Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec141.bht:"
@article{DBLP:journals/compsec/AJPK24, author = {Nitish A and Hanumanthappa J and S. P. Shiva Prakash and Kirill Krinkin}, title = {Class imbalance and concept drift invariant online botnet threat detection framework for heterogeneous IoT edge}, journal = {Comput. Secur.}, volume = {141}, pages = {103820}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103820}, doi = {10.1016/J.COSE.2024.103820}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AJPK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AldaajehA24, author = {Saleh H. Aldaajeh and Saed Alrabaee}, title = {Strategic cybersecurity}, journal = {Comput. Secur.}, volume = {141}, pages = {103845}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103845}, doi = {10.1016/J.COSE.2024.103845}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AldaajehA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArroyabeAAA24, author = {Marta F. Arroyabe and Carlos F. A. Arranz and Ignacio Fernandez De Arroyabe and Juan Carlos Fernandez de Arroyabe}, title = {Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives}, journal = {Comput. Secur.}, volume = {141}, pages = {103826}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103826}, doi = {10.1016/J.COSE.2024.103826}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArroyabeAAA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AsiriXAL24, author = {Sultan Asiri and Yang Xiao and Saleh Alzahrani and Tieshan Li}, title = {PhishingRTDS: {A} real-time detection system for phishing attacks using a Deep Learning model}, journal = {Comput. Secur.}, volume = {141}, pages = {103843}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103843}, doi = {10.1016/J.COSE.2024.103843}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AsiriXAL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoffaDMVGVB24, author = {Matteo Boffa and Idilio Drago and Marco Mellia and Luca Vassio and Danilo Giordano and Rodolfo V. Valentim and Zied Ben{-}Houidi}, title = {LogPr{\'{e}}cis: Unleashing language models for automated malicious log analysis}, journal = {Comput. Secur.}, volume = {141}, pages = {103805}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103805}, doi = {10.1016/J.COSE.2024.103805}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoffaDMVGVB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FatokiSM24, author = {Jimoh Fatoki and Zixing Shen and Carlo A. Mora Monge}, title = {Optimism amid risk: How non-IT employees' beliefs affect cybersecurity behavior}, journal = {Comput. Secur.}, volume = {141}, pages = {103812}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103812}, doi = {10.1016/J.COSE.2024.103812}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FatokiSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalliGMPS24, author = {Antonio Galli and Valerio La Gatta and Vincenzo Moscato and Marco Postiglione and Giancarlo Sperl{\`{\i}}}, title = {Explainability in AI-based behavioral malware detection systems}, journal = {Comput. Secur.}, volume = {141}, pages = {103842}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103842}, doi = {10.1016/J.COSE.2024.103842}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalliGMPS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanLCHWBHW24, author = {Xu Han and Qiang Li and Hongbo Cao and Lei Han and Bin Wang and Xuhua Bao and Yufei Han and Wei Wang}, title = {BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts}, journal = {Comput. Secur.}, volume = {141}, pages = {103817}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103817}, doi = {10.1016/J.COSE.2024.103817}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HanLCHWBHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ItodoO24, author = {Cornelius Itodo and Murat Ozer}, title = {Multivocal literature review on zero-trust security implementation}, journal = {Comput. Secur.}, volume = {141}, pages = {103827}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103827}, doi = {10.1016/J.COSE.2024.103827}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ItodoO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangZLKY24, author = {Guangshang Jiang and Hanlin Zhang and Jie Lin and Fanyu Kong and Leyun Yu}, title = {Optimized verifiable delegated private set intersection on outsourced private datasets}, journal = {Comput. Secur.}, volume = {141}, pages = {103822}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103822}, doi = {10.1016/J.COSE.2024.103822}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangZLKY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KernLSW24, author = {Manuel Kern and Max Landauer and Florian Skopik and Edgar R. Weippl}, title = {A logging maturity and decision model for the selection of intrusion detection cyber security solutions}, journal = {Comput. Secur.}, volume = {141}, pages = {103844}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103844}, doi = {10.1016/J.COSE.2024.103844}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KernLSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KuznetsovZFM24, author = {Oleksandr Kuznetsov and Dmytro Zakharov and Emanuele Frontoni and Andrea Maranesi}, title = {AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection}, journal = {Comput. Secur.}, volume = {141}, pages = {103828}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103828}, doi = {10.1016/J.COSE.2024.103828}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KuznetsovZFM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCHZDSW24, author = {Qiao Li and Jing Chen and Kun He and Zijun Zhang and Ruiying Du and Jisi She and Xinxin Wang}, title = {Model-agnostic adversarial example detection via high-frequency amplification}, journal = {Comput. Secur.}, volume = {141}, pages = {103791}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103791}, doi = {10.1016/J.COSE.2024.103791}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCHZDSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuKLZ24, author = {Liang Liu and Xinyu Kuang and Lin Liu and Lei Zhang}, title = {Defend against adversarial attacks in malware detection through attack space management}, journal = {Comput. Secur.}, volume = {141}, pages = {103841}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103841}, doi = {10.1016/J.COSE.2024.103841}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuKLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuoWT24, author = {Peng Luo and Buhong Wang and Jiwei Tian}, title = {{TTSAD:} TCN-Transformer-SVDD Model for Anomaly Detection in air traffic {ADS-B} data}, journal = {Comput. Secur.}, volume = {141}, pages = {103840}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103840}, doi = {10.1016/J.COSE.2024.103840}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuoWT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaliniK24, author = {P. Malini and Dr. K. R. Kavitha}, title = {An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment}, journal = {Comput. Secur.}, volume = {141}, pages = {103818}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103818}, doi = {10.1016/J.COSE.2024.103818}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaliniK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PascualARD24, author = {Hugo Pascual and Jos{\'{e}} M. del {\'{A}}lamo and David Rodriguez and Juan C. Due{\~{n}}as}, title = {Hunter: Tracing anycast communications to uncover cross-border personal data transfers}, journal = {Comput. Secur.}, volume = {141}, pages = {103823}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103823}, doi = {10.1016/J.COSE.2024.103823}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PascualARD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RoshanZ24, author = {Khushnaseeb Roshan and Aasim Zafar}, title = {Black-box adversarial transferability: An empirical study in cybersecurity perspective}, journal = {Comput. Secur.}, volume = {141}, pages = {103853}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103853}, doi = {10.1016/J.COSE.2024.103853}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RoshanZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenFX24, author = {Lina Shen and Mengqi Fang and Jian Xu}, title = {GHGDroid: Global heterogeneous graph-based android malware detection}, journal = {Comput. Secur.}, volume = {141}, pages = {103846}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103846}, doi = {10.1016/J.COSE.2024.103846}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenFX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinghT24, author = {Narendra Singh and Somanath Tripathy}, title = {It's too late if exfiltrate: Early stage Android ransomware detection}, journal = {Comput. Secur.}, volume = {141}, pages = {103819}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103819}, doi = {10.1016/J.COSE.2024.103819}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinghT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangYZKW24, author = {Gaigai Tang and Lin Yang and Long Zhang and Hongyu Kuang and Huiqiang Wang}, title = {MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension}, journal = {Comput. Secur.}, volume = {141}, pages = {103816}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103816}, doi = {10.1016/J.COSE.2024.103816}, timestamp = {Fri, 24 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangYZKW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLHBWZ24, author = {Gaosheng Wang and Peipei Liu and Jintao Huang and Haoyu Bin and Xi Wang and Hongsong Zhu}, title = {KnowCTI: Knowledge-based cyber threat intelligence entity and relation extraction}, journal = {Comput. Secur.}, volume = {141}, pages = {103824}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103824}, doi = {10.1016/J.COSE.2024.103824}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLHBWZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WanyanLLC24, author = {Hanxiao Wanyan and Yingxu Lai and Jing Liu and Hao Chen}, title = {NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of {ICS} protocol fuzzing}, journal = {Comput. Secur.}, volume = {141}, pages = {103811}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103811}, doi = {10.1016/J.COSE.2024.103811}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WanyanLLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangHS24, author = {Xue Yang and Enda Howley and Michael Schukat}, title = {{ADT:} Time series anomaly detection for cyber-physical systems via deep reinforcement learning}, journal = {Comput. Secur.}, volume = {141}, pages = {103825}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103825}, doi = {10.1016/J.COSE.2024.103825}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YiCLZ24, author = {Tao Yi and Xingshu Chen and Qindong Li and Yi Zhu}, title = {An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool {(SPP)}}, journal = {Comput. Secur.}, volume = {141}, pages = {103809}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103809}, doi = {10.1016/J.COSE.2024.103809}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YiCLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhongLZX24, author = {Meihui Zhong and Mingwei Lin and Chao Zhang and Zeshui Xu}, title = {A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges}, journal = {Comput. Secur.}, volume = {141}, pages = {103821}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103821}, doi = {10.1016/J.COSE.2024.103821}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhongLZX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.