Search dblp for Publications

export results for "toc:db/journals/compsec/compsec141.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AJPK24,
  author       = {Nitish A and
                  Hanumanthappa J and
                  S. P. Shiva Prakash and
                  Kirill Krinkin},
  title        = {Class imbalance and concept drift invariant online botnet threat detection
                  framework for heterogeneous IoT edge},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103820},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103820},
  doi          = {10.1016/J.COSE.2024.103820},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AJPK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AldaajehA24,
  author       = {Saleh H. Aldaajeh and
                  Saed Alrabaee},
  title        = {Strategic cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103845},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103845},
  doi          = {10.1016/J.COSE.2024.103845},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AldaajehA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArroyabeAAA24,
  author       = {Marta F. Arroyabe and
                  Carlos F. A. Arranz and
                  Ignacio Fernandez De Arroyabe and
                  Juan Carlos Fernandez de Arroyabe},
  title        = {Revealing the realities of cybercrime in small and medium enterprises:
                  Understanding fear and taxonomic perspectives},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103826},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103826},
  doi          = {10.1016/J.COSE.2024.103826},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArroyabeAAA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AsiriXAL24,
  author       = {Sultan Asiri and
                  Yang Xiao and
                  Saleh Alzahrani and
                  Tieshan Li},
  title        = {PhishingRTDS: {A} real-time detection system for phishing attacks
                  using a Deep Learning model},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103843},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103843},
  doi          = {10.1016/J.COSE.2024.103843},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AsiriXAL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoffaDMVGVB24,
  author       = {Matteo Boffa and
                  Idilio Drago and
                  Marco Mellia and
                  Luca Vassio and
                  Danilo Giordano and
                  Rodolfo V. Valentim and
                  Zied Ben{-}Houidi},
  title        = {LogPr{\'{e}}cis: Unleashing language models for automated malicious
                  log analysis},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103805},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103805},
  doi          = {10.1016/J.COSE.2024.103805},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoffaDMVGVB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FatokiSM24,
  author       = {Jimoh Fatoki and
                  Zixing Shen and
                  Carlo A. Mora Monge},
  title        = {Optimism amid risk: How non-IT employees' beliefs affect cybersecurity
                  behavior},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103812},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103812},
  doi          = {10.1016/J.COSE.2024.103812},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FatokiSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalliGMPS24,
  author       = {Antonio Galli and
                  Valerio La Gatta and
                  Vincenzo Moscato and
                  Marco Postiglione and
                  Giancarlo Sperl{\`{\i}}},
  title        = {Explainability in AI-based behavioral malware detection systems},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103842},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103842},
  doi          = {10.1016/J.COSE.2024.103842},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalliGMPS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanLCHWBHW24,
  author       = {Xu Han and
                  Qiang Li and
                  Hongbo Cao and
                  Lei Han and
                  Bin Wang and
                  Xuhua Bao and
                  Yufei Han and
                  Wei Wang},
  title        = {BFS2Adv: Black-box adversarial attack towards hard-to-attack short
                  texts},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103817},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103817},
  doi          = {10.1016/J.COSE.2024.103817},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HanLCHWBHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ItodoO24,
  author       = {Cornelius Itodo and
                  Murat Ozer},
  title        = {Multivocal literature review on zero-trust security implementation},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103827},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103827},
  doi          = {10.1016/J.COSE.2024.103827},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ItodoO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangZLKY24,
  author       = {Guangshang Jiang and
                  Hanlin Zhang and
                  Jie Lin and
                  Fanyu Kong and
                  Leyun Yu},
  title        = {Optimized verifiable delegated private set intersection on outsourced
                  private datasets},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103822},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103822},
  doi          = {10.1016/J.COSE.2024.103822},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangZLKY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KernLSW24,
  author       = {Manuel Kern and
                  Max Landauer and
                  Florian Skopik and
                  Edgar R. Weippl},
  title        = {A logging maturity and decision model for the selection of intrusion
                  detection cyber security solutions},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103844},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103844},
  doi          = {10.1016/J.COSE.2024.103844},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KernLSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KuznetsovZFM24,
  author       = {Oleksandr Kuznetsov and
                  Dmytro Zakharov and
                  Emanuele Frontoni and
                  Andrea Maranesi},
  title        = {AttackNet: Enhancing biometric security via tailored convolutional
                  neural network architectures for liveness detection},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103828},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103828},
  doi          = {10.1016/J.COSE.2024.103828},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KuznetsovZFM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCHZDSW24,
  author       = {Qiao Li and
                  Jing Chen and
                  Kun He and
                  Zijun Zhang and
                  Ruiying Du and
                  Jisi She and
                  Xinxin Wang},
  title        = {Model-agnostic adversarial example detection via high-frequency amplification},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103791},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103791},
  doi          = {10.1016/J.COSE.2024.103791},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCHZDSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuKLZ24,
  author       = {Liang Liu and
                  Xinyu Kuang and
                  Lin Liu and
                  Lei Zhang},
  title        = {Defend against adversarial attacks in malware detection through attack
                  space management},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103841},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103841},
  doi          = {10.1016/J.COSE.2024.103841},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuKLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuoWT24,
  author       = {Peng Luo and
                  Buhong Wang and
                  Jiwei Tian},
  title        = {{TTSAD:} TCN-Transformer-SVDD Model for Anomaly Detection in air traffic
                  {ADS-B} data},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103840},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103840},
  doi          = {10.1016/J.COSE.2024.103840},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuoWT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaliniK24,
  author       = {P. Malini and
                  Dr. K. R. Kavitha},
  title        = {An efficient deep learning mechanisms for IoT/Non-IoT devices classification
                  and attack detection in SDN-enabled smart environment},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103818},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103818},
  doi          = {10.1016/J.COSE.2024.103818},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaliniK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PascualARD24,
  author       = {Hugo Pascual and
                  Jos{\'{e}} M. del {\'{A}}lamo and
                  David Rodriguez and
                  Juan C. Due{\~{n}}as},
  title        = {Hunter: Tracing anycast communications to uncover cross-border personal
                  data transfers},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103823},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103823},
  doi          = {10.1016/J.COSE.2024.103823},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PascualARD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RoshanZ24,
  author       = {Khushnaseeb Roshan and
                  Aasim Zafar},
  title        = {Black-box adversarial transferability: An empirical study in cybersecurity
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103853},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103853},
  doi          = {10.1016/J.COSE.2024.103853},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RoshanZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenFX24,
  author       = {Lina Shen and
                  Mengqi Fang and
                  Jian Xu},
  title        = {GHGDroid: Global heterogeneous graph-based android malware detection},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103846},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103846},
  doi          = {10.1016/J.COSE.2024.103846},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenFX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinghT24,
  author       = {Narendra Singh and
                  Somanath Tripathy},
  title        = {It's too late if exfiltrate: Early stage Android ransomware detection},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103819},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103819},
  doi          = {10.1016/J.COSE.2024.103819},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinghT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangYZKW24,
  author       = {Gaigai Tang and
                  Lin Yang and
                  Long Zhang and
                  Hongyu Kuang and
                  Huiqiang Wang},
  title        = {MRC-VulLoc: Software source code vulnerability localization based
                  on multi-choice reading comprehension},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103816},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103816},
  doi          = {10.1016/J.COSE.2024.103816},
  timestamp    = {Fri, 24 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangYZKW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLHBWZ24,
  author       = {Gaosheng Wang and
                  Peipei Liu and
                  Jintao Huang and
                  Haoyu Bin and
                  Xi Wang and
                  Hongsong Zhu},
  title        = {KnowCTI: Knowledge-based cyber threat intelligence entity and relation
                  extraction},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103824},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103824},
  doi          = {10.1016/J.COSE.2024.103824},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLHBWZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WanyanLLC24,
  author       = {Hanxiao Wanyan and
                  Yingxu Lai and
                  Jing Liu and
                  Hao Chen},
  title        = {NCMFuzzer: Using non-critical field mutation and test case combination
                  to improve the efficiency of {ICS} protocol fuzzing},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103811},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103811},
  doi          = {10.1016/J.COSE.2024.103811},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WanyanLLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangHS24,
  author       = {Xue Yang and
                  Enda Howley and
                  Michael Schukat},
  title        = {{ADT:} Time series anomaly detection for cyber-physical systems via
                  deep reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103825},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103825},
  doi          = {10.1016/J.COSE.2024.103825},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YiCLZ24,
  author       = {Tao Yi and
                  Xingshu Chen and
                  Qindong Li and
                  Yi Zhu},
  title        = {An anomaly behavior characterization method of network traffic based
                  on Spatial Pyramid Pool {(SPP)}},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103809},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103809},
  doi          = {10.1016/J.COSE.2024.103809},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YiCLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhongLZX24,
  author       = {Meihui Zhong and
                  Mingwei Lin and
                  Chao Zhang and
                  Zeshui Xu},
  title        = {A survey on graph neural networks for intrusion detection systems:
                  Methods, trends and challenges},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103821},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103821},
  doi          = {10.1016/J.COSE.2024.103821},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhongLZX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics