Search dblp for Publications

export results for "toc:db/journals/compsec/compsec93.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlmashhadaniKCS20,
  author       = {Ahmad O. Almashhadani and
                  Mustafa Kaiiali and
                  Domhnall Carlin and
                  Sakir Sezer},
  title        = {MaldomDetector: {A} system for detecting algorithmically generated
                  domain names with machine learning},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101787},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101787},
  doi          = {10.1016/J.COSE.2020.101787},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlmashhadaniKCS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Arce20,
  author       = {Daniel G. Arce},
  title        = {Cybersecurity and platform competition in the cloud},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101774},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101774},
  doi          = {10.1016/J.COSE.2020.101774},
  timestamp    = {Fri, 14 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Arce20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AslamMKR20,
  author       = {Mudassar Aslam and
                  Bushra Mohsin and
                  Abdul Nasir Khan and
                  Shahid Raza},
  title        = {FoNAC - An automated Fog Node Audit and Certification scheme},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101759},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101759},
  doi          = {10.1016/J.COSE.2020.101759},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AslamMKR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BergerBR20,
  author       = {Stephan Berger and
                  Olga B{\"{u}}rger and
                  Maximilian R{\"{o}}glinger},
  title        = {Attacks on the Industrial Internet of Things - Development of a multi-layer
                  Taxonomy},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101790},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101790},
  doi          = {10.1016/J.COSE.2020.101790},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BergerBR20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BidgolyBA20,
  author       = {Amir Jalaly Bidgoly and
                  Hamed Jalaly Bidgoly and
                  Zeynab Arezoumand},
  title        = {A survey on methods and challenges in {EEG} based authentication},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101788},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101788},
  doi          = {10.1016/J.COSE.2020.101788},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BidgolyBA20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangHSQ20,
  author       = {Yong Fang and
                  Cheng Huang and
                  Yu Su and
                  Yaoyao Qiu},
  title        = {Detecting malicious JavaScript code based on semantic analysis},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101764},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101764},
  doi          = {10.1016/J.COSE.2020.101764},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FangHSQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ImineLB20,
  author       = {Youcef Imine and
                  Ahmed Lounis and
                  Abdelmadjid Bouabdallah},
  title        = {An accountable privacy-preserving scheme for public information sharing
                  systems},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101786},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101786},
  doi          = {10.1016/J.COSE.2020.101786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ImineLB20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarjalainenSS20,
  author       = {Mari Karjalainen and
                  Mikko T. Siponen and
                  Suprateek Sarker},
  title        = {Toward a stage theory of the development of employees' information
                  security behavior},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101782},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101782},
  doi          = {10.1016/J.COSE.2020.101782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarjalainenSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWSTC20,
  author       = {Tengyao Li and
                  Buhong Wang and
                  Fute Shang and
                  Jiwei Tian and
                  Kunrui Cao},
  title        = {Dynamic temporal {ADS-B} data attack detection based on sHDP-HMM},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101789},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101789},
  doi          = {10.1016/J.COSE.2020.101789},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWSTC20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangS20,
  author       = {Yuting Liang and
                  Reza Samavi},
  title        = {Optimization-based \emph{k}-anonymity algorithms},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101753},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101753},
  doi          = {10.1016/J.COSE.2020.101753},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Mitchell20,
  author       = {Chris J. Mitchell},
  title        = {The impact of quantum computing on real-world security: {A} 5G case
                  study},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101825},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101825},
  doi          = {10.1016/J.COSE.2020.101825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Mitchell20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OlukoyaMO20a,
  author       = {Oluwafemi Olukoya and
                  Lewis Mackenzie and
                  Inah Omoronyia},
  title        = {Towards using unstructured user input request for malware detection},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101783},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101783},
  doi          = {10.1016/J.COSE.2020.101783},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OlukoyaMO20a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PeiYT20,
  author       = {Xin{-}jun Pei and
                  Long Yu and
                  Shengwei Tian},
  title        = {AMalNet: {A} deep learning framework based on graph convolutional
                  networks for malware detection},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101792},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101792},
  doi          = {10.1016/J.COSE.2020.101792},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PeiYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SebastioBBDGLPQ20,
  author       = {Stefano Sebastio and
                  Eduard Baranov and
                  Fabrizio Biondi and
                  Olivier Decourbe and
                  Thomas Given{-}Wilson and
                  Axel Legay and
                  Cassius Puodzius and
                  Jean Quilbeuf},
  title        = {Optimizing symbolic execution for malware behavior classification},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101775},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101775},
  doi          = {10.1016/J.COSE.2020.101775},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SebastioBBDGLPQ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VakiliniaS20,
  author       = {Iman Vakilinia and
                  Shamik Sengupta},
  title        = {Vulnerability market as a public-good auction with privacy preservation},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101807},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101807},
  doi          = {10.1016/J.COSE.2020.101807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VakiliniaS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZCP20,
  author       = {Rong Wang and
                  Yan Zhu and
                  Chin{-}Chen Chang and
                  Qiang Peng},
  title        = {Privacy-preserving high-dimensional data publishing for classification},
  journal      = {Comput. Secur.},
  volume       = {93},
  pages        = {101785},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.cose.2020.101785},
  doi          = {10.1016/J.COSE.2020.101785},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZCP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics