default search action
Computers & Security, Volume 96
Volume 96, September 2020
- Nuray Baltaci Akhuseyinoglu, James Joshi:
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems. 101802 - Bo Yang:
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks. 101809 - Amal Sammoud, Mohamed Aymen Chalouf, Omessaad Hamdi, Nicolas Montavont, Ammar Bouallegue:
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis. 101838 - Huijuan Lian, Weidong Qiu, Di Yan, Jie Guo, Zhe Li, Peng Tang:
Privacy-preserving spatial query protocol based on the Moore curve for location-based service. 101845 - Moussa Wajdi, Basty Nadia, Ghazouani Ines:
Asymmetric effect and dynamic relationships over the cryptocurrencies market. 101860 - Xiaofeng Lu, Shengfei Zhang, Pan Hui, Pietro Liò:
Continuous authentication by free-text keystroke based on CNN and RNN. 101861 - Ashraf Tantawy, Sherif Abdelwahed, Abdelkarim Erradi, Khaled B. Shaban:
Model-based risk assessment for cyber physical systems security. 101864 - Karl van der Schyff, Stephen Flowerday, Steven Furnell:
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment. 101866 - George Stergiopoulos, Panagiotis Dedousis, Dimitris Gritzalis:
Automatic network restructuring and risk mitigation through business process asset dependency analysis. 101869 - Andrew Case, Ryan D. Maggio, Md Firoz-Ul-Amin, Mohammad M. Jalalzai, Aisha I. Ali-Gombe, Mingxuan Sun, Golden G. Richard III:
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics. 101872 - João Guerreiro, Rui Moura, João Nuno Silva:
TEEnder: SGX enclave migration using HSMs. 101874 - Hwee-Joo Kam, Philip Menard, Dustin Ormond, Robert E. Crossler:
Cultivating cybersecurity learning: An integration of self-determination and flow. 101875 - Zhe Sun, Lihua Yin, Chao Li, Weizhe Zhang, Ang Li, Zhihong Tian:
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach. 101876 - Yuanfan Yao, Ziyu Wang, Pan Zhou:
Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach. 101886 - Chunpeng Ge, Changchun Yin, Zhe Liu, Liming Fang, Juncen Zhu, Huading Ling:
A privacy preserve big data analysis system for wearable wireless sensor network. 101887 - Héber Hwang Arcolezi, Jean-François Couchot, Selene Cerna, Christophe Guyeux, Guillaume Royer, Bechara al Bouna, Xiaokui Xiao:
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data. 101888 - Chen Fang, Yuanbo Guo, Na Wang, Ankang Ju:
Highly efficient federated learning with strong privacy preservation in cloud computing. 101889 - Oleksii Konashevych, Oleg Khovayko:
Randpay: The technology for blockchain micropayments and transactions which require recipient's consent. 101892 - Abdelaziz Amara Korba, Nouredine Tamani, Yacine Ghamri-Doudane, Nour El Islem Karabadji:
Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI. 101896 - Noura Aleisa, Karen Renaud, Ivano Bongiovanni:
The privacy paradox applies to IoT devices too: A Saudi Arabian study. 101897 - Zuchao Ma, Liang Liu, Weizhi Meng:
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks. 101898 - Liqun Yang, Xiaoming Zhang, Zhi Li, Zhoujun Li, Yueying He:
Detecting bi-level false data injection attack based on time series analysis method in smart grid. 101899 - Cyril Onwubiko:
Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud. 101900 - Davide Maiorca, Ambra Demontis, Battista Biggio, Fabio Roli, Giorgio Giacinto:
Adversarial Detection of Flash Malware: Limitations and Open Issues. 101901 - Javier Galbally:
A new Foe in biometrics: A narrative review of side-channel attacks. 101902 - Waqas Haider, Nour Moustafa, Marwa Keshk, Amanda S. Fernandez, Kim-Kwang Raymond Choo, Abdul Wahab:
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems. 101906 - Michael D. Iannacone, Robert A. Bridges:
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach. 101907 - Nebrase Elmrabit, Shuang-Hua Yang, Lili Yang, Huiyu Zhou:
Insider Threat Risk Prediction based on Bayesian Network. 101908 - Jinyin Chen, Haibin Zheng, Ruoxi Chen, Hui Xiong:
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours. 101916 - Amit Dvir, Angelos K. Marnerides, Ran Dubin, Nehor Golan, Chen Hajaj:
Encrypted video traffic clustering demystified. 101917 - Mohammad Amiri-Zarandi, Rozita Dara, Evan D. G. Fraser:
A survey of machine learning-based solutions to protect privacy in the Internet of Things. 101921 - Jiang Xie, Shuhao Li, Xiaochun Yun, Yongzheng Zhang, Peng Chang:
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics. 101923 - Bhaveer Bhana, Stephen Flowerday:
Passphrase and keystroke dynamics authentication: Usable security. 101925 - Kelei Miao, Xiufang Shi, Wen-an Zhang:
Attack signal estimation for intrusion detection in industrial control system. 101926 - Kuang-Ming Kuo, Paul C. Talley, Chi Hsien Huang:
A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors. 101928 - Isabel Arend, Asaf Shabtai, Tali Idan, Ruty Keinan, Yoella Bereby-Meyer:
Passive- and not active-risk tendencies predict cyber security behavior. 101929 - Zhitao Guan, Xianwen Sun, Lingyun Shi, Longfei Wu, Xiaojiang Du:
A differentially private greedy decision forest classification algorithm with high utility. 101930 - ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb:
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning. 101932 - Zongyuan Xiang, Dong Guo, Qiang Li:
Detecting mobile advanced persistent threats based on large-scale DNS logs. 101933 - Guangsheng Yu, Xuan Zha, Xu Wang, Wei Ni, Kan Yu, J. Andrew Zhang, Ren Ping Liu:
A Unified Analytical model for proof-of-X schemes. 101934 - Tanmoy Kanti Das, Sridhar Adepu, Jianying Zhou:
Anomaly detection in Industrial Control Systems using Logical Analysis of Data. 101935 - Junfeng Tian, Zhidan Wang:
Fine-grained assured data deletion scheme based on attribute association. 101936 - Denglong Lv, Shibing Zhu:
Achieving secure big data collection based on trust evaluation and true data discovery. 101937
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.