Search dblp for Publications

export results for "toc:db/journals/compsec/compsec119.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AldaajehSABBC22,
  author       = {Saleh H. Aldaajeh and
                  Heba Saleous and
                  Saed Alrabaee and
                  Ezedin Barka and
                  Frank Breitinger and
                  Kim{-}Kwang Raymond Choo},
  title        = {The role of national cybersecurity strategies on the improvement of
                  cybersecurity education},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102754},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102754},
  doi          = {10.1016/J.COSE.2022.102754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AldaajehSABBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ConnollyB22,
  author       = {Alena Yuryna Connolly and
                  Herv{\'{e}} Borrion},
  title        = {Reducing Ransomware Crime: Analysis of Victims' Payment Decisions},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102760},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102760},
  doi          = {10.1016/J.COSE.2022.102760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ConnollyB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DOnghiaSNCPZ22,
  author       = {Mario D'Onghia and
                  Matteo Salvadore and
                  Benedetto Maria Nespoli and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {Ap{\'{\i}}cula: Static detection of {API} calls in generic streams
                  of bytes},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102775},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102775},
  doi          = {10.1016/J.COSE.2022.102775},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DOnghiaSNCPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuHLLZ22,
  author       = {Yun Hu and
                  Aiqun Hu and
                  Chunguo Li and
                  Peng Li and
                  Chunyu Zhang},
  title        = {Towards a privacy protection-capable noise fingerprinting for numerically
                  aggregated data},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102755},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102755},
  doi          = {10.1016/J.COSE.2022.102755},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuHLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeviHAE22,
  author       = {Matan Levi and
                  Itay Hazan and
                  Noga Agmon and
                  Sagi Eden},
  title        = {Behavioral embedding for continuous user verification in global settings},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102716},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102716},
  doi          = {10.1016/J.COSE.2022.102716},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeviHAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZLLYL22,
  author       = {Helin Li and
                  Hui Zhu and
                  Xiaodong Lin and
                  Rongxing Lu and
                  Zhipeng Yu and
                  Wei Lan},
  title        = {Everything you control is not everything: Achieving intention-concealed
                  visit on social networks},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102778},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102778},
  doi          = {10.1016/J.COSE.2022.102778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZLLYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MondejarMS22,
  author       = {Javier Carrillo Mond{\'{e}}jar and
                  Jos{\'{e}} Luis Mart{\'{\i}}nez and
                  Guillermo Suarez{-}Tangil},
  title        = {On how VoIP attacks foster the malicious call ecosystem},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102758},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102758},
  doi          = {10.1016/J.COSE.2022.102758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MondejarMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatilSPSG22,
  author       = {Rajendra Patil and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Akshay Sachdeva and
                  Mohan Gurusamy},
  title        = {{MARK:} Fill in the blanks through a JointGAN based data augmentation
                  for network anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102759},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102759},
  doi          = {10.1016/J.COSE.2022.102759},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatilSPSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiaoZTYLA22,
  author       = {Yanchen Qiao and
                  Weizhe Zhang and
                  Zhicheng Tian and
                  Laurence T. Yang and
                  Yang Liu and
                  Mamoun Alazab},
  title        = {Adversarial malware sample generation method based on the prototype
                  of deep learning detector},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102762},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102762},
  doi          = {10.1016/J.COSE.2022.102762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiaoZTYLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RasslanNA22,
  author       = {Mohamed Rasslan and
                  Mahmoud M. Nasreldin and
                  Heba Kamal Aslan},
  title        = {Ibn Sina: {A} patient privacy-preserving authentication protocol in
                  medical internet of things},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102753},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102753},
  doi          = {10.1016/J.COSE.2022.102753},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RasslanNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenCWCW22,
  author       = {Gaoning Shen and
                  Zhixiang Chen and
                  Hui Wang and
                  Heng Chen and
                  Shuqi Wang},
  title        = {Feature fusion-based malicious code detection with dual attention
                  mechanism and BiLSTM},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102761},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102761},
  doi          = {10.1016/J.COSE.2022.102761},
  timestamp    = {Tue, 13 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenCWCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShillairEDCNS22,
  author       = {Ruth Shillair and
                  Patricia Esteve{-}Gonz{\'{a}}lez and
                  William H. Dutton and
                  Sadie Creese and
                  Eva Nagyfejeo and
                  Basie von Solms},
  title        = {Cybersecurity education, awareness raising, and training initiatives:
                  National level evidence-based results, challenges, and promise},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102756},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102756},
  doi          = {10.1016/J.COSE.2022.102756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShillairEDCNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UgurC22,
  author       = {Naciye G{\"{u}}liz Ugur and
                  K{\"{u}}bra {\c{C}}aliskan},
  title        = {Time for De-cluttering: Digital clutter scaling for individuals and
                  enterprises},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102751},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102751},
  doi          = {10.1016/J.COSE.2022.102751},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UgurC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics