


default search action
Computers & Security, Volume 118
Volume 118, July 2022
- Pooja Chaudhary

, Brij B. Gupta
, Awadhesh Kumar Singh:
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. 102710 - Yong Fang

, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang
:
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. 102715 - Dogukan Aksu

, Muhammed Ali Aydin:
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach. 102717 - Bin Li, Yijie Wang, Kele Xu

, Li Cheng, Zhiquan Qin:
DFAID: Density-aware and feature-deviated active intrusion detection over network traffic streams. 102719 - Zhengyun He, Yexin Duan, Wu Zhang, Junhua Zou, Zhengfang He, Yunyun Wang, Zhisong Pan:

Boosting adversarial attacks with transformed gradient. 102720 - Jianan Chen

, Qin Hu, Honglu Jiang
:
Strategic signaling for utility control in audit games. 102721 - Sandeep Gupta

, Mouna Kacimi, Bruno Crispo:
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control. 102722 - Oualid Koucham, Stéphane Mocanu

, Guillaume Hiet
, Jean-Marc Thiriet, Frédéric Majorczyk:
Cross-domain alert correlation methodology for industrial control systems. 102723 - William Yeoh

, Shan Wang, Ales Popovic
, Noman H. Chowdhury:
A systematic synthesis of critical success factors for cybersecurity. 102724 - Hakan Aydin

, Zeynep Orman
, Muhammed Ali Aydin:
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. 102725 - Mingfu Xue

, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. 102726 - Hui Zhu

, Fan Yin, Shuangrong Peng, Xiaohu Tang:
Differentially private hierarchical tree with high efficiency. 102727 - Stephen Jacob

, Yuansong Qiao
, Yuhang Ye, Brian Lee:
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks. 102728 - S. Manimaran, V. N. Sastry, N. P. Gopalan:

SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning. 102729 - Kun Shao

, Yu Zhang, Junan Yang, Xiaoshuai Li
, Hui Liu:
The triggers that open the NLP model backdoors are hidden in the adversarial samples. 102730 - Hisham S. Galal

, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. 102731 - Maiju Kyytsönen

, Jonna Ikonen, Anna-Mari Aalto, Tuulikki Vehko
:
The self-assessed information security skills of the Finnish population: A regression analysis. 102732 - Xin Sun, Chengliang Tian

, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. 102740 - M. Saqib Nawaz

, Philippe Fournier-Viger
, Muhammad Zohaib Nawaz, Guoting Chen, Youxi Wu:
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining. 102741 - Inger Anne Tøndel

, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. 102744 - Tiago Brito

, Pedro Lopes, Nuno Santos, José Fragoso Santos
:
Wasmati: An efficient static vulnerability scanner for WebAssembly. 102745 - Yassine Himeur

, Shahab Saquib Sohail
, Faycal Bensaali, Abbes Amira
, Mamoun Alazab
:
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives. 102746 - Florian Guggenmos, Björn Häckel, Philipp Ollig, Bastian Stahl:

Security First, Security by Design, or Security Pragmatism - Strategic Roles of IT Security in Digitalization Projects. 102747 - Devrim Akgün

, Selman Hizal, Ünal Çavusoglu:
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. 102748 - Zhen Wang, Yitao Zheng, Hai Zhu, Chang Yang, Tianyi Chen

:
Transferable adversarial examples can efficiently fool topic models. 102749 - Lianyi Yu, Qiangjiang Wang, Yan Wo, Guoqiang Han:

Secure biometric hashing against relation-based attacks via maximizing min-entropy. 102750

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














