Search dblp for Publications

export results for "stream:streams/journals/compsec:"

more than 1000 matches, exporting first 1000 hits only!

 download as .bib file

@article{DBLP:journals/compsec/AhmedKH24,
  author       = {Kashan Ahmed and
                  Syed Khaldoon Khurshid and
                  Sadaf Hina},
  title        = {CyberEntRel: Joint extraction of cyber entities and relations using
                  deep learning},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103579},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103579},
  doi          = {10.1016/J.COSE.2023.103579},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmedKH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AvolaCMFFMM24,
  author       = {Danilo Avola and
                  Luigi Cinque and
                  Maria De Marsico and
                  Alessio Fagioli and
                  Gian Luca Foresti and
                  Maurizio Mancini and
                  Alessio Mecca},
  title        = {Signal enhancement and efficient DTW-based comparison for wearable
                  gait recognition},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103643},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103643},
  doi          = {10.1016/J.COSE.2023.103643},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AvolaCMFFMM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AzimjonovK24,
  author       = {Jahongir Azimjonov and
                  Taehong Kim},
  title        = {Designing accurate lightweight intrusion detection systems for IoT
                  networks using fine-tuned linear {SVM} and feature selectors},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103598},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103598},
  doi          = {10.1016/J.COSE.2023.103598},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AzimjonovK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerensBDKKV24,
  author       = {Benjamin Maximilian Berens and
                  Mark Bohlender and
                  Heike Dietmann and
                  Chiara Krisam and
                  Oksana Kulyk and
                  Melanie Volkamer},
  title        = {Cookie disclaimers: Dark patterns and lack of transparency},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103507},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103507},
  doi          = {10.1016/J.COSE.2023.103507},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BerensBDKKV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerensMV24,
  author       = {Benjamin Maximilian Berens and
                  Mattia Mossano and
                  Melanie Volkamer},
  title        = {Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing
                  awareness video},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103620},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103620},
  doi          = {10.1016/J.COSE.2023.103620},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BerensMV24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BilikaMAP24,
  author       = {Domna Bilika and
                  Nikoletta Michopoulou and
                  Efthimios Alepis and
                  Constantinos Patsakis},
  title        = {Hello me, meet the real me: Voice synthesis attacks on voice assistants},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103617},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103617},
  doi          = {10.1016/J.COSE.2023.103617},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BilikaMAP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BrownGA24,
  author       = {Austin Brown and
                  Maanak Gupta and
                  Mahmoud Abdelsalam},
  title        = {Automated machine learning for deep learning based malware detection},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103582},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103582},
  doi          = {10.1016/J.COSE.2023.103582},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BrownGA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaiXLCZ24,
  author       = {Saihua Cai and
                  Han Xu and
                  Mingjie Liu and
                  Zhilin Chen and
                  Guofeng Zhang},
  title        = {A malicious network traffic detection model based on bidirectional
                  temporal convolutional network with multi-head self-attention mechanism},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103580},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103580},
  doi          = {10.1016/J.COSE.2023.103580},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CaiXLCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoYLZG24,
  author       = {Yu Cao and
                  Ang Yang and
                  Hanning Li and
                  Qingcheng Zeng and
                  Jing Gao},
  title        = {A comprehensive knowledge map for {AI} improving security management
                  of cyber-physical system enabled smart manufacturing},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103650},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103650},
  doi          = {10.1016/J.COSE.2023.103650},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoYLZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CasolaBMO24,
  author       = {Valentina Casola and
                  Alessandra De Benedictis and
                  Carlo Mazzocca and
                  Vittorio Orbinato},
  title        = {Secure software development and testing: {A} model-based methodology},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103639},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103639},
  doi          = {10.1016/J.COSE.2023.103639},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CasolaBMO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CheeGBK24,
  author       = {Kok Onn Chee and
                  Mengmeng Ge and
                  Guangdong Bai and
                  Dan Dongseong Kim},
  title        = {IoTSecSim: {A} framework for modelling and simulation of security
                  in Internet of things},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103534},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103534},
  doi          = {10.1016/J.COSE.2023.103534},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CheeGBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenDLC24,
  author       = {Peng Chen and
                  Xin Du and
                  Zhihui Lu and
                  Hongfeng Chai},
  title        = {Universal adversarial backdoor attacks to fool vertical federated
                  learning},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103601},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103601},
  doi          = {10.1016/J.COSE.2023.103601},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenDLC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenHK24,
  author       = {Jiayi Chen and
                  Urs Hengartner and
                  Hassan Khan},
  title        = {{SHRIMPS:} {A} framework for evaluating multi-user, multi-modal implicit
                  authentication systems},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103594},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103594},
  doi          = {10.1016/J.COSE.2023.103594},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenHK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenJCZZYY24,
  author       = {Ruoxi Chen and
                  Haibo Jin and
                  Jinyin Chen and
                  Haibin Zheng and
                  Shilian Zheng and
                  Xiaoniu Yang and
                  Xing Yang},
  title        = {AdvCheck: Characterizing adversarial examples via local gradient checking},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103540},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103540},
  doi          = {10.1016/J.COSE.2023.103540},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenJCZZYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLL24,
  author       = {Hongsong Chen and
                  Xingyu Li and
                  Wenmao Liu},
  title        = {Multivariate time series anomaly detection by fusion of deep convolution
                  residual autoencoding reconstruction model and ConvLstm forecasting
                  model},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103581},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103581},
  doi          = {10.1016/J.COSE.2023.103581},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWZYTP24,
  author       = {Shi Chen and
                  Wennan Wang and
                  Yubin Zhong and
                  Zuobin Ying and
                  Weixuan Tang and
                  Zijie Pan},
  title        = {{HP-MIA:} {A} novel membership inference attack scheme for high membership
                  prediction precision},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103571},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103571},
  doi          = {10.1016/J.COSE.2023.103571},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWZYTP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenYCDJLL24,
  author       = {Yufan Chen and
                  Jiahai Yang and
                  Susu Cui and
                  Cong Dong and
                  Bo Jiang and
                  Yuling Liu and
                  Zhigang Lu},
  title        = {Unveiling encrypted traffic types through hierarchical network characteristics},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103645},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103645},
  doi          = {10.1016/J.COSE.2023.103645},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenYCDJLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZLZ24,
  author       = {Tieming Chen and
                  Huan Zeng and
                  Mingqi Lv and
                  Tiantian Zhu},
  title        = {{CTIMD:} Cyber threat intelligence enhanced malware detection using
                  {API} call sequences with parameters},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103518},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103518},
  doi          = {10.1016/J.COSE.2023.103518},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiSLK24,
  author       = {Wonwoo Choi and
                  Minjae Seo and
                  Seongman Lee and
                  Brent ByungHoon Kang},
  title        = {SuM: Efficient shadow stack protection on {ARM} Cortex-M},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103568},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103568},
  doi          = {10.1016/J.COSE.2023.103568},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiSLK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChowdhuryAT24,
  author       = {Noman H. Chowdhury and
                  Marc T. P. Adam and
                  Timm Teubner},
  title        = {Withdrawal notice to 'Time pressure in human cybersecurity behavior:
                  Theoretical framework and countermeasures' [Computers {\&} Security,
                  97 {(2020)} 101931]},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103393},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103393},
  doi          = {10.1016/J.COSE.2023.103393},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChowdhuryAT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoppaS24,
  author       = {Emilio Coppa and
                  Sebastian Schrittwieser},
  title        = {Editorial: Special issue on {ARES} 2022},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103662},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103662},
  doi          = {10.1016/J.COSE.2023.103662},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CoppaS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CorinS24,
  author       = {Roberto Doriguzzi Corin and
                  Domenico Siracusa},
  title        = {{FLAD:} Adaptive Federated Learning for DDoS attack detection},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103597},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103597},
  doi          = {10.1016/J.COSE.2023.103597},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CorinS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Dubin24,
  author       = {Ran Dubin},
  title        = {Content Disarm and Reconstruction of Microsoft Office {OLE} files},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103647},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103647},
  doi          = {10.1016/J.COSE.2023.103647},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Dubin24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DunstonR24,
  author       = {Snofy D. Dunston and
                  V. Mary Anita Rajam},
  title        = {{AIPA:} An Adversarial Imperceptible Patch Attack on Medical Datasets
                  and its Interpretability},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103574},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103574},
  doi          = {10.1016/J.COSE.2023.103574},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DunstonR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DurstHZ24,
  author       = {Susanne Durst and
                  Christoph Hinteregger and
                  Malgorzata Zieba},
  title        = {The effect of environmental turbulence on cyber security risk management
                  and organizational resilience},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103591},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103591},
  doi          = {10.1016/J.COSE.2023.103591},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DurstHZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandoK24,
  author       = {Damien Warren Fernando and
                  Nikos Komninos},
  title        = {FeSAD ransomware detection framework with machine learning using adaption
                  to concept drift},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103629},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103629},
  doi          = {10.1016/J.COSE.2023.103629},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandoK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GadallahIO24,
  author       = {Waheed G. Gadallah and
                  Hosny M. Ibrahim and
                  Nagwa M. Omar},
  title        = {A deep learning technique to detect distributed denial of service
                  attacks in software-defined networks},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103588},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103588},
  doi          = {10.1016/J.COSE.2023.103588},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GadallahIO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GengWFZWG24,
  author       = {Jiaxuan Geng and
                  Junfeng Wang and
                  Zhiyang Fang and
                  Yingjie Zhou and
                  Di Wu and
                  Wenhan Ge},
  title        = {A survey of strategy-driven evasion methods for {PE} malware: Transformation,
                  concealment, and attack},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103595},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103595},
  doi          = {10.1016/J.COSE.2023.103595},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GengWFZWG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GernotR24,
  author       = {Tanguy Gernot and
                  Christophe Rosenberger},
  title        = {Robust biometric scheme against replay attacks using one-time biometric
                  templates},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103586},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103586},
  doi          = {10.1016/J.COSE.2023.103586},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GernotR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GongLLYG24,
  author       = {Zhimao Gong and
                  Junyi Li and
                  Yaping Lin and
                  Lening Yuan and
                  Wen Gao},
  title        = {A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103659},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103659},
  doi          = {10.1016/J.COSE.2023.103659},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GongLLYG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuerraManzanares24,
  author       = {Alejandro Guerra{-}Manzanares},
  title        = {Machine Learning for Android Malware Detection: Mission Accomplished?
                  {A} Comprehensive Review of Open Challenges and Future Perspectives},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103654},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103654},
  doi          = {10.1016/J.COSE.2023.103654},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuerraManzanares24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoLX24,
  author       = {Ping Guo and
                  Wenfeng Liang and
                  Shuilong Xu},
  title        = {A privacy preserving four-factor authentication protocol for internet
                  of medical things},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103632},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103632},
  doi          = {10.1016/J.COSE.2023.103632},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoLX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeSXHTZ24,
  author       = {Ying He and
                  Zhili Shen and
                  Chang Xia and
                  Jingyu Hua and
                  Wei Tong and
                  Sheng Zhong},
  title        = {{SGBA:} {A} stealthy scapegoat backdoor attack against deep neural
                  networks},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103523},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103523},
  doi          = {10.1016/J.COSE.2023.103523},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HeSXHTZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeXZXY24,
  author       = {Xinlong He and
                  Yang Xu and
                  Sicong Zhang and
                  Weida Xu and
                  Jiale Yan},
  title        = {Enhance membership inference attacks in federated learning},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103535},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103535},
  doi          = {10.1016/J.COSE.2023.103535},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HeXZXY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HnamteNNHS24,
  author       = {Vanlalruata Hnamte and
                  Ashfaq Ahmad Najar and
                  Hong Nhung{-}Nguyen and
                  Jamal Hussain and
                  Manohar Naik Sugali},
  title        = {DDoS attack detection and mitigation using deep neural network in
                  {SDN} environment},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103661},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103661},
  doi          = {10.1016/J.COSE.2023.103661},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HnamteNNHS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoffmanHPMA24,
  author       = {Cameron John Hoffman and
                  C. Jordan Howell and
                  Robert C. Perkins and
                  David Maimon and
                  Olena Antonaccio},
  title        = {Predicting new hackers' criminal careers: {A} group-based trajectory
                  approach},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103649},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103649},
  doi          = {10.1016/J.COSE.2023.103649},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HoffmanHPMA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangWWB24,
  author       = {Jiahao Huang and
                  Mi Wen and
                  Minjie Wei and
                  Yanbing Bi},
  title        = {Enhancing the transferability of adversarial samples with random noise
                  techniques},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103541},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103541},
  doi          = {10.1016/J.COSE.2023.103541},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangWWB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangYZDYY24,
  author       = {Yuxian Huang and
                  Geng Yang and
                  Hao Zhou and
                  Hua Dai and
                  Dong Yuan and
                  Shui Yu},
  title        = {{VPPFL:} {A} verifiable privacy-preserving federated learning scheme
                  against poisoning attacks},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103562},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103562},
  doi          = {10.1016/J.COSE.2023.103562},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangYZDYY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZZHC24,
  author       = {Haoxiang Huang and
                  Jianbiao Zhang and
                  Lei Zhang and
                  Jun Hu and
                  Yihao Cao},
  title        = {{SABDTM:} Security-first architecture-based dynamic trusted measurement
                  scheme for operating system of the virtual computing node},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103648},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103648},
  doi          = {10.1016/J.COSE.2023.103648},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZZHC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaLL24,
  author       = {Cheng{-}kun Jia and
                  Min Long and
                  Yong{-}chao Liu},
  title        = {Enhanced face morphing attack detection using error-level analysis
                  and efficient selective kernel network},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103640},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103640},
  doi          = {10.1016/J.COSE.2023.103640},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KavrestadRN24,
  author       = {Joakim K{\"{a}}vrestad and
                  Jana Rambusch and
                  Marcus Nohlberg},
  title        = {Design principles for cognitively accessible cybersecurity training},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103630},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103630},
  doi          = {10.1016/J.COSE.2023.103630},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KavrestadRN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalilBK24,
  author       = {Shaymaa Mamdouh Khalil and
                  Hayretdin Bahsi and
                  Tarmo Kor{\~{o}}tko},
  title        = {Threat modeling of industrial control systems: {A} systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103543},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103543},
  doi          = {10.1016/J.COSE.2023.103543},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalilBK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalilFHM24,
  author       = {Fatima Mavra Khalil and
                  Adnan Fazil and
                  Muhammad Jawad Hussain and
                  Ammar Masood},
  title        = {Cross-Layer {RF} Distance Bounding Scheme for Passive and Semi-passive
                  Ubiquitous Computing Systems},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103633},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103633},
  doi          = {10.1016/J.COSE.2023.103633},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalilFHM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KonstaLSD24,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Beatrice Spiga and
                  Nicola Dragoni},
  title        = {Corrigendum to "Survey: Automatic generation of attack trees and attack
                  graphs" [Computers {\&} Security Volume 137, February 2024, 103602]},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103660},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103660},
  doi          = {10.1016/J.COSE.2023.103660},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KonstaLSD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KonstaLSD24a,
  author       = {Alyzia Maria Konsta and
                  Alberto Lluch{-}Lafuente and
                  Beatrice Spiga and
                  Nicola Dragoni},
  title        = {Survey: Automatic generation of attack trees and attack graphs},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103602},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103602},
  doi          = {10.1016/J.COSE.2023.103602},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KonstaLSD24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KozikFPPPC24,
  author       = {Rafal Kozik and
                  Massimo Ficco and
                  Aleksandra Pawlicka and
                  Marek Pawlicki and
                  Francesco Palmieri and
                  Michal Choras},
  title        = {When explainability turns into a threat - using xAI to fool a fake
                  news detection method},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103599},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103599},
  doi          = {10.1016/J.COSE.2023.103599},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KozikFPPPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KruzikovaMKDSM24,
  author       = {Agata Kruzikova and
                  Michal Muzik and
                  Lenka Knapova and
                  Lenka Dedkova and
                  David Smahel and
                  Vashek Matyas},
  title        = {Two-factor authentication time: How time-efficiency and time-satisfaction
                  are associated with perceived security and satisfaction},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103667},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103667},
  doi          = {10.1016/J.COSE.2023.103667},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KruzikovaMKDSM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KrzyworzekaOO24,
  author       = {Natalia Krzyworzeka and
                  Lidia Ogiela and
                  Marek R. Ogiela},
  title        = {Personal CAPTCHA-based authentication protocol},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103613},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103613},
  doi          = {10.1016/J.COSE.2023.103613},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KrzyworzekaOO24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LanduytWJ24,
  author       = {Dimitri Van Landuyt and
                  Vincent Wijshoff and
                  Wouter Joosen},
  title        = {A study of NoSQL query injection in Neo4j},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103590},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103590},
  doi          = {10.1016/J.COSE.2023.103590},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LanduytWJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCCZ24,
  author       = {Junchen Li and
                  Guang Cheng and
                  Zongyao Chen and
                  Peng Zhao},
  title        = {Protocol clustering of unknown traffic based on embedding of protocol
                  specification},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103575},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103575},
  doi          = {10.1016/J.COSE.2023.103575},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiHLFYL24,
  author       = {Junhao Li and
                  Junjiang He and
                  Wenshan Li and
                  Wenbo Fang and
                  Geying Yang and
                  Tao Li},
  title        = {SynDroid: An adaptive enhanced Android malware classification method
                  based on {CTGAN-SVM}},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103604},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103604},
  doi          = {10.1016/J.COSE.2023.103604},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiHLFYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiSGYL24,
  author       = {Huang Li and
                  Yiqin Sang and
                  Hongjuan Ge and
                  Jie Yan and
                  Shijia Li},
  title        = {Anomaly detection of aviation data bus based on {SAE} and {IMD}},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103619},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103619},
  doi          = {10.1016/J.COSE.2023.103619},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiSGYL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiXSSZLZ24,
  author       = {Xiang Li and
                  Jiang Xie and
                  Qige Song and
                  Yafei Sang and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Tianning Zang},
  title        = {Let model keep evolving: Incremental learning for encrypted traffic
                  classification},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103624},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103624},
  doi          = {10.1016/J.COSE.2023.103624},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiXSSZLZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZWWSW24,
  author       = {Xixing Li and
                  Lei Zhao and
                  Qiang Wei and
                  Zehui Wu and
                  Weiming Shi and
                  Yunchao Wang},
  title        = {SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities
                  in embedded devices},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103618},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103618},
  doi          = {10.1016/J.COSE.2023.103618},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZWWSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangHZZ24,
  author       = {Chuang Liang and
                  Jie Huang and
                  Zeping Zhang and
                  Shuaishuai Zhang},
  title        = {Defending against model extraction attacks with {OOD} feature learning
                  and decision boundary confusion},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103563},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103563},
  doi          = {10.1016/J.COSE.2023.103563},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangHZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LilhoreDS24,
  author       = {Umesh Kumar Lilhore and
                  Surjeet Dalal and
                  Sarita Simaiya},
  title        = {A cognitive security framework for detecting intrusions in IoT and
                  5G utilizing deep learning},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103560},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103560},
  doi          = {10.1016/J.COSE.2023.103560},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LilhoreDS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuPZF24,
  author       = {Side Liu and
                  Guojun Peng and
                  Haitao Zeng and
                  Jianming Fu},
  title        = {A survey on the evolution of fileless attacks and detection techniques},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103653},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103653},
  doi          = {10.1016/J.COSE.2023.103653},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuPZF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuSLL24,
  author       = {Ming Liu and
                  Xiao Song and
                  Yong Li and
                  Wenxin Li},
  title        = {Correlated differential privacy based logistic regression for supplier
                  data protection},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103542},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103542},
  doi          = {10.1016/J.COSE.2023.103542},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuSLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaG24,
  author       = {Zihan Ma and
                  Tianchong Gao},
  title        = {Federated learning backdoor attack detection with persistence diagram},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103557},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103557},
  doi          = {10.1016/J.COSE.2023.103557},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MaG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaMJG24,
  author       = {Xirong Ma and
                  Chuan Ma and
                  Yali Jiang and
                  Chunpeng Ge},
  title        = {Improved privacy-preserving {PCA} using optimized homomorphic matrix
                  multiplication},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103658},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103658},
  doi          = {10.1016/J.COSE.2023.103658},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MaMJG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MayerHE24,
  author       = {Rudolf Mayer and
                  Markus Hittmeir and
                  Andreas Ekelhart},
  title        = {Distance-based linkage of personal microbiome records for identification
                  and its privacy implications},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103538},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103538},
  doi          = {10.1016/J.COSE.2023.103538},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MayerHE24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MestariLD24,
  author       = {Soumia Zohra El Mestari and
                  Gabriele Lenzini and
                  H{\"{u}}seyin Demirci},
  title        = {Preserving data privacy in machine learning systems},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103605},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103605},
  doi          = {10.1016/J.COSE.2023.103605},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MestariLD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeursCCJA24,
  author       = {Tom Meurs and
                  Edward J. Cartwright and
                  Anna Cartwright and
                  Marianne Junger and
                  Abhishta Abhishta},
  title        = {Deception in double extortion ransomware attacks: An analysis of profitability
                  and credibility},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103670},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103670},
  doi          = {10.1016/J.COSE.2023.103670},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MeursCCJA24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MikuleticVSZ24,
  author       = {Samanta Mikuletic and
                  Simon Vrhovec and
                  Brigita Skela{-}Savic and
                  Bostjan Zvanut},
  title        = {Security and privacy oriented information security culture {(ISC):}
                  Explaining unauthorized access to healthcare data by nursing employees},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103489},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103489},
  doi          = {10.1016/J.COSE.2023.103489},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MikuleticVSZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitchellMR24,
  author       = {Jeff Mitchell and
                  Niall McLaughlin and
                  Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n},
  title        = {Generating sparse explanations for malicious Android opcode sequences
                  using hierarchical {LIME}},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103637},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103637},
  doi          = {10.1016/J.COSE.2023.103637},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MitchellMR24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NajafiPCM24,
  author       = {Pejman Najafi and
                  Wenzel P{\"{u}}nter and
                  Feng Cheng and
                  Christoph Meinel},
  title        = {You are your friends: Detecting malware via guilt-by-association and
                  exempt-by-reputation},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103519},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103519},
  doi          = {10.1016/J.COSE.2023.103519},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NajafiPCM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OuytselDL24,
  author       = {Charles{-}Henry Bertrand Van Ouytsel and
                  Khanh{-}Huu{-}The Dam and
                  Axel Legay},
  title        = {Analysis of machine learning approaches to packing detection},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103536},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103536},
  doi          = {10.1016/J.COSE.2023.103536},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/OuytselDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkKPC24,
  author       = {Eun Hee Park and
                  Jongwoo Kim and
                  Young Soon Park and
                  Kyung Hee Chun},
  title        = {Facilitating and impeding factors to insiders' prosocial rule breaking
                  in South Korea},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103572},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103572},
  doi          = {10.1016/J.COSE.2023.103572},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkKPC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PayaAGG24,
  author       = {Antonio Paya and
                  Sergio Arroni and
                  Vicente Garc{\'{\i}}a{-}D{\'{\i}}az and
                  Alberto G{\'{o}}mez},
  title        = {Apollon: {A} robust defense system against Adversarial Machine Learning
                  attacks in Intrusion Detection Systems},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103546},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103546},
  doi          = {10.1016/J.COSE.2023.103546},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PayaAGG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PiGCSYP24,
  author       = {Ben Pi and
                  Chun Guo and
                  Yunhe Cui and
                  Guowei Shen and
                  Jialong Yang and
                  Yuan Ping},
  title        = {Remote access trojan traffic early detection method based on Markov
                  matrices and deep learning},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103628},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103628},
  doi          = {10.1016/J.COSE.2023.103628},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PiGCSYP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PrasadC24,
  author       = {Arvind Prasad and
                  Shalini Chandra},
  title        = {PhiUSIIL: {A} diverse security profile empowered phishing {URL} detection
                  framework based on similarity index and incremental learning},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103545},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103545},
  doi          = {10.1016/J.COSE.2023.103545},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PrasadC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PrummerSB24,
  author       = {Julia Pr{\"{u}}mmer and
                  Tommy van Steen and
                  Bibi van den Berg},
  title        = {A systematic review of current cybersecurity training methods},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103585},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103585},
  doi          = {10.1016/J.COSE.2023.103585},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PrummerSB24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QinJDD24,
  author       = {Xingsheng Qin and
                  Frank Jiang and
                  Chengzu Dong and
                  Robin Doss},
  title        = {A hybrid cyber defense framework for reconnaissance attack in industrial
                  control systems},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103506},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103506},
  doi          = {10.1016/J.COSE.2023.103506},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/QinJDD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RekaKRS24,
  author       = {R. Reka and
                  R. Karthick and
                  R. Saravana Ram and
                  Gurkirpal Singh},
  title        = {Multi head self-attention gated graph convolutional network based
                  multi{\unicode{8209}}attack intrusion detection in {MANET}},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103526},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103526},
  doi          = {10.1016/J.COSE.2023.103526},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RekaKRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RibeiroGC24,
  author       = {Liliana Ribeiro and
                  In{\^{e}}s Sousa Guedes and
                  Carla Sofia Cardoso},
  title        = {Which factors predict susceptibility to phishing? An empirical study},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103558},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103558},
  doi          = {10.1016/J.COSE.2023.103558},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RibeiroGC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RizviW24,
  author       = {Syed Rizvi and
                  Iyonna Williams},
  title        = {Analyzing transparency and malicious insiders prevention for cloud
                  computing environment},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103622},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103622},
  doi          = {10.1016/J.COSE.2023.103622},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RizviW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RodriguezKS24,
  author       = {Jes{\'{u}}s Garc{\'{\i}}a Rodr{\'{\i}}guez and
                  Stephan Krenn and
                  Daniel Slamanig},
  title        = {To pass or not to pass: Privacy-preserving physical access control},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103566},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103566},
  doi          = {10.1016/J.COSE.2023.103566},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RodriguezKS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RustamJ24,
  author       = {Furqan Rustam and
                  Anca Delia Jurcut},
  title        = {Malicious traffic detection in multi-environment networks using novel
                  {S-DATE} and {PSO-D-SEM} approaches},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103564},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103564},
  doi          = {10.1016/J.COSE.2023.103564},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RustamJ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SanchezCBP24,
  author       = {Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Alberto Huertas Celdr{\'{a}}n and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Single-board device individual authentication based on hardware performance
                  and autoencoder transformer models},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103596},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103596},
  doi          = {10.1016/J.COSE.2023.103596},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SanchezCBP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Schiavone24,
  author       = {Antonio Giovanni Schiavone},
  title        = {Municipality2HTTPS: {A} study on {HTTPS} protocol's usage in Italian
                  municipalities' websites},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103592},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103592},
  doi          = {10.1016/J.COSE.2023.103592},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Schiavone24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SethuramanSRRK24,
  author       = {Sibi Chakkaravarthy Sethuraman and
                  Devi Priya V. S and
                  Tarun Reddi and
                  Mulka Sai Tharun Reddy and
                  Muhammad Khurram Khan},
  title        = {A comprehensive examination of email spoofing: Issues and prospects
                  for email security},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103600},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103600},
  doi          = {10.1016/J.COSE.2023.103600},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SethuramanSRRK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShankarAKJTK24,
  author       = {Deepa D. Shankar and
                  Adresya Suresh Azhakath and
                  Nesma Khalil and
                  Sajeev J and
                  Mahalakshmi T and
                  Sheeba K},
  title        = {Data mining for cyber biosecurity risk management - {A} comprehensive
                  review},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103627},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103627},
  doi          = {10.1016/J.COSE.2023.103627},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShankarAKJTK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenS24,
  author       = {Quan Shen and
                  Yanming Shen},
  title        = {Endpoint security reinforcement via integrated zero-trust systems:
                  {A} collaborative approach},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103537},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103537},
  doi          = {10.1016/J.COSE.2023.103537},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Skeoch24,
  author       = {Henry R. K. Skeoch},
  title        = {Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance"
                  [Computers {\&} Security Volume 112 {(2022)} 102533]},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103657},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103657},
  doi          = {10.1016/J.COSE.2023.103657},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Skeoch24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SongSZHWXZ24,
  author       = {Haina Song and
                  Hua Shen and
                  Nan Zhao and
                  Zhangqing He and
                  Minghu Wu and
                  Wei Xiong and
                  Mingwu Zhang},
  title        = {{APLDP:} Adaptive personalized local differential privacy data collection
                  in mobile crowdsensing},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103517},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103517},
  doi          = {10.1016/J.COSE.2023.103517},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SongSZHWXZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SumanK24,
  author       = {Suman and
                  Raees Ahmad Khan},
  title        = {An optimized neural network for prediction of security threats on
                  software testing},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103626},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103626},
  doi          = {10.1016/J.COSE.2023.103626},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SumanK24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunZCZ24,
  author       = {Hui Sun and
                  Tianqing Zhu and
                  Wenhan Chang and
                  Wanlei Zhou},
  title        = {A two-stage model extraction attack on GANs with a small collected
                  dataset},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103634},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103634},
  doi          = {10.1016/J.COSE.2023.103634},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SunZCZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TahaYAMY24,
  author       = {Kamal Taha and
                  Paul D. Yoo and
                  Yousof Al{-}Hammadi and
                  Sami Muhaidat and
                  Chan Yeob Yeun},
  title        = {Learning a deep-feature clustering model for gait-based individual
                  identification},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103559},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103559},
  doi          = {10.1016/J.COSE.2023.103559},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TahaYAMY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TaoLS24,
  author       = {Shouzheng Tao and
                  Yezheng Liu and
                  Chunhua Sun},
  title        = {Understanding information sensitivity perceptions and its impact on
                  information privacy concerns in e-commerce services: Insights from
                  China},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103646},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103646},
  doi          = {10.1016/J.COSE.2023.103646},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TaoLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TuptukH24,
  author       = {Nilufer Tuptuk and
                  Stephen Hailes},
  title        = {Identifying vulnerabilities of industrial control systems using evolutionary
                  multiobjective optimisation},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103593},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103593},
  doi          = {10.1016/J.COSE.2023.103593},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TuptukH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TurukmaneD24,
  author       = {Anil V. Turukmane and
                  Ramkumar Devendiran},
  title        = {M-MultiSVM: An efficient feature selection assisted network intrusion
                  detection system using machine learning},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103587},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103587},
  doi          = {10.1016/J.COSE.2023.103587},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TurukmaneD24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VoDN24,
  author       = {Hoang V. Vo and
                  Hanh Phuong Du and
                  Hoa Ngoc Nguyen},
  title        = {{APELID:} Enhancing real-time intrusion detection with augmented {WGAN}
                  and parallel ensemble learning},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103567},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103567},
  doi          = {10.1016/J.COSE.2023.103567},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/VoDN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSW24,
  author       = {Wenjie Wang and
                  Yuanhai Shao and
                  Yiju Wang},
  title        = {Optimization-based adversarial perturbations against twin support
                  vector machines},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103573},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103573},
  doi          = {10.1016/J.COSE.2023.103573},
  timestamp    = {Fri, 12 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangWWS24,
  author       = {Xintong Wang and
                  Zixuan Wang and
                  Enliang Wang and
                  Zhixin Sun},
  title        = {Spatial-temporal knowledge distillation for lightweight network traffic
                  anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103636},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103636},
  doi          = {10.1016/J.COSE.2023.103636},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangWWS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangYJZC24,
  author       = {Wenbo Wang and
                  Peng Yi and
                  Junfang Jiang and
                  Peng Zhang and
                  Xiang Chen},
  title        = {Transformer-based framework for alert aggregation and attack prediction
                  in a multi-stage attack},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103533},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103533},
  doi          = {10.1016/J.COSE.2023.103533},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangYJZC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangYLZZG24,
  author       = {Xiaoyu Wang and
                  Xiaobo Yang and
                  Xueping Liang and
                  Xiu Zhang and
                  Wei Zhang and
                  Xiaorui Gong},
  title        = {Combating alert fatigue with AlertPro: Context-aware alert prioritization
                  using reinforcement learning for multi-step attack detection},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103583},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103583},
  doi          = {10.1016/J.COSE.2023.103583},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangYLZZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZCZL24,
  author       = {Maoli Wang and
                  Xiaodong Zang and
                  Jianbo Cao and
                  Bowen Zhang and
                  Shengbao Li},
  title        = {PhishHunter: Detecting camouflaged IDN-based phishing attacks via
                  Siamese neural network},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103668},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103668},
  doi          = {10.1016/J.COSE.2023.103668},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZCZL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZW24,
  author       = {Meng Wang and
                  Yahao Zhang and
                  WeiPing Wen},
  title        = {Improved capsule networks based on Nash equilibrium for malicious
                  code classification},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103503},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103503},
  doi          = {10.1016/J.COSE.2023.103503},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WengLLL24,
  author       = {Juanjuan Weng and
                  Zhiming Luo and
                  Dazhen Lin and
                  Shaozi Li},
  title        = {Comparative evaluation of recent universal adversarial perturbations
                  in image classification},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103576},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103576},
  doi          = {10.1016/J.COSE.2023.103576},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WengLLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WengLLL24a,
  author       = {Juanjuan Weng and
                  Zhiming Luo and
                  Dazhen Lin and
                  Shaozi Li},
  title        = {Learning transferable targeted universal adversarial perturbations
                  by sequential meta-learning},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103584},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103584},
  doi          = {10.1016/J.COSE.2023.103584},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WengLLL24a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WilliamsZG24,
  author       = {Jason A. Williams and
                  Humayun Zafar and
                  Saurabh Gupta},
  title        = {Fortifying healthcare: An action research approach to developing an
                  effective {SETA} program},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103655},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103655},
  doi          = {10.1016/J.COSE.2023.103655},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WilliamsZG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WoodsS24,
  author       = {Naomi Woods and
                  Mikko T. Siponen},
  title        = {How memory anxiety can influence password security behavior},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103589},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103589},
  doi          = {10.1016/J.COSE.2023.103589},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WoodsS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WurzenbergerHLS24,
  author       = {Markus Wurzenberger and
                  Georg H{\"{o}}ld and
                  Max Landauer and
                  Florian Skopik},
  title        = {Analysis of statistical properties of variables in log data for advanced
                  anomaly detection in cyber security},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103631},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103631},
  doi          = {10.1016/J.COSE.2023.103631},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WurzenbergerHLS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaoZYYZLL24,
  author       = {Xi Xiao and
                  Xiang Zhou and
                  Zhenyu Yang and
                  Le Yu and
                  Bin Zhang and
                  Qixu Liu and
                  Xiapu Luo},
  title        = {A comprehensive analysis of website fingerprinting defenses on Tor},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103577},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103577},
  doi          = {10.1016/J.COSE.2023.103577},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaoZYYZLL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiaoZZLDL24,
  author       = {Haitao Xiao and
                  Yan Zhu and
                  Bin Zhang and
                  Zhigang Lu and
                  Dan Du and
                  Yuling Liu},
  title        = {Unveiling shadows: {A} comprehensive framework for insider threat
                  detection based on statistical and sequential analysis},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103665},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103665},
  doi          = {10.1016/J.COSE.2023.103665},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XiaoZZLDL24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuT24,
  author       = {Jiacheng Xu and
                  Chengxiang Tan},
  title        = {Unawareness detection: Discovering black-box malicious models and
                  quantifying privacy leakage risks},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103565},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103565},
  doi          = {10.1016/J.COSE.2023.103565},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XuT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLW24,
  author       = {Benyuan Yang and
                  Lili Luo and
                  Zhimeng Wang},
  title        = {Ensuring secure interoperation of access control in a multidomain
                  environment},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103621},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103621},
  doi          = {10.1016/J.COSE.2023.103621},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWZCH24,
  author       = {Hongyu Yang and
                  Youwei Wang and
                  Liang Zhang and
                  Xiang Cheng and
                  Ze Hu},
  title        = {A novel Android malware detection method with {API} semantics extraction},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103651},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103651},
  doi          = {10.1016/J.COSE.2023.103651},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWZCH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YehASKXN24,
  author       = {Jyh{-}haw Yeh and
                  Md Mashrur Arifin and
                  Ning Shen and
                  Ujwal Karki and
                  Yi Xie and
                  Archana Nanjundarao},
  title        = {Integrity coded databases - protecting data integrity for outsourced
                  databases},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103569},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103569},
  doi          = {10.1016/J.COSE.2023.103569},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YehASKXN24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuWW24,
  author       = {Rongwei Yu and
                  Yong Wang and
                  Wang Wang},
  title        = {{AMAD:} Active learning-based multivariate time series anomaly detection
                  for large-scale {IT} systems},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103603},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103603},
  doi          = {10.1016/J.COSE.2023.103603},
  timestamp    = {Fri, 09 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YuWW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuanHHYKZ24,
  author       = {Xinwei Yuan and
                  Shu Han and
                  Wei Huang and
                  Hongliang Ye and
                  Xianglong Kong and
                  Fan Zhang},
  title        = {A simple framework to enhance the adversarial robustness of deep learning-based
                  intrusion detection system},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103644},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103644},
  doi          = {10.1016/J.COSE.2023.103644},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YuanHHYKZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangXLYLGF24,
  author       = {Xiyuan Zhang and
                  Gang Xiong and
                  Zhen Li and
                  Chen Yang and
                  Xinjie Lin and
                  Gaopeng Gou and
                  Binxing Fang},
  title        = {Traffic spills the beans: {A} robust video identification attack against
                  YouTube},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103623},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103623},
  doi          = {10.1016/J.COSE.2023.103623},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangXLYLGF24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangY24,
  author       = {Longwen Zhang and
                  Qiao Yan},
  title        = {Detect malicious websites by building a neural network to capture
                  global and local features of websites},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103641},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103641},
  doi          = {10.1016/J.COSE.2023.103641},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zhao24,
  author       = {Rui Zhao},
  title        = {Toward the flow-centric detection of browser fingerprinting},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103642},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103642},
  doi          = {10.1016/J.COSE.2023.103642},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Zhao24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoJHLP24,
  author       = {Xiaojuan Zhao and
                  Rong Jiang and
                  Yue Han and
                  Aiping Li and
                  Zhichao Peng},
  title        = {A survey on cybersecurity knowledge graph construction},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103524},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103524},
  doi          = {10.1016/J.COSE.2023.103524},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoJHLP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoLZYSXZZ24,
  author       = {Ziming Zhao and
                  Zhaoxuan Li and
                  Zhihao Zhou and
                  Jiongchi Yu and
                  Zhuoxue Song and
                  Xiaofei Xie and
                  Fan Zhang and
                  Rui Zhang},
  title        = {DDoS family: {A} novel perspective for massive types of DDoS attacks},
  journal      = {Comput. Secur.},
  volume       = {138},
  pages        = {103663},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103663},
  doi          = {10.1016/J.COSE.2023.103663},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoLZYSXZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoYGH24,
  author       = {Xuan Zhao and
                  Jia Yu and
                  Xinrui Ge and
                  Rong Hao},
  title        = {Towards efficient Secure Boolean Range Query over encrypted spatial
                  data},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103544},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103544},
  doi          = {10.1016/J.COSE.2023.103544},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoYGH24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouC24,
  author       = {Man Zhou and
                  Xin Che},
  title        = {Stealthy attack detection based on controlled invariant subspace for
                  autonomous vehicles},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103635},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103635},
  doi          = {10.1016/J.COSE.2023.103635},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouC24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouG24,
  author       = {Peng Zhou and
                  Yuhan Gao},
  title        = {Detecting prototype pollution for node.js: Vulnerability review and
                  new fuzzing inputs},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103625},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103625},
  doi          = {10.1016/J.COSE.2023.103625},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouG24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuCZW24,
  author       = {Erzhou Zhu and
                  Kang Cheng and
                  Zhizheng Zhang and
                  Huabin Wang},
  title        = {{PDHF:} Effective phishing detection model combining optimal artificial
                  and automatic deep features},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103561},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103561},
  doi          = {10.1016/J.COSE.2023.103561},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuCZW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuCZZ24,
  author       = {Zhengwei Zhu and
                  Miaojie Chen and
                  Chenyang Zhu and
                  Yanping Zhu},
  title        = {Effective defense strategies in network security using improved double
                  dueling deep Q-network},
  journal      = {Comput. Secur.},
  volume       = {136},
  pages        = {103578},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103578},
  doi          = {10.1016/J.COSE.2023.103578},
  timestamp    = {Fri, 26 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuCZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZouCWFQS24,
  author       = {Binghui Zou and
                  Chunjie Cao and
                  Longjuan Wang and
                  Sizheng Fu and
                  Tonghua Qiao and
                  Jingzhang Sun},
  title        = {{FACILE:} {A} capsule network with fewer capsules and richer hierarchical
                  information for malware image classification},
  journal      = {Comput. Secur.},
  volume       = {137},
  pages        = {103606},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2023.103606},
  doi          = {10.1016/J.COSE.2023.103606},
  timestamp    = {Sat, 10 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZouCWFQS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/0001CE23,
  author       = {Anna Cartwright and
                  Edward J. Cartwright and
                  Esther Solomon Edun},
  title        = {Cascading information on best practice: Cyber security risk management
                  in {UK} micro and small businesses and the role of {IT} companies},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103288},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103288},
  doi          = {10.1016/J.COSE.2023.103288},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0001CE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/0001R023,
  author       = {Philipp K{\"{u}}hn and
                  David N. Relke and
                  Christian Reuter},
  title        = {Common vulnerability scoring system prediction based on open source
                  intelligence information sources},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103286},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103286},
  doi          = {10.1016/J.COSE.2023.103286},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0001R023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AabyGBT23,
  author       = {Peter Aaby and
                  Mario Valerio Giuffrida and
                  William J. Buchanan and
                  Zhiyuan Tan},
  title        = {An omnidirectional approach to touch-based continuous authentication},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103146},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103146},
  doi          = {10.1016/J.COSE.2023.103146},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AabyGBT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AbuabedAT23,
  author       = {Zaina Abuabed and
                  Ahmad S. Alsadeh and
                  Adel Taweel},
  title        = {{STRIDE} threat model-based framework for assessing the vulnerabilities
                  of modern vehicles},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103391},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103391},
  doi          = {10.1016/J.COSE.2023.103391},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AbuabedAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AebissaDM23,
  author       = {Berhanu Aebissa and
                  Gurpreet Dhillon and
                  Million Meshesha},
  title        = {The direct and indirect effect of organizational justice on employee
                  intention to comply with information security policy: The case of
                  Ethiopian banks},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103248},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103248},
  doi          = {10.1016/J.COSE.2023.103248},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AebissaDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Afzaal0J23,
  author       = {Hamra Afzaal and
                  Muhammad Imran and
                  Muhammad Umar Janjua},
  title        = {Formal verification of fraud-resilience in a crowdsourcing consensus
                  protocol},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103290},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103290},
  doi          = {10.1016/J.COSE.2023.103290},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Afzaal0J23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AggarwalD23,
  author       = {Akshay Aggarwal and
                  Ram Kumar Dhurkari},
  title        = {Association between stress and information security policy non-compliance
                  behavior: {A} meta-analysis},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102991},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102991},
  doi          = {10.1016/J.COSE.2022.102991},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AggarwalD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AgyepongCRB23,
  author       = {Enoch Agyepong and
                  Yulia Cherdantseva and
                  Philipp Reinecke and
                  Pete Burnap},
  title        = {A systematic method for measuring the performance of a cyber security
                  operations centre analyst},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102959},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102959},
  doi          = {10.1016/J.COSE.2022.102959},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AgyepongCRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhnL23,
  author       = {Na{-}Young Ahn and
                  Dong Hoon Lee},
  title        = {IoT security: On-chip secure deletion scheme using {ECC} modulation
                  in IoT appliances},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103422},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103422},
  doi          = {10.1016/J.COSE.2023.103422},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhnL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhvanooeyZOMMCL23,
  author       = {Milad Taleby Ahvanooey and
                  Mark Xuefang Zhu and
                  Shiyan Ou and
                  Hassan Dana Mazraeh and
                  Wojciech Mazurczyk and
                  Kim{-}Kwang Raymond Choo and
                  Chuan Li},
  title        = {AFPr-AM: {A} novel Fuzzy-AHP based privacy risk assessment model for
                  strategic information management of social media platforms},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103263},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103263},
  doi          = {10.1016/J.COSE.2023.103263},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhvanooeyZOMMCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AinslieTMA23,
  author       = {Scott Ainslie and
                  Dean Thompson and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Cyber-threat intelligence for security decision-making: {A} review
                  and research agenda for practice},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103352},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103352},
  doi          = {10.1016/J.COSE.2023.103352},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AinslieTMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AkiyamaSFYSY23,
  author       = {Mitsuaki Akiyama and
                  Shugo Shiraishi and
                  Akifumi Fukumoto and
                  Ryota Yoshimoto and
                  Eitaro Shioji and
                  Toshihiro Yamauchi},
  title        = {Seeing is not always believing: Insights on IoT manufacturing from
                  firmware composition analysis and vendor survey},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103389},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103389},
  doi          = {10.1016/J.COSE.2023.103389},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AktarN23,
  author       = {Sharmin Aktar and
                  Abdullah Yasin Nur},
  title        = {Towards DDoS attack detection using deep learning approach},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103251},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103251},
  doi          = {10.1016/J.COSE.2023.103251},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AktarN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-SarairehA23,
  author       = {Jaafer Al{-}Saraireh and
                  Mohammad Rasool AlJa'afreh},
  title        = {Keystroke and swipe biometrics fusion to enhance smartphones authentication},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103022},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103022},
  doi          = {10.1016/J.COSE.2022.103022},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-SarairehA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlEmariSF23,
  author       = {Salam Al{-}Emari and
                  Yousef K. Sanjalawe and
                  Salam Fraihat},
  title        = {Detection of obfuscated Tor traffic based on bidirectional generative
                  adversarial networks and vision transform},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103512},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103512},
  doi          = {10.1016/J.COSE.2023.103512},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlEmariSF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlSlaimanSSW23,
  author       = {Muhanned AlSlaiman and
                  Mohammed I. Salman and
                  Mariam M. Saleh and
                  Bin Wang},
  title        = {Enhancing false negative and positive rates for efficient insider
                  threat detection},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103066},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103066},
  doi          = {10.1016/J.COSE.2022.103066},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlSlaimanSSW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlacaC23,
  author       = {Yusuf Alaca and
                  Y{\"{u}}ksel {\c{C}}elik},
  title        = {Cyber attack detection with {QR} code images using lightweight deep
                  learning models},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103065},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103065},
  doi          = {10.1016/J.COSE.2022.103065},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlacaC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlanaziMC23,
  author       = {Manar Alanazi and
                  Abdun Mahmood and
                  Mohammad Jabed Morshed Chowdhury},
  title        = {{SCADA} vulnerabilities and attacks: {A} review of the state-of-the-art
                  and open issues},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103028},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103028},
  doi          = {10.1016/J.COSE.2022.103028},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlanaziMC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniMM23,
  author       = {Mohammed M. Alani and
                  Atefeh Mashatan and
                  Ali Miri},
  title        = {XMal: {A} lightweight memory-based explainable obfuscated-malware
                  detector},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103409},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103409},
  doi          = {10.1016/J.COSE.2023.103409},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaouiTMN23,
  author       = {El Arbi Abdellaoui Alaoui and
                  St{\'{e}}phane C{\'{e}}dric Koum{\'{e}}tio T{\'{e}}kouabou and
                  Yassine Maleh and
                  Anand Nayyar},
  title        = {Corrigendum to "Towards to intelligent routing for {DTN} protocols
                  using machine learning techniques" [Simulation Modelling Practice
                  and Theory 117 {(2022)} 102475]},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103012},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103012},
  doi          = {10.1016/J.COSE.2022.103012},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaouiTMN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlbaneseIA23,
  author       = {Massimiliano Albanese and
                  Ibifubara Iganibo and
                  Olutola Adebiyi},
  title        = {A framework for designing vulnerability metrics},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103382},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103382},
  doi          = {10.1016/J.COSE.2023.103382},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlbaneseIA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlexCAAS23,
  author       = {Christin Alex and
                  Giselle Creado and
                  Wesam Almobaideen and
                  Orieb Abu Alghanam and
                  Maha Saadeh},
  title        = {A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification
                  and Machine Learning Mechanisms},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103283},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103283},
  doi          = {10.1016/J.COSE.2023.103283},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlexCAAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlghamdiB23,
  author       = {Rubayyi Alghamdi and
                  Martine Bella{\"{\i}}che},
  title        = {A cascaded federated deep learning based framework for detecting wormhole
                  attacks in IoT networks},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103014},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103014},
  doi          = {10.1016/J.COSE.2022.103014},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlghamdiB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlhelalyDO23,
  author       = {Yasser Alhelaly and
                  Gurpreet Dhillon and
                  Tiago Oliveira},
  title        = {When expectation fails and motivation prevails: the mediating role
                  of awareness in bridging the expectancy-capability gap in mobile identity
                  protection},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103470},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103470},
  doi          = {10.1016/J.COSE.2023.103470},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AlhelalyDO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AliKAAAAQ23,
  author       = {Hassan Ali and
                  Muhammad Suleman Khan and
                  Amer AlGhadhban and
                  Meshari Alazmi and
                  Ahmed Alzamil and
                  Khaled Al{-}Utaibi and
                  Junaid Qadir},
  title        = {Con-Detect: Detecting adversarially perturbed natural language inputs
                  to deep classifiers through holistic analysis},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103367},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103367},
  doi          = {10.1016/J.COSE.2023.103367},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliKAAAAQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlrajaBA23,
  author       = {Mansour Naser Alraja and
                  Usman Javed Butt and
                  Maysam Abbod},
  title        = {Information security policies compliance in a global setting: An employee's
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103208},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103208},
  doi          = {10.1016/J.COSE.2023.103208},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlrajaBA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Altaf00LB23,
  author       = {Tanzeela Altaf and
                  Xu Wang and
                  Wei Ni and
                  Ren Ping Liu and
                  Robin Braun},
  title        = {NE-GConv: {A} lightweight node edge graph convolutional network for
                  intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103285},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103285},
  doi          = {10.1016/J.COSE.2023.103285},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Altaf00LB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlzaqebahAA23,
  author       = {Abdullah Alzaqebah and
                  Ibrahim Aljarah and
                  Omar Sultan Al{-}Kadi},
  title        = {A hierarchical intrusion detection system based on extreme learning
                  machine and nature-inspired optimization},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102957},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102957},
  doi          = {10.1016/J.COSE.2022.102957},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlzaqebahAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AndradeSJYHK23,
  author       = {Ricardo de Andrade and
                  Max Mauro Dias Santos and
                  Jo{\~{a}}o Francisco Justo and
                  Leopoldo Rideki Yoshioka and
                  Hans{-}Joachim Hof and
                  Jo{\~{a}}o Henrique Kleinschmidt},
  title        = {Security architecture for automotive communication networks with {CAN}
                  {FD}},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103203},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103203},
  doi          = {10.1016/J.COSE.2023.103203},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AndradeSJYHK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AratA23,
  author       = {Ferhat Arat and
                  Sedat Akleylek},
  title        = {Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103174},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103174},
  doi          = {10.1016/J.COSE.2023.103174},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AratA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArroyabeAAA23,
  author       = {Ignacio Fernandez De Arroyabe and
                  Carlos F. A. Arranz and
                  Marta F. Arroyabe and
                  Juan Carlos Fernandez de Arroyabe},
  title        = {Cybersecurity capabilities and cyber-attacks as drivers of investment
                  in cybersecurity systems: {A} {UK} survey for 2018 and 2019},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102954},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102954},
  doi          = {10.1016/J.COSE.2022.102954},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArroyabeAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AshrafRAG23,
  author       = {Mohamed Ashraf and
                  Sherine Rady and
                  Tamer Abdelkader and
                  Tarek F. Gharib},
  title        = {Efficient privacy preserving algorithms for hiding sensitive high
                  utility itemsets},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103360},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103360},
  doi          = {10.1016/J.COSE.2023.103360},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AshrafRAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AzzamPPN23,
  author       = {Mazen Azzam and
                  Liliana Pasquale and
                  Gregory M. Provan and
                  Bashar Nuseibeh},
  title        = {Forensic readiness of industrial control systems under stealthy attacks},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103010},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103010},
  doi          = {10.1016/J.COSE.2022.103010},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AzzamPPN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BC23,
  author       = {Judy Flavia B and
                  Balika J. Chelliah},
  title        = {Artificial lizard search optimized fuzzy logic approach to addressing
                  authentication and data security challenges in {P2P} cloud environments},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103475},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103475},
  doi          = {10.1016/J.COSE.2023.103475},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BansalTS23,
  author       = {Gaurav Bansal and
                  Jason Thatcher and
                  Sebastian Walter Schuetz},
  title        = {Where authorities fail and experts excel: Influencing internet users'
                  compliance intentions},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103164},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103164},
  doi          = {10.1016/J.COSE.2023.103164},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BansalTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarrereHO23,
  author       = {Mart{\'{\i}}n Barr{\`{e}}re and
                  Chris Hankin and
                  Dean O'Reilly},
  title        = {Cyber-physical attack graphs (CPAGs): Composable and scalable attack
                  graphs for cyber-physical systems},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103348},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103348},
  doi          = {10.1016/J.COSE.2023.103348},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarrereHO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarretoRWF23,
  author       = {Carlos A. Barreto and
                  Olof Reinert and
                  Tobias Wiesinger and
                  Ulrik Franke},
  title        = {Duopoly insurers' incentives for data quality under a mandatory cyber
                  data sharing regime},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103292},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103292},
  doi          = {10.1016/J.COSE.2023.103292},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarretoRWF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BashendyTE23,
  author       = {May Bashendy and
                  Ashraf Tantawy and
                  Abdelkarim Erradi},
  title        = {Intrusion response systems for cyber-physical systems: {A} comprehensive
                  survey},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102984},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102984},
  doi          = {10.1016/J.COSE.2022.102984},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BashendyTE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BasileSCRC23,
  author       = {Cataldo Basile and
                  Bjorn De Sutter and
                  Daniele Canavese and
                  Leonardo Regano and
                  Bart Coppens},
  title        = {Design, implementation, and automation of a risk management approach
                  for man-at-the-End software protection},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103321},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103321},
  doi          = {10.1016/J.COSE.2023.103321},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BasileSCRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BayerFR23,
  author       = {Markus Bayer and
                  Tobias Frey and
                  Christian Reuter},
  title        = {Multi-level fine-tuning, data augmentation, and few-shot learning
                  for specialized cyber threat intelligence},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103430},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103430},
  doi          = {10.1016/J.COSE.2023.103430},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BayerFR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BegovicAM23,
  author       = {Kenan Begovic and
                  Abdulaziz Al{-}Ali and
                  Qutaibah M. Malluhi},
  title        = {Cryptographic ransomware encryption detection: Survey},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103349},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103349},
  doi          = {10.1016/J.COSE.2023.103349},
  timestamp    = {Mon, 18 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BegovicAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BekkersGHHSL23,
  author       = {Luuk Bekkers and
                  Susanne van 't Hoff{-}De Goede and
                  Ellen Misana{-}ter Huurne and
                  Ynze van Houten and
                  Remco Spithoven and
                  Eric Rutger Leukfeldt},
  title        = {Protecting your business against ransomware attacks? Explaining the
                  motivations of entrepreneurs to take future protective measures against
                  cybercrimes using an extended protection motivation theory model},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103099},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103099},
  doi          = {10.1016/J.COSE.2023.103099},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BekkersGHHSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BellmanO23,
  author       = {Christopher Bellman and
                  Paul C. van Oorschot},
  title        = {Systematic analysis and comparison of security advice as datasets},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102989},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102989},
  doi          = {10.1016/J.COSE.2022.102989},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BellmanO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeltranC23,
  author       = {Marta Beltr{\'{a}}n and
                  Miguel Calvo},
  title        = {A privacy threat model for identity verification based on facial recognition},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103324},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103324},
  doi          = {10.1016/J.COSE.2023.103324},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeltranC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerardiG0MOP23,
  author       = {Davide Berardi and
                  Saverio Giallorenzo and
                  Andrea Melis and
                  Simone Melloni and
                  Loris Onori and
                  Marco Prandini},
  title        = {Data Flooding against Ransomware: Concepts and Implementations},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103295},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103295},
  doi          = {10.1016/J.COSE.2023.103295},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BerardiG0MOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BertoliJSS23,
  author       = {Gustavo de Carvalho Bertoli and
                  Louren{\c{c}}o Alves Pereira J{\'{u}}nior and
                  Osamu Saotome and
                  Aldri Luiz dos Santos},
  title        = {Generalizing intrusion detection for heterogeneous networks: {A} stacked-unsupervised
                  federated learning approach},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103106},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103106},
  doi          = {10.1016/J.COSE.2023.103106},
  timestamp    = {Wed, 17 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BertoliJSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeuJZ0HLB23,
  author       = {Nathan Beu and
                  Asangi Jayatilaka and
                  Mansooreh Zahedi and
                  Ali Babar and
                  Laura Hartley and
                  Winston Lewinsmith and
                  Irina Baetu},
  title        = {Falling for phishing attempts: An investigation of individual differences
                  that are associated with behavior in a naturalistic phishing simulation},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103313},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103313},
  doi          = {10.1016/J.COSE.2023.103313},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeuJZ0HLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeuranVBCTS23,
  author       = {Razvan Beuran and
                  Jan Vykopal and
                  Daniela Belajov{\'{a}} and
                  Pavel Celeda and
                  Yasuo Tan and
                  Yoichi Shinoda},
  title        = {Capability Assessment Methodology and Comparative Analysis of Cybersecurity
                  Training Platforms},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103120},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103120},
  doi          = {10.1016/J.COSE.2023.103120},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeuranVBCTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhardwajD23,
  author       = {Sonam Bhardwaj and
                  Mayank Dave},
  title        = {Enhanced neural network-based attack investigation framework for network
                  forensics: Identification, detection, and analysis of the attack},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103521},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103521},
  doi          = {10.1016/J.COSE.2023.103521},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BhardwajD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BhatBD23,
  author       = {Parnika Bhat and
                  Sunny Behal and
                  Kamlesh Dutta},
  title        = {A system call-based android malware detection approach with homogeneous
                  {\&} heterogeneous ensemble machine learning},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103277},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103277},
  doi          = {10.1016/J.COSE.2023.103277},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BhatBD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BinosiPCZ23,
  author       = {Lorenzo Binosi and
                  Mario Polino and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {{BINO:} Automatic recognition of inline binary functions from template
                  classes},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103312},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103312},
  doi          = {10.1016/J.COSE.2023.103312},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BinosiPCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BitzerHLOSS23,
  author       = {Michael Bitzer and
                  Bj{\"{o}}rn H{\"{a}}ckel and
                  Daniel Leuthe and
                  Joshua Ott and
                  Bastian Stahl and
                  Jacqueline Strobel},
  title        = {Managing the Inevitable - {A} Maturity Model to Establish Incident
                  Response Management Capabilities},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103050},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103050},
  doi          = {10.1016/J.COSE.2022.103050},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BitzerHLOSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BojarajuluTS23,
  author       = {Balaganesh Bojarajulu and
                  Sarvesh Tanwar and
                  Thipendra Pal Singh},
  title        = {Intelligent IoT-BOTNET attack detection model with optimized hybrid
                  classification model},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103064},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103064},
  doi          = {10.1016/J.COSE.2022.103064},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BojarajuluTS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoveF23,
  author       = {Davide Bove and
                  Julian Funk},
  title        = {Basic secure services for standard {RISC-V} architectures},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103415},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103415},
  doi          = {10.1016/J.COSE.2023.103415},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoveF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BovenziACMPP23,
  author       = {Giampaolo Bovenzi and
                  Giuseppe Aceto and
                  Domenico Ciuonzo and
                  Antonio Montieri and
                  Valerio Persico and
                  Antonio Pescap{\`{e}}},
  title        = {Network anomaly detection methods in IoT environments via deep learning:
                  {A} Fair comparison of performance and robustness},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103167},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103167},
  doi          = {10.1016/J.COSE.2023.103167},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BovenziACMPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BozkirDA23,
  author       = {Ahmet Selman Bozkir and
                  Firat Coskun Dalgic and
                  Murat Aydos},
  title        = {GramBeddings: {A} New Neural Network for {URL} Based Identification
                  of Phishing Web Pages Through N-gram Embeddings},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102964},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102964},
  doi          = {10.1016/J.COSE.2022.102964},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BozkirDA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BraghinLR23,
  author       = {Chiara Braghin and
                  Mario Lilli and
                  Elvinia Riccobene},
  title        = {A model-based approach for vulnerability analysis of IoT security
                  protocols: The Z-Wave case study},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103037},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103037},
  doi          = {10.1016/J.COSE.2022.103037},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BraghinLR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BridgesRONWSNHJWGBHE23,
  author       = {Robert A. Bridges and
                  Ashley E. Rice and
                  Sean Oesch and
                  Jeffrey A. Nichols and
                  Cory L. Watson and
                  Kevin D. Spakes and
                  Savannah Norem and
                  Mike Huettel and
                  Brian Jewell and
                  Brian Weber and
                  Connor Gannon and
                  Olivia Bizovi and
                  Samuel C. Hollifield and
                  Samantha Erwin},
  title        = {Testing {SOAR} tools in use},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103201},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103201},
  doi          = {10.1016/J.COSE.2023.103201},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BridgesRONWSNHJWGBHE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BrustSG23,
  author       = {Clemens{-}Alexander Brust and
                  Tim Sonnekalb and
                  Bernd Gruner},
  title        = {{ROMEO:} {A} binary vulnerability detection dataset for exploring
                  Juliet through the lens of assembly language},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103165},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103165},
  doi          = {10.1016/J.COSE.2023.103165},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BrustSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuddeKVSM23,
  author       = {Carlos E. Budde and
                  Anni Karinsalo and
                  Silvia Vidor and
                  Jarno Salonen and
                  Fabio Massacci},
  title        = {Consolidating cybersecurity in Europe: {A} case study on job profiles
                  assessment},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103082},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103082},
  doi          = {10.1016/J.COSE.2022.103082},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuddeKVSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ButtQAAQ23,
  author       = {Muhammad Atif Butt and
                  Adnan Qayyum and
                  Hassan Ali and
                  Ala I. Al{-}Fuqaha and
                  Junaid Qadir},
  title        = {Towards secure private and trustworthy human-centric embedded machine
                  learning: An emotion-aware facial recognition case study},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103058},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103058},
  doi          = {10.1016/J.COSE.2022.103058},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ButtQAAQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cabrera-Arteaga23,
  author       = {Javier Cabrera{-}Arteaga and
                  Martin Monperrus and
                  Tim Toady and
                  Benoit Baudry},
  title        = {WebAssembly diversification for malware evasion},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103296},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103296},
  doi          = {10.1016/J.COSE.2023.103296},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cabrera-Arteaga23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Camara0AUZ23,
  author       = {Xabier S{\'{a}}ez de C{\'{a}}mara and
                  Jose Luis Flores and
                  Crist{\'{o}}bal Arellano and
                  Aitor Urbieta and
                  Urko Zurutuza},
  title        = {Clustered federated learning architecture for network anomaly detection
                  in large scale heterogeneous IoT networks},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103299},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103299},
  doi          = {10.1016/J.COSE.2023.103299},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Camara0AUZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CanonicoS23,
  author       = {Roberto Canonico and
                  Giancarlo Sperl{\`{\i}}},
  title        = {Industrial cyber-physical systems protection: {A} methodological review},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103531},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103531},
  doi          = {10.1016/J.COSE.2023.103531},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CanonicoS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoCHHY23,
  author       = {Yungui Cao and
                  Jiazhen Chen and
                  Liqing Huang and
                  Tianqian Huang and
                  Feng Ye},
  title        = {Three-classification face manipulation detection using attention-based
                  feature decomposition},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103024},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103024},
  doi          = {10.1016/J.COSE.2022.103024},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoCHHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoSZQ23,
  author       = {Wei Cao and
                  Wenting Shen and
                  Zhixiang Zhang and
                  Jing Qin},
  title        = {Privacy-preserving healthcare monitoring for IoT devices under edge
                  computing},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103464},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103464},
  doi          = {10.1016/J.COSE.2023.103464},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoSZQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoWWZFC23,
  author       = {Dongliang Cao and
                  Kaimin Wei and
                  Yongdong Wu and
                  Jilian Zhang and
                  Bingwen Feng and
                  Jinpeng Chen},
  title        = {FePN: {A} robust feature purification network to defend against adversarial
                  examples},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103427},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103427},
  doi          = {10.1016/J.COSE.2023.103427},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoWWZFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CatalanPVT23,
  author       = {David Nevado Catal{\'{a}}n and
                  Sergio Pastrana and
                  Narseo Vallina{-}Rodriguez and
                  Juan Tapiador},
  title        = {An analysis of fake social media engagement services},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103013},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103013},
  doi          = {10.1016/J.COSE.2022.103013},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CatalanPVT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CatilloPV23,
  author       = {Marta Catillo and
                  Antonio Pecchia and
                  Umberto Villano},
  title        = {{CPS-GUARD:} Intrusion detection for cyber-physical systems and IoT
                  devices using outlier-aware deep autoencoders},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103210},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103210},
  doi          = {10.1016/J.COSE.2023.103210},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CatilloPV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CeldranSASGBPS23,
  author       = {Alberto Huertas Celdr{\'{a}}n and
                  Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and
                  Jan von der Assen and
                  Dennis Shushack and
                  {\'{A}}ngel Luis Perales G{\'{o}}mez and
                  G{\'{e}}r{\^{o}}me Bovet and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez and
                  Burkhard Stiller},
  title        = {Behavioral fingerprinting to detect ransomware in resource-constrained
                  devices},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103510},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103510},
  doi          = {10.1016/J.COSE.2023.103510},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CeldranSASGBPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CharanRCAS23,
  author       = {P. V. Sai Charan and
                  Gowtham Ratnakaram and
                  Hrushikesh Chunduri and
                  P. Mohan Anand and
                  Sandeep Kumar Shukla},
  title        = {DKaaS: {DARK-KERNEL} as a service for active cyber threat intelligence},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103329},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103329},
  doi          = {10.1016/J.COSE.2023.103329},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CharanRCAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CharmanasMA23,
  author       = {Konstantinos Charmanas and
                  Nikolaos Mittas and
                  Lefteris Angelis},
  title        = {Topic and influence analysis on technological patents related to security
                  vulnerabilities},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103128},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103128},
  doi          = {10.1016/J.COSE.2023.103128},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CharmanasMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChatzoglouKKKG23,
  author       = {Efstratios Chatzoglou and
                  Vasileios Kouliaridis and
                  Georgios Kambourakis and
                  Georgios Karopoulos and
                  Stefanos Gritzalis},
  title        = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2}
                  and a public dataset},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103051},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103051},
  doi          = {10.1016/J.COSE.2022.103051},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChatzoglouKKKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenHZXZ23,
  author       = {Jinyin Chen and
                  Shulong Hu and
                  Haibin Zheng and
                  Chang{-}you Xing and
                  Guomin Zhang},
  title        = {{GAIL-PT:} An intelligent penetration testing framework with generative
                  adversarial imitation learning},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103055},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103055},
  doi          = {10.1016/J.COSE.2022.103055},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenHZXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLCZ23,
  author       = {Jinyin Chen and
                  Mingjun Li and
                  Yao Cheng and
                  Haibin Zheng},
  title        = {FedRight: An effective model copyright protection for federated learning},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103504},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103504},
  doi          = {10.1016/J.COSE.2023.103504},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWHH23,
  author       = {Shouhong Chen and
                  Tao Wang and
                  Zhentao Huang and
                  Xingna Hou},
  title        = {Detection method of Golden Chip-Free Hardware Trojan based on the
                  combination of ResNeXt structure and attention mechanism},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103428},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103428},
  doi          = {10.1016/J.COSE.2023.103428},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWZL23,
  author       = {Qian Chen and
                  Zilong Wang and
                  Wenjing Zhang and
                  Xiaodong Lin},
  title        = {{PPT:} {A} privacy-preserving global model training protocol for federated
                  learning in {P2P} networks},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102966},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102966},
  doi          = {10.1016/J.COSE.2022.102966},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZZXYYCL23,
  author       = {Tieming Chen and
                  Chenbin Zheng and
                  Tiantian Zhu and
                  Chunlin Xiong and
                  Jie Ying and
                  Qixuan Yuan and
                  Wenrui Cheng and
                  Mingqi Lv},
  title        = {System-level data management for endpoint advanced persistent threat
                  detection: Issues, challenges and trends},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103485},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103485},
  doi          = {10.1016/J.COSE.2023.103485},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZZXYYCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChengYLSS23,
  author       = {Yiran Cheng and
                  Shouguo Yang and
                  Zhe Lang and
                  Zhiqiang Shi and
                  Limin Sun},
  title        = {{VERI:} {A} Large-scale Open-Source Components Vulnerability Detection
                  in IoT Firmware},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103068},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103068},
  doi          = {10.1016/J.COSE.2022.103068},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChengYLSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CifuentesGHKM23,
  author       = {Cristina Cifuentes and
                  Fran{\c{c}}ois Gauthier and
                  Behnaz Hassanshahi and
                  Padmanabhan Krishnan and
                  Davin McCall},
  title        = {The role of program analysis in security vulnerability detection:
                  Then and now},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103463},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103463},
  doi          = {10.1016/J.COSE.2023.103463},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CifuentesGHKM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CosciaDGMP23,
  author       = {Antonio Coscia and
                  Vincenzo Dentamaro and
                  Stefano Galantucci and
                  Antonio Maci and
                  Giuseppe Pirlo},
  title        = {An innovative two-stage algorithm to optimize Firewall rule ordering},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103423},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103423},
  doi          = {10.1016/J.COSE.2023.103423},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CosciaDGMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CostaDGS23,
  author       = {Gabriele Costa and
                  Pierpaolo Degano and
                  Letterio Galletta and
                  Simone Soderi},
  title        = {Formally verifying security protocols built on watermarking and jamming},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103133},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103133},
  doi          = {10.1016/J.COSE.2023.103133},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CostaDGS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoutinhoFYF23,
  author       = {Bruno Coutinho and
                  Jo{\~{a}}o Ferreira and
                  Iryna Yevseyeva and
                  Vitor Basto{-}Fernandes},
  title        = {Integrated cybersecurity methodology and supporting tools for healthcare
                  operational information systems},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103189},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103189},
  doi          = {10.1016/J.COSE.2023.103189},
  timestamp    = {Tue, 09 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/CoutinhoFYF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CrespoMartinezVHCAL23,
  author       = {Ignacio Samuel Crespo{-}Mart{\'{\i}}nez and
                  Adri{\'{a}}n Campazas Vega and
                  {\'{A}}ngel Manuel Guerrero Higueras and
                  Virginia Riego{-}Del Castillo and
                  Claudia {\'{A}}lvarez{-}Aparicio and
                  Camino Fern{\'{a}}ndez Llamas},
  title        = {{SQL} injection attack detection in network flow data},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103093},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103093},
  doi          = {10.1016/J.COSE.2023.103093},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CrespoMartinezVHCAL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DanglSR23,
  author       = {Thomas Dangl and
                  Stewart Sentanoe and
                  Hans P. Reiser},
  title        = {VMIFresh: Efficient and fresh caches for virtual machine introspection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103527},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103527},
  doi          = {10.1016/J.COSE.2023.103527},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DanglSR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DayalS23,
  author       = {Neelam Dayal and
                  Shashank Srivastava},
  title        = {Analyzing effective mitigation of DDoS attack with software defined
                  networking},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103269},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103269},
  doi          = {10.1016/J.COSE.2023.103269},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DayalS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DebichaCKDDM23,
  author       = {Islam Debicha and
                  Benjamin Cochez and
                  Tayeb Kenaza and
                  Thibault Debatty and
                  Jean{-}Michel Dricot and
                  Wim Mees},
  title        = {Adv-Bot: Realistic adversarial botnet attacks against network intrusion
                  detection systems},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103176},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103176},
  doi          = {10.1016/J.COSE.2023.103176},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DebichaCKDDM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DengGSCP23,
  author       = {Huaxin Deng and
                  Chun Guo and
                  Guowei Shen and
                  Yunhe Cui and
                  Yuan Ping},
  title        = {{MCTVD:} {A} malware classification method based on three-channel
                  visualization and deep learning},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103084},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103084},
  doi          = {10.1016/J.COSE.2022.103084},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DengGSCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DengWXLPS23,
  author       = {Liting Deng and
                  Hui Wen and
                  Mingfeng Xin and
                  Hong Li and
                  Zhiwen Pan and
                  Limin Sun},
  title        = {Enimanal: Augmented cross-architecture IoT malware analysis using
                  graph neural networks},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103323},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103323},
  doi          = {10.1016/J.COSE.2023.103323},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DengWXLPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DesgeorgesGD23,
  author       = {Lo{\"{\i}}c Desgeorges and
                  Jean{-}Philippe Georges and
                  Thierry Divoux},
  title        = {Detection of anomalies of a non-deterministic software-defined networking
                  control},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103228},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103228},
  doi          = {10.1016/J.COSE.2023.103228},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DesgeorgesGD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DietrichJGSS23,
  author       = {Aljoscha Dietrich and
                  Kurunandan Jain and
                  Georg Gutjahr and
                  Bianca Steffes and
                  Christoph Sorge},
  title        = {I recognize you by your steps: Privacy impact of pedometer data},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102994},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102994},
  doi          = {10.1016/J.COSE.2022.102994},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DietrichJGSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongDWYG23,
  author       = {Huoyuan Dong and
                  Jialiang Dong and
                  Shaohua Wan and
                  Shuai Yuan and
                  Zhitao Guan},
  title        = {Transferable adversarial distribution learning: Query-efficient adversarial
                  attack against large language models},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103482},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103482},
  doi          = {10.1016/J.COSE.2023.103482},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DongDWYG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongMMSJGT23,
  author       = {Xingbo Dong and
                  Zhihui Miao and
                  Lan Ma and
                  Jiajun Shen and
                  Zhe Jin and
                  Zhenhua Guo and
                  Andrew Beng Jin Teoh},
  title        = {Reconstruct face from features based on genetic algorithm using {GAN}
                  generator as a distribution constraint},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103026},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103026},
  doi          = {10.1016/J.COSE.2022.103026},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DongMMSJGT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongYLWLL23,
  author       = {Cong Dong and
                  Jiahai Yang and
                  Song Liu and
                  Zhi Wang and
                  Yuling Liu and
                  Zhigang Lu},
  title        = {{C-BEDIM} and {S-BEDIM:} Lateral movement detection in enterprise
                  network through behavior deviation measurement},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103267},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103267},
  doi          = {10.1016/J.COSE.2023.103267},
  timestamp    = {Thu, 29 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/DongYLWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DoshiPSS23,
  author       = {Jay Doshi and
                  Kunal Parmar and
                  Raj Sanghavi and
                  Narendra Shekokar},
  title        = {A comprehensive dual-layer architecture for phishing and spam email
                  detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103378},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103378},
  doi          = {10.1016/J.COSE.2023.103378},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DoshiPSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuHLWLH23,
  author       = {Linfeng Du and
                  Junjiang He and
                  Tao Li and
                  Yunpeng Wang and
                  Xiaolong Lan and
                  Yunhua Huang},
  title        = {DBWE-Corbat: Background network traffic generation using dynamic word
                  embedding and contrastive learning for cyber range},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103202},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103202},
  doi          = {10.1016/J.COSE.2023.103202},
  timestamp    = {Wed, 12 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuHLWLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuncanC23,
  author       = {Shawn P. Duncan and
                  Hui Chen},
  title        = {Detecting network-based internet censorship via latent feature representation
                  learning},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103138},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103138},
  doi          = {10.1016/J.COSE.2023.103138},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuncanC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DupontSBL23,
  author       = {Beno{\^{\i}}t Dupont and
                  Clifford Shearing and
                  Marilyne Bernier and
                  Eric Rutger Leukfeldt},
  title        = {The tensions of cyber-resilience: From sensemaking to practice},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103372},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103372},
  doi          = {10.1016/J.COSE.2023.103372},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DupontSBL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EbertSASZK23,
  author       = {Nico Ebert and
                  Thierry Schaltegger and
                  Benjamin Ambuehl and
                  Lorin Sch{\"{o}}ni and
                  Verena Zimmermann and
                  Melanie Knieps},
  title        = {Learning from safety science: {A} way forward for studying cybersecurity
                  incidents in organizations},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103435},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103435},
  doi          = {10.1016/J.COSE.2023.103435},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/EbertSASZK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EceizaFI23,
  author       = {Maialen Eceiza and
                  Jose Luis Flores and
                  Mikel Iturbe},
  title        = {Improving fuzzing assessment methods through the analysis of metrics
                  and experimental conditions},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102946},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102946},
  doi          = {10.1016/J.COSE.2022.102946},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EceizaFI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EnBKKHFT23,
  author       = {Ooi Sian En and
                  Razvan Beuran and
                  Takayuki Kuroda and
                  Takuya Kuwahara and
                  Ryosuke Hotchi and
                  Norihito Fujita and
                  Yasuo Tan},
  title        = {Intent-Driven Secure System Design: Methodology and Implementation},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102955},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102955},
  doi          = {10.1016/J.COSE.2022.102955},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EnBKKHFT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EspositoMS23,
  author       = {Christian Esposito and
                  Vincenzo Moscato and
                  Giancarlo Sperl{\`{\i}}},
  title        = {Detecting malicious reviews and users affecting social reviewing systems:
                  {A} survey},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103407},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103407},
  doi          = {10.1016/J.COSE.2023.103407},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EspositoMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FanWFHX23,
  author       = {Yuanhai Fan and
                  Chuanhao Wan and
                  Cai Fu and
                  Lansheng Han and
                  Hao Xu},
  title        = {VDoTR: Vulnerability detection based on tensor representation of comprehensive
                  code graphs},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103247},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103247},
  doi          = {10.1016/J.COSE.2023.103247},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FanWFHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FasciFLQ23,
  author       = {Lara Saidia Fasc{\`{\i}} and
                  Marco Fisichella and
                  Gianluca Lax and
                  Chenyin Qian},
  title        = {Disarming visualization-based approaches in malware detection systems},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103062},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103062},
  doi          = {10.1016/J.COSE.2022.103062},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FasciFLQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ferguson-Walter23,
  author       = {Kimberly J. Ferguson{-}Walter and
                  Maxine M. Major and
                  Chelsea K. Johnson and
                  Craig J. Johnson and
                  Dakota D. Scott and
                  Robert S. Gutzwiller and
                  Temmie Shade},
  title        = {Cyber expert feedback: Experiences, expectations, and opinions about
                  cyber deception},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103268},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103268},
  doi          = {10.1016/J.COSE.2023.103268},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ferguson-Walter23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandezFuentesPC23,
  author       = {Xos{\'{e}} Fern{\'{a}}ndez{-}Fuentes and
                  Tom{\'{a}}s F. Pena and
                  Jos{\'{e}} Carlos Cabaleiro},
  title        = {Digital forensic analysis of the private mode of browsers on Android},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103425},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103425},
  doi          = {10.1016/J.COSE.2023.103425},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandezFuentesPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FilusD23,
  author       = {Katarzyna Filus and
                  Joanna Domanska},
  title        = {Software vulnerabilities in TensorFlow-based deep learning applications},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102948},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102948},
  doi          = {10.1016/J.COSE.2022.102948},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FilusD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FiskKL23,
  author       = {Nathan Fisk and
                  Nicholas M. Kelly and
                  Lorie M. Liebrock},
  title        = {Cybersecurity communities of practice: Strategies for creating gateways
                  to participation},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103188},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103188},
  doi          = {10.1016/J.COSE.2023.103188},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FiskKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ForsbergF23,
  author       = {Joonas Forsberg and
                  Tapio Frantti},
  title        = {Technical performance metrics of a security operations center},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103529},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103529},
  doi          = {10.1016/J.COSE.2023.103529},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ForsbergF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrankJR23,
  author       = {Muriel Frank and
                  Lennart Jaeger and
                  Lukas Manuel Ranft},
  title        = {Using contextual factors to predict information security overconfidence:
                  {A} machine learning approach},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103046},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103046},
  doi          = {10.1016/J.COSE.2022.103046},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FrankJR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrankK23,
  author       = {Muriel Frank and
                  Vanessa Kohn},
  title        = {Understanding extra-role security behaviors: An integration of self-determination
                  theory and construal level theory},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103386},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103386},
  doi          = {10.1016/J.COSE.2023.103386},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrankK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FreitasSCM23,
  author       = {Tadeu Freitas and
                  Jo{\~{a}}o Soares and
                  Manuel Eduardo Correia and
                  Rolando Martins},
  title        = {Deterministic or probabilistic? - {A} survey on Byzantine fault tolerant
                  state machine replication},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103200},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103200},
  doi          = {10.1016/J.COSE.2023.103200},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FreitasSCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrihaFBBKC23,
  author       = {Othmane Friha and
                  Mohamed Amine Ferrag and
                  Mohamed Benbouzid and
                  Tarek Berghout and
                  Burak Kantarci and
                  Kim{-}Kwang Raymond Choo},
  title        = {2DF-IDS: Decentralized and differentially private federated learning-based
                  intrusion detection system for industrial IoT},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103097},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103097},
  doi          = {10.1016/J.COSE.2023.103097},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FrihaFBBKC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuNZHZ23,
  author       = {Nan Fu and
                  Weiwei Ni and
                  Sen Zhang and
                  Lihe Hou and
                  Dongyue Zhang},
  title        = {{GC-NLDP:} {A} graph clustering algorithm with local differential
                  privacy},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102967},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102967},
  doi          = {10.1016/J.COSE.2022.102967},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FuNZHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FujsVV23,
  author       = {Damjan Fujs and
                  Simon Vrhovec and
                  Damjan Vavpotic},
  title        = {Balancing software and training requirements for information security},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103467},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103467},
  doi          = {10.1016/J.COSE.2023.103467},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FujsVV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GanapathiASTOW23,
  author       = {Iyyakutti Iyappan Ganapathi and
                  Syed Sadaf Ali and
                  Uttam Sharma and
                  Pradeep Tomar and
                  Muhammad Owais and
                  Naoufel Werghi},
  title        = {{RHEMAT:} Robust human ear based multimodal authentication technique},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103356},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103356},
  doi          = {10.1016/J.COSE.2023.103356},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GanapathiASTOW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GandalMRB23,
  author       = {Neil Gandal and
                  Tyler Moore and
                  Michael Riordan and
                  Noa Barnir},
  title        = {Empirically evaluating the effect of security precautions on cyber
                  incidents},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103380},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103380},
  doi          = {10.1016/J.COSE.2023.103380},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GandalMRB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GandhiSSP23,
  author       = {Jugal Gandhi and
                  Diksha Shekhawat and
                  M. Santosh and
                  Jai Gopal Pandey},
  title        = {Logic locking for {IP} security: {A} comprehensive analysis on challenges,
                  techniques, and trends},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103196},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103196},
  doi          = {10.1016/J.COSE.2023.103196},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GandhiSSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GaoY23,
  author       = {Chen Gao and
                  Jia Yu},
  title        = {SecureRC: {A} system for privacy-preserving relation classification
                  using secure multi-party computation},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103142},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103142},
  doi          = {10.1016/J.COSE.2023.103142},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GaoY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GeHZS23,
  author       = {Zhaocheng Ge and
                  Hanping Hu and
                  Tengfei Zhao and
                  Dingmeng Shi},
  title        = {Reading is not believing: {A} multimodal adversarial attacker for
                  Chinese-NLP model},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103052},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103052},
  doi          = {10.1016/J.COSE.2022.103052},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GeHZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GeWLTL23,
  author       = {Wenhan Ge and
                  Junfeng Wang and
                  Tongcan Lin and
                  Binhui Tang and
                  Xiaohui Li},
  title        = {Explainable cyber threat behavior identification based on self-adversarial
                  topic generation},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103369},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103369},
  doi          = {10.1016/J.COSE.2023.103369},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GeWLTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GedenR23,
  author       = {Munir Geden and
                  Kasper Rasmussen},
  title        = {RegGuard: Leveraging {CPU} registers for mitigation of control- and
                  data-oriented attacks},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103213},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103213},
  doi          = {10.1016/J.COSE.2023.103213},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GedenR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GegenhuberMHMMWU23,
  author       = {Gabriel K. Gegenhuber and
                  Markus Maier and
                  Florian Holzbauer and
                  Wilfried Mayer and
                  Georg Merzdovnik and
                  Edgar R. Weippl and
                  Johanna Ullrich},
  title        = {An extended view on measuring tor AS-level adversaries},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103302},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103302},
  doi          = {10.1016/J.COSE.2023.103302},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GegenhuberMHMMWU23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GeorgiadouMA23,
  author       = {Anna Georgiadou and
                  Ariadni Michalitsi{-}Psarrou and
                  Dimitris Askounis},
  title        = {A security awareness and competency evaluation in the energy sector},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103199},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103199},
  doi          = {10.1016/J.COSE.2023.103199},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GeorgiadouMA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GiboneyAWOTWJ23,
  author       = {Justin Scott Giboney and
                  Bonnie Brinton Anderson and
                  Geoffrey A. Wright and
                  Shayna Oh and
                  Quincy Taylor and
                  Megan Warren and
                  Kylie Johnson},
  title        = {Barriers to a cybersecurity career: Analysis across career stage and
                  gender},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103316},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103316},
  doi          = {10.1016/J.COSE.2023.103316},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GiboneyAWOTWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GiboneySG23,
  author       = {Justin Scott Giboney and
                  Ryan M. Schuetzler and
                  G. Mark Grimes},
  title        = {Know your enemy: Conversational agents for security, education, training,
                  and awareness at scale},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103207},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103207},
  doi          = {10.1016/J.COSE.2023.103207},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GiboneySG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoelVJ23,
  author       = {Shefali Goel and
                  Abhishek Verma and
                  Vinod Kumar Jain},
  title        = {{CRA-RPL:} {A} Novel Lightweight challenge-Response authentication-based
                  technique for securing {RPL} against dropped {DAO} attacks},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103346},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103346},
  doi          = {10.1016/J.COSE.2023.103346},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoelVJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GovindarajanSG23,
  author       = {Usharani Hareesh Govindarajan and
                  Dhiraj Kumar Singh and
                  Hardik A. Gohel},
  title        = {Forecasting cyber security threats landscape and associated technical
                  trends in telehealth using Bidirectional Encoder Representations from
                  Transformers {(BERT)}},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103404},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103404},
  doi          = {10.1016/J.COSE.2023.103404},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GovindarajanSG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuB23,
  author       = {Yuhao Gu and
                  Yuebin Bai},
  title        = {{LR-BA:} Backdoor attack against vertical federated learning using
                  local latent representations},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103193},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103193},
  doi          = {10.1016/J.COSE.2023.103193},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuSK23,
  author       = {Yeming Gu and
                  Hui Shu and
                  Fei Kang},
  title        = {BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103508},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103508},
  doi          = {10.1016/J.COSE.2023.103508},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuamanTAS23,
  author       = {Danny S. Guam{\'{a}}n and
                  David Rodr{\'{\i}}guez Torrado and
                  Jos{\'{e}} M. del {\'{A}}lamo and
                  Jose M. Such},
  title        = {Automated {GDPR} compliance assessment for cross-border personal data
                  transfers in android applications},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103262},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103262},
  doi          = {10.1016/J.COSE.2023.103262},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuamanTAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuanLXLG23,
  author       = {Zhong Guan and
                  Chang Liu and
                  Gang Xiong and
                  Zhen Li and
                  Gaopeng Gou},
  title        = {FlowTracker: Improved flow correlation attacks with denoising and
                  contrastive learning},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103018},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103018},
  doi          = {10.1016/J.COSE.2022.103018},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuanLXLG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares23,
  author       = {Alejandro Guerra{-}Manzanares and
                  Marcin Luckner and
                  Hayretdin Bahsi},
  title        = {Corrigendum to Concept drift and cross-device behavior: Challenges
                  and implications for effective android malware detection Computers
                  {\&} Security, Volume 120, 102757},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102998},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102998},
  doi          = {10.1016/J.COSE.2022.102998},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoLHWMGL23,
  author       = {Yongyan Guo and
                  Zhengyu Liu and
                  Cheng Huang and
                  Nannan Wang and
                  Hai Min and
                  Wenbo Guo and
                  Jiayong Liu},
  title        = {A framework for threat intelligence extraction and fusion},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103371},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103371},
  doi          = {10.1016/J.COSE.2023.103371},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoLHWMGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoPDZZ23,
  author       = {Taolin Guo and
                  Shunshun Peng and
                  Kai Dong and
                  You Zhao and
                  Mingliang Zhou},
  title        = {{RDPCF:} Range-based differentially private user data perturbation
                  for collaborative filtering},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103452},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103452},
  doi          = {10.1016/J.COSE.2023.103452},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoPDZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoXZ23,
  author       = {Zhenyuan Guo and
                  Lei Xu and
                  Liehuang Zhu},
  title        = {FedSIGN: {A} sign-based federated learning framework with privacy
                  and robustness guarantees},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103474},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103474},
  doi          = {10.1016/J.COSE.2023.103474},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoXZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoYWZLX23,
  author       = {Pengfei Guo and
                  Yingjian Yan and
                  Junjie Wang and
                  Jingxin Zhong and
                  Yanjiang Liu and
                  Jinsong Xu},
  title        = {Towards a metrics suite for evaluating cache side-channel vulnerability:
                  Case studies on an open-source {RISC-V} processor},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103480},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103480},
  doi          = {10.1016/J.COSE.2023.103480},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoYWZLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoYZZZD23,
  author       = {Pengfei Guo and
                  Yingjian Yan and
                  Fan Zhang and
                  Chunsheng Zhu and
                  Lichao Zhang and
                  Zibin Dai},
  title        = {Extending the classical side-channel analysis framework to access-driven
                  cache attacks},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103255},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103255},
  doi          = {10.1016/J.COSE.2023.103255},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoYZZZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuptaYGAG23,
  author       = {Prajjwal Gupta and
                  Krishna Yadav and
                  Brij B. Gupta and
                  Mamoun Alazab and
                  Thippa Reddy Gadekallu},
  title        = {A Novel Data Poisoning Attack in Federated Learning based on Inverted
                  Loss Function},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103270},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103270},
  doi          = {10.1016/J.COSE.2023.103270},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuptaYGAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanCLZJL23,
  author       = {Xueying Han and
                  Susu Cui and
                  Song Liu and
                  Chen Zhang and
                  Bo Jiang and
                  Zhigang Lu},
  title        = {Network intrusion detection based on n-gram frequency and time-aware
                  transformer},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103171},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103171},
  doi          = {10.1016/J.COSE.2023.103171},
  timestamp    = {Tue, 27 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanCLZJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanFLZ23,
  author       = {Yinghua Han and
                  Hantong Feng and
                  Keke Li and
                  Qiang Zhao},
  title        = {False data injection attacks detection with modified temporal multi-graph
                  convolutional network in smart grids},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103016},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103016},
  doi          = {10.1016/J.COSE.2022.103016},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanFLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanMBY23,
  author       = {Kyusuk Han and
                  Hyeran Mun and
                  Malavika Balakrishnan and
                  Chan Yeob Yeun},
  title        = {Enhancing security and robustness of Cyphal on Controller Area Network
                  in unmanned aerial vehicle environments},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103481},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103481},
  doi          = {10.1016/J.COSE.2023.103481},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HanMBY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarborthP23,
  author       = {David Harborth and
                  Sebastian Pape},
  title        = {A privacy calculus model for contact tracing apps: Analyzing the use
                  behavior of the German Corona-Warn-App with a longitudinal user study},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103338},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103338},
  doi          = {10.1016/J.COSE.2023.103338},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarborthP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeLQD23,
  author       = {Xianglong He and
                  Yuezun Li and
                  Haipeng Qu and
                  Junyu Dong},
  title        = {Improving transferable adversarial attack via feature-momentum},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103135},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103135},
  doi          = {10.1016/J.COSE.2023.103135},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeLQD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeidingSOL23,
  author       = {Fredrik Heiding and
                  Emre S{\"{u}}ren and
                  Johannes Oleg{\aa}rd and
                  Robert Lagerstr{\"{o}}m},
  title        = {Penetration testing of connected households},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103067},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103067},
  doi          = {10.1016/J.COSE.2022.103067},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeidingSOL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HengstlerKMNT23,
  author       = {Sebastian Hengstler and
                  Stephan Kuehnel and
                  Kristin Masuch and
                  Ilja Nastjuk and
                  Simon Trang},
  title        = {Should i really do that? Using quantile regression to examine the
                  impact of sanctions on information security policy compliance behavior},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103370},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103370},
  doi          = {10.1016/J.COSE.2023.103370},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HengstlerKMNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HillmanHT23,
  author       = {Doron Hillman and
                  Yaniv Harel and
                  Eran Toch},
  title        = {Evaluating organizational phishing awareness training on an enterprise
                  scale},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103364},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103364},
  doi          = {10.1016/J.COSE.2023.103364},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HillmanHT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoheiselCSJ23,
  author       = {Raphael Hoheisel and
                  Guido van Capelleveen and
                  Dipti K. Sarmah and
                  Marianne Junger},
  title        = {The development of phishing during the {COVID-19} pandemic: An analysis
                  of over 1100 targeted domains},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103158},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103158},
  doi          = {10.1016/J.COSE.2023.103158},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HoheiselCSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HouNZFZ23,
  author       = {Lihe Hou and
                  Weiwei Ni and
                  Sen Zhang and
                  Nan Fu and
                  Dongyue Zhang},
  title        = {Wdt-SCAN: Clustering decentralized social graphs with local differential
                  privacy},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103036},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103036},
  doi          = {10.1016/J.COSE.2022.103036},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HouNZFZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuXZTL23,
  author       = {Tianle Hu and
                  Chonghai Xu and
                  Shenwen Zhang and
                  Shuangshuang Tao and
                  Luqun Li},
  title        = {Cross-site scripting detection with two-channel feature fusion embedded
                  in self-attention mechanism},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102990},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102990},
  doi          = {10.1016/J.COSE.2022.102990},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuXZTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuZLDCWJ23,
  author       = {Lifeng Hu and
                  Fan Zhang and
                  Ziyuan Liang and
                  Ruyi Ding and
                  Xingyu Cai and
                  Zonghui Wang and
                  Wenguang Jin},
  title        = {FaultMorse: An automated controlled-channel attack via longest recurring
                  sequence},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103003},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103003},
  doi          = {10.1016/J.COSE.2022.103003},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZLDCWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuZYT23,
  author       = {Mingming Hu and
                  Kun Zhang and
                  Ruibang You and
                  Bibo Tu},
  title        = {AuthConFormer: Sensor-based Continuous Authentication of Smartphone
                  Users Using {A} Convolutional Transformer},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103122},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103122},
  doi          = {10.1016/J.COSE.2023.103122},
  timestamp    = {Mon, 01 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZYT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangM23,
  author       = {Yunfan Huang and
                  Maode Ma},
  title        = {{ILL-IDS:} An incremental lifetime learning {IDS} for VANETs},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102992},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102992},
  doi          = {10.1016/J.COSE.2022.102992},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangSQH23,
  author       = {Yinghui Huang and
                  Wenting Shen and
                  Jing Qin and
                  Huiying Hou},
  title        = {Privacy-preserving certificateless public auditing supporting different
                  auditing frequencies},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103181},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103181},
  doi          = {10.1016/J.COSE.2023.103181},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangSQH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZGWLZ23,
  author       = {Jia{-}Cheng Huang and
                  Guo{-}Qiang Zeng and
                  Guang{-}Gang Geng and
                  Jian Weng and
                  Kang{-}Di Lu and
                  Yu Zhang},
  title        = {Differential evolution-based convolutional neural networks: An automatic
                  architecture design method for intrusion detection in industrial control
                  systems},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103310},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103310},
  doi          = {10.1016/J.COSE.2023.103310},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HullSL23,
  author       = {David M. Hull and
                  Sebastian Walter Schuetz and
                  Paul Benjamin Lowry},
  title        = {Tell me a story: The effects that narratives exert on meaningful-engagement
                  outcomes in antiphishing training},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103252},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103252},
  doi          = {10.1016/J.COSE.2023.103252},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HullSL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IanniM23,
  author       = {Michele Ianni and
                  Elio Masciari},
  title        = {{SCOUT:} Security by computing OUTliers on activity logs},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103355},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103355},
  doi          = {10.1016/J.COSE.2023.103355},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IanniM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ImranSRRRA23,
  author       = {Muhammad Ali Imran and
                  Hafeez Ur Rehman Siddiqui and
                  Ali Raza and
                  Muhammad Amjad Raza and
                  Furqan Rustam and
                  Imran Ashraf},
  title        = {A performance overview of machine learning-based defense strategies
                  for advanced persistent threats in industrial control systems},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103445},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103445},
  doi          = {10.1016/J.COSE.2023.103445},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ImranSRRRA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JafarianN23,
  author       = {Jafar Haadi Jafarian and
                  Amirreza Niakanlahiji},
  title        = {MultiRHM: Defeating multi-staged enterprise intrusion attacks through
                  multi-dimensional and multi-parameter host identity anonymization},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102958},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102958},
  doi          = {10.1016/J.COSE.2022.102958},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JafarianN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JayalaxmiSKACC23,
  author       = {PLS Jayalaxmi and
                  Rahul Saha and
                  Gulshan Kumar and
                  Mamoun Alazab and
                  Mauro Conti and
                  Xiaochun Cheng},
  title        = {{PIGNUS:} {A} Deep Learning model for {IDS} in industrial internet-of-things},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103315},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103315},
  doi          = {10.1016/J.COSE.2023.103315},
  timestamp    = {Tue, 20 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JayalaxmiSKACC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaYZLM23,
  author       = {Zhizhuang Jia and
                  Chao Yang and
                  Xiaoyun Zhao and
                  Xinghua Li and
                  Jian Feng Ma},
  title        = {Design and implementation of an efficient container tag dynamic taint
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103528},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103528},
  doi          = {10.1016/J.COSE.2023.103528},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaYZLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangZ23,
  author       = {Randi Jiang and
                  Jianru Zhang},
  title        = {The impact of work pressure and work completion justification on intentional
                  nonmalicious information security policy violation intention},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103253},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103253},
  doi          = {10.1016/J.COSE.2023.103253},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinJWLJYZ23,
  author       = {Xin Jin and
                  Xin Jin and
                  Ruxin Wang and
                  Shin{-}Jye Lee and
                  Qian Jiang and
                  Shaowen Yao and
                  Wei Zhou},
  title        = {Adversarial attacks on multi-focus image fusion models},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103455},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103455},
  doi          = {10.1016/J.COSE.2023.103455},
  timestamp    = {Sun, 18 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JinJWLJYZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JingadeK23,
  author       = {Raghuram Raghavendra Jingade and
                  Rajaram Sanjeev Kunte},
  title        = {Extended right-angle difference ternary co-relation pattern: {A} new
                  feature descriptor for face anti-spoofing},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103421},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103421},
  doi          = {10.1016/J.COSE.2023.103421},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JingadeK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JohnAAWJ23,
  author       = {Taran Cyriac John and
                  Muhammad Shabbir Abbasi and
                  Harith Al{-}Sahaf and
                  Ian Welch and
                  Julian Jang{-}Jaccard},
  title        = {Evolving malice scoring models for ransomware detection: An automated
                  approach by utilising genetic programming and cooperative coevolution},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103215},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103215},
  doi          = {10.1016/J.COSE.2023.103215},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JohnAAWJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JohnstonGBCSWS23,
  author       = {Allen C. Johnston and
                  Paul Michael Di Gangi and
                  France B{\'{e}}langer and
                  Robert E. Crossler and
                  Mikko T. Siponen and
                  Merrill Warkentin and
                  Tripti Singh},
  title        = {Seeking rhetorical validity in fear appeal research: An application
                  of rhetorical theory},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103020},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103020},
  doi          = {10.1016/J.COSE.2022.103020},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JoyceANR23,
  author       = {Robert J. Joyce and
                  Dev Amlani and
                  Charles Nicholas and
                  Edward Raff},
  title        = {{MOTIF:} {A} Malware Reference Dataset with Ground Truth Family Labels},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102921},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102921},
  doi          = {10.1016/J.COSE.2022.102921},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JoyceANR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KaleT23,
  author       = {Rahul Kale and
                  Vrizlynn L. L. Thing},
  title        = {Few-shot weakly-supervised cybersecurity anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103194},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103194},
  doi          = {10.1016/J.COSE.2023.103194},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KaleT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KampourakisGK23,
  author       = {Vyron Kampourakis and
                  Vasileios Gkioulos and
                  Sokratis K. Katsikas},
  title        = {A systematic literature review on wireless security testbeds in the
                  cyber-physical realm},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103383},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103383},
  doi          = {10.1016/J.COSE.2023.103383},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KangLWZNL23,
  author       = {Hongzhaoning Kang and
                  Gang Liu and
                  Quan Wang and
                  Qi Zhang and
                  Jiamin Niu and
                  Nan Luo},
  title        = {An improved minimal noise role mining algorithm based on role interpretability},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103100},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103100},
  doi          = {10.1016/J.COSE.2023.103100},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KangLWZNL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KangXZJSZ23,
  author       = {Zi Kang and
                  Hui Xia and
                  Rui Zhang and
                  Shuliang Jiang and
                  Xiaolong Shi and
                  Zuming Zhang},
  title        = {{FGDA-GS:} Fast guided decision attack based on gradient signs for
                  skeletal action recognition},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103522},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103522},
  doi          = {10.1016/J.COSE.2023.103522},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KangXZJSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Kemp23,
  author       = {Steven Kemp},
  title        = {Exploring public cybercrime prevention campaigns and victimization
                  of businesses: {A} Bayesian model averaging approach},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103089},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103089},
  doi          = {10.1016/J.COSE.2022.103089},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Kemp23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalilBDKMK23,
  author       = {Shaymaa Mamdouh Khalil and
                  Hayretdin Bahsi and
                  Henry Ochieng' Dola and
                  Tarmo Kor{\~{o}}tko and
                  Kieran McLaughlin and
                  Vahur Kotkas},
  title        = {Threat Modeling of Cyber-Physical Systems - {A} Case Study of a Microgrid
                  System},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102950},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102950},
  doi          = {10.1016/J.COSE.2022.102950},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalilBDKMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalilEM23,
  author       = {Maysaa Khalil and
                  Moez Esseghir and
                  Le{\"{\i}}la Merghem{-}Boulahia},
  title        = {Privacy-Preserving federated learning: An application for big data
                  load forecast in buildings},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103211},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103211},
  doi          = {10.1016/J.COSE.2023.103211},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalilEM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanAUIRAAA23,
  author       = {Saddam Hussain Khan and
                  Tahani Jaser Alahmadi and
                  Wasi Ullah and
                  Javed Iqbal and
                  Azizur Rahim and
                  Hend Khalid Alkahtani and
                  Wajdi Alghamdi and
                  Alaa Omran Almagrabi},
  title        = {A new deep boosted {CNN} and ensemble learning based IoT malware detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103385},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103385},
  doi          = {10.1016/J.COSE.2023.103385},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanAUIRAAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanIMJ23,
  author       = {Naurin Farooq Khan and
                  Naveed Ikram and
                  Hajra Murtaza and
                  Mehwish Javed},
  title        = {Evaluating protection motivation based cybersecurity awareness training
                  on Kirkpatrick's Model},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103049},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103049},
  doi          = {10.1016/J.COSE.2022.103049},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanIMJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhurshidR23,
  author       = {Anum Khurshid and
                  Shahid Raza},
  title        = {AutoCert: Automated TOCTOU-secure digital certification for IoT with
                  combined authentication and assurance},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102952},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102952},
  doi          = {10.1016/J.COSE.2022.102952},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhurshidR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimJPP23,
  author       = {Sung{-}Kyung Kim and
                  Eun{-}Tae Jang and
                  Hanjin Park and
                  Ki{-}Woong Park},
  title        = {Pwnable-Sherpa: An interactive coaching system with a case study of
                  pwnable challenges},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103009},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103009},
  doi          = {10.1016/J.COSE.2022.103009},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimJPP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimKYPSP23,
  author       = {Jinwoo Kim and
                  Yeonkeun Kim and
                  Vinod Yegneswaran and
                  Phillip A. Porras and
                  Seungwon Shin and
                  Taejune Park},
  title        = {Extended data plane architecture for in-network security services
                  in software-defined networks},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102976},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102976},
  doi          = {10.1016/J.COSE.2022.102976},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimKYPSP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimSC23,
  author       = {Suryeon Kim and
                  Seungwon Shin and
                  Hyunwoo Choi},
  title        = {{AVX-TSCHA:} Leaking information through {AVX} extensions in commercial
                  processors},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103437},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103437},
  doi          = {10.1016/J.COSE.2023.103437},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KimSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KingoA23,
  author       = {Thomas Kingo and
                  Diego F. Aranha},
  title        = {User-centric security analysis of MitID: The Danish passwordless digital
                  identity solution},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103376},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103376},
  doi          = {10.1016/J.COSE.2023.103376},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KingoA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KishoreBMM23,
  author       = {Pushkar Kishore and
                  Swadhin Kumar Barisal and
                  Durga Prasad Mohapatra and
                  Rajib Mall},
  title        = {An efficient two-stage pipeline model with filtering algorithm for
                  mislabeled malware detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103499},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103499},
  doi          = {10.1016/J.COSE.2023.103499},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KishoreBMM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KitkowskaSMW23,
  author       = {Agnieszka Kitkowska and
                  Yefim Shulman and
                  Leonardo A. Martucci and
                  Erik W{\"{a}}stlund},
  title        = {Designing for privacy: Exploring the influence of affect and individual
                  characteristics on users' interactions with privacy policies},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103468},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103468},
  doi          = {10.1016/J.COSE.2023.103468},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KitkowskaSMW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KoKK23,
  author       = {Kyoungmin Ko and
                  Sunghwan Kim and
                  Hyun Kwon},
  title        = {Multi-targeted audio adversarial example for use against speech recognition
                  systems},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103168},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103168},
  doi          = {10.1016/J.COSE.2023.103168},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KoKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KornyoAOOPBB23,
  author       = {Oliver Kornyo and
                  Michael Asante and
                  Richard Opoku and
                  Kwabena Owusu{-}Agyemang and
                  Benjamin Tei Partey and
                  Emmanuel Kwesi Baah and
                  Nkrumah Boadu},
  title        = {Botnet attacks classification in {AMI} networks with recursive feature
                  elimination {(RFE)} and machine learning algorithms},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103456},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103456},
  doi          = {10.1016/J.COSE.2023.103456},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KornyoAOOPBB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarBAG23,
  author       = {Chandan Kumar and
                  Soham Biswas and
                  Md. Sarfaraj Alam Ansari and
                  Mahesh Chandra Govil},
  title        = {Nature-inspired intrusion detection system for protecting software-defined
                  networks controller},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103438},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103438},
  doi          = {10.1016/J.COSE.2023.103438},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarBAG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarLC23,
  author       = {Kiran Kumar and
                  Dapeng Liu and
                  Lemuria D. Carter},
  title        = {Understanding the adoption of digital conferencing tools: Unpacking
                  the impact of privacy concerns and incident response efficacy},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103375},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103375},
  doi          = {10.1016/J.COSE.2023.103375},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarS23,
  author       = {Yogendra Kumar and
                  Basant Subba},
  title        = {Stacking \emph{ensemble-based} {HIDS} framework for detecting anomalous
                  system processes in \emph{Windows} based operating systems using multiple
                  word embedding},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {102961},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102961},
  doi          = {10.1016/J.COSE.2022.102961},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarS23a,
  author       = {Vikash Kumar and
                  Ditipriya Sinha},
  title        = {Synthetic attack data generation model applying generative adversarial
                  network for intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103054},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103054},
  doi          = {10.1016/J.COSE.2022.103054},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarS23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumariJ23,
  author       = {Pooja Kumari and
                  Ankit Kumar Jain},
  title        = {A comprehensive study of DDoS attacks over IoT network and their countermeasures},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103096},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103096},
  doi          = {10.1016/J.COSE.2023.103096},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumariJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KwonL23,
  author       = {Hyun Kwon and
                  Sanghyun Lee},
  title        = {Erratum to 'Ensemble transfer attack targeting text classification
                  systems' [Computers {\&} Security 117 {(2022)} 1-8/ 102695]},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102944},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102944},
  doi          = {10.1016/J.COSE.2022.102944},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KwonL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KwonN23,
  author       = {Hyun Kwon and
                  Seung{-}Hun Nam},
  title        = {Audio adversarial detection through classification score on speech
                  recognition systems},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103061},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103061},
  doi          = {10.1016/J.COSE.2022.103061},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/KwonN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaiLLHLWC23,
  author       = {Yuan{-}Cheng Lai and
                  Jheng{-}Yan Lin and
                  Ying{-}Dar Lin and
                  Ren{-}Hung Hwang and
                  Po{-}Ching Lin and
                  Hsiao{-}Kuang Wu and
                  Chung{-}Kuan Chen},
  title        = {Two-phase Defense Against Poisoning Attacks on Federated Learning-based
                  Intrusion Detection},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103205},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103205},
  doi          = {10.1016/J.COSE.2023.103205},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaiLLHLWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Lee23,
  author       = {In Lee},
  title        = {Analyzing web descriptions of cybersecurity breaches in the healthcare
                  provider sector: {A} content analytics research method},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103185},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103185},
  doi          = {10.1016/J.COSE.2023.103185},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Lee23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCL23,
  author       = {Sunwoo Lee and
                  Wonsuk Choi and
                  Dong Hoon Lee},
  title        = {The vibration knows who you are! {A} further analysis on usable authentication
                  for smartwatch users},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103040},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103040},
  doi          = {10.1016/J.COSE.2022.103040},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeKL23,
  author       = {Jiyeon Lee and
                  Hyosu Kim and
                  Kilho Lee},
  title        = {VRKeyLogger: Virtual keystroke inference attack via eavesdropping
                  controller usage pattern in WebVR},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103461},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103461},
  doi          = {10.1016/J.COSE.2023.103461},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeLJL23,
  author       = {Sun{-}Jin Lee and
                  Yu{-}Rim Lee and
                  So{-}Eun Jeon and
                  Il{-}Gu Lee},
  title        = {Machine learning-based jamming attack classification and effective
                  defense technique},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103169},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103169},
  doi          = {10.1016/J.COSE.2023.103169},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeLJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeiHH23,
  author       = {Wenjing Lei and
                  Siqi Hu and
                  Carol Hsu},
  title        = {Unveiling the process of phishing precautions taking: The moderating
                  role of optimism bias},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103249},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103249},
  doi          = {10.1016/J.COSE.2023.103249},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeiHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LenzBWV23,
  author       = {Julia Lenz and
                  Zdravko Bozakov and
                  Steffen Wendzel and
                  Simon Vrhovec},
  title        = {Why people replace their aging smart devices: {A} push-pull-mooring
                  perspective},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103258},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103258},
  doi          = {10.1016/J.COSE.2023.103258},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LenzBWV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCAGPZ23,
  author       = {Jingjin Li and
                  Chao Chen and
                  Mostafa Rahimi Azghadi and
                  Hossein Ghodosi and
                  Lei Pan and
                  Jun Zhang},
  title        = {Security and privacy problems in voice assistant applications: {A}
                  survey},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103448},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103448},
  doi          = {10.1016/J.COSE.2023.103448},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCAGPZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCBC23,
  author       = {Yong{-}Gang Li and
                  JiaZhen Cai and
                  Yu Bao and
                  Yeh{-}Ching Chung},
  title        = {What you can read is what you can't execute},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103377},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103377},
  doi          = {10.1016/J.COSE.2023.103377},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCBC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCPZWZX23,
  author       = {Lin Li and
                  Chao Chen and
                  Lei Pan and
                  Leo Yu Zhang and
                  Zhifeng Wang and
                  Jun Zhang and
                  Yang Xiang},
  title        = {A Survey of PPG's Application in Authentication},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103488},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103488},
  doi          = {10.1016/J.COSE.2023.103488},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCPZWZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZY23,
  author       = {Chao Li and
                  Yanan Cheng and
                  Zhaoxin Zhang and
                  Ping Yu},
  title        = {Configuration anormaly detection and resolution risk assessment of
                  authoritative domain name server},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103426},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103426},
  doi          = {10.1016/J.COSE.2023.103426},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiFHY23,
  author       = {Jiawen Li and
                  Kun Fang and
                  Xiaolin Huang and
                  Jie Yang},
  title        = {Improving adversarial robustness through a curriculum-guided reliable
                  distillation},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103411},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103411},
  doi          = {10.1016/J.COSE.2023.103411},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiFHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiGZD23,
  author       = {Kun Li and
                  Wei Guo and
                  Fan Zhang and
                  Jiayu Du},
  title        = {{GAMBD:} Generating adversarial malware against MalConv},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103279},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103279},
  doi          = {10.1016/J.COSE.2023.103279},
  timestamp    = {Wed, 07 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiGZD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiHDQG23,
  author       = {Zhengfa Li and
                  Chuanhe Huang and
                  Shuhua Deng and
                  Wanyu Qiu and
                  Xieping Gao},
  title        = {A soft actor-critic reinforcement learning algorithm for network intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103502},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103502},
  doi          = {10.1016/J.COSE.2023.103502},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiHDQG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiHX23,
  author       = {Jiachun Li and
                  Yuchao Hu and
                  Fei Xia},
  title        = {A variable adversarial attack method based on filtering},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103431},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103431},
  doi          = {10.1016/J.COSE.2023.103431},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLCZW23,
  author       = {Li Li and
                  Tianfeng Li and
                  Hua Cai and
                  Jian Zhang and
                  Jianjun Wang},
  title        = {I will only know after using it: The repeat purchasers of smart home
                  appliances and the privacy paradox problem},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103156},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103156},
  doi          = {10.1016/J.COSE.2023.103156},
  timestamp    = {Thu, 05 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLCZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLFWP23,
  author       = {Xiangjuan Li and
                  Yang Li and
                  Zhaowen Feng and
                  Zhaoxuan Wang and
                  Quan Pan},
  title        = {{ATS-O2A:} {A} state-based adversarial attack strategy on deep reinforcement
                  learning},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103259},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103259},
  doi          = {10.1016/J.COSE.2023.103259},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLFWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLJZZ23,
  author       = {Munan Li and
                  Hongbo Liu and
                  Xiangdong Jiang and
                  Zheng Zhao and
                  Tianhao Zhang},
  title        = {{SENSE:} An unsupervised semantic learning model for cross-platform
                  vulnerability search},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103500},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103500},
  doi          = {10.1016/J.COSE.2023.103500},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLJZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLWL23,
  author       = {Yuzhe Li and
                  Yong Liu and
                  Bo Li and
                  Weiping Wang and
                  Nan Liu},
  title        = {Towards practical differential privacy in data analysis: Understanding
                  the effect of epsilon on utility in private {ERM}},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103147},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103147},
  doi          = {10.1016/J.COSE.2023.103147},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiM23,
  author       = {Yuying Li and
                  Rogemar S. Mamon},
  title        = {Modelling health-data breaches with application to cyber insurance},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102963},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102963},
  doi          = {10.1016/J.COSE.2022.102963},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiTZ23,
  author       = {Wenjuan Li and
                  Jiao Tan and
                  Nan Zhu},
  title        = {Design of double-cross-based smartphone unlock mechanism},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103204},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103204},
  doi          = {10.1016/J.COSE.2023.103204},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiXZYC23,
  author       = {Xin Li and
                  Yang Xin and
                  Hongliang Zhu and
                  Yixian Yang and
                  Yuling Chen},
  title        = {Cross-domain vulnerability detection using graph embedding and domain
                  adaptation},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103017},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103017},
  doi          = {10.1016/J.COSE.2022.103017},
  timestamp    = {Mon, 06 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiXZYC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiYLLC23,
  author       = {Yufeng Li and
                  Fengyu Yang and
                  Qi Liu and
                  Jiangtao Li and
                  Chenhong Cao},
  title        = {Light can be Dangerous: Stealthy and Effective Physical-world Adversarial
                  Attack by Spot Light},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103345},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103345},
  doi          = {10.1016/J.COSE.2023.103345},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiYLLC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiYSB23,
  author       = {Yanli Li and
                  Dong Yuan and
                  Abubakar Sadiq Sani and
                  Wei Bao},
  title        = {Enhancing federated learning robustness in adversarial environment
                  through clustering Non-IID features},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103319},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103319},
  doi          = {10.1016/J.COSE.2023.103319},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiYSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZRC23,
  author       = {Jie Li and
                  Tianqing Zhu and
                  Wei Ren and
                  Kim{-}Kwang Raymond Choo},
  title        = {Improve individual fairness in federated learning via adversarial
                  training},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103336},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103336},
  doi          = {10.1016/J.COSE.2023.103336},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZRC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZSWHLH23,
  author       = {Qianyu Li and
                  Min Zhang and
                  Yi Shen and
                  Ruipeng Wang and
                  Miao Hu and
                  Yang Li and
                  Hao Hao},
  title        = {A hierarchical deep reinforcement learning model with expert prior
                  knowledge for intelligent penetration testing},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103358},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103358},
  doi          = {10.1016/J.COSE.2023.103358},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZSWHLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangKSBS23,
  author       = {Xueping Liang and
                  Charalambos Konstantinou and
                  Sachin Shetty and
                  Eranga Bandara and
                  Ruimin Sun},
  title        = {Decentralizing Cyber Physical Systems for Resilience: An Innovative
                  Case Study from {A} Cybersecurity Perspective},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102953},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102953},
  doi          = {10.1016/J.COSE.2022.102953},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangKSBS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangWZC23,
  author       = {Jianbing Liang and
                  Suxia Wang and
                  Shuang Zhao and
                  Shuhui Chen},
  title        = {{FECC:} {DNS} tunnel detection model based on {CNN} and clustering},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103132},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103132},
  doi          = {10.1016/J.COSE.2023.103132},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangWZC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LichyBDDH23,
  author       = {Adi Lichy and
                  Ofek Bader and
                  Ran Dubin and
                  Amit Dvir and
                  Chen Hajaj},
  title        = {When a {RF} beats a {CNN} and GRU, together - {A} comparison of deep
                  learning and classical machine learning approaches for encrypted malware
                  traffic classification},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103000},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103000},
  doi          = {10.1016/J.COSE.2022.103000},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LichyBDDH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinXHLZL23,
  author       = {Zhutian Lin and
                  Xi Xiao and
                  Guangwu Hu and
                  Qing Li and
                  Bin Zhang and
                  Xiapu Luo},
  title        = {Tracking phishing on Ethereum: Transaction network embedding approach
                  for accounts representation learning},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103479},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103479},
  doi          = {10.1016/J.COSE.2023.103479},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LinXHLZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LingWZQDCQWJLWW23,
  author       = {Xiang Ling and
                  Lingfei Wu and
                  Jiangyu Zhang and
                  Zhenqing Qu and
                  Wei Deng and
                  Xiang Chen and
                  Yaguan Qian and
                  Chunming Wu and
                  Shouling Ji and
                  Tianyue Luo and
                  Jingzheng Wu and
                  Yanjun Wu},
  title        = {Adversarial attacks against Windows {PE} malware detection: {A} survey
                  of the state-of-the-art},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103134},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103134},
  doi          = {10.1016/J.COSE.2023.103134},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LingWZQDCQWJLWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuFHX23,
  author       = {Zhonglin Liu and
                  Yong Fang and
                  Cheng Huang and
                  Yijia Xu},
  title        = {{MFXSS:} An effective {XSS} vulnerability detection method in JavaScript
                  based on multi-feature model},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103015},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103015},
  doi          = {10.1016/J.COSE.2022.103015},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuFHX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuL23,
  author       = {Xiaojian Liu and
                  Kehong Liu},
  title        = {A permission-carrying security policy and static enforcement for information
                  flows in Android programs},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103090},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103090},
  doi          = {10.1016/J.COSE.2022.103090},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuLXZX23,
  author       = {Jiyuan Liu and
                  Bingyi Lu and
                  Mingkang Xiong and
                  Tao Zhang and
                  Huilin Xiong},
  title        = {Low frequency sparse adversarial attack},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103379},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103379},
  doi          = {10.1016/J.COSE.2023.103379},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuLXZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuWLXN23,
  author       = {Xueyan Liu and
                  Jing Wang and
                  Qiong Liu and
                  Xin Xiong and
                  Shufen Niu},
  title        = {Bidirectional location privacy protection scheme for epidemiological
                  investigation based on {OT}},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103453},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103453},
  doi          = {10.1016/J.COSE.2023.103453},
  timestamp    = {Thu, 14 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuWLXN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuZXWX23,
  author       = {Linfeng Liu and
                  Yaoze Zhou and
                  Zhiyuan Xi and
                  Jiagao Wu and
                  Jia Xu},
  title        = {Defense against underwater spy-robots: {A} distributed anti-theft
                  topology control mechanism for insecure {UASN}},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103214},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103214},
  doi          = {10.1016/J.COSE.2023.103214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuZXWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LopesZAALRP23,
  author       = {Ivandro Ortet Lopes and
                  Deqing Zou and
                  Ihsan H. Abdulqadder and
                  Saeed Akbar and
                  Zhen Li and
                  Francis A. Ruambo and
                  Wagner Pereira},
  title        = {Network intrusion detection based on the temporal convolutional model},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103465},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103465},
  doi          = {10.1016/J.COSE.2023.103465},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LoucaPS23,
  author       = {Constantinos Louca and
                  Adamantini Peratikou and
                  Stavros Stavrou},
  title        = {A novel Evil Twin MiTM attack through 802.11v protocol exploitation},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103261},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103261},
  doi          = {10.1016/J.COSE.2023.103261},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LoucaPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuLLGY23,
  author       = {Shiwei Lu and
                  Ruihu Li and
                  Wenbin Liu and
                  Chaofeng Guan and
                  Xiaopeng Yang},
  title        = {Top-\emph{k} sparsification with secure aggregation for privacy-preserving
                  federated learning},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102993},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102993},
  doi          = {10.1016/J.COSE.2022.102993},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuLLGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuoLL23,
  author       = {Shiyao Luo and
                  Yingxu Lai and
                  Jing Liu},
  title        = {Selective forwarding attack detection and network recovery mechanism
                  based on cloud-edge cooperation in software-defined wireless sensor
                  network},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103083},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103083},
  doi          = {10.1016/J.COSE.2022.103083},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LuoLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaLZZLGAA23,
  author       = {Hua Ma and
                  Qun Li and
                  Yifeng Zheng and
                  Zhi Zhang and
                  Xiaoning Liu and
                  Yansong Gao and
                  Said F. Al{-}Sarawi and
                  Derek Abbott},
  title        = {MUD-PQFed: Towards Malicious User Detection on model corruption in
                  Privacy-preserving Quantized Federated learning},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103406},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103406},
  doi          = {10.1016/J.COSE.2023.103406},
  timestamp    = {Fri, 01 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MaLZZLGAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaZWJGW23,
  author       = {Xiuli Ma and
                  Wenbin Zhu and
                  Jieling Wei and
                  Yanliang Jin and
                  Dongsheng Gu and
                  Rui Wang},
  title        = {{EETC:} An extended encrypted traffic classification algorithm based
                  on variant resnet network},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103175},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103175},
  doi          = {10.1016/J.COSE.2023.103175},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaZWJGW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaZWM23,
  author       = {Binhao Ma and
                  Can Zhao and
                  Dejun Wang and
                  Bo Meng},
  title        = {{DIHBA:} Dynamic, invisible and high attack success rate boundary
                  backdoor attack with low poison ratio},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103212},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103212},
  doi          = {10.1016/J.COSE.2023.103212},
  timestamp    = {Sat, 20 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaZWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaesschalckSDGH23,
  author       = {Sam Maesschalck and
                  Alexander Staves and
                  Richard Derbyshire and
                  Benjamin Green and
                  David Hutchison},
  title        = {Walking under the ladder logic: {PLC-VBS:} a {PLC} control logic vulnerability
                  scanning tool},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103116},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103116},
  doi          = {10.1016/J.COSE.2023.103116},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaesschalckSDGH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MahadikPM23,
  author       = {Shalaka Mahadik and
                  Pranav M. Pawar and
                  Raja Muthalagu},
  title        = {Edge-HetIoT defense against DDoS attack using learning techniques},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103347},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103347},
  doi          = {10.1016/J.COSE.2023.103347},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MahadikPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MakhdoomAFLZPS23,
  author       = {Imran Makhdoom and
                  Mehran Abolhasan and
                  Daniel Robert Franklin and
                  Justin Lipman and
                  Christian Zimmermann and
                  Massimo Piccardi and
                  Negin Shariati},
  title        = {Detecting compromised IoT devices: Existing techniques, challenges,
                  and a way forward},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103384},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103384},
  doi          = {10.1016/J.COSE.2023.103384},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MakhdoomAFLZPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MandaS23,
  author       = {Sridhar Manda and
                  Charanjeet Singh},
  title        = {{CVFP:} Energy and trust aware data routing protocol based on Competitive
                  Verse Flower Pollination algorithm in IoT},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103035},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103035},
  doi          = {10.1016/J.COSE.2022.103035},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MandaS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaoLCSZQ23,
  author       = {Zhongshu Mao and
                  Yiqin Lu and
                  Zhe Cheng and
                  Xiong Shen and
                  Yang Zhang and
                  Jiancheng Qin},
  title        = {Boosting adversarial attacks with future momentum and future transformation},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103124},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103124},
  doi          = {10.1016/J.COSE.2023.103124},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaoLCSZQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaoQHLTWWY23,
  author       = {Jiaoze Mao and
                  Yaguan Qian and
                  Jianchang Huang and
                  Zejie Lian and
                  Renhui Tao and
                  Bin Wang and
                  Wei Wang and
                  Tengteng Yao},
  title        = {Object-free backdoor attack and defense on semantic segmentation},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103365},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103365},
  doi          = {10.1016/J.COSE.2023.103365},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaoQHLTWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McIntoshKCNW23,
  author       = {Timothy R. McIntosh and
                  A. S. M. Kayes and
                  Yi{-}Ping Phoebe Chen and
                  Alex Ng and
                  Paul A. Watters},
  title        = {Applying staged event-driven access control to combat ransomware},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103160},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103160},
  doi          = {10.1016/J.COSE.2023.103160},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshKCNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McIntoshLSANNW23,
  author       = {Timothy R. McIntosh and
                  Tong Liu and
                  Teo Susnjak and
                  Hooman Alavizadeh and
                  Alex Ng and
                  Raza Nowrozy and
                  Paul A. Watters},
  title        = {Harnessing {GPT-4} for generation of cybersecurity {GRC} policies:
                  {A} focus on ransomware attack mitigation},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103424},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103424},
  doi          = {10.1016/J.COSE.2023.103424},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshLSANNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MeidanBBAS23,
  author       = {Yair Meidan and
                  Daniel Benatar and
                  Ron Bitton and
                  Dan Avraham and
                  Asaf Shabtai},
  title        = {D-Score: An expert-based method for assessing the detectability of
                  IoT-related cyber-attacks},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103073},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103073},
  doi          = {10.1016/J.COSE.2022.103073},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MeidanBBAS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MengLQ0YZ23,
  author       = {Shunmei Meng and
                  Qianmu Li and
                  Lianyong Qi and
                  Xiaolong Xu and
                  Rui Yuan and
                  Xuyun Zhang},
  title        = {An intelligent recommendation method based on multi-interest network
                  and adversarial deep learning},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103264},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103264},
  doi          = {10.1016/J.COSE.2023.103264},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MengLQ0YZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MiculanV23,
  author       = {Marino Miculan and
                  Nicola Vitacolonna},
  title        = {Automated verification of Telegram's MTProto 2.0 in the symbolic model},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103072},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103072},
  doi          = {10.1016/J.COSE.2022.103072},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MiculanV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MillsWL23,
  author       = {Alan Mills and
                  Jonathan White and
                  Phil Legg},
  title        = {Longitudinal risk-based security assessment of docker software container
                  images},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103478},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103478},
  doi          = {10.1016/J.COSE.2023.103478},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MillsWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MinnaM23,
  author       = {Francesco Minna and
                  Fabio Massacci},
  title        = {SoK: Run-time security for cloud microservices. Are we there yet?},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103119},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103119},
  doi          = {10.1016/J.COSE.2023.103119},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MinnaM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MirskyDKSGYZPLE23,
  author       = {Yisroel Mirsky and
                  Ambra Demontis and
                  Jaidip Kotak and
                  Ram Shankar and
                  Gelei Deng and
                  Liu Yang and
                  Xiangyu Zhang and
                  Maura Pintor and
                  Wenke Lee and
                  Yuval Elovici and
                  Battista Biggio},
  title        = {The Threat of Offensive {AI} to Organizations},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103006},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103006},
  doi          = {10.1016/J.COSE.2022.103006},
  timestamp    = {Mon, 04 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MirskyDKSGYZPLE23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MitsevaAP23,
  author       = {Asya Mitseva and
                  Marharyta Aleksandrova and
                  Andriy Panchenko},
  title        = {Security and performance implications of {BGP} rerouting-resistant
                  guard selection algorithms for Tor},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103374},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103374},
  doi          = {10.1016/J.COSE.2023.103374},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MitsevaAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohammedARSB23,
  author       = {Abubakar Sadiq Mohammed and
                  Eirini Anthi and
                  Omer F. Rana and
                  Neetesh Saxena and
                  Pete Burnap},
  title        = {Detection and mitigation of field flooding attacks on oil and gas
                  critical infrastructure communication},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103007},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103007},
  doi          = {10.1016/J.COSE.2022.103007},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/MohammedARSB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Molina-Coronado23,
  author       = {Borja Molina{-}Coronado and
                  Usue Mori and
                  Alexander Mendiburu and
                  Jos{\'{e}} Miguel{-}Alonso},
  title        = {Towards a fair comparison and realistic evaluation framework of android
                  malware detectors based on static analysis and machine learning},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102996},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102996},
  doi          = {10.1016/J.COSE.2022.102996},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Molina-Coronado23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MollaeefarR23,
  author       = {Majid Mollaeefar and
                  Silvio Ranise},
  title        = {Identifying and quantifying trade-offs in multi-stakeholder risk evaluation
                  with applications to the data protection impact assessment of the
                  {GDPR}},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103206},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103206},
  doi          = {10.1016/J.COSE.2023.103206},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MollaeefarR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MoreiraMS23,
  author       = {Caio C. Moreira and
                  Davi C. Moreira and
                  Claudomiro de S. de Sales Jr.},
  title        = {Improving ransomware detection based on portable executable header
                  using xception convolutional neural network},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103265},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103265},
  doi          = {10.1016/J.COSE.2023.103265},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MoreiraMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MottTNMSCC23,
  author       = {Gareth Mott and
                  Sarah Turner and
                  Jason R. C. Nurse and
                  Jamie MacColl and
                  James Sullivan and
                  Anna Cartwright and
                  Edward J. Cartwright},
  title        = {Between a rock and a hard(ening) place: Cyber insurance in the ransomware
                  era},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103162},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103162},
  doi          = {10.1016/J.COSE.2023.103162},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MottTNMSCC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MouraLMPC23,
  author       = {Ricardo Moura and
                  Ricardo Lopes and
                  David R. Matos and
                  Miguel L. Pardal and
                  Miguel Correia},
  title        = {MultiTLS: using multiple and diverse ciphers for stronger secure channels},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103342},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103342},
  doi          = {10.1016/J.COSE.2023.103342},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MouraLMPC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MouratidisIPSI23,
  author       = {Haralambos Mouratidis and
                  Shareeful Islam and
                  Antonio Santos{-}Olmo Parra and
                  Lu{\'{\i}}s Enrique Sanchez and
                  Umar Mukhtar Ismail},
  title        = {Modelling language for cyber security incident handling for critical
                  infrastructures},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103139},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103139},
  doi          = {10.1016/J.COSE.2023.103139},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MouratidisIPSI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MubarkootABEL23,
  author       = {Mohammed Mubarkoot and
                  J{\"{o}}rn Altmann and
                  Morteza Rasti Barzoki and
                  Bernhard Egger and
                  Hyejin Lee},
  title        = {Software Compliance Requirements, Factors, and Policies: {A} Systematic
                  Literature Review},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102985},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102985},
  doi          = {10.1016/J.COSE.2022.102985},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MubarkootABEL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MunozRRL23,
  author       = {Antonio Mu{\~{n}}oz and
                  Ruben Rios and
                  Rodrigo Rom{\'{a}}n and
                  Javier L{\'{o}}pez},
  title        = {A survey on the (in)security of trusted execution environments},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103180},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103180},
  doi          = {10.1016/J.COSE.2023.103180},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MunozRRL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MunsingerBR23,
  author       = {Brita Munsinger and
                  Nicole Beebe and
                  Turquoise Richardson},
  title        = {Virtual reality for improving cyber situational awareness in security
                  operations centers},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103368},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103368},
  doi          = {10.1016/J.COSE.2023.103368},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MunsingerBR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MustaphaKZCFFA23,
  author       = {Ali Mustapha and
                  Rida Khatoun and
                  Sherali Zeadally and
                  Fadlallah Chbib and
                  Ahmad Fadlallah and
                  Walid Fahs and
                  Ali El Attar},
  title        = {Detecting DDoS attacks using adversarial neural network},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103117},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103117},
  doi          = {10.1016/J.COSE.2023.103117},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MustaphaKZCFFA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaqviPFMOP23,
  author       = {Bilal Naqvi and
                  Kseniia Perova and
                  Ali Farooq and
                  Imran Makhdoom and
                  Shola Oyedeji and
                  Jari Porras},
  title        = {Mitigation strategies against the phishing attacks: {A} systematic
                  literature review},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103387},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103387},
  doi          = {10.1016/J.COSE.2023.103387},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NaqviPFMOP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaseerNAMS23,
  author       = {Ayesha Naseer and
                  Humza Naseer and
                  Atif Ahmad and
                  Sean B. Maynard and
                  Adil Masood Siddiqui},
  title        = {Moving towards agile cybersecurity incident response: {A} case study
                  exploring the enabling role of big data analytics-embedded dynamic
                  capabilities},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103525},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103525},
  doi          = {10.1016/J.COSE.2023.103525},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NasirAK23,
  author       = {Muhammad Hassan Nasir and
                  Junaid Arshad and
                  Muhammad Mubashir Khan},
  title        = {Collaborative device-level botnet detection for internet of things},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103172},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103172},
  doi          = {10.1016/J.COSE.2023.103172},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NasirAK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NayfehLSDK23,
  author       = {Mohammad Nayfeh and
                  Yuchen Li and
                  Khair Al Shamaileh and
                  Vijay Kumar Devabhaktuni and
                  Naima Kaabouch},
  title        = {Machine Learning Modeling of {GPS} Features with Applications to {UAV}
                  Location Spoofing Detection and Classification},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103085},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103085},
  doi          = {10.1016/J.COSE.2022.103085},
  timestamp    = {Thu, 17 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NayfehLSDK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NgwobiaRKK23,
  author       = {Sunday Cosmos Ngwobia and
                  Anca L. Ralescu and
                  David Kapp and
                  Temesgen Kebede},
  title        = {Detection of malicious {PE} files using synthesized {DNA} artifacts},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103457},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103457},
  doi          = {10.1016/J.COSE.2023.103457},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NgwobiaRKK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiakanlahijiOVJ23,
  author       = {Amirreza Niakanlahiji and
                  Soeren Orlowski and
                  Alireza Vahid and
                  Jafar Haadi Jafarian},
  title        = {Toward practical defense against traffic analysis attacks on encrypted
                  {DNS} traffic},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103001},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103001},
  doi          = {10.1016/J.COSE.2022.103001},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiakanlahijiOVJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NicheliniPLCZ23,
  author       = {Alessandro Nichelini and
                  Carlo Alberto Pozzoli and
                  Stefano Longari and
                  Michele Carminati and
                  Stefano Zanero},
  title        = {CANova: {A} hybrid intrusion detection framework based on automatic
                  signal classification for {CAN}},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103166},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103166},
  doi          = {10.1016/J.COSE.2023.103166},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NicheliniPLCZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NieCWZCS23,
  author       = {Xiaofan Nie and
                  Liwei Chen and
                  Haolai Wei and
                  Yuantong Zhang and
                  Ningning Cui and
                  Gang Shi},
  title        = {{KPDFI:} Efficient data flow integrity based on key property against
                  data corruption attack},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103183},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103183},
  doi          = {10.1016/J.COSE.2023.103183},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NieCWZCS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NirmalapriyaMLN23,
  author       = {G. Nirmalapriya and
                  Balajee Maram and
                  Ramanathan Lakshmanan and
                  M. Navaneethakrishnan},
  title        = {ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep
                  learning networks for digital image forgery detection},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103155},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103155},
  doi          = {10.1016/J.COSE.2023.103155},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NirmalapriyaMLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiuGXWKH23,
  author       = {Zequn Niu and
                  Wenjie Guo and
                  Jingfeng Xue and
                  Yong Wang and
                  Zixiao Kong and
                  Lu Huang},
  title        = {A novel anomaly detection approach based on ensemble semi-supervised
                  active learning {(ADESSA)}},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103190},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103190},
  doi          = {10.1016/J.COSE.2023.103190},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiuGXWKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NovkovicG23,
  author       = {Bojan Novkovic and
                  Marin Golub},
  title        = {Improving monolithic kernel security and robustness through intra-kernel
                  sandboxing},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103104},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103104},
  doi          = {10.1016/J.COSE.2023.103104},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NovkovicG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NwankpaD23,
  author       = {Joseph K. Nwankpa and
                  Pratim Milton Datta},
  title        = {Remote vigilance: The roles of cyber awareness and cybersecurity policies
                  among remote workers},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103266},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103266},
  doi          = {10.1016/J.COSE.2023.103266},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NwankpaD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OdeleyeLHSPS23,
  author       = {Blessing Odeleye and
                  George Loukas and
                  Ryan Heartfield and
                  Georgia Sakellari and
                  Emmanouil Panaousis and
                  Fotios Spyridonis},
  title        = {Virtually secure: {A} taxonomic assessment of cybersecurity challenges
                  in virtual reality environments},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102951},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102951},
  doi          = {10.1016/J.COSE.2022.102951},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OdeleyeLHSPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OfteK23,
  author       = {H{\aa}vard Jakobsen Ofte and
                  Sokratis K. Katsikas},
  title        = {Understanding situation awareness in SOCs, a systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103069},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103069},
  doi          = {10.1016/J.COSE.2022.103069},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OfteK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OgbanufeCB23,
  author       = {Obi Ogbanufe and
                  Robert E. Crossler and
                  David Biros},
  title        = {The valued coexistence of protection motivation and stewardship in
                  information security behaviors},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102960},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102960},
  doi          = {10.1016/J.COSE.2022.102960},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OgbanufeCB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OgbanufeG23,
  author       = {Obi Ogbanufe and
                  Ling Ge},
  title        = {A comparative evaluation of behavioral security motives: Protection,
                  intrinsic, and identity motivations},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103136},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103136},
  doi          = {10.1016/J.COSE.2023.103136},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OgbanufeG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OkeyURRK23,
  author       = {Ogobuchi Daniel Okey and
                  Ekikere Umoren Udo and
                  Renata Lopes Rosa and
                  Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez and
                  Jo{\~{a}}o Henrique Kleinschmidt},
  title        = {Investigating ChatGPT and cybersecurity: {A} perspective on topic
                  modeling and sentiment analysis},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103476},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103476},
  doi          = {10.1016/J.COSE.2023.103476},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/OkeyURRK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OlimpioCMF23,
  author       = {Gilberto Olimpio and
                  L{\'{a}}saro J. Camargos and
                  Rodrigo Sanches Miani and
                  Elaine Ribeiro de Faria},
  title        = {Model update for intrusion detection: Analyzing the performance of
                  delayed labeling and active learning strategies},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103451},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103451},
  doi          = {10.1016/J.COSE.2023.103451},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OlimpioCMF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PamiesEstremsG23,
  author       = {David P{\`{a}}mies{-}Estrems and
                  Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro},
  title        = {On the self-adjustment of privacy safeguards for query log streams},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103450},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103450},
  doi          = {10.1016/J.COSE.2023.103450},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PamiesEstremsG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PandeyVARV23,
  author       = {Bishwajeet K. Pandey and
                  M. R. M. VeeraManickam and
                  Shabeer Ahmad and
                  Ciro Rodriguez Rodriguez and
                  Doris Esenarro Vargas},
  title        = {ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based
                  Deep maxout network for intrusion detection using big data in cloud
                  computing framework},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102975},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102975},
  doi          = {10.1016/J.COSE.2022.102975},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PandeyVARV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PangLWGMX23,
  author       = {Chengbin Pang and
                  Hongbin Liu and
                  Yifan Wang and
                  Neil Zhenqiang Gong and
                  Bing Mao and
                  Jun Xu},
  title        = {Generation-based fuzzing? Don't build a new generator, reuse!},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103178},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103178},
  doi          = {10.1016/J.COSE.2023.103178},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PangLWGMX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkJL23,
  author       = {Sung Bum Park and
                  Hyo Jin Jo and
                  Dong Hoon Lee},
  title        = {Flooding attack mitigator for in-vehicle {CAN} using fault confinement
                  in {CAN} protocol},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103091},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103091},
  doi          = {10.1016/J.COSE.2023.103091},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkRPJ23,
  author       = {Ah{-}hyun Park and
                  Hyejin Ryu and
                  Woobeen Park and
                  Doowon Jeong},
  title        = {Forensic investigation framework for cryptocurrency wallet in the
                  end device},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103392},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103392},
  doi          = {10.1016/J.COSE.2023.103392},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkRPJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PasikhaniCG23,
  author       = {Aryan Mohammadi Pasikhani and
                  John A. Clark and
                  Prosanta Gope},
  title        = {Incremental hybrid intrusion detection for 6LoWPAN},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103447},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103447},
  doi          = {10.1016/J.COSE.2023.103447},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PattersonNF23,
  author       = {Clare M. Patterson and
                  Jason R. C. Nurse and
                  Virginia N. L. Franqueira},
  title        = {Learning from cyber security incidents: {A} systematic review and
                  future research agenda},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103309},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103309},
  doi          = {10.1016/J.COSE.2023.103309},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PattersonNF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PattnaikLN23,
  author       = {Nandita Pattnaik and
                  Shujun Li and
                  Jason R. C. Nurse},
  title        = {Perspectives of non-expert users on cyber security and privacy: An
                  analysis of online discussions on twitter},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103008},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103008},
  doi          = {10.1016/J.COSE.2022.103008},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PattnaikLN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Pirca023,
  author       = {Ana Maria Pirca and
                  Harjinder Singh Lallie},
  title        = {An empirical evaluation of the effectiveness of attack graphs and
                  {MITRE} ATT{\&}CK matrices in aiding cyber attack perception amongst
                  decision-makers},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103254},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103254},
  doi          = {10.1016/J.COSE.2023.103254},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Pirca023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PlappertLEJFH23,
  author       = {Christian Plappert and
                  Dominik Lorych and
                  Michael Eckel and
                  Lukas J{\"{a}}ger and
                  Andreas Fuchs and
                  Ronald Heddergott},
  title        = {Evaluating the applicability of hardware trust anchors for automotive
                  applications},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103514},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103514},
  doi          = {10.1016/J.COSE.2023.103514},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PlappertLEJFH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PohnGZB23,
  author       = {Daniela P{\"{o}}hn and
                  Nils Gruschka and
                  Leonhard Ziegler and
                  Andre B{\"{u}}ttner},
  title        = {A framework for analyzing authentication risks in account networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103515},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103515},
  doi          = {10.1016/J.COSE.2023.103515},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PohnGZB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PourNFB23,
  author       = {Morteza Safaei Pour and
                  Christelle Nader and
                  Kurt Friday and
                  Elias Bou{-}Harb},
  title        = {A Comprehensive Survey of Recent Internet Measurement Techniques for
                  Cyber Security},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103123},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103123},
  doi          = {10.1016/J.COSE.2023.103123},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PourNFB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PreuveneersJ23,
  author       = {Davy Preuveneers and
                  Wouter Joosen},
  title        = {Privacy-preserving correlation of cross-organizational cyber threat
                  intelligence with private graph intersections},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103505},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103505},
  doi          = {10.1016/J.COSE.2023.103505},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/PreuveneersJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QamarAA23,
  author       = {Sara Qamar and
                  Zahid Anwar and
                  Mehreen Afzal},
  title        = {A systematic threat analysis and defense strategies for the metaverse
                  and extended reality systems},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103127},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103127},
  doi          = {10.1016/J.COSE.2023.103127},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QamarAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiaoMZWCXL23,
  author       = {Tong Qiao and
                  Yuyan Ma and
                  Ning Zheng and
                  Hanzhou Wu and
                  Yanli Chen and
                  Ming Xu and
                  Xiangyang Luo},
  title        = {A novel model watermarking for protecting generative adversarial network},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103102},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103102},
  doi          = {10.1016/J.COSE.2023.103102},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiaoMZWCXL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QinPLZCZS23,
  author       = {Chuan Qin and
                  Jiaqian Peng and
                  Puzhuo Liu and
                  Yaowen Zheng and
                  Kai Cheng and
                  Weidong Zhang and
                  Limin Sun},
  title        = {{UCRF:} Static analyzing firmware to generate under-constrained seed
                  for fuzzing {SOHO} router},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103157},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103157},
  doi          = {10.1016/J.COSE.2023.103157},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QinPLZCZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QinZP23,
  author       = {Yingxin Qin and
                  Kejia Zhang and
                  Haiwei Pan},
  title        = {Adversarial attack for object detectors under complex conditions},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103460},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103460},
  doi          = {10.1016/J.COSE.2023.103460},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QinZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuXS23,
  author       = {Leilei Qu and
                  Ruojin Xiao and
                  Wenchang Shi},
  title        = {Interactions of Framing and Timing in Nudging Online Game Security},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102962},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102962},
  doi          = {10.1016/J.COSE.2022.102962},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QuXS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuanWLL23,
  author       = {Hanyu Quan and
                  Boyang Wang and
                  Ming Li and
                  Iraklis Leontiadis},
  title        = {FastReach: {A} system for privacy-preserving reachability queries
                  over location data},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103513},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103513},
  doi          = {10.1016/J.COSE.2023.103513},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/QuanWLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RacheracheSSD23,
  author       = {Badis Racherache and
                  Paria Shirani and
                  Andrei Soeanu and
                  Mourad Debbabi},
  title        = {{CPID:} Insider threat detection using profiling and cyber-persona
                  identification},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103350},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103350},
  doi          = {10.1016/J.COSE.2023.103350},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RacheracheSSD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RajashreeSSS23,
  author       = {Harine Rajashree and
                  K. Sundarakantham and
                  E. Sivasankar and
                  Mercy Shalinie Selvaraj},
  title        = {A hybrid deep learning framework for privacy preservation in edge
                  computing},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103209},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103209},
  doi          = {10.1016/J.COSE.2023.103209},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RajashreeSSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RaoCA23,
  author       = {Siddharth Prakash Rao and
                  Hsin Yi Chen and
                  Tuomas Aura},
  title        = {Threat modeling framework for mobile communication systems},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103047},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103047},
  doi          = {10.1016/J.COSE.2022.103047},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RaoCA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RashidS23,
  author       = {Aqib Rashid and
                  Jose M. Such},
  title        = {StratDef: Strategic defense against adversarial attacks in ML-based
                  malware detection},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103459},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103459},
  doi          = {10.1016/J.COSE.2023.103459},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RashidS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassKWVP23,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Jasmin Wachter and
                  V{\'{\i}}ctor Mayoral Vilches and
                  Emmanouil Panaousis},
  title        = {Game-theoretic {APT} defense: An experimental study on robotics},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103328},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103328},
  doi          = {10.1016/J.COSE.2023.103328},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassKWVP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RayDowlingHS23,
  author       = {Aratrika Ray{-}Dowling and
                  Daqing Hou and
                  Stephanie Schuckers},
  title        = {Stationary mobile behavioral biometrics: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103184},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103184},
  doi          = {10.1016/J.COSE.2023.103184},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RayDowlingHS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ReevesCD23,
  author       = {Andrew Reeves and
                  Dragana Calic and
                  Paul H. Delfabbro},
  title        = {"Generic and unusable"\({}^{\mbox{1}}\): Understanding employee perceptions
                  of cybersecurity training and measuring advice fatigue},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103137},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103137},
  doi          = {10.1016/J.COSE.2023.103137},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ReevesCD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ren0LLZS23,
  author       = {Yimo Ren and
                  Hong Li and
                  Peipei Liu and
                  Jie Liu and
                  Hongsong Zhu and
                  Limin Sun},
  title        = {{CL-GAN:} {A} GAN-based continual learning model for generating and
                  detecting AGDs},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103317},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103317},
  doi          = {10.1016/J.COSE.2023.103317},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ren0LLZS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenaudD23,
  author       = {Karen Renaud and
                  Marc J. Dupuis},
  title        = {Cybersecurity Insights Gleaned from World Religions},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103326},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103326},
  doi          = {10.1016/J.COSE.2023.103326},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenaudD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RenaudSM23,
  author       = {Karen Renaud and
                  Karl van der Schyff and
                  Stuart MacDonald},
  title        = {Would {US} citizens accept cybersecurity deresponsibilization? Perhaps
                  not},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103301},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103301},
  doi          = {10.1016/J.COSE.2023.103301},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RenaudSM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RendonSegadorAV23,
  author       = {Fernando J. Rend{\'{o}}n{-}Segador and
                  Juan Antonio {\'{A}}lvarez{-}Garc{\'{\i}}a and
                  {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca},
  title        = {Paying attention to cyber-attacks: {A} multi-layer perceptron with
                  self-attention mechanism},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103318},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103318},
  doi          = {10.1016/J.COSE.2023.103318},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RendonSegadorAV23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Repetto23,
  author       = {Matteo Repetto},
  title        = {Adaptive monitoring, detection, and response for agile digital service
                  chains},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103343},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103343},
  doi          = {10.1016/J.COSE.2023.103343},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Repetto23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RibeiroFS23,
  author       = {Marcos Aur{\'{e}}lio Ribeiro and
                  Mauro Sergio Pereira Fonseca and
                  Juliana de Santi},
  title        = {Detecting and mitigating DDoS attacks with moving target defense approach
                  based on automated flow classification in {SDN} networks},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103462},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103462},
  doi          = {10.1016/J.COSE.2023.103462},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RibeiroFS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RigakiG23,
  author       = {Maria Rigaki and
                  Sebastian Garc{\'{\i}}a},
  title        = {Stealing and evading malware classifiers and antivirus at low false
                  positive conditions},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103192},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103192},
  doi          = {10.1016/J.COSE.2023.103192},
  timestamp    = {Wed, 17 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RigakiG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RizviZTFCFH23,
  author       = {Syed Rizvi and
                  Tatiana Zwerling and
                  Benjamin Thompson and
                  Shawn Faiola and
                  Shakir Campbell and
                  Stephen Fisanick and
                  Codi Hutnick},
  title        = {A modular framework for auditing IoT devices and networks},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103327},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103327},
  doi          = {10.1016/J.COSE.2023.103327},
  timestamp    = {Wed, 06 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RizviZTFCFH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RoblesGonzalezCP23,
  author       = {Antonio Robles{-}Gonz{\'{a}}lez and
                  Patricia Arias Cabarcos and
                  Javier Parra{-}Arnau},
  title        = {Privacy-centered authentication: {A} new framework and analysis},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103353},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103353},
  doi          = {10.1016/J.COSE.2023.103353},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RoblesGonzalezCP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RodriguezMMP23,
  author       = {Ricardo J. Rodr{\'{\i}}guez and
                  Stefano Marrone and
                  Ibai Marcos and
                  Giuseppe Porzio},
  title        = {{MOSTO:} {A} toolkit to facilitate security auditing of {ICS} devices
                  using Modbus/TCP},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103373},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103373},
  doi          = {10.1016/J.COSE.2023.103373},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RodriguezMMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RomdhanaMCT23,
  author       = {Andrea Romdhana and
                  Alessio Merlo and
                  Mariano Ceccato and
                  Paolo Tonella},
  title        = {Assessing the security of inter-app communications in android through
                  reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103311},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103311},
  doi          = {10.1016/J.COSE.2023.103311},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RostamipoorGP23,
  author       = {Maryam Rostamipoor and
                  Seyedhamed Ghavamnia and
                  Michalis Polychronakis},
  title        = {Confine: Fine-grained system call filtering for container attack surface
                  reduction},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103325},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103325},
  doi          = {10.1016/J.COSE.2023.103325},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RostamipoorGP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RustNguyenSS23,
  author       = {Nhien Rust{-}Nguyen and
                  Shruti Sharma and
                  Mark Stamp},
  title        = {Darknet traffic classification and adversarial attacks using machine
                  learning},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103098},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103098},
  doi          = {10.1016/J.COSE.2023.103098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RustNguyenSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SSK23,
  author       = {Devi Priya V. S and
                  Sibi Chakkaravarthy Sethuraman and
                  Muhammad Khurram Khan},
  title        = {Container security: Precaution levels, mitigation strategies, and
                  research perspectives},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103490},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103490},
  doi          = {10.1016/J.COSE.2023.103490},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SahayEMJB23,
  author       = {Rishikesh Sahay and
                  Daniel A. Sepulveda Estay and
                  Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Michael Bruhn Barfod},
  title        = {A comparative risk analysis on CyberShip system with STPA-Sec, {STRIDE}
                  and {CORAS}},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103179},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103179},
  doi          = {10.1016/J.COSE.2023.103179},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SahayEMJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SalehAS023,
  author       = {Mariam M. Saleh and
                  Muhanned AlSlaiman and
                  Mohammed I. Salman and
                  Bin Wang},
  title        = {Combining raw data and engineered features for optimizing encrypted
                  and compressed internet of things traffic classification},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103287},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103287},
  doi          = {10.1016/J.COSE.2023.103287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SalehAS023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SanchezGarciaGC23,
  author       = {Isaac Daniel Sanchez{-}Garcia and
                  Tom{\'{a}}s San Feliu Gilabert and
                  Jos{\'{e}} Antonio Calvo{-}Manzano},
  title        = {Countermeasures and their taxonomies for risk treatment in cybersecurity:
                  {A} systematic mapping review},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103170},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103170},
  doi          = {10.1016/J.COSE.2023.103170},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SanchezGarciaGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SangY0LC23,
  author       = {Yafei Sang and
                  Jisong Yang and
                  Yongzheng Zhang and
                  Shuhao Li and
                  Peng Chang},
  title        = {Toward IoT device fingerprinting from proprietary protocol traffic
                  via key-blocks aware approach},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103145},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103145},
  doi          = {10.1016/J.COSE.2023.103145},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SangY0LC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SanoussiCOH23,
  author       = {Nouhad Sanoussi and
                  Kaouthar Chetioui and
                  Ghizlane Orhanou and
                  Said El Hajji},
  title        = {{ITC:} Intrusion tolerant controller for multicontroller {SDN} architecture},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103351},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103351},
  doi          = {10.1016/J.COSE.2023.103351},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SanoussiCOH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SantosVST23,
  author       = {Roger Robson dos Santos and
                  Eduardo K. Viegas and
                  Altair O. Santin and
                  Pietro Tedeschi},
  title        = {Federated learning for reliable model updates in network-based intrusion
                  detection},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103413},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103413},
  doi          = {10.1016/J.COSE.2023.103413},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SantosVST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SaqibM23,
  author       = {Manasha Saqib and
                  Ayaz Hassan Moon},
  title        = {A Systematic Security Assessment and Review of Internet of Things
                  in the Context of Authentication},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103053},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103053},
  doi          = {10.1016/J.COSE.2022.103053},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SaqibM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SarikayaKD23,
  author       = {Alper Sarikaya and
                  Banu G{\"{u}}nel Kili{\c{c}} and
                  Mehmet Demirci},
  title        = {{RAIDS:} Robust autoencoder-based intrusion detection system model
                  against adversarial attacks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103483},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103483},
  doi          = {10.1016/J.COSE.2023.103483},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SarikayaKD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SartayevaC23,
  author       = {Yerkezhan Sartayeva and
                  Henry C. B. Chan},
  title        = {A survey on indoor positioning security and privacy},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103293},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103293},
  doi          = {10.1016/J.COSE.2023.103293},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SartayevaC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchuckertKL23,
  author       = {Felix Schuckert and
                  Basel Katt and
                  Hanno Langweg},
  title        = {Insecurity Refactoring: Automated Injection of Vulnerabilities in
                  Source Code},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103121},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103121},
  doi          = {10.1016/J.COSE.2023.103121},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchuckertKL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchyffF23,
  author       = {Karl van der Schyff and
                  Stephen Flowerday},
  title        = {The mediating role of perceived risks and benefits when self-disclosing:
                  {A} study of social media trust and FoMO},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103071},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103071},
  doi          = {10.1016/J.COSE.2022.103071},
  timestamp    = {Wed, 21 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchyffF23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaikhS23,
  author       = {Faheem Ahmed Shaikh and
                  Mikko T. Siponen},
  title        = {Information security risk assessments following cybersecurity breaches:
                  The mediating role of top management attention to cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102974},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102974},
  doi          = {10.1016/J.COSE.2022.102974},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaikhS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShajiJMP23,
  author       = {Neena Susan Shaji and
                  Tanushree Jain and
                  Raja Muthalagu and
                  Pranav Mothabhau Pawar},
  title        = {Deep-discovery: Anomaly discovery in software-defined networks using
                  artificial neural networks},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103320},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103320},
  doi          = {10.1016/J.COSE.2023.103320},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShajiJMP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShakedCBM23,
  author       = {Avi Shaked and
                  Yulia Cherdantseva and
                  Pete Burnap and
                  Peter Maynard},
  title        = {Operations-informed incident response playbooks},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103454},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103454},
  doi          = {10.1016/J.COSE.2023.103454},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShakedCBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharifB23,
  author       = {Dyari Mohammad Sharif and
                  Hakem Beitollahi},
  title        = {Detection of application-layer DDoS attacks using machine learning
                  and genetic algorithms},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103511},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103511},
  doi          = {10.1016/J.COSE.2023.103511},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SharifB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaSC23,
  author       = {Shreyansh Sharma and
                  Anil K. Saini and
                  Santanu Chaudhury},
  title        = {A survey on biometric cryptosystems and their applications},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103458},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103458},
  doi          = {10.1016/J.COSE.2023.103458},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaSC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaSN23,
  author       = {Abhishek Sharma and
                  Sangeeta Sabharwal and
                  Sushama Nagpal},
  title        = {A hybrid scoring system for prioritization of software vulnerabilities},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103256},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103256},
  doi          = {10.1016/J.COSE.2023.103256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaSN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShvartzmanOZSOMGO23,
  author       = {Oren Shvartzman and
                  Adar Ovadya and
                  Kfir Zvi and
                  Omer Shwartz and
                  Rom Ogen and
                  Yakov Mallah and
                  Niv Gilboa and
                  Yossi Oren},
  title        = {Characterization and Detection of Cross-Router Covert Channels},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103125},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103125},
  doi          = {10.1016/J.COSE.2023.103125},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShvartzmanOZSOMGO23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Silva23,
  author       = {Joseph Da Silva},
  title        = {Protection, expertise and domination: Cyber masculinity in practice},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103408},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103408},
  doi          = {10.1016/J.COSE.2023.103408},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Silva23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SingamPABN23,
  author       = {Sai Bala Subrahmanyam Singam and
                  Goutham Pooloth and
                  Vasanth Kumar Reddy Ambati and
                  C. V. Bijitha and
                  Hiran V. Nath},
  title        = {A hybrid method for analysis and detection of malicious executables
                  in IoT network},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103339},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103339},
  doi          = {10.1016/J.COSE.2023.103339},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SingamPABN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinghARG23,
  author       = {Kuldeep Singh and
                  Palvi Aggarwal and
                  Prashanth Rajivan and
                  Cleotilde Gonzalez},
  title        = {Cognitive elements of learning and discriminability in anti-phishing
                  training},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103105},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103105},
  doi          = {10.1016/J.COSE.2023.103105},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinghARG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SongGY23,
  author       = {Yunjiao Song and
                  Xinrui Ge and
                  Jia Yu},
  title        = {Privacy-preserving reachability query over graphs with result verifiability},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103092},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103092},
  doi          = {10.1016/J.COSE.2023.103092},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SongGY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SoremekunUC23,
  author       = {Ezekiel O. Soremekun and
                  Sakshi Udeshi and
                  Sudipta Chattopadhyay},
  title        = {Towards Backdoor Attacks and Defense in Robust Machine Learning Models},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103101},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103101},
  doi          = {10.1016/J.COSE.2023.103101},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SoremekunUC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Spring23,
  author       = {Jonathan M. Spring},
  title        = {An analysis of how many undiscovered vulnerabilities remain in information
                  systems},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103191},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103191},
  doi          = {10.1016/J.COSE.2023.103191},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Spring23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SrijayanthiS23,
  author       = {S. Srijayanthi and
                  T. Sethukarasi},
  title        = {Design of privacy preserving model based on clustering involved anonymization
                  along with feature selection},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103027},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103027},
  doi          = {10.1016/J.COSE.2022.103027},
  timestamp    = {Sun, 19 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SrijayanthiS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SrivastavaSK23,
  author       = {Arpita Srivastava and
                  Ditipriya Sinha and
                  Vikash Kumar},
  title        = {{WCGAN-GP} based synthetic attack data generation with {GA} based
                  feature selection for {IDS}},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103432},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103432},
  doi          = {10.1016/J.COSE.2023.103432},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SrivastavaSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StudiawanGC23,
  author       = {Hudan Studiawan and
                  George Grispos and
                  Kim{-}Kwang Raymond Choo},
  title        = {Unmanned Aerial Vehicle {(UAV)} Forensics: The Good, The Bad, and
                  the Unaddressed},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103340},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103340},
  doi          = {10.1016/J.COSE.2023.103340},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StudiawanGC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/StyliosCTK23,
  author       = {Ioannis Stylios and
                  Sotirios Chatzis and
                  Olga Thanou and
                  Spyros Kokolakis},
  title        = {Continuous authentication with feature-level fusion of touch gestures
                  and keystroke dynamics to solve security and usability issues},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103363},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103363},
  doi          = {10.1016/J.COSE.2023.103363},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/StyliosCTK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunL0X0Y23,
  author       = {Peishuai Sun and
                  Shuhao Li and
                  Jiang Xie and
                  Hongbo Xu and
                  Zhenyu Cheng and
                  Rong Yang},
  title        = {{GPMT:} Generating practical malicious traffic based on adversarial
                  attacks with little prior knowledge},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103257},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103257},
  doi          = {10.1016/J.COSE.2023.103257},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunL0X0Y23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunLDL23,
  author       = {Xuekai Sun and
                  Chunling Liu and
                  Weiyu Dong and
                  Tieming Liu},
  title        = {Improvements to code2vec: Generating path vectors using {RNN}},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103322},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103322},
  doi          = {10.1016/J.COSE.2023.103322},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunLDL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunLL23,
  author       = {Yanan Sun and
                  Hengjian Li and
                  Nianqiang Li},
  title        = {A novel cancelable fingerprint scheme based on random security sampling
                  mechanism and relocation bloom filter},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103021},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103021},
  doi          = {10.1016/J.COSE.2022.103021},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SunLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunOZLWZ23,
  author       = {Hongyu Sun and
                  Guoliang Ou and
                  Ziqiu Zheng and
                  Lei Liao and
                  He Wang and
                  Yuqing Zhang},
  title        = {Inconsistent measurement and incorrect detection of software names
                  in security vulnerability reports},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103477},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103477},
  doi          = {10.1016/J.COSE.2023.103477},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/SunOZLWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TajDiniSKG23,
  author       = {Mahyar Taj Dini and
                  Volodymyr Sokolov and
                  Ievgeniia Kuzminykh and
                  Bogdan Ghita},
  title        = {Brainwave-based authentication using features fusion},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103198},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103198},
  doi          = {10.1016/J.COSE.2023.103198},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TajDiniSKG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TanXHWL23,
  author       = {Xiao Tan and
                  Qi Xie and
                  Lidong Han and
                  Shengbao Wang and
                  Wenhao Liu},
  title        = {Proof of retrievability with flexible designated verification for
                  cloud storage},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103486},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103486},
  doi          = {10.1016/J.COSE.2023.103486},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TanXHWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangDYQ23,
  author       = {Chenghua Tang and
                  Zheng Du and
                  Mengmeng Yang and
                  Baohua Qiang},
  title        = {Android static taint analysis based on multi branch search association},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103186},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103186},
  doi          = {10.1016/J.COSE.2023.103186},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangDYQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangQJLD23,
  author       = {Yonghe Tang and
                  Xuyan Qi and
                  Jing Jing and
                  Chunling Liu and
                  Weiyu Dong},
  title        = {{BHMDC:} {A} byte and hex n-gram based malware detection and classification
                  method},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103118},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103118},
  doi          = {10.1016/J.COSE.2023.103118},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangQJLD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TangXYTZ23,
  author       = {Chaofan Tang and
                  Lijuan Xu and
                  Bo Yang and
                  Yongwei Tang and
                  Dawei Zhao},
  title        = {GRU-Based Interpretable Multivariate Time Series Anomaly Detection
                  in Industrial Control System},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103094},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103094},
  doi          = {10.1016/J.COSE.2023.103094},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TangXYTZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TaoSWWZ23,
  author       = {Wenxin Tao and
                  Xiaohong Su and
                  Jiayuan Wan and
                  Hongwei Wei and
                  Weining Zheng},
  title        = {Vulnerability detection through cross-modal feature enhancement and
                  fusion},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103341},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103341},
  doi          = {10.1016/J.COSE.2023.103341},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TaoSWWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TarwireyiTA23,
  author       = {Paul Tarwireyi and
                  Alfredo Terzoli and
                  Matthew O. Adigun},
  title        = {Using multi-audio feature fusion for android malware detection},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103282},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103282},
  doi          = {10.1016/J.COSE.2023.103282},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TarwireyiTA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TayyabMJHUQ23,
  author       = {Muhammad Tayyab and
                  Mohsen Marjani and
                  N. Z. Jhanjhi and
                  Ibrahim Abaker Targio Hashem and
                  Raja Sher Afgun Usmani and
                  Faizan Qamar},
  title        = {A comprehensive review on deep learning algorithms: Security and privacy
                  issues},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103297},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103297},
  doi          = {10.1016/J.COSE.2023.103297},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TayyabMJHUQ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianJD23,
  author       = {Chuan (Annie) Tian and
                  Matthew L. Jensen and
                  Alexandra Durcikova},
  title        = {Phishing susceptibility across industries: The differential impact
                  of influence techniques},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103487},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103487},
  doi          = {10.1016/J.COSE.2023.103487},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TianJD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianZZWX23,
  author       = {Miao Tian and
                  Yushu Zhang and
                  Youwen Zhu and
                  Liangmin Wang and
                  Yong Xiang},
  title        = {{DIVRS:} Data integrity verification based on ring signature in cloud
                  storage},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103002},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103002},
  doi          = {10.1016/J.COSE.2022.103002},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TianZZWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TrabelsiFJ23,
  author       = {Rahma Trabelsi and
                  Ghofrane Fersi and
                  Mohamed Jmaiel},
  title        = {Access control in Internet of Things: {A} survey},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103472},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103472},
  doi          = {10.1016/J.COSE.2023.103472},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TrabelsiFJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsengC23,
  author       = {Chinyang Henry Tseng and
                  Ya{-}Ting Chang},
  title        = {{EBDM:} Ensemble binary detection models for multi-class wireless
                  intrusion detection based on deep neural network},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103419},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103419},
  doi          = {10.1016/J.COSE.2023.103419},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsengC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TsoupidiTP23,
  author       = {Rodothea{-}Myrsini Tsoupidi and
                  Elena Troubitsyna and
                  Panagiotis Papadimitratos},
  title        = {Thwarting code-reuse and side-channel attacks in embedded systems},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103405},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103405},
  doi          = {10.1016/J.COSE.2023.103405},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TsoupidiTP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TuLS23,
  author       = {Yu Tu and
                  Shuang Liu and
                  Qian Sun},
  title        = {{DNS} tunnelling detection by fusing encoding feature and behavioral
                  feature},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103357},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103357},
  doi          = {10.1016/J.COSE.2023.103357},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TuLS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VerdejoEAM23,
  author       = {Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and
                  Rafael Estepa and
                  Antonio Jose Estepa Alonso and
                  Germ{\'{a}}n Madinabeitia},
  title        = {A critical review of the techniques used for anomaly detection of
                  HTTP-based attacks: taxonomy, limitations and open challenges},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102997},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102997},
  doi          = {10.1016/J.COSE.2022.102997},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/VerdejoEAM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VijayakanthanAA23,
  author       = {Ramyapandian Vijayakanthan and
                  Irfan Ahmed and
                  Aisha I. Ali{-}Gombe},
  title        = {{SWMAT:} Mel-frequency cepstral coefficients-based memory fingerprinting
                  for IoT devices},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103298},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103298},
  doi          = {10.1016/J.COSE.2023.103298},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VijayakanthanAA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Villar-Rodriguez23,
  author       = {Esther Villar{-}Rodriguez and
                  Mar{\'{\i}}a Arostegi P{\'{e}}rez and
                  Ana I. Torre{-}Bastida and
                  Cristina Regueiro Senderos and
                  Juan L{\'{o}}pez{-}de{-}Armentia},
  title        = {Edge intelligence secure frameworks: Current state and future challenges},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103278},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103278},
  doi          = {10.1016/J.COSE.2023.103278},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Villar-Rodriguez23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VimercatiFJLPS23,
  author       = {Sabrina De Capitani di Vimercati and
                  Sara Foresti and
                  Sushil Jajodia and
                  Giovanni Livraga and
                  Stefano Paraboschi and
                  Pierangela Samarati},
  title        = {Distributed query execution under access restrictions},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103056},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103056},
  doi          = {10.1016/J.COSE.2022.103056},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VitorinoPM23,
  author       = {Jo{\~{a}}o Vitorino and
                  Isabel Pra{\c{c}}a and
                  Eva Maia},
  title        = {SoK: Realistic adversarial attacks and defenses for intelligent network
                  intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103433},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103433},
  doi          = {10.1016/J.COSE.2023.103433},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/VitorinoPM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VondracekBCM23,
  author       = {Martin Vondr{\'{a}}cek and
                  Ibrahim M. Baggili and
                  Peter Casey and
                  Mehdi Mekni},
  title        = {Rise of the Metaverse's Immersive Virtual Reality Malware and the
                  Man-in-the-Room Attack {\&} Defenses},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {102923},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102923},
  doi          = {10.1016/J.COSE.2022.102923},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VondracekBCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VrhovecBM23,
  author       = {Simon Vrhovec and
                  Igor Bernik and
                  Blaz Markelj},
  title        = {Explaining information seeking intentions: Insights from a Slovenian
                  social engineering awareness campaign},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103038},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103038},
  doi          = {10.1016/J.COSE.2022.103038},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VrhovecBM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangCPLLLZZ23,
  author       = {Ruipeng Wang and
                  Kaixiang Chen and
                  Zulie Pan and
                  Yuwei Li and
                  Qianyu Li and
                  Yang Li and
                  Min Zhang and
                  Chao Zhang},
  title        = {Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided
                  Exploitable States Exploration},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102995},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102995},
  doi          = {10.1016/J.COSE.2022.102995},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangCPLLLZZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangCWYL23,
  author       = {Yu Wang and
                  Liquan Chen and
                  Ge Wu and
                  Kunliang Yu and
                  Tianyu Lu},
  title        = {Efficient and secure content-based image retrieval with deep neural
                  networks in the mobile cloud computing},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103163},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103163},
  doi          = {10.1016/J.COSE.2023.103163},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangCWYL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangCZW23,
  author       = {Wenpeng Wang and
                  Zhixiang Chen and
                  Ziyang Zheng and
                  Hui Wang},
  title        = {An adaptive fuzzing method based on transformer and protocol similarity
                  mutation},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103197},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103197},
  doi          = {10.1016/J.COSE.2023.103197},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangCZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangDJDLQHMWL23,
  author       = {Qing Wang and
                  Cong Dong and
                  Shijie Jian and
                  Dan Du and
                  Zhigang Lu and
                  Yinhao Qi and
                  Dongxu Han and
                  Xiaobo Ma and
                  Fei Wang and
                  Yuling Liu},
  title        = {{HANDOM:} Heterogeneous Attention Network Model for Malicious Domain
                  Detection},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103059},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103059},
  doi          = {10.1016/J.COSE.2022.103059},
  timestamp    = {Wed, 28 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangDJDLQHMWL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangGRZ23,
  author       = {Qian Wang and
                  Yuying Gao and
                  Jiadong Ren and
                  Bing Zhang},
  title        = {An automatic classification algorithm for software vulnerability based
                  on weighted word vector and fusion neural network},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103070},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103070},
  doi          = {10.1016/J.COSE.2022.103070},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangGRZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangJPHL23,
  author       = {Yan Wang and
                  Peng Jia and
                  Xi Peng and
                  Cheng Huang and
                  Jiayong Liu},
  title        = {BinVulDet: Detecting vulnerability in binary program via decompiled
                  pseudo code and BiLSTM-attention},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103023},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103023},
  doi          = {10.1016/J.COSE.2022.103023},
  timestamp    = {Sun, 31 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangJPHL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangJTWH23,
  author       = {Wei Wang and
                  Songlei Jian and
                  Yusong Tan and
                  Qingbo Wu and
                  Chenlin Huang},
  title        = {Robust unsupervised network intrusion detection with self-supervised
                  masked context reconstruction},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103131},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103131},
  doi          = {10.1016/J.COSE.2023.103131},
  timestamp    = {Tue, 02 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangJTWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLKT23,
  author       = {Xuan Wang and
                  Yaojie Li and
                  Hanieh Javadi Khasraghi and
                  Cherie Courseault Trumbach},
  title        = {The mediating role of security anxiety in internet threat avoidance
                  behavior},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103429},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103429},
  doi          = {10.1016/J.COSE.2023.103429},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLLXQK23,
  author       = {Zhihua Wang and
                  Zhenyu Li and
                  Zeminghui Li and
                  Yingheng Xu and
                  Fazhi Qi and
                  Jinsheng Kong},
  title        = {A low cost and effective multi-instance abnormal driving behavior
                  detection system under edge computing},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103362},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103362},
  doi          = {10.1016/J.COSE.2023.103362},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLLXQK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangMHER23,
  author       = {Han Wang and
                  Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and
                  Muhammad Zaid Hameed and
                  David Eklund and
                  Shahid Raza},
  title        = {SparSFA: Towards robust and communication-efficient peer-to-peer federated
                  learning},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103182},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103182},
  doi          = {10.1016/J.COSE.2023.103182},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangMHER23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangMK23,
  author       = {Hang Wang and
                  David J. Miller and
                  George Kesidis},
  title        = {Anomaly detection of adversarial examples using class-conditional
                  generative adversarial networks},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102956},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102956},
  doi          = {10.1016/J.COSE.2022.102956},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangMK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangMLLWHC23,
  author       = {Leiqi Wang and
                  Xiu Ma and
                  Ning Li and
                  Qiujian Lv and
                  Yan Wang and
                  Weiqing Huang and
                  Haiyan Chen},
  title        = {TGPrint: Attack fingerprint classification on encrypted network traffic
                  based graph convolution attention networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103466},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103466},
  doi          = {10.1016/J.COSE.2023.103466},
  timestamp    = {Mon, 04 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangMLLWHC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangT23,
  author       = {Zihao Wang and
                  Vrizlynn L. L. Thing},
  title        = {Feature mining for encrypted malicious traffic detection with deep
                  learning and other machine learning algorithms},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103143},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103143},
  doi          = {10.1016/J.COSE.2023.103143},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangTL0C23,
  author       = {Han Wang and
                  Zhangguo Tang and
                  Huanzhou Li and
                  Jian Zhang and
                  Cheng Cai},
  title        = {{DDOFM:} Dynamic malicious domain detection method based on feature
                  mining},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103260},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103260},
  doi          = {10.1016/J.COSE.2023.103260},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangTL0C23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangX23,
  author       = {Ruiling Wang and
                  Yakui Xue},
  title        = {Stability analysis and optimal control of worm propagation model with
                  saturated incidence rate},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103063},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103063},
  doi          = {10.1016/J.COSE.2022.103063},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZBKCR23,
  author       = {Qifan Wang and
                  Lei Zhou and
                  Jianli Bai and
                  Yun Sing Koh and
                  Shujie Cui and
                  Giovanni Russello},
  title        = {\emph{HT2ML}: An efficient hybrid framework for privacy-preserving
                  Machine Learning using {HE} and {TEE}},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103509},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103509},
  doi          = {10.1016/J.COSE.2023.103509},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZBKCR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZX23,
  author       = {Yongkang Wang and
                  Di{-}Hua Zhai and
                  Yuanqing Xia},
  title        = {{SCFL:} Mitigating backdoor attacks in federated learning based on
                  {SVD} and clustering},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103414},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103414},
  doi          = {10.1016/J.COSE.2023.103414},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WatsonJB23,
  author       = {Katie Watson and
                  Mike Just and
                  Tessa Berg},
  title        = {A comic-based approach to permission request communication},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102942},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102942},
  doi          = {10.1016/J.COSE.2022.102942},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WatsonJB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeiXD23,
  author       = {Chongbo Wei and
                  Gaogang Xie and
                  Zulong Diao},
  title        = {A lightweight deep learning framework for botnet detecting at the
                  IoT edge},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103195},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103195},
  doi          = {10.1016/J.COSE.2023.103195},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WeiXD23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WeickertJC23,
  author       = {Tobias D. Weickert and
                  Adam N. Joinson and
                  Barnaby Craggs},
  title        = {Is cybersecurity research missing a trick? Integrating insights from
                  the psychology of habit into research and practice},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103130},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103130},
  doi          = {10.1016/J.COSE.2023.103130},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WeickertJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WenK23,
  author       = {Shao{-}Fang Wen and
                  Basel Katt},
  title        = {A quantitative security evaluation and analysis model for web applications
                  based on {OWASP} application security verification standard},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103532},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103532},
  doi          = {10.1016/J.COSE.2023.103532},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WenK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WidelHEJL23,
  author       = {Wojciech Widel and
                  Simon Hacks and
                  Mathias Ekstedt and
                  Pontus Johnson and
                  Robert Lagerstr{\"{o}}m},
  title        = {The meta attack language - a formal description},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103284},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103284},
  doi          = {10.1016/J.COSE.2023.103284},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WidelHEJL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WongCOZ23,
  author       = {Ann Yi Wong and
                  Eyasu Getahun Chekole and
                  Mart{\'{\i}}n Ochoa and
                  Jianying Zhou},
  title        = {On the Security of Containers: Threat Modeling, Attack Analysis, and
                  Mitigation Strategies},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103140},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103140},
  doi          = {10.1016/J.COSE.2023.103140},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WongCOZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuBCTI23,
  author       = {Chia{-}Yi Wu and
                  Tao Ban and
                  Shin{-}Ming Cheng and
                  Takeshi Takahashi and
                  Daisuke Inoue},
  title        = {IoT malware classification based on reinterpreted function-call graphs},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103060},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103060},
  doi          = {10.1016/J.COSE.2022.103060},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WuBCTI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuFLX23,
  author       = {Anbin Wu and
                  Zhiyong Feng and
                  Xiaohong Li and
                  Jianmao Xiao},
  title        = {ZTWeb: Cross site scripting detection based on zero trust},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103434},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103434},
  doi          = {10.1016/J.COSE.2023.103434},
  timestamp    = {Tue, 24 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuFLX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuLZYWFC23,
  author       = {Yinwei Wu and
                  Meijin Li and
                  Qi Zeng and
                  Tao Yang and
                  Junfeng Wang and
                  Zhiyang Fang and
                  Luyu Cheng},
  title        = {DroidRL: Feature selection for android malware detection with reinforcement
                  learning},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103126},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103126},
  doi          = {10.1016/J.COSE.2023.103126},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuLZYWFC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuWLH23,
  author       = {Yuanlu Wu and
                  Yan Wo and
                  Caiyu Li and
                  Guoqiang Han},
  title        = {Learning domain-invariant representation for generalizing face forgery
                  detection},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103280},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103280},
  doi          = {10.1016/J.COSE.2023.103280},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuWLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuZYWZ23,
  author       = {Bolun Wu and
                  Futai Zou and
                  Ping Yi and
                  Yue Wu and
                  Liang Zhang},
