Search dblp for Publications

export results for "toc:db/journals/compsec/compsec131.bht:"

 download as .bib file

@article{DBLP:journals/compsec/0001CE23,
  author       = {Anna Cartwright and
                  Edward J. Cartwright and
                  Esther Solomon Edun},
  title        = {Cascading information on best practice: Cyber security risk management
                  in {UK} micro and small businesses and the role of {IT} companies},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103288},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103288},
  doi          = {10.1016/J.COSE.2023.103288},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0001CE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/0001R023,
  author       = {Philipp K{\"{u}}hn and
                  David N. Relke and
                  Christian Reuter},
  title        = {Common vulnerability scoring system prediction based on open source
                  intelligence information sources},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103286},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103286},
  doi          = {10.1016/J.COSE.2023.103286},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0001R023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Afzaal0J23,
  author       = {Hamra Afzaal and
                  Muhammad Imran and
                  Muhammad Umar Janjua},
  title        = {Formal verification of fraud-resilience in a crowdsourcing consensus
                  protocol},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103290},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103290},
  doi          = {10.1016/J.COSE.2023.103290},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Afzaal0J23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarretoRWF23,
  author       = {Carlos A. Barreto and
                  Olof Reinert and
                  Tobias Wiesinger and
                  Ulrik Franke},
  title        = {Duopoly insurers' incentives for data quality under a mandatory cyber
                  data sharing regime},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103292},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103292},
  doi          = {10.1016/J.COSE.2023.103292},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarretoRWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerardiG0MOP23,
  author       = {Davide Berardi and
                  Saverio Giallorenzo and
                  Andrea Melis and
                  Simone Melloni and
                  Loris Onori and
                  Marco Prandini},
  title        = {Data Flooding against Ransomware: Concepts and Implementations},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103295},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103295},
  doi          = {10.1016/J.COSE.2023.103295},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BerardiG0MOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeuJZ0HLB23,
  author       = {Nathan Beu and
                  Asangi Jayatilaka and
                  Mansooreh Zahedi and
                  Ali Babar and
                  Laura Hartley and
                  Winston Lewinsmith and
                  Irina Baetu},
  title        = {Falling for phishing attempts: An investigation of individual differences
                  that are associated with behavior in a naturalistic phishing simulation},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103313},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103313},
  doi          = {10.1016/J.COSE.2023.103313},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeuJZ0HLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cabrera-Arteaga23,
  author       = {Javier Cabrera{-}Arteaga and
                  Martin Monperrus and
                  Tim Toady and
                  Benoit Baudry},
  title        = {WebAssembly diversification for malware evasion},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103296},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103296},
  doi          = {10.1016/J.COSE.2023.103296},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cabrera-Arteaga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Camara0AUZ23,
  author       = {Xabier S{\'{a}}ez de C{\'{a}}mara and
                  Jose Luis Flores and
                  Crist{\'{o}}bal Arellano and
                  Aitor Urbieta and
                  Urko Zurutuza},
  title        = {Clustered federated learning architecture for network anomaly detection
                  in large scale heterogeneous IoT networks},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103299},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103299},
  doi          = {10.1016/J.COSE.2023.103299},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Camara0AUZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalilEM23,
  author       = {Maysaa Khalil and
                  Moez Esseghir and
                  Le{\"{\i}}la Merghem{-}Boulahia},
  title        = {Privacy-Preserving federated learning: An application for big data
                  load forecast in buildings},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103211},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103211},
  doi          = {10.1016/J.COSE.2023.103211},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalilEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ren0LLZS23,
  author       = {Yimo Ren and
                  Hong Li and
                  Peipei Liu and
                  Jie Liu and
                  Hongsong Zhu and
                  Limin Sun},
  title        = {{CL-GAN:} {A} GAN-based continual learning model for generating and
                  detecting AGDs},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103317},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103317},
  doi          = {10.1016/J.COSE.2023.103317},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ren0LLZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenaudSM23,
  author       = {Karen Renaud and
                  Karl van der Schyff and
                  Stuart MacDonald},
  title        = {Would {US} citizens accept cybersecurity deresponsibilization? Perhaps
                  not},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103301},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103301},
  doi          = {10.1016/J.COSE.2023.103301},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenaudSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RomdhanaMCT23,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Assessing the security of inter-app communications in android through
                  reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103311},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103311},
  doi          = {10.1016/J.COSE.2023.103311},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SangY0LC23,
  author       = {Yafei Sang and
                  Jisong Yang and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Peng Chang},
  title        = {Toward IoT device fingerprinting from proprietary protocol traffic
                  via key-blocks aware approach},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103145},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103145},
  doi          = {10.1016/J.COSE.2023.103145},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SangY0LC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SartayevaC23,
  author       = {Yerkezhan Sartayeva and
                  Henry C. B. Chan},
  title        = {A survey on indoor positioning security and privacy},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103293},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103293},
  doi          = {10.1016/J.COSE.2023.103293},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SartayevaC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spring23,
  author       = {Jonathan M. Spring},
  title        = {An analysis of how many undiscovered vulnerabilities remain in information
                  systems},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103191},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103191},
  doi          = {10.1016/J.COSE.2023.103191},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Spring23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TarwireyiTA23,
  author       = {Paul Tarwireyi and
                  Alfredo Terzoli and
                  Matthew O. Adigun},
  title        = {Using multi-audio feature fusion for android malware detection},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103282},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103282},
  doi          = {10.1016/J.COSE.2023.103282},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TarwireyiTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TayyabMJHUQ23,
  author       = {Muhammad Tayyab and
                  Mohsen Marjani and
                  N. Z. Jhanjhi and
                  Ibrahim Abaker Targio Hashem and
                  Raja Sher Afgun Usmani and
                  Faizan Qamar},
  title        = {A comprehensive review on deep learning algorithms: Security and privacy
                  issues},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103297},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103297},
  doi          = {10.1016/J.COSE.2023.103297},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TayyabMJHUQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Yang23,
  author       = {Benyuan Yang},
  title        = {Enforcement of separation of duty constraints in attribute-based access
                  control},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103294},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103294},
  doi          = {10.1016/J.COSE.2023.103294},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Yang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Yuan0YZ0WG23,
  author       = {Qingjun Yuan and
                  Chang Liu and
                  Wentao Yu and
                  Yuefei Zhu and
                  Gang Xiong and
                  Yongjuan Wang and
                  Gaopeng Gou},
  title        = {BoAu: Malicious traffic detection with noise labels based on boundary
                  augmentation},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103300},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103300},
  doi          = {10.1016/J.COSE.2023.103300},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Yuan0YZ0WG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuanHY23,
  author       = {Yachao Yuan and
                  Yu Huang and
                  Yali Yuan},
  title        = {PrSLoc: Sybil attack detection for localization with private observers
                  using differential privacy},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103289},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103289},
  doi          = {10.1016/J.COSE.2023.103289},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuanHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics