default search action
Computers & Security, Volume 146
Volume 146, 2024
- Fan Zhou, Dongxia Wang, Yanhai Xiong, Kun Sun, Wenhai Wang:
FAMCF: A few-shot Android malware family classification framework. 104027 - Quanqiang Zhou, Cheng Huang:
A recommendation attack detection approach integrating CNN with Bagging. 104030 - Sarath Babu, Virendra Singh:
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier. 104031 - Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock:
Generation and deployment of honeytokens in relational databases for cyber deception. 104032 - Otman Driouch, Slimane Bah, Zouhair Guennoun:
CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic. 104033 - Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, Euclides Carlos Pinto Neto, Ali A. Ghorbani:
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. 104034 - Rahim Taheri, Mohammad Shojafar, Farzad Arabikhan, Alexander E. Gegov:
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks. 104035 - Haibin Hu, Renxin Liu, Rilong Liu:
An intelligent diagnostic model for industrial equipment with privacy protection. 104036 - Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, Eric Pardede, Ahmad Salehi S.:
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks. 104037 - Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. 104038 - Ruizhong Du, Zhuang Liang, Xiaoyan Liang:
Privacy-preserving quadratic truth discovery based on Precision partitioning. 104039 - Pejman Najafi, Feng Cheng, Christoph Meinel:
HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity. 104040 - Jinyin Chen, Zhiqi Cao, Ruoxi Chen, Haibin Zheng, Xiao Li, Qi Xuan, Xing Yang:
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation. 104041 - Anja Klauzer, Markus Maier, Lore Abart-Heriszt, Johanna Ullrich:
Fostering security research in the energy sector: A validation of open source intelligence for power grid model data. 104042 - Bailin Xie, Qi Li, Yu Wang:
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks. 104049 - Akanksha Dixit, Bruno Bogaz Zarpelão, Max Smith-Creasey, Muttukrishnan Rajarajan:
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace. 104050 - Hanlin Yang, Yajun Guo, Yimin Guo:
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming. 104052 - Chao Zha, Zhiyu Wang, Yifei Fan, Xingming Zhang, Bing Bai, Yinjie Zhang, Sainan Shi, Ruyun Zhang:
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture. 104056 - Sotirios Katsikeas, Andrei Buhaiu, Mathias Ekstedt, Zeeshan Afzal, Simon Hacks, Preetam Mukherjee:
Development and validation of coreLang: A threat modeling language for the ICT domain. 104057 - Bo Zhang, Yu-Jie Xiong, Chunming Xia, Yongbin Gao:
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention. 104058 - Muhammed Maruf Öztürk:
A cosine similarity-based labeling technique for vulnerability type detection using source codes. 104059 - Jiyun Yang, Hanwei Li, Lijun He, Tao Xiang, Yujie Jin:
MDADroid: A novel malware detection method by constructing functionality-API mapping. 104061 - Karl van der Schyff, Suzanne Prior, Karen Renaud:
Privacy policy analysis: A scoping review and research agenda. 104065 - Zimin Mao, Shuiyan Chen, Zhuang Miao, Heng Li, Beihao Xia, Junzhe Cai, Wei Yuan, Xinge You:
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks. 104066 - Zhenhua Yang, Jun Kong:
Cue-based two factor authentication. 104068 - Alessandro Palma, Giacomo Acitelli, Andrea Marrella, Silvia Bonomi, Marco Angelini:
A compliance assessment system for Incident Management process. 104070 - Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791]. 104006 - Ivano Bongiovanni, David M. Herold, Simon J. Wilde:
Protecting the play: An integrative review of cybersecurity in and for sports events. 104064 - Shujiang Xie, Lian Li, Yian Zhu:
Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks. 104075
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.