


default search action
Computers & Security, Volume 157
Volume 157, 2025
- Kevin Bergner, Dieter Landes
:
A uniform assessment of host-based intrusion detection data sets. 104503 - Charles Weir
, Cecilia Loureiro-Koechlin, Lucy Hunt, Louise A. Dennis
:
The human factor: Addressing computing risks for critical national infrastructure towards 2040. 104524 - Munmun Swain
, Nikhil Tripathi
, Kamalakanta Sethi
:
Identifying communication sequence anomalies to detect DoS attacks against MQTT. 104526 - Jianzhou Zhao
, Qiang Wei, Xingwei Li, Yunchao Wang, Xixing Li
:
ASIRDetector: Scheduling-driven, asynchronous execution to discover asynchronous improper releases bug in linux kernel. 104530 - Huifang Xiang, Ruimei Zhang, Ziling Wang
, Di Dong:
New results on modeling and hybrid control for malware propagation in cyber-physical systems. 104533 - Mucahit Soylu
, Resul Das
:
Prediction and graph visualization of cyber attacks using graph attention networks. 104534 - Bouthayna El Bouzaidi Tiali
, Said Amari:
Modeling and modular detection of time attacks in cyber-physical systems based on timed automata with guards and dioid algebra. 104535 - Dayoung Choi
, Joohong Rheey
, Hyunggon Park
:
Attack-specific feature analysis framework for NetFlow IoT datasets. 104536 - Kok Onn Chee
, Mengmeng Ge
, Guangdong Bai
, Dan Dongseong Kim
:
Unveiling the evolution of IoT threats: Trends, tactics, and simulation analysis. 104537 - K. Praveen Kumar, N. Suresh Kumar:
Advanced Attack Mitigation in IoT Gateway Protocols. 104539 - Benxiao Tang
, Shilin Zhang
, Fei Zhu
, Aoshuang Ye
:
CAPRA: Context-Aware patch risk assessment for detecting immature vulnerability in open-source software. 104540 - Anagha A. S.
, Ciza Thomas, Balakrishnan Narayanaswamy
:
Optimized intrusion predictions through feature selection methods. 104541 - G. Y. Sree Varshini, S. Latha, Rajaa Vikhram Yohanandhan
:
Impact and detection of cyber attacks in wide area control application of cyber-physical power system (CPPS). 104547 - Yi-Chih Tung, En-Cheng Liou
, Pen-Chih Hu, Cheng-Han Yu:
VWA-6G AI assisted continuous security monitoring over open RAN service management orchestration. 104566 - Chuan Lu, Senlin Luo, Limin Pan
:
High-trigger fuzz testing for microarchitectural speculative execution vulnerability. 104567 - Syed Wali, Yasir Ali Farrukh, Irfan Khan:
Explainable AI and Random Forest based reliable intrusion detection system. 104542 - Tino Jungebloud, Nhung H. Nguyen, Dan Dongseong Kim, Armin Zimmermann:
Model-based structural and behavioral cybersecurity risk assessment in system designs. 104543 - Tariq Hussain, Muhammad Nawaz Khan, Bailin Yang, Razaz Waheeb Attar, Ahmed Alhomoud:
LiDAR point cloud transmission: Adversarial perspectives of spoofing attacks in autonomous driving. 104544 - Naomi Woods, Mikko Siponen:
Questioning a security assumption: Are unique passwords harder to remember than reused or modified passwords? 104545 - Zhizhuang Jia, Chao Yang, Pengbin Feng, Xiaoyun Zhao, Xinghua Li, Jianfeng Ma:
Impact assessment of third-party library vulnerabilities through vulnerability reachability analysis. 104546 - Yucheng Zhang, Xiaolin Ju, Xiang Chen, Misbahul Amin, Zilong Ren:
HGAN4VD: Leveraging Heterogeneous Graph Attention Networks for enhanced Vulnerability Detection. 104548 - Suraj Harsha Kamtam, Qian Lu, Abdur Rakib, Muhamad Azfar Ramli, Rakhi Manohar Mepparambath, Siraj Ahmed Shaikh, Hoang Nga Nguyen:
WOLVES: Window of Opportunity attack feasibility likelihood value estimation through a simulation-based approach. 104549 - Mahender Kumar, Gregory Epiphaniou, Carsten Maple:
Security of cyber-physical Additive Manufacturing supply chain: Survey, attack taxonomy and solutions. 104557 - Xiao Zhang, Yingxu Lai, Xinrui Dong, Xinyu Xu:
MER-GCN: Reasoning about attacking group behaviors using industrial control system attack knowledge graphs. 104558 - Awais Yousaf, Sean Gunawan, Sunil Basnet, Victor Bolbot, Jianying Zhou, Osiris A. Valdez Banda:
STPA-Cyber: A semi-automated cyber risk assessment framework for maritime cybersecurity. 104559 - Suvrima Datta, U. Venkanna, Aditya Kotha:
FiPiBox:Development of firewall for IoT networks using P4Pi. 104560 - Daniel Jeremiah, Husnain Rafiq, Ta Vinh Thong, Muhammad Usman, Mohsin Raza, Muhammad Awais:
NIOM-DGA: Nature-inspired optimised ML-based model for DGA detection. 104561 - Hongpo Zhang, Zhaozhe Zhang, Haizhaoyang Huang, Hehe Yang:
Wasserstein distance guided feature Tokenizer transformer domain adaptation for network intrusion detection. 104562 - Zehui Wang, Hao Li, Yinhao Qi, Wei Qiao, Song Liu, Chen Zhang, Bo Jiang, Zhigang Lu:
PathWatcher: A path-based behavior detection method for attack detection and investigation. 104563 - Jiaqi Li, Ke Wang, Yaoguang Chen, Yajin Zhou, Lei Wu, Jiashui Wang:
Detecting DBMS bugs with context-sensitive instantiation and multi-plan execution. 104564 - Naser AlDuaij:
VeracOS: An operating system extension for the veracity of files. 104565 - Mordechai Guri:
PIXHELL: When pixels learn to scream. 104568 - Manuela M. C. de Souza, Camila F. T. Pontes, João J. C. Gondim, Luís Paulo Faina Garcia, Luiz A. DaSilva, Eduardo F. M. Cavalcante, Marcelo Antonio Marotta:
A novel open set Energy-based Flow Classifier for Network Intrusion Detection. 104569 - Gaoyuan Pan, Huan Li, Jian Wang:
A fast hardware Trojan detection method with parallel clustering for large-scale gate-level netlists. 104570 - Sibo Qiao, Haohao Zhu, Lin Sha, Min Wang, Qiang Guo:
DynMark: A dynamic packet counting watermarking scheme for robust traffic tracing in network flows. 104571 - Jakub Suchorab, Sebastian Plamowski, Maciej Lawrynczuk:
Anomaly detection system for Modbus data based on an open source tool. 104572 - P. V. V. S. Srinivas, Nikhil Yadavalli, Venkata Durga, Karthik Kumar, Prateesh Raju:
Enhanced biometric template protection schemes using distance based fuzzy extractor. 104573 - Arthur Dantas Mangussi, Ricardo Cardoso Pereira, Ana Carolina Lorena, Miriam Seoane Santos, Pedro Henriques Abreu:
Studying the robustness of data imputation methodologies against adversarial attacks. 104574 - Steffi Haag, Nils Siegfried, Nane Winkler:
Informal control responses to information security policy violations: A factorial survey on insurance employees' moral licensing of insider threats. 104575 - Alessandro Palma, Silvia Bonomi:
Behind the scenes of attack graphs: Vulnerable network generator for in-depth experimental evaluation of attack graph scalability. 104576 - R. Hannah Jessie Rani, Amit Barve, Ashwini Malviya, Vivek Ranjan, Rubal Jeet, Nilesh Bhosle:
Enhancing detection rates in intrusion detection systems using fuzzy integration and computational intelligence. 104577 - Manuel Suarez-Roman, Juan Tapiador:
Attack structure matters: Causality-preserving metrics for Provenance-based Intrusion Detection Systems. 104578 - Iván Abellán Álvarez, Joaquín Delgado Fernández, Sergio Potenciano Menci:
Privacy-preserving distributed clustering: A fully homomorphic encrypted approach for time series. 104579 - Man Zhou, Lansheng Han, Xin Che:
Strengthening edge defense: A differential game-based edge intelligence strategy against APT attacks. 104580 - Xiangpu Song, Yingpei Zeng, Jianliang Wu, Hao Li, Chaoshun Zuo, Qingchuan Zhao, Shanqing Guo:
CSFuzzer: A grey-box fuzzer for network protocol using context-aware state feedback. 104581 - Yun-Che Yu, Ci-Yi Hung, Li-Der Chou:
Kernel-level hidden rootkit detection based on eBPF. 104582 - David Cevallos-Salas, José Estrada-Jiménez, Danny S. Guamán, Luis Urquiza-Aguiar:
Ransomware dynamics: Mitigating personal data exfiltration through the SCIRAS lens. 104583 - Renato Solimar Alves, Jady Pamella Barbacena da Silva, Luiz Antônio Ribeiro Júnior, Rafael Rabelo Nunes:
Enhancing cybersecurity in the judiciary: Integrating additional controls into the CIS framework. 104584 - Zhen Li, Qi Liao:
To insure or not to insure: How attackers exploit cyber-insurance via game theory. 104585 - Kai Yang, Yingjun Zhang, Ting Li, Limin Sun:
ASIDS: Acoustic side-channel based intrusion detection system for industrial robotic arms. 104586 - Yinhao Qi, Chuyi Yan, Zehui Wang, Chen Zhang, Song Liu, Zhigang Lu, Bo Jiang:
ATHITD: Attention-based temporal heterogeneous graph neural network for insider threat detection. 104587 - Hongmei Li, Tiantian Zhu, Jie Ying, Tieming Chen, Mingqi Lv, Jian-Ping Mei, Zhengqiu Weng, Lili Shi:
MIRDETECTOR: Applying malicious intent representation for enhanced APT anomaly detection. 104588 - Weiping Wang, Chenyu Wang, Hong Song, Kai Chen, Shigeng Zhang:
ProvGOutLiner: A lightweight anomaly detection method based on process behavior features within provenance graphs. 104589 - Ting He:
Physical-layer identity-authentication mechanism for network time synchronisation using network and precision time protocols. 104590 - Andong Chen, Zhaoxuan Jin, Zhenyuan Li, Yan Chen, Yu Ning, Ying Wang:
AutoSeg: Automatic micro-segmentation policy generation via configuration analysis. 104591 - Peng Xu, Tingting Rao, Wei Wang, Zhaojun Lu, Kaitai Liang:
Power of union: Federated honey password vaults against differential attack. 104592 - Shengrui Lin, Shaowei Xu, Binjie He, Hongyan Liu, Dezhang Kong, Xiang Chen, Dong Zhang, Chunming Wu, Ming Li, Xuan Liu, Yuqin Wu, Muhammad Khurram Khan:
NDIF: A distributed framework for efficient in-network neural network inference. 104593 - Zhiming Chu, Guyue Li, Qingchun Meng, Haobo Li, Yuwei Zeng:
Privacy-preserving WiFi sensing in WSNs via CSI obfuscation. 104594 - Gajanan Nanaji Tikhe, Pushpinder Singh Patheja:
Feature attention assisted convolutional stacked sparse auto-encoder model for intrusion detection in network function virtualization environment. 104595 - Sijjad Ali, Dhani Bux Talpur, Adeel Abro, Khulud Salem S. Alshudukhi, Ghadah Naif Alwakid, Mamoona Humayun, Farhan Bashir, Shuaib Ahmed Wadho, Asadullah Shah:
Security and privacy in multi-cloud and hybrid cloud environments: Challenges, strategies, and future directions. 104599 - Priva Chassem Kamdem, Alain B. Zemkoho, Laurent Njilla, Marcellin Nkenlifack, Charles A. Kamhoua:
Multi-domain deception for enhanced security in automotive networks. 104600 - Junbi Xiao, Zhaoyu Yin, Yuhao Zhou, Kai Liu, Jian Wang, Peiying Zhang:
P4Drop: A lightweight security function for filtering TCP spoofing packets on programmable switches. 104601 - Argianto Rahartomo, Leonel Merino, Mohammad Ghafari:
Metaverse security and privacy research: A systematic review. 104602 - Maxwell Dorgbefu Jnr, Yaw Marfo Missah, Najim Ussiph, Gaddafi Abdul-Salaam, Oliver Kornyo, Joseph Mawulorm Mensah:
Hybrid framework of differential privacy and secure multi-party computation for privacy-preserving entity resolution. 104603 - Gizem Kayisoglu, Emre Duzenli, Pelin Bolat, Aleksei Bondarenko:
Exploring cyber security threats and security models in cross-border paperless maritime trade system. 104604 - Hiba Hnaini, Raúl Mazo, Paola Vallejo, Andrés López, Joël Champeau:
Enhancing security requirements specification with SECRET-SCORE: A template-driven and ontology-based approach. 104605 - Allan Nganga, Joel Scanlan, Margareta Lützhöft, Steven Mallam:
Cyber risk communication during vessel incident management: A case study. 104607 - Yongyi Chen, Yu-Ling Hsueh:
A personalized and semantic-aware approach for trajectory protection. 104608 - Zhenwu Xu, Xingshu Chen, Liangguo Chen, Xiao Lan, Hao Ren, Changxiang Shen:
An efficient and commercial proof of storage scheme supporting dynamic data updates. 104609 - Yuling Luo, Yali Wan, Xue Ouyang, Junxiu Liu, Qiang Fu, Sheng Qin, Ziqi Yuan, Tinghua Hu:
Time series correlated key-value data collection with local differential privacy. 104610 - Haohua Qing, Roliana Ibrahim, Hui Wen Nies:
Location privacy protection method based on social network platform. 104611 - Lynda Kacha:
NKAB: An optimization approach for k-anonymity based on Black Hole Algorithm. 104612 - Ping Guo, Shuilong Xu, Wenfeng Liang:
A cloud-assisted anonymous and privacy-preserving authentication scheme for internet of medical things. 104614 - Xinxin Ye, Youwen Zhu, Jie Pan, Miao Zhang, Hai Deng:
PrivRS: Differentially private synthetic data generation via role similarity. 104616 - Gianpietro Castiglione, Daniele Francesco Santamaria, Giampaolo Bella, Laura Brisindi, Gaetano Puccia:
Guiding cybersecurity compliance: An ontology for the NIS 2 directive. 104617 - Andra Cojocaru:
Aligning regulation and governance for cyber resilience: A theoretical framework for the UK Financial Sector. 104627

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.