Search dblp for Publications

export results for "toc:db/journals/compsec/compsec135.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlEmariSF23,
  author       = {Salam Al{-}Emari and
                  Yousef K. Sanjalawe and
                  Salam Fraihat},
  title        = {Detection of obfuscated Tor traffic based on bidirectional generative
                  adversarial networks and vision transform},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103512},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103512},
  doi          = {10.1016/J.COSE.2023.103512},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlEmariSF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BC23,
  author       = {Judy Flavia B and
                  Balika J. Chelliah},
  title        = {Artificial lizard search optimized fuzzy logic approach to addressing
                  authentication and data security challenges in {P2P} cloud environments},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103475},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103475},
  doi          = {10.1016/J.COSE.2023.103475},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhardwajD23,
  author       = {Sonam Bhardwaj and
                  Mayank Dave},
  title        = {Enhanced neural network-based attack investigation framework for network
                  forensics: Identification, detection, and analysis of the attack},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103521},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103521},
  doi          = {10.1016/J.COSE.2023.103521},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BhardwajD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CanonicoS23,
  author       = {Roberto Canonico and
                  Giancarlo Sperl{\`{\i}}},
  title        = {Industrial cyber-physical systems protection: {A} methodological review},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103531},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103531},
  doi          = {10.1016/J.COSE.2023.103531},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CanonicoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CeldranSASGBPS23,
  author       = {Alberto Huertas Celdr{\'{a}}n and
                  Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Jan von der Assen and
                  Dennis Shushack and
                  {\'{A}}ngel Luis Perales G{\'{o}}mez and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {Behavioral fingerprinting to detect ransomware in resource-constrained
                  devices},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103510},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103510},
  doi          = {10.1016/J.COSE.2023.103510},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CeldranSASGBPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLCZ23,
  author       = {Jinyin Chen and
                  Mingjun Li and
                  Yao Cheng and
                  Haibin Zheng},
  title        = {FedRight: An effective model copyright protection for federated learning},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103504},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103504},
  doi          = {10.1016/J.COSE.2023.103504},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZZXYYCL23,
  author       = {Tieming Chen and
                  Chenbin Zheng and
                  Tiantian Zhu and
                  Chunlin Xiong and
                  Jie Ying and
                  Qixuan Yuan and
                  Wenrui Cheng and
                  Mingqi Lv},
  title        = {System-level data management for endpoint advanced persistent threat
                  detection: Issues, challenges and trends},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103485},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103485},
  doi          = {10.1016/J.COSE.2023.103485},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZZXYYCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CifuentesGHKM23,
  author       = {Cristina Cifuentes and
                  Fran{\c{c}}ois Gauthier and
                  Behnaz Hassanshahi and
                  Padmanabhan Krishnan and
                  Davin McCall},
  title        = {The role of program analysis in security vulnerability detection:
                  Then and now},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103463},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103463},
  doi          = {10.1016/J.COSE.2023.103463},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CifuentesGHKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DanglSR23,
  author       = {Thomas Dangl and
                  Stewart Sentanoe and
                  Hans P. Reiser},
  title        = {VMIFresh: Efficient and fresh caches for virtual machine introspection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103527},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103527},
  doi          = {10.1016/J.COSE.2023.103527},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DanglSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongDWYG23,
  author       = {Huoyuan Dong and
                  Jialiang Dong and
                  Shaohua Wan and
                  Shuai Yuan and
                  Zhitao Guan},
  title        = {Transferable adversarial distribution learning: Query-efficient adversarial
                  attack against large language models},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103482},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103482},
  doi          = {10.1016/J.COSE.2023.103482},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DongDWYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ForsbergF23,
  author       = {Joonas Forsberg and
                  Tapio Frantti},
  title        = {Technical performance metrics of a security operations center},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103529},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103529},
  doi          = {10.1016/J.COSE.2023.103529},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ForsbergF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuSK23,
  author       = {Yeming Gu and
                  Hui Shu and
                  Fei Kang},
  title        = {BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103508},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103508},
  doi          = {10.1016/J.COSE.2023.103508},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoXZ23,
  author       = {Zhenyuan Guo and
                  Lei Xu and
                  Liehuang Zhu},
  title        = {FedSIGN: {A} sign-based federated learning framework with privacy
                  and robustness guarantees},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103474},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103474},
  doi          = {10.1016/J.COSE.2023.103474},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoYWZLX23,
  author       = {Pengfei Guo and
                  Yingjian Yan and
                  Junjie Wang and
                  Jingxin Zhong and
                  Yanjiang Liu and
                  Jinsong Xu},
  title        = {Towards a metrics suite for evaluating cache side-channel vulnerability:
                  Case studies on an open-source {RISC-V} processor},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103480},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103480},
  doi          = {10.1016/J.COSE.2023.103480},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoYWZLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanMBY23,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Malavika Balakrishnan and
                  Chan Yeob Yeun},
  title        = {Enhancing security and robustness of Cyphal on Controller Area Network
                  in unmanned aerial vehicle environments},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103481},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103481},
  doi          = {10.1016/J.COSE.2023.103481},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanMBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaYZLM23,
  author       = {Zhizhuang Jia and
                  Chao Yang and
                  Xiaoyun Zhao and
                  Xinghua Li and
                  Jian Feng Ma},
  title        = {Design and implementation of an efficient container tag dynamic taint
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103528},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103528},
  doi          = {10.1016/J.COSE.2023.103528},
  timestamp    = {Tue, 02 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaYZLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KangXZJSZ23,
  author       = {Zi Kang and
                  Hui Xia and
                  Rui Zhang and
                  Shuliang Jiang and
                  Xiaolong Shi and
                  Zuming Zhang},
  title        = {{FGDA-GS:} Fast guided decision attack based on gradient signs for
                  skeletal action recognition},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103522},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103522},
  doi          = {10.1016/J.COSE.2023.103522},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KangXZJSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KishoreBMM23,
  author       = {Pushkar Kishore and
                  Swadhin Kumar Barisal and
                  Durga Prasad Mohapatra and
                  Rajib Mall},
  title        = {An efficient two-stage pipeline model with filtering algorithm for
                  mislabeled malware detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103499},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103499},
  doi          = {10.1016/J.COSE.2023.103499},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KishoreBMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KornyoAOOPBB23,
  author       = {Oliver Kornyo and
                  Michael Asante and
                  Richard Opoku and
                  Kwabena Owusu{-}Agyemang and
                  Benjamin Tei Partey and
                  Emmanuel Kwesi Baah and
                  Nkrumah Boadu},
  title        = {Botnet attacks classification in {AMI} networks with recursive feature
                  elimination {(RFE)} and machine learning algorithms},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103456},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103456},
  doi          = {10.1016/J.COSE.2023.103456},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KornyoAOOPBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCPZWZX23,
  author       = {Lin Li and
                  Chao Chen and
                  Lei Pan and
                  Leo Yu Zhang and
                  Zhifeng Wang and
                  Jun Zhang and
                  Yang Xiang},
  title        = {A Survey of PPG's Application in Authentication},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103488},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103488},
  doi          = {10.1016/J.COSE.2023.103488},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCPZWZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZY23,
  author       = {Chao Li and
                  Yanan Cheng and
                  Zhaoxin Zhang and
                  Ping Yu},
  title        = {Configuration anormaly detection and resolution risk assessment of
                  authoritative domain name server},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103426},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103426},
  doi          = {10.1016/J.COSE.2023.103426},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiHDQG23,
  author       = {Zhengfa Li and
                  Chuanhe Huang and
                  Shuhua Deng and
                  Wanyu Qiu and
                  Xieping Gao},
  title        = {A soft actor-critic reinforcement learning algorithm for network intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103502},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103502},
  doi          = {10.1016/J.COSE.2023.103502},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiHDQG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLJZZ23,
  author       = {Munan Li and
                  Hongbo Liu and
                  Xiangdong Jiang and
                  Zheng Zhao and
                  Tianhao Zhang},
  title        = {{SENSE:} An unsupervised semantic learning model for cross-platform
                  vulnerability search},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103500},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103500},
  doi          = {10.1016/J.COSE.2023.103500},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLJZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinXHLZL23,
  author       = {Zhutian Lin and
                  Xi Xiao and
                  Guangwu Hu and
                  Qing Li and
                  Bin Zhang and
                  Xiapu Luo},
  title        = {Tracking phishing on Ethereum: Transaction network embedding approach
                  for accounts representation learning},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103479},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103479},
  doi          = {10.1016/J.COSE.2023.103479},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LinXHLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuWLXN23,
  author       = {Xueyan Liu and
                  Jing Wang and
                  Qiong Liu and
                  Xin Xiong and
                  Shufen Niu},
  title        = {Bidirectional location privacy protection scheme for epidemiological
                  investigation based on {OT}},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103453},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103453},
  doi          = {10.1016/J.COSE.2023.103453},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuWLXN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopesZAALRP23,
  author       = {Ivandro Ortet Lopes and
                  Deqing Zou and
                  Ihsan H. Abdulqadder and
                  Saeed Akbar and
                  Zhen Li and
                  Francis A. Ruambo and
                  Wagner Pereira},
  title        = {Network intrusion detection based on the temporal convolutional model},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103465},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103465},
  doi          = {10.1016/J.COSE.2023.103465},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillsWL23,
  author       = {Alan Mills and
                  Jonathan White and
                  Phil Legg},
  title        = {Longitudinal risk-based security assessment of docker software container
                  images},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103478},
  doi          = {10.1016/J.COSE.2023.103478},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MillsWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaseerNAMS23,
  author       = {Ayesha Naseer and
                  Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Adil Masood Siddiqui},
  title        = {Moving towards agile cybersecurity incident response: {A} case study
                  exploring the enabling role of big data analytics-embedded dynamic
                  capabilities},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103525},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103525},
  doi          = {10.1016/J.COSE.2023.103525},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OkeyURRK23,
  author       = {Ogobuchi Daniel Okey and
                  Ekikere Umoren Udo and
                  Renata Lopes Rosa and
                  Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez and
                  Jo{\~{a}}o Henrique Kleinschmidt},
  title        = {Investigating ChatGPT and cybersecurity: {A} perspective on topic
                  modeling and sentiment analysis},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103476},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103476},
  doi          = {10.1016/J.COSE.2023.103476},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/OkeyURRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PasikhaniCG23,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Incremental hybrid intrusion detection for 6LoWPAN},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103447},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103447},
  doi          = {10.1016/J.COSE.2023.103447},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PlappertLEJFH23,
  author       = {Christian Plappert and
                  Dominik Lorych and
                  Michael Eckel and
                  Lukas J{\"{a}}ger and
                  Andreas Fuchs and
                  Ronald Heddergott},
  title        = {Evaluating the applicability of hardware trust anchors for automotive
                  applications},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103514},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103514},
  doi          = {10.1016/J.COSE.2023.103514},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PlappertLEJFH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PohnGZB23,
  author       = {Daniela P{\"{o}}hn and
                  Nils Gruschka and
                  Leonhard Ziegler and
                  Andre B{\"{u}}ttner},
  title        = {A framework for analyzing authentication risks in account networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103515},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103515},
  doi          = {10.1016/J.COSE.2023.103515},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PohnGZB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PreuveneersJ23,
  author       = {Davy Preuveneers and
                  Wouter Joosen},
  title        = {Privacy-preserving correlation of cross-organizational cyber threat
                  intelligence with private graph intersections},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103505},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103505},
  doi          = {10.1016/J.COSE.2023.103505},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PreuveneersJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuanWLL23,
  author       = {Hanyu Quan and
                  Boyang Wang and
                  Ming Li and
                  Iraklis Leontiadis},
  title        = {FastReach: {A} system for privacy-preserving reachability queries
                  over location data},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103513},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103513},
  doi          = {10.1016/J.COSE.2023.103513},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/QuanWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SSK23,
  author       = {Devi Priya V. S and
                  Sibi Chakkaravarthy Sethuraman and
                  Muhammad Khurram Khan},
  title        = {Container security: Precaution levels, mitigation strategies, and
                  research perspectives},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103490},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103490},
  doi          = {10.1016/J.COSE.2023.103490},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SarikayaKD23,
  author       = {Alper Sarikaya and
                  Banu G{\"{u}}nel Kili{\c{c}} and
                  Mehmet Demirci},
  title        = {{RAIDS:} Robust autoencoder-based intrusion detection system model
                  against adversarial attacks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103483},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103483},
  doi          = {10.1016/J.COSE.2023.103483},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SarikayaKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharifB23,
  author       = {Dyari Mohammad Sharif and
                  Hakem Beitollahi},
  title        = {Detection of application-layer DDoS attacks using machine learning
                  and genetic algorithms},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103511},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103511},
  doi          = {10.1016/J.COSE.2023.103511},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SharifB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunOZLWZ23,
  author       = {Hongyu Sun and
                  Guoliang Ou and
                  Ziqiu Zheng and
                  Lei Liao and
                  He Wang and
                  Yuqing Zhang},
  title        = {Inconsistent measurement and incorrect detection of software names
                  in security vulnerability reports},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103477},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103477},
  doi          = {10.1016/J.COSE.2023.103477},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SunOZLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanXHWL23,
  author       = {Xiao Tan and
                  Qi Xie and
                  Lidong Han and
                  Shengbao Wang and
                  Wenhao Liu},
  title        = {Proof of retrievability with flexible designated verification for
                  cloud storage},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103486},
  doi          = {10.1016/J.COSE.2023.103486},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TanXHWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianJD23,
  author       = {Chuan (Annie) Tian and
                  Matthew L. Jensen and
                  Alexandra Durcikova},
  title        = {Phishing susceptibility across industries: The differential impact
                  of influence techniques},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103487},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103487},
  doi          = {10.1016/J.COSE.2023.103487},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TianJD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TrabelsiFJ23,
  author       = {Rahma Trabelsi and
                  Ghofrane Fersi and
                  Mohamed Jmaiel},
  title        = {Access control in Internet of Things: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103472},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103472},
  doi          = {10.1016/J.COSE.2023.103472},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TrabelsiFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangMLLWHC23,
  author       = {Leiqi Wang and
                  Xiu Ma and
                  Ning Li and
                  Qiujian Lv and
                  Yan Wang and
                  Weiqing Huang and
                  Haiyan Chen},
  title        = {TGPrint: Attack fingerprint classification on encrypted network traffic
                  based graph convolution attention networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103466},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103466},
  doi          = {10.1016/J.COSE.2023.103466},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangMLLWHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZBKCR23,
  author       = {Qifan Wang and
                  Lei Zhou and
                  Jianli Bai and
                  Yun Sing Koh and
                  Shujie Cui and
                  Giovanni Russello},
  title        = {\emph{HT2ML}: An efficient hybrid framework for privacy-preserving
                  Machine Learning using {HE} and {TEE}},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103509},
  doi          = {10.1016/J.COSE.2023.103509},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZBKCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WenK23,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {A quantitative security evaluation and analysis model for web applications
                  based on {OWASP} application security verification standard},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103532},
  doi          = {10.1016/J.COSE.2023.103532},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WenK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YanHY23,
  author       = {Haotian Yan and
                  Haibo Hu and
                  Qingqing Ye},
  title        = {Partial message verification in fog-based industrial Internet of things},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103530},
  doi          = {10.1016/J.COSE.2023.103530},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YanHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YousefiK23,
  author       = {Fares Yousefi and
                  Hoshang Kolivand},
  title        = {A robust brain pattern for brain-based authentication methods using
                  deep breath},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103520},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103520},
  doi          = {10.1016/J.COSE.2023.103520},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YousefiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZahoorCAP23,
  author       = {Ehtesham Zahoor and
                  Maryam Chaudhary and
                  Sabina Akhtar and
                  Olivier Perrin},
  title        = {A formal approach for the identification of redundant authorization
                  policies in Kubernetes},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103473},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103473},
  doi          = {10.1016/J.COSE.2023.103473},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZahoorCAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZarinUKH23,
  author       = {Rahat Zarin and
                  Niamat Ullah and
                  Amir Khan and
                  Usa Wannasingha Humphries},
  title        = {A numerical study of a new non-linear fractal fractional mathematical
                  model of malicious codes propagation in wireless sensor networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103484},
  doi          = {10.1016/J.COSE.2023.103484},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZarinUKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangX23,
  author       = {Chunyong Zhang and
                  Yang Xin},
  title        = {VulGAI: vulnerability detection based on graphs and images},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103501},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103501},
  doi          = {10.1016/J.COSE.2023.103501},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengCSMYY23,
  author       = {Haibin Zheng and
                  Jinyin Chen and
                  Wenchang Shangguan and
                  Zhaoyan Ming and
                  Xing Yang and
                  Zhijun Yang},
  title        = {{GONE:} {A} generic {O(1)} NoisE layer for protecting privacy of deep
                  neural networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103471},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103471},
  doi          = {10.1016/J.COSE.2023.103471},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengCSMYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhongLH23,
  author       = {Meihui Zhong and
                  Mingwei Lin and
                  Zhu He},
  title        = {Dynamic multi-scale topological representation for enhancing network
                  intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103516},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103516},
  doi          = {10.1016/J.COSE.2023.103516},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhongLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics