Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec131.bht:"
@article{DBLP:journals/compsec/0001CE23, author = {Anna Cartwright and Edward J. Cartwright and Esther Solomon Edun}, title = {Cascading information on best practice: Cyber security risk management in {UK} micro and small businesses and the role of {IT} companies}, journal = {Comput. Secur.}, volume = {131}, pages = {103288}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103288}, doi = {10.1016/J.COSE.2023.103288}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0001CE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/0001R023, author = {Philipp K{\"{u}}hn and David N. Relke and Christian Reuter}, title = {Common vulnerability scoring system prediction based on open source intelligence information sources}, journal = {Comput. Secur.}, volume = {131}, pages = {103286}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103286}, doi = {10.1016/J.COSE.2023.103286}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0001R023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Afzaal0J23, author = {Hamra Afzaal and Muhammad Imran and Muhammad Umar Janjua}, title = {Formal verification of fraud-resilience in a crowdsourcing consensus protocol}, journal = {Comput. Secur.}, volume = {131}, pages = {103290}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103290}, doi = {10.1016/J.COSE.2023.103290}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Afzaal0J23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarretoRWF23, author = {Carlos A. Barreto and Olof Reinert and Tobias Wiesinger and Ulrik Franke}, title = {Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime}, journal = {Comput. Secur.}, volume = {131}, pages = {103292}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103292}, doi = {10.1016/J.COSE.2023.103292}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarretoRWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerardiG0MOP23, author = {Davide Berardi and Saverio Giallorenzo and Andrea Melis and Simone Melloni and Loris Onori and Marco Prandini}, title = {Data Flooding against Ransomware: Concepts and Implementations}, journal = {Comput. Secur.}, volume = {131}, pages = {103295}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103295}, doi = {10.1016/J.COSE.2023.103295}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BerardiG0MOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeuJZ0HLB23, author = {Nathan Beu and Asangi Jayatilaka and Mansooreh Zahedi and Ali Babar and Laura Hartley and Winston Lewinsmith and Irina Baetu}, title = {Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation}, journal = {Comput. Secur.}, volume = {131}, pages = {103313}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103313}, doi = {10.1016/J.COSE.2023.103313}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeuJZ0HLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cabrera-Arteaga23, author = {Javier Cabrera{-}Arteaga and Martin Monperrus and Tim Toady and Benoit Baudry}, title = {WebAssembly diversification for malware evasion}, journal = {Comput. Secur.}, volume = {131}, pages = {103296}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103296}, doi = {10.1016/J.COSE.2023.103296}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cabrera-Arteaga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Camara0AUZ23, author = {Xabier S{\'{a}}ez de C{\'{a}}mara and Jose Luis Flores and Crist{\'{o}}bal Arellano and Aitor Urbieta and Urko Zurutuza}, title = {Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks}, journal = {Comput. Secur.}, volume = {131}, pages = {103299}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103299}, doi = {10.1016/J.COSE.2023.103299}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Camara0AUZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalilEM23, author = {Maysaa Khalil and Moez Esseghir and Le{\"{\i}}la Merghem{-}Boulahia}, title = {Privacy-Preserving federated learning: An application for big data load forecast in buildings}, journal = {Comput. Secur.}, volume = {131}, pages = {103211}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103211}, doi = {10.1016/J.COSE.2023.103211}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhalilEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ren0LLZS23, author = {Yimo Ren and Hong Li and Peipei Liu and Jie Liu and Hongsong Zhu and Limin Sun}, title = {{CL-GAN:} {A} GAN-based continual learning model for generating and detecting AGDs}, journal = {Comput. Secur.}, volume = {131}, pages = {103317}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103317}, doi = {10.1016/J.COSE.2023.103317}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ren0LLZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenaudSM23, author = {Karen Renaud and Karl van der Schyff and Stuart MacDonald}, title = {Would {US} citizens accept cybersecurity deresponsibilization? Perhaps not}, journal = {Comput. Secur.}, volume = {131}, pages = {103301}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103301}, doi = {10.1016/J.COSE.2023.103301}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RenaudSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RomdhanaMCT23, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Assessing the security of inter-app communications in android through reinforcement learning}, journal = {Comput. Secur.}, volume = {131}, pages = {103311}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103311}, doi = {10.1016/J.COSE.2023.103311}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SangY0LC23, author = {Yafei Sang and Jisong Yang and Yongzheng Zhang and Shuhao Li and Peng Chang}, title = {Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach}, journal = {Comput. Secur.}, volume = {131}, pages = {103145}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103145}, doi = {10.1016/J.COSE.2023.103145}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SangY0LC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SartayevaC23, author = {Yerkezhan Sartayeva and Henry C. B. Chan}, title = {A survey on indoor positioning security and privacy}, journal = {Comput. Secur.}, volume = {131}, pages = {103293}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103293}, doi = {10.1016/J.COSE.2023.103293}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SartayevaC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spring23, author = {Jonathan M. Spring}, title = {An analysis of how many undiscovered vulnerabilities remain in information systems}, journal = {Comput. Secur.}, volume = {131}, pages = {103191}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103191}, doi = {10.1016/J.COSE.2023.103191}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Spring23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TarwireyiTA23, author = {Paul Tarwireyi and Alfredo Terzoli and Matthew O. Adigun}, title = {Using multi-audio feature fusion for android malware detection}, journal = {Comput. Secur.}, volume = {131}, pages = {103282}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103282}, doi = {10.1016/J.COSE.2023.103282}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TarwireyiTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TayyabMJHUQ23, author = {Muhammad Tayyab and Mohsen Marjani and N. Z. Jhanjhi and Ibrahim Abaker Targio Hashem and Raja Sher Afgun Usmani and Faizan Qamar}, title = {A comprehensive review on deep learning algorithms: Security and privacy issues}, journal = {Comput. Secur.}, volume = {131}, pages = {103297}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103297}, doi = {10.1016/J.COSE.2023.103297}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TayyabMJHUQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Yang23, author = {Benyuan Yang}, title = {Enforcement of separation of duty constraints in attribute-based access control}, journal = {Comput. Secur.}, volume = {131}, pages = {103294}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103294}, doi = {10.1016/J.COSE.2023.103294}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Yang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Yuan0YZ0WG23, author = {Qingjun Yuan and Chang Liu and Wentao Yu and Yuefei Zhu and Gang Xiong and Yongjuan Wang and Gaopeng Gou}, title = {BoAu: Malicious traffic detection with noise labels based on boundary augmentation}, journal = {Comput. Secur.}, volume = {131}, pages = {103300}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103300}, doi = {10.1016/J.COSE.2023.103300}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Yuan0YZ0WG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuanHY23, author = {Yachao Yuan and Yu Huang and Yali Yuan}, title = {PrSLoc: Sybil attack detection for localization with private observers using differential privacy}, journal = {Comput. Secur.}, volume = {131}, pages = {103289}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103289}, doi = {10.1016/J.COSE.2023.103289}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuanHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.