/dAmbrosioPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics