Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec133.bht:"
@article{DBLP:journals/compsec/AbuabedAT23, author = {Zaina Abuabed and Ahmad S. Alsadeh and Adel Taweel}, title = {{STRIDE} threat model-based framework for assessing the vulnerabilities of modern vehicles}, journal = {Comput. Secur.}, volume = {133}, pages = {103391}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103391}, doi = {10.1016/J.COSE.2023.103391}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbuabedAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhnL23, author = {Na{-}Young Ahn and Dong Hoon Lee}, title = {IoT security: On-chip secure deletion scheme using {ECC} modulation in IoT appliances}, journal = {Comput. Secur.}, volume = {133}, pages = {103422}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103422}, doi = {10.1016/J.COSE.2023.103422}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhnL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AkiyamaSFYSY23, author = {Mitsuaki Akiyama and Shugo Shiraishi and Akifumi Fukumoto and Ryota Yoshimoto and Eitaro Shioji and Toshihiro Yamauchi}, title = {Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey}, journal = {Comput. Secur.}, volume = {133}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103389}, doi = {10.1016/J.COSE.2023.103389}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlaniMM23, author = {Mohammed M. Alani and Atefeh Mashatan and Ali Miri}, title = {XMal: {A} lightweight memory-based explainable obfuscated-malware detector}, journal = {Comput. Secur.}, volume = {133}, pages = {103409}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103409}, doi = {10.1016/J.COSE.2023.103409}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlaniMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoveF23, author = {Davide Bove and Julian Funk}, title = {Basic secure services for standard {RISC-V} architectures}, journal = {Comput. Secur.}, volume = {133}, pages = {103415}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103415}, doi = {10.1016/J.COSE.2023.103415}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoveF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoshiPSS23, author = {Jay Doshi and Kunal Parmar and Raj Sanghavi and Narendra Shekokar}, title = {A comprehensive dual-layer architecture for phishing and spam email detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103378}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103378}, doi = {10.1016/J.COSE.2023.103378}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoshiPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EspositoMS23, author = {Christian Esposito and Vincenzo Moscato and Giancarlo Sperl{\`{\i}}}, title = {Detecting malicious reviews and users affecting social reviewing systems: {A} survey}, journal = {Comput. Secur.}, volume = {133}, pages = {103407}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103407}, doi = {10.1016/J.COSE.2023.103407}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EspositoMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GandalMRB23, author = {Neil Gandal and Tyler Moore and Michael Riordan and Noa Barnir}, title = {Empirically evaluating the effect of security precautions on cyber incidents}, journal = {Comput. Secur.}, volume = {133}, pages = {103380}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103380}, doi = {10.1016/J.COSE.2023.103380}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GandalMRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GovindarajanSG23, author = {Usharani Hareesh Govindarajan and Dhiraj Kumar Singh and Hardik A. Gohel}, title = {Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers {(BERT)}}, journal = {Comput. Secur.}, volume = {133}, pages = {103404}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103404}, doi = {10.1016/J.COSE.2023.103404}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GovindarajanSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HengstlerKMNT23, author = {Sebastian Hengstler and Stephan Kuehnel and Kristin Masuch and Ilja Nastjuk and Simon Trang}, title = {Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior}, journal = {Comput. Secur.}, volume = {133}, pages = {103370}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103370}, doi = {10.1016/J.COSE.2023.103370}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HengstlerKMNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KampourakisGK23, author = {Vyron Kampourakis and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A systematic literature review on wireless security testbeds in the cyber-physical realm}, journal = {Comput. Secur.}, volume = {133}, pages = {103383}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103383}, doi = {10.1016/J.COSE.2023.103383}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanAUIRAAA23, author = {Saddam Hussain Khan and Tahani Jaser Alahmadi and Wasi Ullah and Javed Iqbal and Azizur Rahim and Hend Khalid Alkahtani and Wajdi Alghamdi and Alaa Omran Almagrabi}, title = {A new deep boosted {CNN} and ensemble learning based IoT malware detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103385}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103385}, doi = {10.1016/J.COSE.2023.103385}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhanAUIRAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiFHY23, author = {Jiawen Li and Kun Fang and Xiaolin Huang and Jie Yang}, title = {Improving adversarial robustness through a curriculum-guided reliable distillation}, journal = {Comput. Secur.