


default search action
Computers & Security, Volume 154
Volume 154, 2025
- Armando Bellante

, Tommaso Fioravanti, Michele Carminati
, Stefano Zanero
, Alessandro Luongo:
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems. 104341 - Ziting Ren

, Yucong Duan, Qi Qi, Lanhua Luo
:
Data-free fingerprinting technology for biometric classifiers. 104386 - Hongle Liu, Ming Liu, Lansheng Han, Haili Sun

, Cai Fu:
Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection. 104387 - Yuedi Zhu

, Yong Wang
, Lin Zhou, Yuan Xia:
FC-Trans: Deep learning methods for network intrusion detection in big data environments. 104392 - Willi Lazarov

, Pavel Seda
, Zdenek Martinasek
, Roman Kummel:
Penterep: Comprehensive penetration testing with adaptable interactive checklists. 104399 - Dika Zou

, Jun Tao
, Zuyan Wang:
Semantics-aware location privacy preserving: A differential privacy approach. 104402 - Irfan Khan

, Syed Wali
, Yasir Ali Farrukh
:
RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats. 104403 - Andrew Stewart, Christopher Hobbs

:
Systematic analysis of security advice on the topic of insider threats. 104411 - Yue Hou

, Xinyan Zhou
, Huakang Xia, Jian Wang, Haiming Chen
:
Surf-Snooping: USB crosstalk leakage attacks on wireless charging. 104412 - Tiantian Zhu

, Wenya He, Tieming Chen
, Jiabo Zhang, Mingqi Lv
, Hongmei Li
, Aohan Zheng, Jie Zheng, Mingjun Ma, Xiangyang Zheng, Zhengqiu Weng, Shuying Wu:
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics. 104413 - Nadiah Al-Nomasy, Abdulelah Alamri

, Ahamed Aljuhani
, Prabhat Kumar
:
Transformer-based knowledge distillation for explainable intrusion detection system. 104417 - Nandita Goyal, Kanika Taneja, Shivani Agarwal, Harsh Khatter:

Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment. 104418 - Laurens Sion

, Dimitri Van Landuyt
, Kim Wuyts
, Wouter Joosen
:
Robust and reusable LINDDUN privacy threat knowledge. 104419 - Qiang Zhang

, Cheng Huang
, Jiaxuan Han, Shuyi Jiang
, Jiayong Liu:
LowPTor: A lightweight method for detecting extremely low-proportion darknet traffic. 104420 - Mohammed Asiri

, Arjun Arunasalam
, Neetesh Saxena
, Z. Berkay Celik
:
Frontline responders: Rethinking indicators of compromise for industrial control system security. 104421 - Jinchuan Pei, Yuxiang Hu, Le Tian, Xinglong Pei, Zihao Wang:

Dynamic anomaly detection using In-band Network Telemetry and GCN for cloud-edge collaborative networks. 104422 - Nora Basha

, Bechir Hamdaoui:
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity. 104423 - Mohammad Al-Fawa'reh

, Jumana M. Abu-Khalaf
, Naeem Janjua
, Patryk Szewczyk
:
Detection of on-manifold adversarial attacks via latent space transformation. 104431 - Gaurav Madkaikar

, Karthikeya S. M. Yelisetty
, Shamik Sural
, Jaideep Vaidya
, Vijayalakshmi Atluri
:
Performance analysis of dynamic ABAC systems using a queuing theoretic framework. 104432 - Dominic Too

, Louise Axon
, Ioannis Agrafiotis, Michael Goldsmith, Sadie Creese:
Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts. 104433 - Yuling Luo, Tinghua Hu, Xue Ouyang

, Junxiu Liu, Qiang Fu, Sheng Qin, Zhen Min, Xiaoguang Lin:
DPO-Face: Differential privacy obfuscation for facial sensitive regions. 104434 - Iury Araújo

, Marco Vieira
:
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data. 104438 - Pavlos Cheimonidis

, Konstantinos Rantos
:
A novel proactive and dynamic cyber risk assessment methodology. 104439 - Zehuan Li

, Meihua Xiao, Yangping Xu, Fangping Chen, Huaibin Shao, Sufen Yan:
A novel symbolic model for analyzing Internet of Things protocols based on event logic. 104440 - Sanfeng Zhang

, Shangze Li, Juncheng Lu, Wang Yang:
Power-ASTNN: A deobfuscation and AST neural network enabled effective detection method for malicious PowerShell Scripts. 104441 - Shimin Sun, Le Zhou, Ze Wang, Li Han:

Robust intrusion detection based on personalized federated learning for IoT environment. 104442 - Hongsheng Xu, Akeel Qadir

, Saima Sadiq
:
Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity. 104443 - Okba Ben Atia, Mustafa Al Samara

, Ismail Bennis
, Abdelhafid Abouaissa, Jaafar Gaber, Pascal Lorenz
:
M3D-FL: Multi-layer Malicious Model Detection for Federated Learning in IoT networks. 104444 - Chenggang He

, Chris H. Q. Ding:
SecRASP: Next generation web application security protection methodology and framework. 104445 - Qindong Li

, Wenyi Tang
, Xingshu Chen, Hao Ren:
VuldiffFinder: Discovering inconsistencies in unstructured vulnerability information. 104447 - Neeshe Khan

, Steven Furnell, Maria Bada
, Matthew Rand
, Jason R. C. Nurse
:
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises. 104448 - Chaitanya Joshi

, Sergeja Slapnicar, Jinming Yang
, Ryan K. L. Ko
:
Contrasting the optimal resource allocation to cybersecurity controls and cyber insurance using prospect theory versus expected utility theory. 104450 - Aissa Ben Yahya

, Hicham El Akhal
, El Mehdi Ismaili Alaoui
, Abdelbaki El Belrhiti El Alaoui
:
Bayes-based word weighting for enhanced vulnerability classification in critical infrastructure systems. 104451 - Narges Rahimi

, Beth-Anne Schuelke Leech, Mitra Mirhassani:
A comprehensive review of security vulnerabilities in heavy-duty vehicles: Comparative insights and current research gaps. 104452 - Mofareh Waqdan

, Habib Louafi
, Malek Mouhoub
:
Security risk assessment in IoT environments: A taxonomy and survey. 104456 - Luigi Coppolino

, Salvatore D'Antonio, Giovanni Mazzeo
, Luigi Romano
:
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX. 104457 - Anil Sezgin

, Aytug Boyaci:
DecoyPot: A large language model-driven web API honeypot for realistic attacker engagement. 104458 - Ole Höfener

, Qinghua Wang
:
Requirements framework for IoT device authentication using behavioral fingerprinting. 104459 - Jin Wang, Liping Wang:

LR-STGCN: Detecting and mitigating low-rate DDoS attacks in SDN based on spatial-temporal graph neural network. 104460 - Naif Abdo Alsharabi

, Akashdeep Bhardwaj
, Abdulaziz Ayaba, Amr Jadi:
Threat hunting for adversary impact inhibiting system recovery. 104464 - Onur Sahin, Suleyman Uludag

:
Leveraging inter-arrival time for efficient threat filtering: A parsimonious approach. 104471

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














