- 2022
- Hassan Ali, Muhammad Suleman Khan, Ala I. Al-Fuqaha, Junaid Qadir:
Tamp-X: Attacking explainable natural language classifiers through tampered activations. Comput. Secur. 120: 102791 (2022) - Pedro H. Barros, Eduarda T. C. Chagas, Leonardo B. Oliveira, Fabiane Queiroz, Heitor S. Ramos:
Malware-SMELL: A zero-shot learning strategy for detecting zero-day vulnerabilities. Comput. Secur. 120: 102785 (2022) - Richard L. Baskerville, Jongwoo Kim, Carl Stucke:
The cybersecurity risk estimation engine: A tool for possibility based risk analysis. Comput. Secur. 120: 102752 (2022) - Craig Beaman, Michael Redbourne, J. Darren Mummery, Saqib Hakak:
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions. Comput. Secur. 120: 102813 (2022) - Oliver Buckley, Duncan Hodges, Jonathan Windle, Sally Earl:
CLICKA: Collecting and leveraging identity cues with keystroke dynamics. Comput. Secur. 120: 102780 (2022) - Rajasekhar Chaganti, Vinayakumar Ravi, Tuan D. Pham:
Deep learning based cross architecture internet of things malware detection and classification. Comput. Secur. 120: 102779 (2022) - El Balmany Chawki, Zakariae Tbatou, Ahmed Asimi, Mohamed Bamarouf:
Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage. Comput. Secur. 120: 102815 (2022) - Li Chen, Cong Tang, Junjiang He, Hui Zhao, Xiaolong Lan, Tao Li:
XSS adversarial example attacks based on deep reinforcement learning. Comput. Secur. 120: 102831 (2022) - Xuyang Chen, Xiaolu Zhang, Michael Elliot, Xiaoyin Wang, Feng Wang:
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions. Comput. Secur. 120: 102812 (2022) - Pietro Colombo, Elena Ferrari, Engin Deniz Tümer:
Efficient ABAC based information sharing within MQTT environments under emergencies. Comput. Secur. 120: 102829 (2022) - Lei Cui, Jiancong Cui, Zhiyu Hao, Lun Li, Zhenquan Ding, Yongji Liu:
An empirical study of vulnerability discovery methods over the past ten years. Comput. Secur. 120: 102817 (2022) - Yansong Dong, Long Tang, Cong Tian, Bin Yu, Zhenhua Duan:
Improving transferability of adversarial examples by saliency distribution and data augmentation. Comput. Secur. 120: 102811 (2022) - Steven Furnell:
Assessing website password practices - Unchanged after fifteen years? Comput. Secur. 120: 102790 (2022) - Hemangi Goswami, Hiten Choudhury:
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network. Comput. Secur. 120: 102806 (2022) - Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian M. Molloy:
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks. Comput. Secur. 120: 102814 (2022) - Alejandro Guerra-Manzanares, Marcin Luckner, Hayretdin Bahsi:
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection. Comput. Secur. 120: 102757 (2022) - Jorge L. Guerra, Carlos Adrián Catania, Eduardo E. Veas:
Datasets are not enough: Challenges in labeling network traffic. Comput. Secur. 120: 102810 (2022) - Mohamed Hammad, Nabil M. Hewahi, Wael Elmedany:
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems. Comput. Secur. 120: 102777 (2022) - Shuai Jiang, Cai Fu, Yekui Qian, Shuai He, Jianqiang Lv, Lansheng Han:
IFAttn: Binary code similarity analysis based on interpretable features with attention. Comput. Secur. 120: 102804 (2022) - Hyeonseong Jo, Yongjae Lee, Seungwon Shin:
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text. Comput. Secur. 120: 102763 (2022) - Naurin Farooq Khan, Amber Yaqoob, Muhammad Saud Khan, Naveed Ikram:
The cybersecurity behavioral research: A tertiary study. Comput. Secur. 120: 102826 (2022) - Jae-Yeol Kim, Hyuk-Yoon Kwon:
Threat classification model for security information event management focusing on model efficiency. Comput. Secur. 120: 102789 (2022) - Rajesh Kumar, Siddharth Sharma, Chirag Vachhani, Nitish Yadav:
What changed in the cyber-security after COVID-19? Comput. Secur. 120: 102821 (2022) - Yong-Gang Li, Yeh-Ching Chung, Yu Bao, Yi Lu, Shanqing Guo, Guoyuan Lin:
KPointer: Keep the code pointers on the stack point to the right code. Comput. Secur. 120: 102781 (2022) - Jianbing Liang, Shuhui Chen, Ziling Wei, Shuang Zhao, Wei Zhao:
HAGDetector: Heterogeneous DGA domain name detection model. Comput. Secur. 120: 102803 (2022) - Milton V. M. Lima, Ricardo Lima, Fernando Lins, Michel S. Bonfim:
Beholder - A CEP-based intrusion detection and prevention systems for IoT environments. Comput. Secur. 120: 102824 (2022) - Imran Makhdoom, Mehran Abolhasan, Justin Lipman:
A comprehensive survey of covert communication techniques, limitations and future challenges. Comput. Secur. 120: 102784 (2022) - Alok Mishra, Yehia Ibrahim Alzoubi, Memoona Javeria Anwar, Asif Qumer Gill:
Attributes impacting cybersecurity policy development: An evidence from seven nations. Comput. Secur. 120: 102820 (2022) - Hardhik Mohanty, Arousha Haghighian Roudsari, Arash Habibi Lashkari:
Robust stacking ensemble model for darknet traffic classification under adversarial settings. Comput. Secur. 120: 102830 (2022) - Nitin Naik, Paul Grace, Paul Jenkins, Kshirasagar Naik, Jingping Song:
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity. Comput. Secur. 120: 102808 (2022)