}, volume = {133}, pages = {103411}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103411}, doi = {10.1016/J.COSE.2023.103411}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiFHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaLZZLGAA23, author = {Hua Ma and Qun Li and Yifeng Zheng and Zhi Zhang and Xiaoning Liu and Yansong Gao and Said F. Al{-}Sarawi and Derek Abbott}, title = {MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning}, journal = {Comput. Secur.}, volume = {133}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103406}, doi = {10.1016/J.COSE.2023.103406}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MaLZZLGAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkRPJ23, author = {Ah{-}hyun Park and Hyejin Ryu and Woobeen Park and Doowon Jeong}, title = {Forensic investigation framework for cryptocurrency wallet in the end device}, journal = {Comput. Secur.}, volume = {133}, pages = {103392}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103392}, doi = {10.1016/J.COSE.2023.103392}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkRPJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SantosVST23, author = {Roger Robson dos Santos and Eduardo K. Viegas and Altair O. Santin and Pietro Tedeschi}, title = {Federated learning for reliable model updates in network-based intrusion detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103413}, doi = {10.1016/J.COSE.2023.103413}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SantosVST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Silva23, author = {Joseph Da Silva}, title = {Protection, expertise and domination: Cyber masculinity in practice}, journal = {Comput. Secur.}, volume = {133}, pages = {103408}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103408}, doi = {10.1016/J.COSE.2023.103408}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Silva23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsengC23, author = {Chinyang Henry Tseng and Ya{-}Ting Chang}, title = {{EBDM:} Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network}, journal = {Comput. Secur.}, volume = {133}, pages = {103419}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103419}, doi = {10.1016/J.COSE.2023.103419}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsengC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsoupidiTP23, author = {Rodothea{-}Myrsini Tsoupidi and Elena Troubitsyna and Panagiotis Papadimitratos}, title = {Thwarting code-reuse and side-channel attacks in embedded systems}, journal = {Comput. Secur.}, volume = {133}, pages = {103405}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103405}, doi = {10.1016/J.COSE.2023.103405}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsoupidiTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZX23, author = {Yongkang Wang and Di{-}Hua Zhai and Yuanqing Xia}, title = {{SCFL:} Mitigating backdoor attacks in federated learning based on {SVD} and clustering}, journal = {Comput. Secur.}, volume = {133}, pages = {103414}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103414}, doi = {10.1016/J.COSE.2023.103414}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YeohLSJ23, author = {William Yeoh and Marina Liu and Malcolm Shore and Frank Jiang}, title = {Zero trust cybersecurity: Critical success factors and {A} maturity assessment framework}, journal = {Comput. Secur.}, volume = {133}, pages = {103412}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103412}, doi = {10.1016/J.COSE.2023.103412}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YeohLSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinHZ23, author = {Ya Yin and Carol Hsu and Zhongyun Zhou}, title = {Employees' in-role and extra-role information security behaviors from the {P-E} fit perspective}, journal = {Comput. Secur.}, volume = {133}, pages = {103390}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103390}, doi = {10.1016/J.COSE.2023.103390}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZakariyyaKA23, author = {Idris Zakariyya and Harsha K. Kalutarage and M. Omar Al{-}Kadri}, title = {Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring}, journal = {Comput. Secur.}, volume = {133}, pages = {103388}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103388}, doi = {10.1016/J.COSE.2023.103388}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZakariyyaKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZangGZL23, author = {Xiaodong Zang and Jian Gong and Xinchang Zhang and Guiqing Li}, title = {Attack scenario reconstruction via fusing heterogeneous threat intelligence}, journal = {Comput. Secur.}, volume = {133}, pages = {103420}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103420}, doi = {10.1016/J.COSE.2023.103420}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZangGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/dAmbrosioPR23, author = {Nicola d'Ambrosio and Gaetano Perrone and Simon Pietro Romano}, title = {Including insider threats into risk management through Bayesian threat graph networks}, journal = {Comput. Secur.}, volume = {133}, pages = {103410}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103410}, doi = {10.1016/J.COSE.2023.103410}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/dAmbrosioPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.