Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec135.bht:"
@article{DBLP:journals/compsec/AlEmariSF23, author = {Salam Al{-}Emari and Yousef K. Sanjalawe and Salam Fraihat}, title = {Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform}, journal = {Comput. Secur.}, volume = {135}, pages = {103512}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103512}, doi = {10.1016/J.COSE.2023.103512}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlEmariSF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BC23, author = {Judy Flavia B and Balika J. Chelliah}, title = {Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in {P2P} cloud environments}, journal = {Comput. Secur.}, volume = {135}, pages = {103475}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103475}, doi = {10.1016/J.COSE.2023.103475}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhardwajD23, author = {Sonam Bhardwaj and Mayank Dave}, title = {Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack}, journal = {Comput. Secur.}, volume = {135}, pages = {103521}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103521}, doi = {10.1016/J.COSE.2023.103521}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BhardwajD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CanonicoS23, author = {Roberto Canonico and Giancarlo Sperl{\`{\i}}}, title = {Industrial cyber-physical systems protection: {A} methodological review}, journal = {Comput. Secur.}, volume = {135}, pages = {103531}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103531}, doi = {10.1016/J.COSE.2023.103531}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CanonicoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CeldranSASGBPS23, author = {Alberto Huertas Celdr{\'{a}}n and Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Jan von der Assen and Dennis Shushack and {\'{A}}ngel Luis Perales G{\'{o}}mez and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {Behavioral fingerprinting to detect ransomware in resource-constrained devices}, journal = {Comput. Secur.}, volume = {135}, pages = {103510}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103510}, doi = {10.1016/J.COSE.2023.103510}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CeldranSASGBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLCZ23, author = {Jinyin Chen and Mingjun Li and Yao Cheng and Haibin Zheng}, title = {FedRight: An effective model copyright protection for federated learning}, journal = {Comput. Secur.}, volume = {135}, pages = {103504}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103504}, doi = {10.1016/J.COSE.2023.103504}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZZXYYCL23, author = {Tieming Chen and Chenbin Zheng and Tiantian Zhu and Chunlin Xiong and Jie Ying and Qixuan Yuan and Wenrui Cheng and Mingqi Lv}, title = {System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends}, journal = {Comput. Secur.}, volume = {135}, pages = {103485}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103485}, doi = {10.1016/J.COSE.2023.103485}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenZZXYYCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CifuentesGHKM23, author = {Cristina Cifuentes and Fran{\c{c}}ois Gauthier and Behnaz Hassanshahi and Padmanabhan Krishnan and Davin McCall}, title = {The role of program analysis in security vulnerability detection: Then and now}, journal = {Comput. Secur.}, volume = {135}, pages = {103463}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103463}, doi = {10.1016/J.COSE.2023.103463}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CifuentesGHKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DanglSR23, author = {Thomas Dangl and Stewart Sentanoe and Hans P. Reiser}, title = {VMIFresh: Efficient and fresh caches for virtual machine introspection}, journal = {Comput. Secur.}, volume = {135}, pages = {103527}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103527}, doi = {10.1016/J.COSE.2023.103527}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DanglSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongDWYG23, author = {Huoyuan Dong and Jialiang Dong and Shaohua Wan and Shuai Yuan and Zhitao Guan}, title = {Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models}, journal = {Comput. Secur.}, volume = {135}, pages = {103482}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103482}, doi = {10.1016/J.COSE.2023.103482}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DongDWYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ForsbergF23, author = {Joonas Forsberg and Tapio Frantti}, title = {Technical performance metrics of a security operations center}, journal = {Comput. Secur.}, volume = {135}, pages = {103529}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103529}, doi = {10.1016/J.COSE.2023.103529}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ForsbergF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuSK23, author = {Yeming Gu and Hui Shu and Fei Kang}, title = {BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries}, journal = {Comput. Secur.}, volume = {135}, pages = {103508}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103508}, doi = {10.1016/J.COSE.2023.103508}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoXZ23, author = {Zhenyuan Guo and Lei Xu and Liehuang Zhu}, title = {FedSIGN: {A} sign-based federated learning framework with privacy and robustness guarantees}, journal = {Comput. Secur.}, volume = {135}, pages = {103474}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103474}, doi = {10.1016/J.COSE.2023.103474}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoYWZLX23, author = {Pengfei Guo and Yingjian Yan and Junjie Wang and Jingxin Zhong and Yanjiang Liu and Jinsong Xu}, title = {Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source {RISC-V} processor}, journal = {Comput. Secur.}, volume = {135}, pages = {103480}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103480}, doi = {10.1016/J.COSE.2023.103480}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoYWZLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanMBY23, author = {Kyusuk Han and Hyeran Mun and Malavika Balakrishnan and Chan Yeob Yeun}, title = {Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments}, journal = {Comput. Secur.}, volume = {135}, pages = {103481}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103481}, doi = {10.1016/J.COSE.2023.103481}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanMBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaYZLM23, author = {Zhizhuang Jia and Chao Yang and Xiaoyun Zhao and Xinghua Li and Jian Feng Ma}, title = {Design and implementation of an efficient container tag dynamic taint analysis}, journal = {Comput. Secur.}, volume = {135}, pages = {103528}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103528}, doi = {10.1016/J.COSE.2023.103528}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiaYZLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KangXZJSZ23, author = {Zi Kang and Hui Xia and Rui Zhang and Shuliang Jiang and Xiaolong Shi and Zuming Zhang}, title = {{FGDA-GS:} Fast guided decision attack based on gradient signs for skeletal action recognition}, journal = {Comput. Secur.}, volume = {135}, pages = {103522}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103522}, doi = {10.1016/J.COSE.2023.103522}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KangXZJSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KishoreBMM23, author = {Pushkar Kishore and Swadhin Kumar Barisal and Durga Prasad Mohapatra and Rajib Mall}, title = {An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103499}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103499}, doi = {10.1016/J.COSE.2023.103499}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KishoreBMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KornyoAOOPBB23, author = {Oliver Kornyo and Michael Asante and Richard Opoku and Kwabena Owusu{-}Agyemang and Benjamin Tei Partey and Emmanuel Kwesi Baah and Nkrumah Boadu}, title = {Botnet attacks classification in {AMI} networks with recursive feature elimination {(RFE)} and machine learning algorithms}, journal = {Comput. Secur.}, volume = {135}, pages = {103456}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103456}, doi = {10.1016/J.COSE.2023.103456}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KornyoAOOPBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCPZWZX23, author = {Lin Li and Chao Chen and Lei Pan and Leo Yu Zhang and Zhifeng Wang and Jun Zhang and Yang Xiang}, title = {A Survey of PPG's Application in Authentication}, journal = {Comput. Secur.}, volume = {135}, pages = {103488}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103488}, doi = {10.1016/J.COSE.2023.103488}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCPZWZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCZY23, author = {Chao Li and Yanan Cheng and Zhaoxin Zhang and Ping Yu}, title = {Configuration anormaly detection and resolution risk assessment of authoritative domain name server}, journal = {Comput. Secur.}, volume = {135}, pages = {103426}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103426}, doi = {10.1016/J.COSE.2023.103426}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiHDQG23, author = {Zhengfa Li and Chuanhe Huang and Shuhua Deng and Wanyu Qiu and Xieping Gao}, title = {A soft actor-critic reinforcement learning algorithm for network intrusion detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103502}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103502}, doi = {10.1016/J.COSE.2023.103502}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiHDQG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLJZZ23, author = {Munan Li and Hongbo Liu and Xiangdong Jiang and Zheng Zhao and Tianhao Zhang}, title = {{SENSE:} An unsupervised semantic learning model for cross-platform vulnerability search}, journal = {Comput. Secur.}, volume = {135}, pages = {103500}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103500}, doi = {10.1016/J.COSE.2023.103500}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiLJZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinXHLZL23, author = {Zhutian Lin and Xi Xiao and Guangwu Hu and Qing Li and Bin Zhang and Xiapu Luo}, title = {Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning}, journal = {Comput. Secur.}, volume = {135}, pages = {103479}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103479}, doi = {10.1016/J.COSE.2023.103479}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LinXHLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuWLXN23, author = {Xueyan Liu and Jing Wang and Qiong Liu and Xin Xiong and Shufen Niu}, title = {Bidirectional location privacy protection scheme for epidemiological investigation based on {OT}}, journal = {Comput. Secur.}, volume = {135}, pages = {103453}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103453}, doi = {10.1016/J.COSE.2023.103453}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuWLXN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopesZAALRP23, author = {Ivandro Ortet Lopes and Deqing Zou and Ihsan H. Abdulqadder and Saeed Akbar and Zhen Li and Francis A. Ruambo and Wagner Pereira}, title = {Network intrusion detection based on the temporal convolutional model}, journal = {Comput. Secur.}, volume = {135}, pages = {103465}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103465}, doi = {10.1016/J.COSE.2023.103465}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MillsWL23, author = {Alan Mills and Jonathan White and Phil Legg}, title = {Longitudinal risk-based security assessment of docker software container images}, journal = {Comput. Secur.}, volume = {135}, pages = {103478}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103478}, doi = {10.1016/J.COSE.2023.103478}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MillsWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaseerNAMS23, author = {Ayesha Naseer and Humza Naseer and Atif Ahmad and Sean B. Maynard and Adil Masood Siddiqui}, title = {Moving towards agile cybersecurity incident response: {A} case study exploring the enabling role of big data analytics-embedded dynamic capabilities}, journal = {Comput. Secur.}, volume = {135}, pages = {103525}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103525}, doi = {10.1016/J.COSE.2023.103525}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OkeyURRK23, author = {Ogobuchi Daniel Okey and Ekikere Umoren Udo and Renata Lopes Rosa and Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez and Jo{\~{a}}o Henrique Kleinschmidt}, title = {Investigating ChatGPT and cybersecurity: {A} perspective on topic modeling and sentiment analysis}, journal = {Comput. Secur.}, volume = {135}, pages = {103476}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103476}, doi = {10.1016/J.COSE.2023.103476}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/OkeyURRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PasikhaniCG23, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Incremental hybrid intrusion detection for 6LoWPAN}, journal = {Comput. Secur.}, volume = {135}, pages = {103447}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103447}, doi = {10.1016/J.COSE.2023.103447}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PlappertLEJFH23, author = {Christian Plappert and Dominik Lorych and Michael Eckel and Lukas J{\"{a}}ger and Andreas Fuchs and Ronald Heddergott}, title = {Evaluating the applicability of hardware trust anchors for automotive applications}, journal = {Comput. Secur.}, volume = {135}, pages = {103514}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103514}, doi = {10.1016/J.COSE.2023.103514}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PlappertLEJFH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PohnGZB23, author = {Daniela P{\"{o}}hn and Nils Gruschka and Leonhard Ziegler and Andre B{\"{u}}ttner}, title = {A framework for analyzing authentication risks in account networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103515}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103515}, doi = {10.1016/J.COSE.2023.103515}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PohnGZB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PreuveneersJ23, author = {Davy Preuveneers and Wouter Joosen}, title = {Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections}, journal = {Comput. Secur.}, volume = {135}, pages = {103505}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103505}, doi = {10.1016/J.COSE.2023.103505}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PreuveneersJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuanWLL23, author = {Hanyu Quan and Boyang Wang and Ming Li and Iraklis Leontiadis}, title = {FastReach: {A} system for privacy-preserving reachability queries over location data}, journal = {Comput. Secur.}, volume = {135}, pages = {103513}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103513}, doi = {10.1016/J.COSE.2023.103513}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/QuanWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SSK23, author = {Devi Priya V. S and Sibi Chakkaravarthy Sethuraman and Muhammad Khurram Khan}, title = {Container security: Precaution levels, mitigation strategies, and research perspectives}, journal = {Comput. Secur.}, volume = {135}, pages = {103490}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103490}, doi = {10.1016/J.COSE.2023.103490}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SarikayaKD23, author = {Alper Sarikaya and Banu G{\"{u}}nel Kili{\c{c}} and Mehmet Demirci}, title = {{RAIDS:} Robust autoencoder-based intrusion detection system model against adversarial attacks}, journal = {Comput. Secur.}, volume = {135}, pages = {103483}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103483}, doi = {10.1016/J.COSE.2023.103483}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SarikayaKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharifB23, author = {Dyari Mohammad Sharif and Hakem Beitollahi}, title = {Detection of application-layer DDoS attacks using machine learning and genetic algorithms}, journal = {Comput. Secur.}, volume = {135}, pages = {103511}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103511}, doi = {10.1016/J.COSE.2023.103511}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SharifB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunOZLWZ23, author = {Hongyu Sun and Guoliang Ou and Ziqiu Zheng and Lei Liao and He Wang and Yuqing Zhang}, title = {Inconsistent measurement and incorrect detection of software names in security vulnerability reports}, journal = {Comput. Secur.}, volume = {135}, pages = {103477}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103477}, doi = {10.1016/J.COSE.2023.103477}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SunOZLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanXHWL23, author = {Xiao Tan and Qi Xie and Lidong Han and Shengbao Wang and Wenhao Liu}, title = {Proof of retrievability with flexible designated verification for cloud storage}, journal = {Comput. Secur.}, volume = {135}, pages = {103486}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103486}, doi = {10.1016/J.COSE.2023.103486}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TanXHWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianJD23, author = {Chuan (Annie) Tian and Matthew L. Jensen and Alexandra Durcikova}, title = {Phishing susceptibility across industries: The differential impact of influence techniques}, journal = {Comput. Secur.}, volume = {135}, pages = {103487}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103487}, doi = {10.1016/J.COSE.2023.103487}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TianJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TrabelsiFJ23, author = {Rahma Trabelsi and Ghofrane Fersi and Mohamed Jmaiel}, title = {Access control in Internet of Things: {A} survey}, journal = {Comput. Secur.}, volume = {135}, pages = {103472}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103472}, doi = {10.1016/J.COSE.2023.103472}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TrabelsiFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangMLLWHC23, author = {Leiqi Wang and Xiu Ma and Ning Li and Qiujian Lv and Yan Wang and Weiqing Huang and Haiyan Chen}, title = {TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103466}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103466}, doi = {10.1016/J.COSE.2023.103466}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangMLLWHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZBKCR23, author = {Qifan Wang and Lei Zhou and Jianli Bai and Yun Sing Koh and Shujie Cui and Giovanni Russello}, title = {\emph{HT2ML}: An efficient hybrid framework for privacy-preserving Machine Learning using {HE} and {TEE}}, journal = {Comput. Secur.}, volume = {135}, pages = {103509}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103509}, doi = {10.1016/J.COSE.2023.103509}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangZBKCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WenK23, author = {Shao{-}Fang Wen and Basel Katt}, title = {A quantitative security evaluation and analysis model for web applications based on {OWASP} application security verification standard}, journal = {Comput. Secur.}, volume = {135}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103532}, doi = {10.1016/J.COSE.2023.103532}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WenK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YanHY23, author = {Haotian Yan and Haibo Hu and Qingqing Ye}, title = {Partial message verification in fog-based industrial Internet of things}, journal = {Comput. Secur.}, volume = {135}, pages = {103530}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103530}, doi = {10.1016/J.COSE.2023.103530}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YanHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YousefiK23, author = {Fares Yousefi and Hoshang Kolivand}, title = {A robust brain pattern for brain-based authentication methods using deep breath}, journal = {Comput. Secur.}, volume = {135}, pages = {103520}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103520}, doi = {10.1016/J.COSE.2023.103520}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YousefiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZahoorCAP23, author = {Ehtesham Zahoor and Maryam Chaudhary and Sabina Akhtar and Olivier Perrin}, title = {A formal approach for the identification of redundant authorization policies in Kubernetes}, journal = {Comput. Secur.}, volume = {135}, pages = {103473}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103473}, doi = {10.1016/J.COSE.2023.103473}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZahoorCAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZarinUKH23, author = {Rahat Zarin and Niamat Ullah and Amir Khan and Usa Wannasingha Humphries}, title = {A numerical study of a new non-linear fractal fractional mathematical model of malicious codes propagation in wireless sensor networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103484}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103484}, doi = {10.1016/J.COSE.2023.103484}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZarinUKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangX23, author = {Chunyong Zhang and Yang Xin}, title = {VulGAI: vulnerability detection based on graphs and images}, journal = {Comput. Secur.}, volume = {135}, pages = {103501}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103501}, doi = {10.1016/J.COSE.2023.103501}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengCSMYY23, author = {Haibin Zheng and Jinyin Chen and Wenchang Shangguan and Zhaoyan Ming and Xing Yang and Zhijun Yang}, title = {{GONE:} {A} generic {O(1)} NoisE layer for protecting privacy of deep neural networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103471}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103471}, doi = {10.1016/J.COSE.2023.103471}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhengCSMYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhongLH23, author = {Meihui Zhong and Mingwei Lin and Zhu He}, title = {Dynamic multi-scale topological representation for enhancing network intrusion detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103516}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103516}, doi = {10.1016/J.COSE.2023.103516}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhongLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.