  title        = {SlicedLocator: Code vulnerability locator based on sliced dependence
                  graph},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103469},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103469},
  doi          = {10.1016/J.COSE.2023.103469},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuZYWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XingSK23,
  author       = {Ying Xing and
                  Hui Shu and
                  Fei Kang},
  title        = {PeerRemove: An adaptive node removal strategy for {P2P} botnet based
                  on deep reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103129},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103129},
  doi          = {10.1016/J.COSE.2023.103129},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XingSK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XiongLL23,
  author       = {Wen Ding Xiong and
                  Kai Lun Luo and
                  Rui Li},
  title        = {{AIDTF:} Adversarial training framework for network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103141},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103141},
  doi          = {10.1016/J.COSE.2023.103141},
  timestamp    = {Wed, 19 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XiongLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuLGLBCWWLWML23,
  author       = {Guangquan Xu and
                  Wenqing Lei and
                  Lixiao Gong and
                  Jian Liu and
                  Hongpeng Bai and
                  Kai Chen and
                  Ran Wang and
                  Wei Wang and
                  Kaitai Liang and
                  Weizhe Wang and
                  Weizhi Meng and
                  Shaoying Liu},
  title        = {{UAF-GUARD:} Defending the use-after-free exploits via fine-grained
                  memory permission management},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103048},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103048},
  doi          = {10.1016/J.COSE.2022.103048},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XuLGLBCWWLWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuSCBLBLMZ23,
  author       = {Guangquan Xu and
                  Hongfei Shao and
                  Jingyi Cui and
                  Hongpeng Bai and
                  Jiliang Li and
                  Guangdong Bai and
                  Shaoying Liu and
                  Weizhi Meng and
                  Xi Zheng},
  title        = {GenDroid: {A} query-efficient black-box android adversarial attack
                  framework},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103359},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103359},
  doi          = {10.1016/J.COSE.2023.103359},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuSCBLBLMZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YanHY23,
  author       = {Haotian Yan and
                  Haibo Hu and
                  Qingqing Ye},
  title        = {Partial message verification in fog-based industrial Internet of things},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103530},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103530},
  doi          = {10.1016/J.COSE.2023.103530},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YanHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Yang23,
  author       = {Benyuan Yang},
  title        = {Enforcement of separation of duty constraints in attribute-based access
                  control},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103294},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103294},
  doi          = {10.1016/J.COSE.2023.103294},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Yang23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangGCLY23,
  author       = {Wang Yang and
                  Mingzhe Gao and
                  Ligeng Chen and
                  Zhengxuan Liu and
                  Lingyun Ying},
  title        = {RecMaL: Rectify the malware family label via hybrid analysis},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103177},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103177},
  doi          = {10.1016/J.COSE.2023.103177},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangGCLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangHWQZ23,
  author       = {Run Yang and
                  Hui He and
                  Yulong Wang and
                  Yue Qu and
                  Weizhe Zhang},
  title        = {Dependable federated learning for IoT intrusion detection against
                  poisoning attacks},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103381},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103381},
  doi          = {10.1016/J.COSE.2023.103381},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YangHWQZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangL23,
  author       = {Xiaohui Yang and
                  Xiang Li},
  title        = {{ATDAD:} One-class adversarial learning for tabular data anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103449},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103449},
  doi          = {10.1016/J.COSE.2023.103449},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLL23,
  author       = {Guangyi Yang and
                  Xiaoxing Liu and
                  Beixin Li},
  title        = {Anti-money laundering supervision by intelligent algorithm},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103344},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103344},
  doi          = {10.1016/J.COSE.2023.103344},
  timestamp    = {Wed, 23 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangMZWLKSH23,
  author       = {Haitian Yang and
                  Xiang Meng and
                  Xuan Zhao and
                  Yan Wang and
                  Yuejun Liu and
                  Xiaoyu Kang and
                  Jiahui Shen and
                  Weiqing Huang},
  title        = {{CKDAN:} Content and keystroke dual attention networks with pre-trained
                  models for continuous authentication},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103159},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103159},
  doi          = {10.1016/J.COSE.2023.103159},
  timestamp    = {Tue, 10 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangMZWLKSH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YaoLDW23,
  author       = {Lin Yao and
                  Jia Li and
                  Jing Deng and
                  Guowei Wu},
  title        = {Detection of Cache Pollution Attack Based on Federated Learning in
                  Ultra-Dense Network},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {102965},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.102965},
  doi          = {10.1016/J.COSE.2022.102965},
  timestamp    = {Mon, 25 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YaoLDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YeohLSJ23,
  author       = {William Yeoh and
                  Marina Liu and
                  Malcolm Shore and
                  Frank Jiang},
  title        = {Zero trust cybersecurity: Critical success factors and {A} maturity
                  assessment framework},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103412},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103412},
  doi          = {10.1016/J.COSE.2023.103412},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YeohLSJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YinHZ23,
  author       = {Ya Yin and
                  Carol Hsu and
                  Zhongyun Zhou},
  title        = {Employees' in-role and extra-role information security behaviors from
                  the {P-E} fit perspective},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103390},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103390},
  doi          = {10.1016/J.COSE.2023.103390},
  timestamp    = {Fri, 22 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YinHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YousefiK23,
  author       = {Fares Yousefi and
                  Hoshang Kolivand},
  title        = {A robust brain pattern for brain-based authentication methods using
                  deep breath},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103520},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103520},
  doi          = {10.1016/J.COSE.2023.103520},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/YousefiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuCWW23,
  author       = {Chuan Yu and
                  Shuhui Chen and
                  Ziling Wei and
                  Fei Wang},
  title        = {\emph{SecChecker}: Inspecting the security implementation of 5G Commercial
                  Off-The-Shelf {(COTS)} mobile devices},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103361},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103361},
  doi          = {10.1016/J.COSE.2023.103361},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuCWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Yuan0YZ0WG23,
  author       = {Qingjun Yuan and
                  Chang Liu and
                  Wentao Yu and
                  Yuefei Zhu and
                  Gang Xiong and
                  Yongjuan Wang and
                  Gaopeng Gou},
  title        = {BoAu: Malicious traffic detection with noise labels based on boundary
                  augmentation},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103300},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103300},
  doi          = {10.1016/J.COSE.2023.103300},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Yuan0YZ0WG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuanHY23,
  author       = {Yachao Yuan and
                  Yu Huang and
                  Yali Yuan},
  title        = {PrSLoc: Sybil attack detection for localization with private observers
                  using differential privacy},
  journal      = {Comput. Secur.},
  volume       = {131},
  pages        = {103289},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103289},
  doi          = {10.1016/J.COSE.2023.103289},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuanHY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZahoorCAP23,
  author       = {Ehtesham Zahoor and
                  Maryam Chaudhary and
                  Sabina Akhtar and
                  Olivier Perrin},
  title        = {A formal approach for the identification of redundant authorization
                  policies in Kubernetes},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103473},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103473},
  doi          = {10.1016/J.COSE.2023.103473},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZahoorCAP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZakariyyaKA23,
  author       = {Idris Zakariyya and
                  Harsha K. Kalutarage and
                  M. Omar Al{-}Kadri},
  title        = {Towards a robust, effective and resource efficient machine learning
                  technique for IoT security monitoring},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103388},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103388},
  doi          = {10.1016/J.COSE.2023.103388},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZakariyyaKA23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZangGZL23,
  author       = {Xiaodong Zang and
                  Jian Gong and
                  Xinchang Zhang and
                  Guiqing Li},
  title        = {Attack scenario reconstruction via fusing heterogeneous threat intelligence},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103420},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103420},
  doi          = {10.1016/J.COSE.2023.103420},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZangGZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZarinUKH23,
  author       = {Rahat Zarin and
                  Niamat Ullah and
                  Amir Khan and
                  Usa Wannasingha Humphries},
  title        = {A numerical study of a new non-linear fractal fractional mathematical
                  model of malicious codes propagation in wireless sensor networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103484},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103484},
  doi          = {10.1016/J.COSE.2023.103484},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZarinUKH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZengKLJC23,
  author       = {Qingyang Zeng and
                  Mohammad Kavousi and
                  Yinhong Luo and
                  Ling Jin and
                  Yan Chen},
  title        = {Full-stack vulnerability analysis of the cloud-native platform},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103173},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103173},
  doi          = {10.1016/J.COSE.2023.103173},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZengKLJC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Zenitani23,
  author       = {Kengo Zenitani},
  title        = {Attack graph analysis: An explanatory guide},
  journal      = {Comput. Secur.},
  volume       = {126},
  pages        = {103081},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103081},
  doi          = {10.1016/J.COSE.2022.103081},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Zenitani23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhanDHYPG23,
  author       = {Dazhi Zhan and
                  Yexin Duan and
                  Yue Hu and
                  Lujia Yin and
                  Zhisong Pan and
                  Shize Guo},
  title        = {AMGmal: Adaptive mask-guided adversarial attack against malware detection
                  with minimal perturbation},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103103},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103103},
  doi          = {10.1016/J.COSE.2023.103103},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhanDHYPG23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangCLW23,
  author       = {Tianyue Zhang and
                  Wei Chen and
                  Yuxiao Liu and
                  Lifa Wu},
  title        = {An intrusion detection method based on stacked sparse autoencoder
                  and improved gaussian mixture model},
  journal      = {Comput. Secur.},
  volume       = {128},
  pages        = {103144},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103144},
  doi          = {10.1016/J.COSE.2023.103144},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangCLW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJYWK23,
  author       = {Wenfang Zhang and
                  Heng Jiao and
                  Zhuoqun Yan and
                  Xiaomin Wang and
                  Muhammad Khurram Khan},
  title        = {Security analysis and improvement of a public auditing scheme for
                  secure data storage in fog-to-cloud computing},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103019},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103019},
  doi          = {10.1016/J.COSE.2022.103019},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangLCLL23,
  author       = {Guiqi Zhang and
                  Qi Liu and
                  Chenhong Cao and
                  Jiangtao Li and
                  Yufeng Li},
  title        = {Bit scanner: Anomaly detection for in-vehicle {CAN} bus using binary
                  sequence whitelisting},
  journal      = {Comput. Secur.},
  volume       = {134},
  pages        = {103436},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103436},
  doi          = {10.1016/J.COSE.2023.103436},
  timestamp    = {Wed, 20 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangLCLL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangMFLZWT23,
  author       = {Hengwei Zhang and
                  Yan Mi and
                  Yumeng Fu and
                  Xiaohu Liu and
                  Yuchen Zhang and
                  Jindong Wang and
                  Jinglei Tan},
  title        = {Security defense decision method based on potential differential game
                  for complex networks},
  journal      = {Comput. Secur.},
  volume       = {129},
  pages        = {103187},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103187},
  doi          = {10.1016/J.COSE.2023.103187},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangMFLZWT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangMLP23,
  author       = {Yunxiao Zhang and
                  Pasquale Malacaria and
                  George Loukas and
                  Emmanouil Panaousis},
  title        = {{CROSS:} {A} framework for cyber risk optimisation in smart homes},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103250},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103250},
  doi          = {10.1016/J.COSE.2023.103250},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangMLP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangNFHZ23,
  author       = {Dongyue Zhang and
                  Weiwei Ni and
                  Nan Fu and
                  Lihe Hou and
                  Ruyu Zhang},
  title        = {Locally differentially private multi-dimensional data collection via
                  haar transform},
  journal      = {Comput. Secur.},
  volume       = {130},
  pages        = {103291},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103291},
  doi          = {10.1016/J.COSE.2023.103291},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangNFHZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangTKSSKST23,
  author       = {Jie Zhang and
                  Min{-}Yen Tsai and
                  Kotcharat Kitchat and
                  Min{-}Te Sun and
                  Kazuya Sakai and
                  Wei{-}Shinn Ku and
                  Thattapon Surasak and
                  Tipajin Thaipisutikul},
  title        = {A secure annuli {CAPTCHA} system},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103025},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103025},
  doi          = {10.1016/J.COSE.2022.103025},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangTKSSKST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangX23,
  author       = {Chunyong Zhang and
                  Yang Xin},
  title        = {VulGAI: vulnerability detection based on graphs and images},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103501},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103501},
  doi          = {10.1016/J.COSE.2023.103501},
  timestamp    = {Fri, 19 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangZRXC23,
  author       = {Zhiqiu Zhang and
                  Tianqing Zhu and
                  Wei Ren and
                  Ping Xiong and
                  Kim{-}Kwang Raymond Choo},
  title        = {Preserving data privacy in federated learning through large gradient
                  pruning},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103039},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103039},
  doi          = {10.1016/J.COSE.2022.103039},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangZRXC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoHJGL23,
  author       = {Xu Zhao and
                  Guangqiu Huang and
                  Jin Jiang and
                  Ling Gao and
                  Maozhen Li},
  title        = {Corrigendum to 'Research on Lightweight Anomaly Detection of Multimedia
                  Traffic in Edge Computing' Computer {\&} Security, 111(2021) 102463},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103004},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103004},
  doi          = {10.1016/J.COSE.2022.103004},
  timestamp    = {Fri, 20 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoHJGL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoX23,
  author       = {Xueli Zhao and
                  Zhihua Xia},
  title        = {Secure outsourced {NB:} Accurate and efficient privacy-preserving
                  Naive Bayes classification},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103011},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103011},
  doi          = {10.1016/J.COSE.2022.103011},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoYJWM23,
  author       = {Xiaoyun Zhao and
                  Chao Yang and
                  Zhizhuang Jia and
                  Yue Wang and
                  Jianfeng Ma},
  title        = {{FCEVAL:} An effective and quantitative platform for evaluating fuzzer
                  combinations fairly and easily},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103354},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103354},
  doi          = {10.1016/J.COSE.2023.103354},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoYJWM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengCSMYY23,
  author       = {Haibin Zheng and
                  Jinyin Chen and
                  Wenchang Shangguan and
                  Zhaoyan Ming and
                  Xing Yang and
                  Zhijun Yang},
  title        = {{GONE:} {A} generic {O(1)} NoisE layer for protecting privacy of deep
                  neural networks},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103471},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103471},
  doi          = {10.1016/J.COSE.2023.103471},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengCSMYY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengLCDZL23,
  author       = {Haibin Zheng and
                  Xiaohao Li and
                  Jinyin Chen and
                  Jianfeng Dong and
                  Yan Zhang and
                  Changting Lin},
  title        = {One4All: Manipulate one agent to poison the cooperative multi-agent
                  reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {124},
  pages        = {103005},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103005},
  doi          = {10.1016/J.COSE.2022.103005},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengLCDZL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengLY23,
  author       = {Chenming Zheng and
                  Jun Li and
                  Xuanxia Yao},
  title        = {Design and implementation of trusted boot based on a new trusted computing
                  dual-architecture},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103095},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103095},
  doi          = {10.1016/J.COSE.2023.103095},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengLY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhongLH23,
  author       = {Meihui Zhong and
                  Mingwei Lin and
                  Zhu He},
  title        = {Dynamic multi-scale topological representation for enhancing network
                  intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {135},
  pages        = {103516},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103516},
  doi          = {10.1016/J.COSE.2023.103516},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhongLH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuZSCM23,
  author       = {Chengcheng Zhu and
                  Jiale Zhang and
                  Xiaobing Sun and
                  Bing Chen and
                  Weizhi Meng},
  title        = {{ADFL:} Defending backdoor attacks in federated learning via adversarial
                  distillation},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103366},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103366},
  doi          = {10.1016/J.COSE.2023.103366},
  timestamp    = {Tue, 21 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuZSCM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuZZRJ23,
  author       = {Hegui Zhu and
                  Ying Zhu and
                  Haoran Zheng and
                  Yuchen Ren and
                  Wuming Jiang},
  title        = {{LIGAA:} Generative adversarial attack method based on low-frequency
                  information},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103057},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103057},
  doi          = {10.1016/J.COSE.2022.103057},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuZZRJ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZoppiCPB23,
  author       = {Tommaso Zoppi and
                  Andrea Ceccarelli and
                  Tommaso Puccetti and
                  Andrea Bondavalli},
  title        = {Which algorithm can detect unknown attacks? Comparison of supervised,
                  unsupervised and meta-learning algorithms for intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {127},
  pages        = {103107},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103107},
  doi          = {10.1016/J.COSE.2023.103107},
  timestamp    = {Sat, 13 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZoppiCPB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/dAmbrosioPR23,
  author       = {Nicola d'Ambrosio and
                  Gaetano Perrone and
                  Simon Pietro Romano},
  title        = {Including insider threats into risk management through Bayesian threat
                  graph networks},
  journal      = {Comput. Secur.},
  volume       = {133},
  pages        = {103410},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103410},
  doi          = {10.1016/J.COSE.2023.103410},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/dAmbrosioPR23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AcaraliRRCG22,
  author       = {Dilara Acarali and
                  K. Rajesh Rao and
                  Muttukrishnan Rajarajan and
                  Doron Chema and
                  Mark Ginzburg},
  title        = {Modelling smart grid {IT-OT} dependencies for DDoS impact propagation},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102528},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102528},
  doi          = {10.1016/J.COSE.2021.102528},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AcaraliRRCG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AdahmanMA22,
  author       = {Zillah Adahman and
                  Asad Waqar Malik and
                  Zahid Anwar},
  title        = {An analysis of zero-trust architecture and its cost-effectiveness
                  for organizational security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102911},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102911},
  doi          = {10.1016/J.COSE.2022.102911},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AdahmanMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AggarwalTJCLTG22,
  author       = {Palvi Aggarwal and
                  Omkar Thakoor and
                  Shahin Jabbari and
                  Edward A. Cranford and
                  Christian Lebiere and
                  Milind Tambe and
                  Cleotilde Gonzalez},
  title        = {Designing effective masking strategies for cyberdefense through human
                  experimentation and cognitive models},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102671},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102671},
  doi          = {10.1016/J.COSE.2022.102671},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AggarwalTJCLTG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadAAT22,
  author       = {Rasheed Ahmad and
                  Izzat Alsmadi and
                  Wasim Alhamdani and
                  Lo'ai Tawalbeh},
  title        = {A comprehensive deep learning benchmark for IoT {IDS}},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102588},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102588},
  doi          = {10.1016/J.COSE.2021.102588},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadAAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadMB22,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Richard L. Baskerville},
  title        = {Editorial},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102530},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102530},
  doi          = {10.1016/J.COSE.2021.102530},
  timestamp    = {Wed, 05 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadMB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AkgunHC22,
  author       = {Devrim Akg{\"{u}}n and
                  Selman Hizal and
                  {\"{U}}nal {\c{C}}avusoglu},
  title        = {A new DDoS attacks intrusion detection model based on deep learning
                  for cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102748},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102748},
  doi          = {10.1016/J.COSE.2022.102748},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AkgunHC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AksuA22,
  author       = {Dogukan Aksu and
                  Muhammed Ali Aydin},
  title        = {{MGA-IDS:} Optimal feature subset selection for anomaly detection
                  framework on in-vehicle networks-CAN bus based on genetic algorithm
                  and intrusion detection approach},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102717},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102717},
  doi          = {10.1016/J.COSE.2022.102717},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AksuA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-BakaaA22,
  author       = {Aliaa Al{-}Bakaa and
                  Bahaa Al{-}Musawi},
  title        = {A new intrusion detection system based on using non-linear statistical
                  analysis and features selection techniques},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102906},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102906},
  doi          = {10.1016/J.COSE.2022.102906},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-BakaaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlahmadiAB22,
  author       = {Amal Alahmadi and
                  Norah Alkhraan and
                  Wojdan Binsaeedan},
  title        = {MPSAutodetect: {A} Malicious Powershell Script Detection Model Based
                  on Stacked Denoising Auto-Encoder},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102658},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102658},
  doi          = {10.1016/J.COSE.2022.102658},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlahmadiAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlaniA22,
  author       = {Mohammed M. Alani and
                  Ali Ismail Awad},
  title        = {AdStop: Efficient flow-based mobile adware detection using machine
                  learning},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102718},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102718},
  doi          = {10.1016/J.COSE.2022.102718},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlaniA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AldaajehSABBC22,
  author       = {Saleh H. Aldaajeh and
                  Heba Saleous and
                  Saed Alrabaee and
                  Ezedin Barka and
                  Frank Breitinger and
                  Kim{-}Kwang Raymond Choo},
  title        = {The role of national cybersecurity strategies on the improvement of
                  cybersecurity education},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102754},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102754},
  doi          = {10.1016/J.COSE.2022.102754},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AldaajehSABBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AliKAQ22,
  author       = {Hassan Ali and
                  Muhammad Suleman Khan and
                  Ala I. Al{-}Fuqaha and
                  Junaid Qadir},
  title        = {Tamp-X: Attacking explainable natural language classifiers through
                  tampered activations},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102791},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102791},
  doi          = {10.1016/J.COSE.2022.102791},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliKAQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlishahiMN22,
  author       = {Mina Alishahi and
                  Vahideh Moghtadaiee and
                  Hojjat Navidan},
  title        = {Add noise to remove noise: Local differential privacy for feature
                  selection},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102934},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102934},
  doi          = {10.1016/J.COSE.2022.102934},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlishahiMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlmashhadaniCKS22,
  author       = {Ahmad O. Almashhadani and
                  Domhnall Carlin and
                  Mustafa Kaiiali and
                  Sakir Sezer},
  title        = {{MFMCNS:} a multi-feature and multi-classifier network-based system
                  for ransomworm detection},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102860},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102860},
  doi          = {10.1016/J.COSE.2022.102860},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlmashhadaniCKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlobaidiCLA22,
  author       = {Hind Alobaidi and
                  Nathan L. Clarke and
                  Fudong Li and
                  Abdulrahman Alruban},
  title        = {Real-world smartphone-based gait recognition},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102557},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102557},
  doi          = {10.1016/J.COSE.2021.102557},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlobaidiCLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Alqahtani22,
  author       = {Sultan S. Alqahtani},
  title        = {A study on the use of vulnerabilities databases in software engineering
                  domain},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102661},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102661},
  doi          = {10.1016/J.COSE.2022.102661},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Alqahtani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AmerE22,
  author       = {Eslam Amer and
                  Shaker H. Ali El{-}Sappagh},
  title        = {Robust deep learning early alarm prediction model based on the behavioural
                  smell for android malware},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102670},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102670},
  doi          = {10.1016/J.COSE.2022.102670},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AmerE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ArshadBC22,
  author       = {Elham Arshad and
                  Michele Benolli and
                  Bruno Crispo},
  title        = {Practical attacks on Login {CSRF} in OAuth},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102859},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102859},
  doi          = {10.1016/J.COSE.2022.102859},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ArshadBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AshleyGBB22,
  author       = {Travis Ashley and
                  Sri Nikhil Gupta Gourisetti and
                  Newton Brown and
                  Christopher A. Bonebrake},
  title        = {Aggregate attack surface management for network discovery of operational
                  technology},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102939},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102939},
  doi          = {10.1016/J.COSE.2022.102939},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AshleyGBB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AwadhutkarTGK22,
  author       = {Payas Awadhutkar and
                  Ahmed Tamrawi and
                  Ryan Goluch and
                  Suresh C. Kothari},
  title        = {Control flow equivalence method for establishing sanctity of compiling},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102608},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102608},
  doi          = {10.1016/J.COSE.2022.102608},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AwadhutkarTGK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AydinOA22,
  author       = {Hakan Aydin and
                  Zeynep Orman and
                  Muhammed Ali Aydin},
  title        = {A long short-term memory (LSTM)-based distributed denial of service
                  (DDoS) detection and defense system design in public cloud network
                  environment},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102725},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102725},
  doi          = {10.1016/J.COSE.2022.102725},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AydinOA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BangRVBC22,
  author       = {Ankur O. Bang and
                  Udai Pratap Rao and
                  Andrea Visconti and
                  Alessandro Brighente and
                  Mauro Conti},
  title        = {An IoT Inventory Before Deployment: {A} Survey on IoT Protocols, Communication
                  Technologies, Vulnerabilities, Attacks, and Future Research Directions},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102914},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102914},
  doi          = {10.1016/J.COSE.2022.102914},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BangRVBC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarrosCOQR22,
  author       = {Pedro H. Barros and
                  Eduarda T. C. Chagas and
                  Leonardo B. Oliveira and
                  Fabiane Queiroz and
                  Heitor S. Ramos},
  title        = {Malware-SMELL: {A} zero-shot learning strategy for detecting zero-day
                  vulnerabilities},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102785},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102785},
  doi          = {10.1016/J.COSE.2022.102785},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarrosCOQR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaskervilleKS22,
  author       = {Richard L. Baskerville and
                  Jongwoo Kim and
                  Carl Stucke},
  title        = {The cybersecurity risk estimation engine: {A} tool for possibility
                  based risk analysis},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102752},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102752},
  doi          = {10.1016/J.COSE.2022.102752},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaskervilleKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeamanRMH22,
  author       = {Craig Beaman and
                  Michael Redbourne and
                  J. Darren Mummery and
                  Saqib Hakak},
  title        = {Fuzzing vulnerability discovery techniques: Survey, challenges and
                  future directions},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102813},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102813},
  doi          = {10.1016/J.COSE.2022.102813},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeamanRMH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BelangerMM22,
  author       = {France B{\'{e}}langer and
                  J{\"{u}}rgen Maier and
                  Michaela Maier},
  title        = {A longitudinal study on improving employee information protective
                  knowledge and behaviors},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102641},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102641},
  doi          = {10.1016/J.COSE.2022.102641},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BelangerMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BenyahyaCKN22,
  author       = {Meriem Benyahya and
                  Anastasija Collen and
                  Sotiria Kechagia and
                  Niels Alexander Nijdam},
  title        = {Automated city shuttles: Mapping the key challenges in cybersecurity,
                  privacy and standards to future developments},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102904},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102904},
  doi          = {10.1016/J.COSE.2022.102904},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BenyahyaCKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BernalCP22,
  author       = {Sergio L{\'{o}}pez Bernal and
                  Alberto Huertas Celdr{\'{a}}n and
                  Gregorio Mart{\'{\i}}nez P{\'{e}}rez},
  title        = {Neuronal Jamming cyberattack over invasive BCIs affecting the resolution
                  of tasks requiring visual capabilities},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102534},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102534},
  doi          = {10.1016/J.COSE.2021.102534},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BernalCP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BerryK22,
  author       = {Cate Berry and
                  Nikos Komninos},
  title        = {Efficient optimisation framework for convolutional neural networks
                  with secure multiparty computation},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102679},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102679},
  doi          = {10.1016/J.COSE.2022.102679},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BerryK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BotacinDCMAGG22,
  author       = {Marcus Botacin and
                  Felipe Duarte Domingues and
                  Fabr{\'{\i}}cio Ceschin and
                  Raphael Machnicki and
                  Marco Antonio Zanata Alves and
                  Paulo L{\'{\i}}cio de Geus and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {AntiViruses under the microscope: {A} hands-on perspective},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102500},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102500},
  doi          = {10.1016/J.COSE.2021.102500},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BotacinDCMAGG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BritoLSS22,
  author       = {Tiago Brito and
                  Pedro Lopes and
                  Nuno Santos and
                  Jos{\'{e}} Fragoso Santos},
  title        = {Wasmati: An efficient static vulnerability scanner for WebAssembly},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102745},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102745},
  doi          = {10.1016/J.COSE.2022.102745},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BritoLSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BroeckCS22,
  author       = {Jens Van den Broeck and
                  Bart Coppens and
                  Bjorn De Sutter},
  title        = {Flexible software protection},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102636},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102636},
  doi          = {10.1016/J.COSE.2022.102636},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BroeckCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuckleyHWE22,
  author       = {Oliver Buckley and
                  Duncan Hodges and
                  Jonathan Windle and
                  Sally Earl},
  title        = {{CLICKA:} Collecting and leveraging identity cues with keystroke dynamics},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102780},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102780},
  doi          = {10.1016/J.COSE.2022.102780},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BuckleyHWE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ButaviciusTH22,
  author       = {Marcus A. Butavicius and
                  Ronnie Taib and
                  Simon Jerome Han},
  title        = {Why people keep falling for phishing scams: The effects of time pressure
                  and deception cues on the detection of phishing emails},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102937},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102937},
  doi          = {10.1016/J.COSE.2022.102937},
  timestamp    = {Fri, 05 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ButaviciusTH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CalvoB22,
  author       = {Miguel Calvo and
                  Marta Beltr{\'{a}}n},
  title        = {A Model For risk-Based adaptive security controls},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102612},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102612},
  doi          = {10.1016/J.COSE.2022.102612},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CalvoB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CalzavaraCLMO22,
  author       = {Stefano Calzavara and
                  Lorenzo Cazzaro and
                  Claudio Lucchese and
                  Federico Marcuzzi and
                  Salvatore Orlando},
  title        = {Beyond robustness: Resilience verification of tree-based classifiers},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102843},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102843},
  doi          = {10.1016/J.COSE.2022.102843},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CalzavaraCLMO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaoPTCZ22,
  author       = {Yan Cao and
                  Yuan Ping and
                  Shaohua Tao and
                  YongGang Chen and
                  YanXia Zhu},
  title        = {Specification and adaptive verification of access control policy for
                  cyber-physical-social spaces},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102579},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102579},
  doi          = {10.1016/J.COSE.2021.102579},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaoPTCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CastelblancoRST22,
  author       = {Alejandra Castelblanco and
                  Esteban Rivera and
                  Jesus Solano and
                  Lizzy Tengana and
                  Christian Lopez and
                  Mart{\'{\i}}n Ochoa},
  title        = {Dynamic face authentication systems: Deep learning verification for
                  camera close-Up and head rotation paradigms},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102629},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102629},
  doi          = {10.1016/J.COSE.2022.102629},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CastelblancoRST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CeragioliDG22,
  author       = {Lorenzo Ceragioli and
                  Pierpaolo Degano and
                  Letterio Galletta},
  title        = {Can my firewall system enforce this policy?},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102683},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102683},
  doi          = {10.1016/J.COSE.2022.102683},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CeragioliDG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChagantiRP22,
  author       = {Rajasekhar Chaganti and
                  Vinayakumar Ravi and
                  Tuan D. Pham},
  title        = {Deep learning based cross architecture internet of things malware
                  detection and classification},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102779},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102779},
  doi          = {10.1016/J.COSE.2022.102779},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChagantiRP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChahalBK22,
  author       = {Navdeep S. Chahal and
                  Preeti Bali and
                  Praveen Kumar Khosla},
  title        = {A Proactive Approach to assess web application security through the
                  integration of security tools in a Security Orchestration Platform},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102886},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102886},
  doi          = {10.1016/J.COSE.2022.102886},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChaudharyGS22,
  author       = {Pooja Chaudhary and
                  Brij B. Gupta and
                  Awadhesh Kumar Singh},
  title        = {Securing heterogeneous embedded devices against {XSS} attack in intelligent
                  IoT system},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102710},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102710},
  doi          = {10.1016/J.COSE.2022.102710},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChaudharyGS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChawkiTAB22,
  author       = {El Balmany Chawki and
                  Zakariae Tbatou and
                  Ahmed Asimi and
                  Mohamed Bamarouf},
  title        = {Secure Virtual Machine Image Storage Process into a Trusted Zone-based
                  Cloud Storage},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102815},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102815},
  doi          = {10.1016/J.COSE.2022.102815},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChawkiTAB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenFZL22,
  author       = {Aiguo Chen and
                  Yang Fu and
                  Xu Zheng and
                  Guoming Lu},
  title        = {An efficient network behavior anomaly detection using a hybrid {DBN-LSTM}
                  network},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102600},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102600},
  doi          = {10.1016/J.COSE.2021.102600},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenFZL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenHJ22,
  author       = {Jianan Chen and
                  Qin Hu and
                  Honglu Jiang},
  title        = {Strategic signaling for utility control in audit games},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102721},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102721},
  doi          = {10.1016/J.COSE.2022.102721},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenHJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLS22,
  author       = {Tianrong Chen and
                  Jie Ling and
                  Yuping Sun},
  title        = {White-box content camouflage attacks against deep learning},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102676},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102676},
  doi          = {10.1016/J.COSE.2022.102676},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenTHZLL22,
  author       = {Li Chen and
                  Cong Tang and
                  Junjiang He and
                  Hui Zhao and
                  Xiaolong Lan and
                  Tao Li},
  title        = {{XSS} adversarial example attacks based on deep reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102831},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102831},
  doi          = {10.1016/J.COSE.2022.102831},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenTHZLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenWLXZX22,
  author       = {Fei Chen and
                  Jiahao Wang and
                  Jianqiang Li and
                  Yang Xu and
                  Cheng Zhang and
                  Tao Xiang},
  title        = {TrustBuilder: {A} non-repudiation scheme for IoT cloud applications},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102664},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102664},
  doi          = {10.1016/J.COSE.2022.102664},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenWLXZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenXC22,
  author       = {Yan Chen and
                  Weidong Xia and
                  Karlene Cousins},
  title        = {Voluntary and instrumental information security policy compliance:
                  an integrated view of prosocial motivation, self-regulation and deterrence},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102568},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102568},
  doi          = {10.1016/J.COSE.2021.102568},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZEWW22,
  author       = {Xuyang Chen and
                  Xiaolu Zhang and
                  Michael Elliot and
                  Xiaoyin Wang and
                  Feng Wang},
  title        = {Fix the leaking tap: {A} survey of Trigger-Action Programming {(TAP)}
                  security issues, detection techniques and solutions},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102812},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102812},
  doi          = {10.1016/J.COSE.2022.102812},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZEWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChengZGCGZMNX22,
  author       = {Yueqiang Cheng and
                  Zhi Zhang and
                  Yansong Gao and
                  Zhaofeng Chen and
                  Shengjian Guo and
                  Qifei Zhang and
                  Rui Mei and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Meltdown-type attacks are still feasible in the wall of kernel page-Table
                  isolation},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102556},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102556},
  doi          = {10.1016/J.COSE.2021.102556},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChengZGCGZMNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChevrotVL22,
  author       = {Antoine Chevrot and
                  Alexandre Vernotte and
                  Bruno Legeard},
  title        = {{CAE:} Contextual auto-encoder for multivariate time-series anomaly
                  detection in air transportation},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102652},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102652},
  doi          = {10.1016/J.COSE.2022.102652},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChevrotVL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChohraSKD22,
  author       = {Aniss Chohra and
                  Paria Shirani and
                  ElMouatez Billah Karbab and
                  Mourad Debbabi},
  title        = {Chameleon: Optimized feature selection using particle swarm optimization
                  and ensemble methods for network anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102684},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102684},
  doi          = {10.1016/J.COSE.2022.102684},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChohraSKD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoiJJKL22,
  author       = {Yeseul Choi and
                  Yunjong Jeong and
                  DaeHee Jang and
                  Brent ByungHoon Kang and
                  Hojoon Lee},
  title        = {EmuID: Detecting presence of emulation through microarchitectural
                  characteristic on {ARM}},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102569},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102569},
  doi          = {10.1016/J.COSE.2021.102569},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoiJJKL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChowdhuryKG22,
  author       = {Nabin Chowdhury and
                  Sokratis K. Katsikas and
                  Vasileios Gkioulos},
  title        = {Modeling effective cybersecurity training frameworks: {A} delphi method-based
                  study},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102551},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102551},
  doi          = {10.1016/J.COSE.2021.102551},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChowdhuryKG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CirneSRA22,
  author       = {Andr{\'{e}} Cirne and
                  Patr{\'{\i}}cia R. Sousa and
                  Jo{\~{a}}o S. Resende and
                  Luis Antunes},
  title        = {IoT security certifications: Challenges and potential approaches},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102669},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102669},
  doi          = {10.1016/J.COSE.2022.102669},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CirneSRA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ColomboFT22,
  author       = {Pietro Colombo and
                  Elena Ferrari and
                  Engin Deniz T{\"{u}}mer},
  title        = {Efficient {ABAC} based information sharing within {MQTT} environments
                  under emergencies},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102829},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102829},
  doi          = {10.1016/J.COSE.2022.102829},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ColomboFT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ConnollyB22,
  author       = {Alena Yuryna Connolly and
                  Herv{\'{e}} Borrion},
  title        = {Reducing Ransomware Crime: Analysis of Victims' Payment Decisions},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102760},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102760},
  doi          = {10.1016/J.COSE.2022.102760},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ConnollyB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ContiKP22,
  author       = {Mauro Conti and
                  Shubham Khandhar and
                  Vinod P.},
  title        = {A few-shot malware classification approach for unknown family recognition
                  using malware feature visualization},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102887},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102887},
  doi          = {10.1016/J.COSE.2022.102887},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ContiKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CoulterZPX22,
  author       = {Rory Coulter and
                  Jun Zhang and
                  Lei Pan and
                  Yang Xiang},
  title        = {Domain adaptation for Windows advanced persistent threat detection},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102496},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102496},
  doi          = {10.1016/J.COSE.2021.102496},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CoulterZPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CuiCHLDL22,
  author       = {Lei Cui and
                  Jiancong Cui and
                  Zhiyu Hao and
                  Lun Li and
                  Zhenquan Ding and
                  Yongji Liu},
  title        = {An empirical study of vulnerability discovery methods over the past
                  ten years},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102817},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102817},
  doi          = {10.1016/J.COSE.2022.102817},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CuiCHLDL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DOnghiaSNCPZ22,
  author       = {Mario D'Onghia and
                  Matteo Salvadore and
                  Benedetto Maria Nespoli and
                  Michele Carminati and
                  Mario Polino and
                  Stefano Zanero},
  title        = {Ap{\'{\i}}cula: Static detection of {API} calls in generic streams
                  of bytes},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102775},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102775},
  doi          = {10.1016/J.COSE.2022.102775},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DOnghiaSNCPZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DamK22,
  author       = {Gijs van Dam and
                  Rabiah Abdul Kadir},
  title        = {Hiding payments in lightning network with approximate differentially
                  private payment channels},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102623},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102623},
  doi          = {10.1016/J.COSE.2022.102623},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DamK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Dang-PhamKHP22,
  author       = {Duy Dang{-}Pham and
                  Karlheinz Kautz and
                  Ai{-}Phuong Hoang and
                  Siddhi Pittayachawan},
  title        = {Identifying information security opinion leaders in organizations:
                  Insights from the theory of social power bases and social network
                  analysis},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102505},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102505},
  doi          = {10.1016/J.COSE.2021.102505},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Dang-PhamKHP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DaveCSYC22,
  author       = {Gaurav Dave and
                  Gaurav Choudhary and
                  Vikas Sihag and
                  Ilsun You and
                  Kim{-}Kwang Raymond Choo},
  title        = {Cyber security challenges in aviation communication, navigation, and
                  surveillance},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102516},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102516},
  doi          = {10.1016/J.COSE.2021.102516},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DaveCSYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DemirkiranCUD22,
  author       = {Ferhat Demirkiran and
                  Aykut {\c{C}}ayir and
                  Ugur {\"{U}}nal and
                  Hasan Dag},
  title        = {An ensemble of pre-trained transformer models for imbalanced multiclass
                  malware classification},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102846},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102846},
  doi          = {10.1016/J.COSE.2022.102846},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DemirkiranCUD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DesaiDCK22,
  author       = {Nidhi Desai and
                  Manik Lal Das and
                  Payal Chaudhari and
                  Naveen Kumar},
  title        = {Background knowledge attacks in privacy-preserving data publishing
                  models},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102874},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102874},
  doi          = {10.1016/J.COSE.2022.102874},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DesaiDCK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DharaniSSS22,
  author       = {J. Dharani and
                  K. Sundarakantham and
                  Kunwar Singh and
                  S. Mercy Shalinie},
  title        = {A Privacy-Preserving Framework for Endorsement Process in Hyperledger
                  Fabric},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102637},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102637},
  doi          = {10.1016/J.COSE.2022.102637},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DharaniSSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DhillonS22,
  author       = {Parveen Dhillon and
                  Manpreet Singh},
  title        = {An ontology oriented service framework for social IoT},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102895},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102895},
  doi          = {10.1016/J.COSE.2022.102895},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DhillonS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DongTTYD22,
  author       = {Yansong Dong and
                  Long Tang and
                  Cong Tian and
                  Bin Yu and
                  Zhenhua Duan},
  title        = {Improving transferability of adversarial examples by saliency distribution
                  and data augmentation},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102811},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102811},
  doi          = {10.1016/J.COSE.2022.102811},
  timestamp    = {Thu, 14 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DongTTYD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuCHCZC22,
  author       = {Xuechao Du and
                  Andong Chen and
                  Boyuan He and
                  Hao Chen and
                  Fan Zhang and
                  Yan Chen},
  title        = {AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102889},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102889},
  doi          = {10.1016/J.COSE.2022.102889},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuCHCZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuZ22,
  author       = {Ruizhong Du and
                  Lin Zhen},
  title        = {Multiuser physical layer security mechanism in the wireless communication
                  system of the {IIOT}},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102559},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102559},
  doi          = {10.1016/J.COSE.2021.102559},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuanZZZHZZP22,
  author       = {Yexin Duan and
                  Junhua Zou and
                  Xingyu Zhou and
                  Wu Zhang and
                  Zhengyun He and
                  Dazhi Zhan and
                  Jin Zhang and
                  Zhisong Pan},
  title        = {Adversarial attack via dual-stage network erosion},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102888},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102888},
  doi          = {10.1016/J.COSE.2022.102888},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuanZZZHZZP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/EngstromL22,
  author       = {Viktor Engstr{\"{o}}m and
                  Robert Lagerstr{\"{o}}m},
  title        = {Two decades of cyberattack simulations: {A} systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102681},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102681},
  doi          = {10.1016/J.COSE.2022.102681},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/EngstromL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ErolaANAGC22,
  author       = {Arnau Erola and
                  Ioannis Agrafiotis and
                  Jason R. C. Nurse and
                  Louise Axon and
                  Michael Goldsmith and
                  Sadie Creese},
  title        = {A system to calculate Cyber Value-at-Risk},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102545},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102545},
  doi          = {10.1016/J.COSE.2021.102545},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ErolaANAGC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangHZZH22,
  author       = {Yong Fang and
                  Chaoyi Huang and
                  Minchuan Zeng and
                  Zhiying Zhao and
                  Cheng Huang},
  title        = {JStrong: Malicious JavaScript detection based on code semantic representation
                  and graph neural network},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102715},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102715},
  doi          = {10.1016/J.COSE.2022.102715},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/FangHZZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangXZ22,
  author       = {Rui Fang and
                  Maochao Xu and
                  Peng Zhao},
  title        = {Determination of ransomware payment based on Bayesian game models},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102685},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102685},
  doi          = {10.1016/J.COSE.2022.102685},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FathalizadehMA22,
  author       = {Amir Fathalizadeh and
                  Vahideh Moghtadaiee and
                  Mina Alishahi},
  title        = {On the privacy protection of indoor location dataset using anonymization},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102665},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102665},
  doi          = {10.1016/J.COSE.2022.102665},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FathalizadehMA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Fernandez-Fuentes22,
  author       = {Xos{\'{e}} Fern{\'{a}}ndez{-}Fuentes and
                  Tom{\'{a}}s F. Pena and
                  Jos{\'{e}} Carlos Cabaleiro},
  title        = {Digital forensic analysis methodology for private browsing: Firefox
                  and Chrome on Linux as a case study},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102626},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102626},
  doi          = {10.1016/J.COSE.2022.102626},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/Fernandez-Fuentes22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FernandoK22,
  author       = {Damien Warren Fernando and
                  Nikos Komninos},
  title        = {FeSA: Feature selection architecture for ransomware detection under
                  concept drift},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102659},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102659},
  doi          = {10.1016/J.COSE.2022.102659},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FernandoK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FinderSN22,
  author       = {Ido Finder and
                  Eitam Sheetrit and
                  Nir Nissim},
  title        = {A time-interval-based active learning framework for enhanced {PE}
                  malware acquisition and detection},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102838},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102838},
  doi          = {10.1016/J.COSE.2022.102838},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FinderSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FouladiEA22,
  author       = {Ramin Fadaei Fouladi and
                  Orhan Ermis and
                  Emin Anarim},
  title        = {A Novel Approach for distributed denial of service defense using continuous
                  wavelet transform and convolutional neural network for software-Defined
                  network},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102524},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102524},
  doi          = {10.1016/J.COSE.2021.102524},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FouladiEA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrimpongMU22,
  author       = {Eugene Frimpong and
                  Antonis Michalas and
                  Amjad Ullah},
  title        = {Footsteps in the fog: Certificateless fog-based access control},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102866},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102866},
  doi          = {10.1016/J.COSE.2022.102866},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrimpongMU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FuDKLSZ22,
  author       = {Anmin Fu and
                  Weijia Ding and
                  Boyu Kuang and
                  Qianmu Li and
                  Willy Susilo and
                  Yuqing Zhang},
  title        = {{FH-CFI:} Fine-grained hardware-assisted control flow integrity for
                  ARM-based IoT devices},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102666},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102666},
  doi          = {10.1016/J.COSE.2022.102666},
  timestamp    = {Thu, 18 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FuDKLSZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Furnell22,
  author       = {Steven Furnell},
  title        = {Assessing website password practices - Unchanged after fifteen years?},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102790},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102790},
  doi          = {10.1016/J.COSE.2022.102790},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Furnell22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FurnellHW22,
  author       = {Steven Furnell and
                  Kirsi Helkala and
                  Naomi Woods},
  title        = {Accessible authentication: Assessing the applicability for users with
                  disabilities},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102561},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102561},
  doi          = {10.1016/J.COSE.2021.102561},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FurnellHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalalMY22,
  author       = {Hisham S. Galal and
                  Mohammad Mannan and
                  Amr M. Youssef},
  title        = {Blindfold: Keeping private keys in PKIs and CDNs out of sight},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102731},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102731},
  doi          = {10.1016/J.COSE.2022.102731},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalalMY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GaleBS22,
  author       = {Megan Gale and
                  Ivano Bongiovanni and
                  Sergeja Slapnicar},
  title        = {Governing cybersecurity from the boardroom: Challenges, drivers, and
                  ways ahead},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102840},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102840},
  doi          = {10.1016/J.COSE.2022.102840},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GaleBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GallagherPCPMK22,
  author       = {Michael Gallagher and
                  Nikolaos Pitropakis and
                  Christos Chrysoulas and
                  Pavlos Papadopoulos and
                  Alexios Mylonas and
                  Sokratis K. Katsikas},
  title        = {Investigating machine learning attacks on financial time series models},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102933},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102933},
  doi          = {10.1016/J.COSE.2022.102933},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GallagherPCPMK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalloroPCCZ22,
  author       = {Nicola Galloro and
                  Mario Polino and
                  Michele Carminati and
                  Andrea Continella and
                  Stefano Zanero},
  title        = {A Systematical and longitudinal study of evasive behaviors in windows
                  malware},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102550},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102550},
  doi          = {10.1016/J.COSE.2021.102550},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalloroPCCZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GaoLZWWS22,
  author       = {Yansong Gao and
                  Qun Li and
                  Yifeng Zheng and
                  Guohong Wang and
                  Jiannan Wei and
                  Mang Su},
  title        = {{SEDML:} Securely and efficiently harnessing distributed knowledge
                  in machine learning},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102857},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102857},
  doi          = {10.1016/J.COSE.2022.102857},
  timestamp    = {Wed, 27 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GaoLZWWS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Garcia-TeodoroG22,
  author       = {Pedro Garc{\'{\i}}a{-}Teodoro and
                  Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and
                  Alberto Abell{\'{a}}n{-}Galera},
  title        = {Multi-labeling of complex, multi-behavioral malware samples},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102845},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102845},
  doi          = {10.1016/J.COSE.2022.102845},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GargG22,
  author       = {Manika Garg and
                  Anita Goel},
  title        = {A systematic literature review on online assessment security: Current
                  challenges and integrity strategies},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102544},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102544},
  doi          = {10.1016/J.COSE.2021.102544},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GargG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GarnZSLKK22,
  author       = {Bernhard Garn and
                  Stefan Zauner and
                  Dimitris E. Simos and
                  Manuel Leithner and
                  D. Richard Kuhn and
                  Raghu Kacker},
  title        = {A Two-Step TLS-Based Browser fingerprinting approach using combinatorial
                  sequences},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102575},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102575},
  doi          = {10.1016/J.COSE.2021.102575},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GarnZSLKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GernotL22,
  author       = {Tanguy Gernot and
                  Patrick Lacharme},
  title        = {Biometric masterkeys},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102642},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102642},
  doi          = {10.1016/J.COSE.2022.102642},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GernotL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GibertFMPL22,
  author       = {Daniel Gibert and
                  Matt Fredrikson and
                  Carles Mateu and
                  Jordi Planes and
                  Quan Le},
  title        = {Enhancing the insertion of {NOP} instructions to obfuscate malware
                  via deep reinforcement learning},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102543},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102543},
  doi          = {10.1016/J.COSE.2021.102543},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GibertFMPL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GoswamiC22,
  author       = {Hemangi Goswami and
                  Hiten Choudhury},
  title        = {Remote Registration and Group Authentication of IoT Devices in 5G
                  Cellular Network},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102806},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102806},
  doi          = {10.1016/J.COSE.2022.102806},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GoswamiC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GouveiaVV22,
  author       = {In{\^{e}}s Pinto Gouveia and
                  Marcus V{\"{o}}lp and
                  Paulo Esteves Ver{\'{\i}}ssimo},
  title        = {Behind the last line of defense: Surviving SoC faults and intrusions},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102920},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102920},
  doi          = {10.1016/J.COSE.2022.102920},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GouveiaVV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GravetoCS22,
  author       = {Vitor Graveto and
                  Tiago Cruz and
                  Paulo Sim{\~{o}}es},
  title        = {Security of Building Automation and Control Systems: Survey and future
                  research directions},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102527},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102527},
  doi          = {10.1016/J.COSE.2021.102527},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GravetoCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GrosseLBPBM22,
  author       = {Kathrin Grosse and
                  Taesung Lee and
                  Battista Biggio and
                  Youngja Park and
                  Michael Backes and
                  Ian M. Molloy},
  title        = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102814},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102814},
  doi          = {10.1016/J.COSE.2022.102814},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuSYM22,
  author       = {Yeming Gu and
                  Hui Shu and
                  Pan Yang and
                  Rongkuan Ma},
  title        = {MinSIB: Minimized static instrumentation for fuzzing binaries},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102894},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102894},
  doi          = {10.1016/J.COSE.2022.102894},
  timestamp    = {Sun, 17 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuSYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuZLZRC22,
  author       = {Xiuting Gu and
                  Tianqing Zhu and
                  Jie Li and
                  Tao Zhang and
                  Wei Ren and
                  Kim{-}Kwang Raymond Choo},
  title        = {Privacy, accuracy, and model fairness trade-offs in federated learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102907},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102907},
  doi          = {10.1016/J.COSE.2022.102907},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuZLZRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares22,
  author       = {Alejandro Guerra{-}Manzanares and
                  Marcin Luckner and
                  Hayretdin Bahsi},
  title        = {Concept drift and cross-device behavior: Challenges and implications
                  for effective android malware detection},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102757},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102757},
  doi          = {10.1016/J.COSE.2022.102757},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares22a,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi},
  title        = {On the relativity of time: Implications and challenges of data drift
                  on long-term effective android malware detection},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102835},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102835},
  doi          = {10.1016/J.COSE.2022.102835},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuerraCV22,
  author       = {Jorge L. Guerra and
                  Carlos Adri{\'{a}}n Catania and
                  Eduardo E. Veas},
  title        = {Datasets are not enough: Challenges in labeling network traffic},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102810},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102810},
  doi          = {10.1016/J.COSE.2022.102810},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuerraCV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuggenmosHOS22,
  author       = {Florian Guggenmos and
                  Bj{\"{o}}rn H{\"{a}}ckel and
                  Philipp Ollig and
                  Bastian Stahl},
  title        = {Security First, Security by Design, or Security Pragmatism - Strategic
                  Roles of {IT} Security in Digitalization Projects},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102747},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102747},
  doi          = {10.1016/J.COSE.2022.102747},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuggenmosHOS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoFHOLG22,
  author       = {Wenbo Guo and
                  Yong Fang and
                  Cheng Huang and
                  Haoran Ou and
                  Chun Lin and
                  Yongyan Guo},
  title        = {HyVulDect: {A} hybrid semantic vulnerability mining system based on
                  graph neural network},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102823},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102823},
  doi          = {10.1016/J.COSE.2022.102823},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoFHOLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoYYK22,
  author       = {Li Guo and
                  Jia Yu and
                  Ming Yang and
                  Fanyu Kong},
  title        = {Privacy-Preserving Convolution Neural Network Inference with Edge-assistance},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102910},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102910},
  doi          = {10.1016/J.COSE.2022.102910},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoYYK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuptaJB22,
  author       = {Neha Gupta and
                  Vinita Jindal and
                  Punam Bedi},
  title        = {{CSE-IDS:} Using cost-sensitive deep learning and ensemble algorithms
                  to handle class imbalance in network-based intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102499},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102499},
  doi          = {10.1016/J.COSE.2021.102499},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuptaJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuptaKC22,
  author       = {Sandeep Gupta and
                  Mouna Kacimi and
                  Bruno Crispo},
  title        = {Step {\&} turn - {A} novel bimodal behavioral biometric-based
                  user verification scheme for physical access control},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102722},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102722},
  doi          = {10.1016/J.COSE.2022.102722},
  timestamp    = {Thu, 21 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuptaKC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuvenBA22,
  author       = {Ebu Yusuf Guven and
                  Ali Boyaci and
                  Muhammed Ali Aydin},
  title        = {A Novel Password Policy Focusing on Altering User Password Selection
                  Habits: {A} Statistical Analysis on Breached Data},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102560},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102560},
  doi          = {10.1016/J.COSE.2021.102560},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuvenBA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HamidNHRNA22,
  author       = {Nor Hasnul Azirah Abdul Hamid and
                  Normalina Ibrahim @ Mat Nor and
                  Fazlin Marini Hussain and
                  Rajeswari Raju and
                  Humza Naseer and
                  Atif Ahmad},
  title        = {Barriers and enablers to adoption of cyber insurance in developing
                  countries: An exploratory study of Malaysian organizations},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102893},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102893},
  doi          = {10.1016/J.COSE.2022.102893},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HammadHE22,
  author       = {Mohamed Hammad and
                  Nabil M. Hewahi and
                  Wael Elmedany},
  title        = {{MMM-RF:} {A} novel high accuracy multinomial mixture model for network
                  intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102777},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102777},
  doi          = {10.1016/J.COSE.2022.102777},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HammadHE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HammiZKN22,
  author       = {Badis Hammi and
                  Sherali Zeadally and
                  Rida Khatoun and
                  Jamel Nebhen},
  title        = {Survey on smart homes: Vulnerabilities, risks, and countermeasures},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102677},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102677},
  doi          = {10.1016/J.COSE.2022.102677},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HammiZKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaoLP22,
  author       = {Jingwei Hao and
                  Senlin Luo and
                  Limin Pan},
  title        = {{EII-MBS:} Malware family classification via enhanced adversarial
                  instruction behavior semantic learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102905},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102905},
  doi          = {10.1016/J.COSE.2022.102905},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaoLP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HartHS22,
  author       = {Stephen Hart and
                  Basel Halak and
                  Vladimiro Sassone},
  title        = {{CIST:} {A} Serious Game for Hardware Supply Chain},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102912},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102912},
  doi          = {10.1016/J.COSE.2022.102912},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HartHS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaseebMMW22,
  author       = {Junaid Haseeb and
                  Saif Ur Rehman Malik and
                  Masood Mansoori and
                  Ian Welch},
  title        = {Probabilistic modelling of deception-based security framework using
                  markov decision process},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102599},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102599},
  doi          = {10.1016/J.COSE.2021.102599},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaseebMMW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HaseebMMW22a,
  author       = {Junaid Haseeb and
                  Saif Ur Rehman Malik and
                  Masood Mansoori and
                  Ian Welch},
  title        = {Corrigendum to 'Probabilistic modelling of deception-based security
                  framework using markov decision process' [Computers {\&} Security
                  115 {(2022)/102599]}},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102689},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102689},
  doi          = {10.1016/J.COSE.2022.102689},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HaseebMMW22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HassaninMTC22,
  author       = {Mohammed Hassanin and
                  Nour Moustafa and
                  Murat Tahtali and
                  Kim{-}Kwang Raymond Choo},
  title        = {Rethinking maximum-margin softmax for adversarial robustness},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102640},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102640},
  doi          = {10.1016/J.COSE.2022.102640},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HassaninMTC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeDZZHWP22,
  author       = {Zhengyun He and
                  Yexin Duan and
                  Wu Zhang and
                  Junhua Zou and
                  Zhengfang He and
                  Yunyun Wang and
                  Zhisong Pan},
  title        = {Boosting adversarial attacks with transformed gradient},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102720},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102720},
  doi          = {10.1016/J.COSE.2022.102720},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeDZZHWP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HenriquesCCS22,
  author       = {Jo{\~{a}}o Henriques and
                  Filipe Caldeira and
                  Tiago Cruz and
                  Paulo Sim{\~{o}}es},
  title        = {An automated closed-loop framework to enforce security policies from
                  anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102949},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102949},
  doi          = {10.1016/J.COSE.2022.102949},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HenriquesCCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HimeurSBAA22,
  author       = {Yassine Himeur and
                  Shahab Saquib Sohail and
                  Faycal Bensaali and
                  Abbes Amira and
                  Mamoun Alazab},
  title        = {Latest trends of security and privacy in recommender systems: {A}
                  comprehensive review and future perspectives},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102746},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102746},
  doi          = {10.1016/J.COSE.2022.102746},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HimeurSBAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HoKM22,
  author       = {Heemeng Ho and
                  Ryan K. L. Ko and
                  Lorraine Mazerolle},
  title        = {Situational Crime Prevention {(SCP)} techniques to prevent and control
                  cybercrimes: {A} focused systematic review},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102611},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102611},
  doi          = {10.1016/J.COSE.2022.102611},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HoKM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuHLLZ22,
  author       = {Yun Hu and
                  Aiqun Hu and
                  Chunguo Li and
                  Peng Li and
                  Chunyu Zhang},
  title        = {Towards a privacy protection-capable noise fingerprinting for numerically
                  aggregated data},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102755},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102755},
  doi          = {10.1016/J.COSE.2022.102755},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuHLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangQLLGZ22,
  author       = {Yizhao Huang and
                  Meng Qiao and
                  Fudong Liu and
                  Xingwei Li and
                  Hairen Gui and
                  Chunyan Zhang},
  title        = {Binary code traceability of multigranularity information fusion from
                  the perspective of software genes},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102607},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102607},
  doi          = {10.1016/J.COSE.2022.102607},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangQLLGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangSK22,
  author       = {Yuyao Huang and
                  Hui Shu and
                  Fei Kang},
  title        = {DeMal: Module decomposition of malware based on community discovery},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102680},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102680},
  doi          = {10.1016/J.COSE.2022.102680},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuangZ22,
  author       = {Linan Huang and
                  Quanyan Zhu},
  title        = {{RADAMS:} Resilient and adaptive alert and attention management strategy
                  against Informational Denial-of-Service (IDoS) attacks},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102844},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102844},
  doi          = {10.1016/J.COSE.2022.102844},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuangZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HusakSSLJK22,
  author       = {Martin Hus{\'{a}}k and
                  Luk{\'{a}}s Sadlek and
                  Stanislav Spacek and
                  Martin Lastovicka and
                  Michal Javorn{\'{\i}}k and
                  Jana Kom{\'{a}}rkov{\'{a}}},
  title        = {{CRUSOE:} {A} toolset for cyber situational awareness and decision
                  support in incident handling},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102609},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102609},
  doi          = {10.1016/J.COSE.2022.102609},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HusakSSLJK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HussainYRIAS22,
  author       = {Tariq Hussain and
                  Bailin Yang and
                  Haseeb Ur Rahman and
                  Arshad Iqbal and
                  Farman Ali and
                  Babar Shah},
  title        = {Improving Source location privacy in social Internet of Things using
                  a hybrid phantom routing technique},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102917},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102917},
  doi          = {10.1016/J.COSE.2022.102917},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HussainYRIAS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IbitoyeSM22,
  author       = {Olakunle Ibitoye and
                  M. Omair Shafiq and
                  Ashraf Matrawy},
  title        = {Differentially private self-normalizing neural networks for adversarial
                  robustness in federated learning},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102631},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102631},
  doi          = {10.1016/J.COSE.2022.102631},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IbitoyeSM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IraqiB22,
  author       = {Omar Iraqi and
                  Hanan El Bakkali},
  title        = {Communizer: {A} collaborative cloud-based self-protecting software
                  communities framework - Focus on the alert coordination system},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102692},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102692},
  doi          = {10.1016/J.COSE.2022.102692},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IraqiB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IslamiFP22,
  author       = {Lejla Islami and
                  Simone Fischer{-}H{\"{u}}bner and
                  Panos Papadimitratos},
  title        = {Capturing drivers' privacy preferences for intelligent transportation
                  systems: An intercultural perspective},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102913},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102913},
  doi          = {10.1016/J.COSE.2022.102913},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IslamiFP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/IyerMN22,
  author       = {Padmavathi Iyer and
                  Amirreza Masoumzadeh and
                  Paliath Narendran},
  title        = {On the Expressive Power of Negated Conditions and Negative Authorizations
                  in Access Control Models},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102586},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102586},
  doi          = {10.1016/J.COSE.2021.102586},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/IyerMN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JacobQYL22,
  author       = {Stephen Jacob and
                  Yuansong Qiao and
                  Yuhang Ye and
                  Brian Lee},
  title        = {Anomalous distributed traffic: Detecting cyber security attacks amongst
                  microservices using graph convolutional networks},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102728},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102728},
  doi          = {10.1016/J.COSE.2022.102728},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JacobQYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Jang22,
  author       = {DaeHee Jang},
  title        = {Badaslr: Exceptional cases of {ASLR} aiding exploitation},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102510},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102510},
  doi          = {10.1016/J.COSE.2021.102510},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Jang22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JerbiDBS22,
  author       = {Manel Jerbi and
                  Zaineb Chelly Dagdia and
                  Slim Bechikh and
                  Lamjed Ben Said},
  title        = {Android malware detection as a Bi-level problem},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102825},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102825},
  doi          = {10.1016/J.COSE.2022.102825},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JerbiDBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiaB22,
  author       = {Haiyan Jia and
                  Eric P. S. Baumer},
  title        = {Birds of a feather: Collective privacy of online social activist groups},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102614},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102614},
  doi          = {10.1016/J.COSE.2022.102614},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiaB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JiangFQHLH22,
  author       = {Shuai Jiang and
                  Cai Fu and
                  Yekui Qian and
                  Shuai He and
                  Jianqiang Lv and
                  Lansheng Han},
  title        = {IFAttn: Binary code similarity analysis based on interpretable features
                  with attention},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102804},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102804},
  doi          = {10.1016/J.COSE.2022.102804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JiangFQHLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JimIG22,
  author       = {Lincy Elizebeth Jim and
                  Nahina Islam and
                  Mark A. Gregory},
  title        = {Enhanced {MANET} security using artificial immune system based danger
                  theory to detect selfish nodes},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102538},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102538},
  doi          = {10.1016/J.COSE.2021.102538},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JimIG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JinZQFZ22,
  author       = {Chengbin Jin and
                  Yongbin Zhou and
                  Xinkuan Qiu and
                  Qi Feng and
                  Qian Zhang},
  title        = {Breaking real-world {COTS} {USIM} cards with unknown side-channel
                  countermeasures},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102531},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102531},
  doi          = {10.1016/J.COSE.2021.102531},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JinZQFZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JoLS22,
  author       = {Hyeonseong Jo and
                  Yongjae Lee and
                  Seungwon Shin},
  title        = {Vulcan: Automatic extraction and analysis of cyber threat intelligence
                  from unstructured text},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102763},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102763},
  doi          = {10.1016/J.COSE.2022.102763},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JoLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/JungLB22,
  author       = {Bill Jung and
                  Yan Li and
                  Tamir Bechor},
  title        = {{CAVP:} {A} context-aware vulnerability prioritization model},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102639},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102639},
  doi          = {10.1016/J.COSE.2022.102639},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/JungLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KarlssonKP22,
  author       = {Fredrik Karlsson and
                  Ella Kolkowska and
                  Johan Petersson},
  title        = {Information security policy compliance-eliciting requirements for
                  a computerized software to support value-based compliance analysis},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102578},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102578},
  doi          = {10.1016/J.COSE.2021.102578},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KarlssonKP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KatsikeasJHL22,
  author       = {Sotirios Katsikeas and
                  Pontus Johnson and
                  Simon Hacks and
                  Robert Lagerstr{\"{o}}m},
  title        = {VehicleLang: {A} probabilistic modeling and simulation language for
                  modern vehicle {IT} infrastructures},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102705},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102705},
  doi          = {10.1016/J.COSE.2022.102705},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KatsikeasJHL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhalidM22,
  author       = {Fatima Khalid and
                  Ammar Masood},
  title        = {Vulnerability analysis of Qualcomm Secure Execution Environment {(QSEE)}},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102628},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102628},
  doi          = {10.1016/J.COSE.2022.102628},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhalidM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KhanYKI22,
  author       = {Naurin Farooq Khan and
                  Amber Yaqoob and
                  Muhammad Saud Khan and
                  Naveed Ikram},
  title        = {The cybersecurity behavioral research: {A} tertiary study},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102826},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102826},
  doi          = {10.1016/J.COSE.2022.102826},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KhanYKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ki-AriesFDW22,
  author       = {Duncan Ki{-}Aries and
                  Shamal Faily and
                  Huseyin Dogan and
                  Christopher Williams},
  title        = {Assessing system of systems information security risk with OASoSIS},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102690},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102690},
  doi          = {10.1016/J.COSE.2022.102690},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ki-AriesFDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimC22,
  author       = {Jin{-}Young Kim and
                  Sung{-}Bae Cho},
  title        = {Obfuscated Malware Detection Using Deep Generative Model based on
                  Global/Local Features},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102501},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102501},
  doi          = {10.1016/J.COSE.2021.102501},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimK22,
  author       = {Jae{-}Yeol Kim and
                  Hyuk{-}Yoon Kwon},
  title        = {Threat classification model for security information event management
                  focusing on model efficiency},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102789},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102789},
  doi          = {10.1016/J.COSE.2022.102789},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KleijSCY22,
  author       = {Rick van der Kleij and
                  Jan Maarten Schraagen and
                  Beatrice Cadet and
                  Heather Young},
  title        = {Developing decision support for cybersecurity threat and incident
                  managers},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102535},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102535},
  doi          = {10.1016/J.COSE.2021.102535},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KleijSCY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KongZYZ22,
  author       = {Ke Kong and
                  Zhichao Zhang and
                  Ziyuan Yang and
                  Zhaoxin Zhang},
  title        = {{FCSCNN:} Feature centralized Siamese CNN-based android malware identification},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102514},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102514},
  doi          = {10.1016/J.COSE.2021.102514},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KongZYZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KouchamMHTM22,
  author       = {Oualid Koucham and
                  St{\'{e}}phane Mocanu and
                  Guillaume Hiet and
                  Jean{-}Marc Thiriet and
                  Fr{\'{e}}d{\'{e}}ric Majorczyk},
  title        = {Cross-domain alert correlation methodology for industrial control
                  systems},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102723},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102723},
  doi          = {10.1016/J.COSE.2022.102723},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KouchamMHTM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KoutsokostasLAO22,
  author       = {Vasilios Koutsokostas and
                  Nikolaos Lykousas and
                  Theodoros Apostolopoulos and
                  Gabriele Orazi and
                  Amrita Ghosal and
                  Fran Casino and
                  Mauro Conti and
                  Constantinos Patsakis},
  title        = {Invoice {\#}31415 attached: Automated analysis of malicious Microsoft
                  Office documents},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102582},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102582},
  doi          = {10.1016/J.COSE.2021.102582},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KoutsokostasLAO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KravchikDBS22,
  author       = {Moshe Kravchik and
                  Luca Demetrio and
                  Battista Biggio and
                  Asaf Shabtai},
  title        = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors
                  in Industrial Control Systems},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102901},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102901},
  doi          = {10.1016/J.COSE.2022.102901},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KruzikovaKSDM22,
  author       = {Agata Kruzikova and
                  Lenka Knapova and
                  David Smahel and
                  Lenka Dedkova and
                  Vashek Matyas},
  title        = {Usable and secure? User perception of four authentication methods
                  for mobile banking},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102603},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102603},
  doi          = {10.1016/J.COSE.2022.102603},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KruzikovaKSDM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KuangFSYG22,
  author       = {Boyu Kuang and
                  Anmin Fu and
                  Willy Susilo and
                  Shui Yu and
                  Yansong Gao},
  title        = {A survey of remote attestation in Internet of Things: Attacks, countermeasures,
                  and prospects},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102498},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102498},
  doi          = {10.1016/J.COSE.2021.102498},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KuangFSYG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarSSL22,
  author       = {Ayush Kumar and
                  Mrinalini Shridhar and
                  Sahithya Swaminathan and
                  Teng Joon Lim},
  title        = {Machine learning-based early detection of IoT botnets using network-edge
                  traffic},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102693},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102693},
  doi          = {10.1016/J.COSE.2022.102693},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarSSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KumarSVY22,
  author       = {Rajesh Kumar and
                  Siddharth Sharma and
                  Chirag Vachhani and
                  Nitish Yadav},
  title        = {What changed in the cyber-security after COVID-19?},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102821},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102821},
  doi          = {10.1016/J.COSE.2022.102821},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KumarSVY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KurniawanEKQT22,
  author       = {Kabul Kurniawan and
                  Andreas Ekelhart and
                  Elmar Kiesling and
                  Gerald Quirchmayr and
                  A Min Tjoa},
  title        = {{KRYSTAL:} Knowledge graph-based framework for tactical attack discovery
                  in audit data},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102828},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102828},
  doi          = {10.1016/J.COSE.2022.102828},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KurniawanEKQT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KwonL22,
  author       = {Hyun Kwon and
                  Sanghyun Lee},
  title        = {Ensemble transfer attack targeting text classification systems},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102695},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102695},
  doi          = {10.1016/J.COSE.2022.102695},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KwonL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KyytsonenIAV22,
  author       = {Maiju Kyyts{\"{o}}nen and
                  Jonna Ikonen and
                  Anna{-}Mari Aalto and
                  Tuulikki Vehko},
  title        = {The self-assessed information security skills of the Finnish population:
                  {A} regression analysis},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102732},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102732},
  doi          = {10.1016/J.COSE.2022.102732},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KyytsonenIAV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LaiTLWTZQ22,
  author       = {Yingxu Lai and
                  Liyao Tong and
                  Jing Liu and
                  Yipeng Wang and
                  Tong Tang and
                  Zijian Zhao and
                  Hua Qin},
  title        = {Identifying malicious nodes in wireless sensor networks based on correlation
                  detection},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102540},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102540},
  doi          = {10.1016/J.COSE.2021.102540},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LaiTLWTZQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LanLLLG22,
  author       = {Jinghong Lan and
                  Xudong Liu and
                  Bo Li and
                  Yanan Li and
                  Tongtong Geng},
  title        = {DarknetSec: {A} novel self-attentive deep learning method for darknet
                  traffic classification and application identification},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102663},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102663},
  doi          = {10.1016/J.COSE.2022.102663},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LanLLLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LanLLSLZ22,
  author       = {Jinghong Lan and
                  Xudong Liu and
                  Bo Li and
                  Jie Sun and
                  Beibei Li and
                  Jun Zhao},
  title        = {{MEMBER:} {A} multi-task learning model with hybrid deep features
                  for network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102919},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102919},
  doi          = {10.1016/J.COSE.2022.102919},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LanLLSLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeCCCHK22,
  author       = {Jung{-}San Lee and
                  Ying{-}Chin Chen and
                  Chit{-}Jie Chew and
                  Chih{-}Lung Chen and
                  Thu{-}Nguyet Huynh and
                  Chung{-}Wei Kuo},
  title        = {CoNN-IDS: Intrusion detection system based on collaborative neural
                  networks and agile training},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102908},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102908},
  doi          = {10.1016/J.COSE.2022.102908},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeGWGR22,
  author       = {Jaeung Lee and
                  Melchor C. de Guzman and
                  Jingguo Wang and
                  Manish Gupta and
                  H. Raghav Rao},
  title        = {Investigating perceptions about risk of data breaches in financial
                  institutions: {A} routine activity-approach},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102832},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102832},
  doi          = {10.1016/J.COSE.2022.102832},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeGWGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeJCKK22,
  author       = {Seungkwang Lee and
                  Nam{-}Su Jho and
                  Doyoung Chung and
                  Yousung Kang and
                  Myungchul Kim},
  title        = {Rcryptect: Real-time detection of cryptographic function in the user-space
                  filesystem},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102512},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102512},
  doi          = {10.1016/J.COSE.2021.102512},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeJCKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeeL22,
  author       = {Junwon Lee and
                  Heejo Lee},
  title        = {Improving {SSH} detection model using {IPA} time and {WGAN-GP}},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102672},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102672},
  doi          = {10.1016/J.COSE.2022.102672},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeeL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LeviHAE22,
  author       = {Matan Levi and
                  Itay Hazan and
                  Noga Agmon and
                  Sagi Eden},
  title        = {Behavioral embedding for continuous user verification in global settings},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102716},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102716},
  doi          = {10.1016/J.COSE.2022.102716},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LeviHAE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCBLGL22,
  author       = {Yong{-}Gang Li and
                  Yeh{-}Ching Chung and
                  Yu Bao and
                  Yi Lu and
                  Shanqing Guo and
                  Guoyuan Lin},
  title        = {KPointer: Keep the code pointers on the stack point to the right code},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102781},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102781},
  doi          = {10.1016/J.COSE.2022.102781},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCBLGL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiCZWLWLS22,
  author       = {Ce Li and
                  Zijun Cheng and
                  He Zhu and
                  Leiqi Wang and
                  Qiujian Lv and
                  Yan Wang and
                  Ning Li and
                  Degang Sun},
  title        = {DMalNet: Dynamic malware analysis based on {API} feature engineering
                  and graph learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102872},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102872},
  doi          = {10.1016/J.COSE.2022.102872},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiCZWLWLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiL22,
  author       = {Zhen Li and
                  Qi Liao},
  title        = {Preventive portfolio against data-selling ransomware - {A} game theory
                  of encryption and deception},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102644},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102644},
  doi          = {10.1016/J.COSE.2022.102644},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLWSQ22,
  author       = {Ce Li and
                  Qiujian Lv and
                  Ning Li and
                  Yan Wang and
                  Degang Sun and
                  Yuanyuan Qiao},
  title        = {A novel deep framework for dynamic malware detection based on {API}
                  sequence intrinsic features},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102686},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102686},
  doi          = {10.1016/J.COSE.2022.102686},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLWSQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiMDXZ22,
  author       = {Kehong Li and
                  Wengang Ma and
                  Huawei Duan and
                  Han Xie and
                  Juanxiu Zhu},
  title        = {Few-shot IoT attack detection based on {RFP-CNN} and adversarial unsupervised
                  domain-adaptive regularization},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102856},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102856},
  doi          = {10.1016/J.COSE.2022.102856},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiMDXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiQHLLG22,
  author       = {Yanan Li and
                  Tao Qin and
                  Yongzhong Huang and
                  Jinghong Lan and
                  ZanHao Liang and
                  Tongtong Geng},
  title        = {{HDFEF:} {A} hierarchical and dynamic feature extraction framework
                  for intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102842},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102842},
  doi          = {10.1016/J.COSE.2022.102842},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiQHLLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiWXCQ22,
  author       = {Bin Li and
                  Yijie Wang and
                  Kele Xu and
                  Li Cheng and
                  Zhiquan Qin},
  title        = {{DFAID:} Density-aware and feature-deviated active intrusion detection
                  over network traffic streams},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102719},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102719},
  doi          = {10.1016/J.COSE.2022.102719},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiWXCQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZCS22,
  author       = {Bin Li and
                  Qinglei Zhou and
                  Yan Cao and
                  Xueming Si},
  title        = {Cognitively reconfigurable mimic-based heterogeneous password recovery
                  system},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102667},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102667},
  doi          = {10.1016/J.COSE.2022.102667},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiZLLYL22,
  author       = {Helin Li and
                  Hui Zhu and
                  Xiaodong Lin and
                  Rongxing Lu and
                  Zhipeng Yu and
                  Wei Lan},
  title        = {Everything you control is not everything: Achieving intention-concealed
                  visit on social networks},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102778},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102778},
  doi          = {10.1016/J.COSE.2022.102778},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiZLLYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiangCWZZ22,
  author       = {Jianbing Liang and
                  Shuhui Chen and
                  Ziling Wei and
                  Shuang Zhao and
                  Wei Zhao},
  title        = {HAGDetector: Heterogeneous {DGA} domain name detection model},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102803},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102803},
  doi          = {10.1016/J.COSE.2022.102803},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiangCWZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LimaLLB22,
  author       = {Milton V. M. Lima and
                  Ricardo Lima and
                  Fernando Lins and
                  Michel S. Bonfim},
  title        = {Beholder - {A} CEP-based intrusion detection and prevention systems
                  for IoT environments},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102824},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102824},
  doi          = {10.1016/J.COSE.2022.102824},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LimaLLB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinLLXG22,
  author       = {Xinjie Lin and
                  Han Liu and
                  Zhen Li and
                  Gang Xiong and
                  Gaopeng Gou},
  title        = {Privacy protection of China's top websites: {A} Multi-layer privacy
                  measurement via network behaviours and privacy policies},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102606},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102606},
  doi          = {10.1016/J.COSE.2022.102606},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinLLXG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LinMZZ22,
  author       = {Yu Lin and
                  Yunlong Mao and
                  Yuan Zhang and
                  Sheng Zhong},
  title        = {Secure deduplication schemes for content delivery in mobile edge computing},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102602},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102602},
  doi          = {10.1016/J.COSE.2022.102602},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LinMZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuFHH22,
  author       = {Zhonglin Liu and
                  Yong Fang and
                  Cheng Huang and
                  Jiaxuan Han},
  title        = {GraphXSS: An efficient {XSS} payload detection approach based on graph
                  convolutional network},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102597},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102597},
  doi          = {10.1016/J.COSE.2021.102597},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuFHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuFWSC22,
  author       = {Songsong Liu and
                  Pengbin Feng and
                  Shu Wang and
                  Kun Sun and
                  Jiahao Cao},
  title        = {Enhancing malware analysis sandboxes with emulated user behavior},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102613},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102613},
  doi          = {10.1016/J.COSE.2022.102613},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuFWSC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuJJ22,
  author       = {Yujia Liu and
                  Ming Jiang and
                  Tingting Jiang},
  title        = {Transferable adversarial examples based on global smooth perturbations},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102816},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102816},
  doi          = {10.1016/J.COSE.2022.102816},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuJJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuQH22,
  author       = {Yuanzhen Liu and
                  Umair Mujtaba Qureshi and
                  Gerhard Petrus Hancke},
  title        = {Keypad entry inference with sensor fusion from mobile and smart wearables},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102837},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102837},
  doi          = {10.1016/J.COSE.2022.102837},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuQH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuRLLZ22,
  author       = {Zhenpeng Liu and
                  Lele Ren and
                  Ruilin Li and
                  Qiannan Liu and
                  Yonggang Zhao},
  title        = {ID-based sanitizable signature data integrity auditing scheme with
                  privacy-preserving},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102858},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102858},
  doi          = {10.1016/J.COSE.2022.102858},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuRLLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuWZ22,
  author       = {Tao Liu and
                  He Wang and
                  Yuqing Zhang},
  title        = {A traffic anomaly detection scheme for non-directional denial of service
                  attacks in software-defined optical network},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102467},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102467},
  doi          = {10.1016/J.COSE.2021.102467},
  timestamp    = {Tue, 19 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuXZSL22,
  author       = {Yaqun Liu and
                  Chang{-}you Xing and
                  Guomin Zhang and
                  Lihua Song and
                  Hongxiu Lin},
  title        = {\emph{AntiTomo}: Network topology obfuscation against adversarial
                  tomography-based topology inference},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102570},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102570},
  doi          = {10.1016/J.COSE.2021.102570},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuXZSL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuZGYL22,
  author       = {Haiyang Liu and
                  Hanlin Zhang and
                  Li Guo and
                  Jia Yu and
                  Jie Lin},
  title        = {Privacy-Preserving cloud-Aided broad learning system},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102503},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102503},
  doi          = {10.1016/J.COSE.2021.102503},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuZGYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LoftHYW22,
  author       = {Paul Loft and
                  Ying He and
                  Iryna Yevseyeva and
                  Isabel Wagner},
  title        = {{CAESAR8:} An agile enterprise architecture approach to managing information
                  security risks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102877},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102877},
  doi          = {10.1016/J.COSE.2022.102877},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LoftHYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LongGXZ22,
  author       = {Teng Long and
                  Qi Gao and
                  Lili Xu and
                  Zhangbing Zhou},
  title        = {A survey on adversarial attacks in computer vision: Taxonomy, visualization
                  and future directions},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102847},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102847},
  doi          = {10.1016/J.COSE.2022.102847},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/LongGXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LongW22,
  author       = {Zhang Long and
                  Jinsong Wang},
  title        = {A hybrid method of entropy and {SSAE-SVM} based DDoS detection and
                  mitigation mechanism in {SDN}},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102604},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102604},
  doi          = {10.1016/J.COSE.2022.102604},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LongW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuLLC22,
  author       = {Shiwei Lu and
                  Ruihu Li and
                  Wenbin Liu and
                  Xuan Chen},
  title        = {Defense against backdoor attack in federated learning},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102819},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102819},
  doi          = {10.1016/J.COSE.2022.102819},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuLLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuLZJ22,
  author       = {Qian Lu and
                  Shihao Li and
                  Jiahui Zhang and
                  Ruobing Jiang},
  title        = {{PEDR:} Exploiting phase error drift range to detect full-model rogue
                  access point attacks},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102581},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102581},
  doi          = {10.1016/J.COSE.2021.102581},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuLZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LuSXJ22,
  author       = {Jintian Lu and
                  Jiakun Sun and
                  Ruizhi Xiao and
                  Shuyuan Jin},
  title        = {{DIFCS:} {A} Secure Cloud Data Sharing Approach Based on Decentralized
                  Information Flow Control},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102678},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102678},
  doi          = {10.1016/J.COSE.2022.102678},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LuSXJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaCS22,
  author       = {Qian Ma and
                  Baojiang Cui and
                  Cong Sun},
  title        = {A novel privacy-aware model for nonparametric decentralized detection},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102688},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102688},
  doi          = {10.1016/J.COSE.2022.102688},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaCS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaesschalckGGR22,
  author       = {Sam Maesschalck and
                  Vasileios Giotsas and
                  Benjamin Green and
                  Nicholas J. P. Race},
  title        = {Don't get stung, cover your {ICS} in honey: How do honeypots fit within
                  industrial control system security},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102598},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102598},
  doi          = {10.1016/J.COSE.2021.102598},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaesschalckGGR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MagesAR22,
  author       = {Tobias Mages and
                  Magnus Almgren and
                  Christian Rohner},
  title        = {Towards an information-theoretic framework of intrusion detection
                  for composed systems and robustness analyses},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102633},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102633},
  doi          = {10.1016/J.COSE.2022.102633},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MagesAR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MakhdoomAL22,
  author       = {Imran Makhdoom and
                  Mehran Abolhasan and
                  Justin Lipman},
  title        = {A comprehensive survey of covert communication techniques, limitations
                  and future challenges},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102784},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102784},
  doi          = {10.1016/J.COSE.2022.102784},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MakhdoomAL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ManimaranSG22,
  author       = {S. Manimaran and
                  V. N. Sastry and
                  N. P. Gopalan},
  title        = {{SBTDDL:} {A} novel framework for sensor-based threats detection on
                  Android smartphones using deep learning},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102729},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102729},
  doi          = {10.1016/J.COSE.2022.102729},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ManimaranSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MartinezCJP22,
  author       = {David Mart{\'{\i}}nez and
                  Eusebi Calle and
                  Albert Jov{\'{e}} and
                  Cristina P{\'{e}}rez{-}Sol{\`{a}}},
  title        = {Web-tracking compliance: websites' level of confidence in the use
                  of information-gathering technologies},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102873},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102873},
  doi          = {10.1016/J.COSE.2022.102873},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MartinezCJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MasuchGTK22,
  author       = {Kristin Masuch and
                  Maike Greve and
                  Simon Trang and
                  Lutz M. Kolbe},
  title        = {Apologize or justify? Examining the impact of data breach response
                  actions on stock value of affected companies?},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102502},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102502},
  doi          = {10.1016/J.COSE.2021.102502},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MasuchGTK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MathovSSE22,
  author       = {Yael Mathov and
                  Tal Ben Senior and
                  Asaf Shabtai and
                  Yuval Elovici},
  title        = {Stop bugging me! Evading modern-day wiretapping using adversarial
                  perturbations},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102841},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102841},
  doi          = {10.1016/J.COSE.2022.102841},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MathovSSE22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McLeodD22,
  author       = {Alexander J. McLeod Jr. and
                  Diane Dolezel},
  title        = {Information security policy non-compliance: Can capitulation theory
                  explain user behaviors?},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102526},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102526},
  doi          = {10.1016/J.COSE.2021.102526},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McLeodD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MilosevicC22,
  author       = {Marija S. Milosevic and
                  Vladimir M. Ciric},
  title        = {Extreme minority class detection in imbalanced data for network intrusion},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102940},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102940},
  doi          = {10.1016/J.COSE.2022.102940},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MilosevicC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MimranBKKBLES22,
  author       = {Dudu Mimran and
                  Ron Bitton and
                  Yehonatan Kfir and
                  Eitan Klevansky and
                  Oleg Brodt and
                  Heiko Lehmann and
                  Yuval Elovici and
                  Asaf Shabtai},
  title        = {Security of Open Radio Access Networks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102890},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102890},
  doi          = {10.1016/J.COSE.2022.102890},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MishraAAG22,
  author       = {Alok Mishra and
                  Yehia Ibrahim Alzoubi and
                  Memoona Javeria Anwar and
                  Asif Qumer Gill},
  title        = {Attributes impacting cybersecurity policy development: An evidence
                  from seven nations},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102820},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102820},
  doi          = {10.1016/J.COSE.2022.102820},
  timestamp    = {Fri, 06 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MishraAAG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MohantyRL22,
  author       = {Hardhik Mohanty and
                  Arousha Haghighian Roudsari and
                  Arash Habibi Lashkari},
  title        = {Robust stacking ensemble model for darknet traffic classification
                  under adversarial settings},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102830},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102830},
  doi          = {10.1016/J.COSE.2022.102830},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MohantyRL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MondejarMS22,
  author       = {Javier Carrillo Mond{\'{e}}jar and
                  Jos{\'{e}} Luis Mart{\'{\i}}nez and
                  Guillermo Suarez{-}Tangil},
  title        = {On how VoIP attacks foster the malicious call ecosystem},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102758},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102758},
  doi          = {10.1016/J.COSE.2022.102758},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MondejarMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MotylinskiMIS22,
  author       = {Michal Motylinski and
                  {\'{A}}ine MacDermott and
                  Farkhund Iqbal and
                  Babar Shah},
  title        = {A GPU-based machine learning approach for detection of botnet attacks},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102918},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102918},
  doi          = {10.1016/J.COSE.2022.102918},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MotylinskiMIS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MuzaffarHLZ22,
  author       = {Ali Muzaffar and
                  Hani Ragab Hassen and
                  Michael A. Lones and
                  Hind Zantout},
  title        = {An in-depth review of machine learning based Android malware detection},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102833},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102833},
  doi          = {10.1016/J.COSE.2022.102833},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MuzaffarHLZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NadlerBBS22,
  author       = {Asaf Nadler and
                  Ron Bitton and
                  Oleg Brodt and
                  Asaf Shabtai},
  title        = {On the vulnerability of anti-malware solutions to {DNS} attacks},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102687},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102687},
  doi          = {10.1016/J.COSE.2022.102687},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NadlerBBS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NaikGJNS22,
  author       = {Nitin Naik and
                  Paul Grace and
                  Paul Jenkins and
                  Kshirasagar Naik and
                  Jingping Song},
  title        = {An evaluation of potential attack surfaces based on attack tree modelling
                  and risk matrix applied to self-sovereign identity},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102808},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102808},
  doi          = {10.1016/J.COSE.2022.102808},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NaikGJNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NasrTBFA22,
  author       = {Tony Nasr and
                  Sadegh Torabi and
                  Elias Bou{-}Harb and
                  Claude Fachkha and
                  Chadi Assi},
  title        = {Power jacking your station: In-depth security analysis of electric
                  vehicle charging station management systems},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102511},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102511},
  doi          = {10.1016/J.COSE.2021.102511},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NawazFNCW22,
  author       = {M. Saqib Nawaz and
                  Philippe Fournier{-}Viger and
                  Muhammad Zohaib Nawaz and
                  Guoting Chen and
                  Youxi Wu},
  title        = {MalSPM: Metamorphic malware behavior analysis and classification using
                  sequential pattern mining},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102741},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102741},
  doi          = {10.1016/J.COSE.2022.102741},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/NawazFNCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NedeljkovicJ22,
  author       = {Dusan Nedeljkovic and
                  Zivana Jakovljevic},
  title        = {{CNN} based method for the development of cyber-attacks detection
                  algorithms in industrial control systems},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102585},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102585},
  doi          = {10.1016/J.COSE.2021.102585},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NedeljkovicJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NiuZZZPH22,
  author       = {Weina Niu and
                  Jie Zhou and
                  Yibin Zhao and
                  Xiaosong Zhang and
                  Yujie Peng and
                  Cheng Huang},
  title        = {Uncovering {APT} malware traffic using deep learning combined with
                  time sequence and association analysis},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102809},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102809},
  doi          = {10.1016/J.COSE.2022.102809},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NiuZZZPH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/NyangaresiR22,
  author       = {Vincent Omollo Nyangaresi and
                  Anthony Joachim Rodrigues},
  title        = {Efficient handover protocol for 5G and beyond networks},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102546},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102546},
  doi          = {10.1016/J.COSE.2021.102546},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/NyangaresiR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OShaughnessyS22,
  author       = {Stephen O'Shaughnessy and
                  Stephen Sheridan},
  title        = {Image-based malware classification hybrid framework based on space-filling
                  curves},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102660},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102660},
  doi          = {10.1016/J.COSE.2022.102660},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OShaughnessyS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ObaidatSPP22,
  author       = {Islam Obaidat and
                  Meera Sridhar and
                  Khue M. Pham and
                  Phu H. Phung},
  title        = {Jadeite: {A} novel image-behavior-based approach for Java malware
                  detection using deep learning},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102547},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102547},
  doi          = {10.1016/J.COSE.2021.102547},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ObaidatSPP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Olukoya22,
  author       = {Oluwafemi Olukoya},
  title        = {Assessing frameworks for eliciting privacy {\&} security requirements
                  from laws and regulations},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102697},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102697},
  doi          = {10.1016/J.COSE.2022.102697},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Olukoya22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OmolaraAAAAAA22,
  author       = {Abiodun Esther Omolara and
                  Abdullah Alabdulatif and
                  Oludare Isaac Abiodun and
                  Moatsum Alawida and
                  Abdulatif Alabdulatif and
                  Wafa' Hamdan Alshoura and
                  Humaira Arshad},
  title        = {The internet of things security: {A} survey encompassing unexplored
                  areas and new insights},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102494},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102494},
  doi          = {10.1016/J.COSE.2021.102494},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OmolaraAAAAAA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OuX22,
  author       = {Fan Ou and
                  Jian Xu},
  title        = {S\({}^{\mbox{3}}\)Feature: {A} static sensitive subgraph-based feature
                  for android malware detection},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102513},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102513},
  doi          = {10.1016/J.COSE.2021.102513},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OuX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/OzkanEO22,
  author       = {Baris {\"{O}}zkan and
                  Mehmet Erdem and
                  Eren {\"{O}}zceylan},
  title        = {Evaluation of Asian Countries using Data Center Security Index: {A}
                  Spherical Fuzzy AHP-based {EDAS} Approach},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102900},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102900},
  doi          = {10.1016/J.COSE.2022.102900},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/OzkanEO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParastSNYKH22,
  author       = {Fatemeh Khoda Parast and
                  Chandni Sindhav and
                  Seema Nikam and
                  Hadiseh Izadi Yekta and
                  Kenneth B. Kent and
                  Saqib Hakak},
  title        = {Cloud computing security: {A} survey of service-based models},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102580},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102580},
  doi          = {10.1016/J.COSE.2021.102580},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParastSNYKH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ParkSYHCKK22,
  author       = {Kyung Ho Park and
                  Hyun Min Song and
                  Jeong Do Yoo and
                  Su{-}Youn Hong and
                  Byoungmo Cho and
                  Kwangsoo Kim and
                  Huy Kang Kim},
  title        = {Unsupervised malicious domain detection with less labeling effort},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102662},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102662},
  doi          = {10.1016/J.COSE.2022.102662},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ParkSYHCKK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PashamokhtariBG22,
  author       = {Arman Pashamokhtari and
                  Gustavo Batista and
                  Hassan Habibi Gharakheili},
  title        = {AdIoTack: Quantifying and refining resilience of decision tree ensemble
                  inference models against adversarial volumetric attacks on IoT networks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102801},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102801},
  doi          = {10.1016/J.COSE.2022.102801},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PashamokhtariBG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PatilSPSG22,
  author       = {Rajendra Patil and
                  Vinay Sachidananda and
                  Hongyi Peng and
                  Akshay Sachdeva and
                  Mohan Gurusamy},
  title        = {{MARK:} Fill in the blanks through a JointGAN based data augmentation
                  for network anomaly detection},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102759},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102759},
  doi          = {10.1016/J.COSE.2022.102759},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PatilSPSG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PayaCR22,
  author       = {Antonio Paya and
                  Alba Cotarelo and
                  Jose Manuel Redondo},
  title        = {Egida: Automated security configuration deployment systems with early
                  error detection},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102638},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102638},
  doi          = {10.1016/J.COSE.2022.102638},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PayaCR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PuC22,
  author       = {Cong Pu and
                  Kim{-}Kwang Raymond Choo},
  title        = {Lightweight Sybil Attack Detection in IoT based on Bloom Filter and
                  Physical Unclonable Function},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102541},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102541},
  doi          = {10.1016/J.COSE.2021.102541},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PuC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/PuLBET22,
  author       = {Wenxi Pu and
                  Siyuan Li and
                  Gregory Bott and
                  Marie Esposito and
                  Jason Bennett Thatcher},
  title        = {To Disclose or Not to Disclose: An Evaluation of the Effects of Information
                  Control and Social Network Transparency},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102509},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102509},
  doi          = {10.1016/J.COSE.2021.102509},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/PuLBET22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QayyumJQ22,
  author       = {Adnan Qayyum and
                  Muhammad Umar Janjua and
                  Junaid Qadir},
  title        = {Making federated learning robust to adversarial attacks by learning
                  data and model association},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102827},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102827},
  doi          = {10.1016/J.COSE.2022.102827},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QayyumJQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QianWWGWZS22,
  author       = {Yaguan Qian and
                  Jiamin Wang and
                  Haijiang Wang and
                  Zhaoquan Gu and
                  Bin Wang and
                  Shaoning Zeng and
                  Wassim Swaileh},
  title        = {Visually imperceptible adversarial patch attacks},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102943},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102943},
  doi          = {10.1016/J.COSE.2022.102943},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QianWWGWZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiangYJ22,
  author       = {Weizhong Qiang and
                  Lin Yang and
                  Hai Jin},
  title        = {Efficient and Robust Malware Detection Based on Control Flow Traces
                  Using Deep Neural Networks},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102871},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102871},
  doi          = {10.1016/J.COSE.2022.102871},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiangYJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiaoZTYLA22,
  author       = {Yanchen Qiao and
                  Weizhe Zhang and
                  Zhicheng Tian and
                  Laurence T. Yang and
                  Yang Liu and
                  Mamoun Alazab},
  title        = {Adversarial malware sample generation method based on the prototype
                  of deep learning detector},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102762},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102762},
  doi          = {10.1016/J.COSE.2022.102762},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiaoZTYLA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QinY22,
  author       = {Yi Qin and
                  Chuan Yue},
  title        = {Fuzzing-based hard-label black-box attacks against machine learning
                  models},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102694},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102694},
  doi          = {10.1016/J.COSE.2022.102694},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QinY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QiuMCYC22,
  author       = {Weicheng Qiu and
                  Yinghua Ma and
                  Xiuzhen Chen and
                  Haiyang Yu and
                  Lixing Chen},
  title        = {Hybrid intrusion detection system based on Dempster-Shafer evidence
                  theory},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102709},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102709},
  doi          = {10.1016/J.COSE.2022.102709},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QiuMCYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuXSHQL22,
  author       = {Leilei Qu and
                  Ruojin Xiao and
                  Wenchang Shi and
                  Keman Huang and
                  Bo Qin and
                  Bin Liang},
  title        = {Your Behaviors Reveal What You Need: {A} Practical Scheme Based on
                  User Behaviors for Personalized Security Nudges},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102891},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102891},
  doi          = {10.1016/J.COSE.2022.102891},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QuXSHQL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/QuamaraS22,
  author       = {Sidharth Quamara and
                  Awadhesh Kumar Singh},
  title        = {A systematic survey on security concerns in cryptocurrencies: State-of-the-art
                  and perspectives},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102548},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102548},
  doi          = {10.1016/J.COSE.2021.102548},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/QuamaraS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RTV22,
  author       = {Ramkumar M. P. and
                  P. V. Bhaskar Reddy and
                  J. T. Thirukrishna and
                  Ch. Vidyadhari},
  title        = {Intrusion detection in big data using hybrid feature fusion and optimization
                  enabled deep learning based on spark architecture},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102668},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102668},
  doi          = {10.1016/J.COSE.2022.102668},
  timestamp    = {Thu, 30 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RTV22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RashidKHIWGF22,
  author       = {Md. Mamunur Rashid and
                  Joarder Kamruzzaman and
                  Mohammad Mehedi Hassan and
                  Tasadduq Imam and
                  Santoso Wibowo and
                  Steven Gordon and
                  Giancarlo Fortino},
  title        = {Adversarial training for deep learning-based cyberattack detection
                  in IoT-based smart city applications},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102783},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102783},
  doi          = {10.1016/J.COSE.2022.102783},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RashidKHIWGF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RassKWEH22,
  author       = {Stefan Rass and
                  Sandra K{\"{o}}nig and
                  Jasmin Wachter and
                  Manuel Egger and
                  Manuel Hobisch},
  title        = {Supervised Machine Learning with Plausible Deniability},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102506},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102506},
  doi          = {10.1016/J.COSE.2021.102506},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RassKWEH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RasslanNA22,
  author       = {Mohamed Rasslan and
                  Mahmoud M. Nasreldin and
                  Heba Kamal Aslan},
  title        = {Ibn Sina: {A} patient privacy-preserving authentication protocol in
                  medical internet of things},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102753},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102753},
  doi          = {10.1016/J.COSE.2022.102753},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RasslanNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RathgebMSTN22,
  author       = {Christian Rathgeb and
                  Johannes Merkle and
                  Johanna Scholz and
                  Benjamin Tams and
                  Vanessa Nesterowicz},
  title        = {Deep face fuzzy vault: Implementation and performance},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102539},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102539},
  doi          = {10.1016/J.COSE.2021.102539},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/RathgebMSTN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Ray-DowlingHSB22,
  author       = {Aratrika Ray{-}Dowling and
                  Daqing Hou and
                  Stephanie Schuckers and
                  Abbie Barbir},
  title        = {Evaluating multi-modal mobile behavioral biometrics using public datasets},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102868},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102868},
  doi          = {10.1016/J.COSE.2022.102868},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Ray-DowlingHSB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/RieraHHMM22,
  author       = {Tom{\'{a}}s Sureda Riera and
                  Juan Ram{\'{o}}n Bermejo Higuera and
                  Javier Bermejo Higuera and
                  Jos{\'{e}} Javier Mart{\'{\i}}nez{-}Herr{\'{a}}iz and
                  Juan Antonio Sicilia Montalvo},
  title        = {A new multi-label dataset for Web attacks {CAPEC} classification using
                  machine learning techniques},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102788},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102788},
  doi          = {10.1016/J.COSE.2022.102788},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/RieraHHMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Roumani22,
  author       = {Yaman Roumani},
  title        = {Detection time of data breaches},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102508},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102508},
  doi          = {10.1016/J.COSE.2021.102508},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Roumani22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SadiqueS22,
  author       = {Farhan Sadique and
                  Shamik Sengupta},
  title        = {Modeling and analyzing attacker behavior in IoT botnet using temporal
                  convolution network {(TCN)}},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102714},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102714},
  doi          = {10.1016/J.COSE.2022.102714},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SadiqueS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SalviSN22,
  author       = {Andrea Salvi and
                  Paolo Spagnoletti and
                  Nadia Saad Noori},
  title        = {Cyber-resilience of Critical Cyber Infrastructures: Integrating digital
                  twins in the electric power ecosystem},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102507},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102507},
  doi          = {10.1016/J.COSE.2021.102507},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SalviSN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SaniBYMD22,
  author       = {Abubakar Sadiq Sani and
                  Elisa Bertino and
                  Dong Yuan and
                  Ke Meng and
                  Zhao Yang Dong},
  title        = {SPrivAD: {A} secure and privacy-preserving mutually dependent authentication
                  and data access scheme for smart communities},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102610},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102610},
  doi          = {10.1016/J.COSE.2022.102610},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SaniBYMD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchinaglSK22,
  author       = {Stef Schinagl and
                  Abbas Shahim and
                  Svetlana Khapova},
  title        = {Paradoxical tensions in the implementation of digital security governance:
                  Toward an ambidextrous approach to governing digital security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102903},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102903},
  doi          = {10.1016/J.COSE.2022.102903},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchinaglSK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShaoZYLL22,
  author       = {Kun Shao and
                  Yu Zhang and
                  Junan Yang and
                  Xiaoshuai Li and
                  Hui Liu},
  title        = {The triggers that open the {NLP} model backdoors are hidden in the
                  adversarial samples},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102730},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102730},
  doi          = {10.1016/J.COSE.2022.102730},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShaoZYLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharevskiAJP22,
  author       = {Filipo Sharevski and
                  Raniem Alsaadi and
                  Peter Jachim and
                  Emma Pieroni},
  title        = {Misinformation warnings: Twitter's soft moderation effects on {COVID-19}
                  vaccine belief echoes},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102577},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102577},
  doi          = {10.1016/J.COSE.2021.102577},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharevskiAJP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaA22,
  author       = {Shwadhin Sharma and
                  Eduardo Aparicio},
  title        = {Organizational and team culture as antecedents of protection motivation
                  among {IT} employees},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102774},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102774},
  doi          = {10.1016/J.COSE.2022.102774},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SharmaGSS22,
  author       = {Amit Sharma and
                  Brij B. Gupta and
                  Awadhesh Kumar Singh and
                  V. K. Saraswat},
  title        = {Orchestration of {APT} malware evasive manoeuvers employed for eluding
                  anti-virus and sandbox defense},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102627},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102627},
  doi          = {10.1016/J.COSE.2022.102627},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SharmaGSS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenCWCW22,
  author       = {Gaoning Shen and
                  Zhixiang Chen and
                  Hui Wang and
                  Heng Chen and
                  Shuqi Wang},
  title        = {Feature fusion-based malicious code detection with dual attention
                  mechanism and BiLSTM},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102761},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102761},
  doi          = {10.1016/J.COSE.2022.102761},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenCWCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShenGSDDZZJ22,
  author       = {Yuncheng Shen and
                  Bing Guo and
                  Yan Shen and
                  Xuliang Duan and
                  Xiangqian Dong and
                  Hong Zhang and
                  Chuanwu Zhang and
                  Yuming Jiang},
  title        = {Personal big data pricing method based on differential privacy},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102529},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102529},
  doi          = {10.1016/J.COSE.2021.102529},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShenGSDDZZJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShillairEDCNS22,
  author       = {Ruth Shillair and
                  Patricia Esteve{-}Gonz{\'{a}}lez and
                  William H. Dutton and
                  Sadie Creese and
                  Eva Nagyfejeo and
                  Basie von Solms},
  title        = {Cybersecurity education, awareness raising, and training initiatives:
                  National level evidence-based results, challenges, and promise},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102756},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102756},
  doi          = {10.1016/J.COSE.2022.102756},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShillairEDCNS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShinW22,
  author       = {Youjin Shin and
                  Simon S. Woo},
  title        = {PasswordTensor: Analyzing and explaining password strength using tensor
                  decomposition},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102634},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102634},
  doi          = {10.1016/J.COSE.2022.102634},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShinW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShowailTZNA22,
  author       = {Ahmad Showail and
                  Rashid Tahir and
                  Muhammad Fareed Zaffar and
                  Muhammad Haris Noor and
                  Mohammed Alkhatib},
  title        = {An internet of secure and private things: {A} service-oriented architecture},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102776},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102776},
  doi          = {10.1016/J.COSE.2022.102776},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShowailTZNA22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SicariRC22,
  author       = {Sabrina Sicari and
                  Alessandra Rizzardi and
                  Alberto Coen{-}Porisini},
  title        = {Insights into security and privacy towards fog computing evolution},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102822},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102822},
  doi          = {10.1016/J.COSE.2022.102822},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SicariRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Silva22,
  author       = {Joseph Da Silva},
  title        = {Cyber security and the Leviathan},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102674},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102674},
  doi          = {10.1016/J.COSE.2022.102674},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Silva22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SinghMM22,
  author       = {Neeraj Kumar Singh and
                  Mahshooq Abdul Majeed and
                  Vasundhara Mahajan},
  title        = {Statistical machine learning defensive mechanism against cyber intrusion
                  in smart grid cyber-physical network},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102941},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102941},
  doi          = {10.1016/J.COSE.2022.102941},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SinghMM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Skeoch22,
  author       = {Henry R. K. Skeoch},
  title        = {Expanding the Gordon-Loeb model to cyber-insurance},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102533},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102533},
  doi          = {10.1016/J.COSE.2021.102533},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Skeoch22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SongYHLL22,
  author       = {Haina Song and
                  Fangfang Yin and
                  Xinyu Han and
                  Tao Luo and
                  Jianfeng Li},
  title        = {{MPDS-RCA:} Multi-level privacy-preserving data sharing for resisting
                  collusion attacks based on an integration of {CP-ABE} and {LDP}},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102523},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102523},
  doi          = {10.1016/J.COSE.2021.102523},
  timestamp    = {Sun, 23 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SongYHLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Sonmez22,
  author       = {Ferda {\"{O}}zdemir S{\"{o}}nmez and
                  Chris Hankin and
                  Pasquale Malacaria},
  title        = {Attack Dynamics: An Automatic Attack Graph Generation Framework Based
                  on System Topology, CAPEC, CWE, and {CVE} Databases},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102938},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102938},
  doi          = {10.1016/J.COSE.2022.102938},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Sonmez22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SonmezHM22,
  author       = {Ferda {\"{O}}zdemir S{\"{o}}nmez and
                  Chris Hankin and
                  Pasquale Malacaria},
  title        = {Decision support for healthcare cyber security},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102865},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102865},
  doi          = {10.1016/J.COSE.2022.102865},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SonmezHM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunTHTZY22,
  author       = {Xin Sun and
                  Chengliang Tian and
                  Changhui Hu and
                  Weizhong Tian and
                  Hanlin Zhang and
                  Jia Yu},
  title        = {Privacy-Preserving and verifiable SRC-based face recognition with
                  cloud/edge server assistance},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102740},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102740},
  doi          = {10.1016/J.COSE.2022.102740},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunTHTZY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunZLLDWJ22,
  author       = {Jie Sun and
                  Lingchen Zhao and
                  Zhuotao Liu and
                  Qi Li and
                  Xinhao Deng and
                  Qian Wang and
                  Yong Jiang},
  title        = {Practical differentially private online advertising},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102504},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102504},
  doi          = {10.1016/J.COSE.2021.102504},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunZLLDWJ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SungRM22,
  author       = {Dillon Cheong Lien Sung and
                  M. R. Gauthama Raman and
                  Aditya P. Mathur},
  title        = {Design-knowledge in learning plant dynamics for detecting process
                  anomalies in water treatment plants},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102532},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102532},
  doi          = {10.1016/J.COSE.2021.102532},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SungRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SyedSTD22,
  author       = {Naeem Firdous Syed and
                  Syed W. Shah and
                  Rolando Trujillo{-}Rasua and
                  Robin Doss},
  title        = {Traceability in supply chains: {A} Cyber security analysis},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102536},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102536},
  doi          = {10.1016/J.COSE.2021.102536},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SyedSTD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TalibNNMAM22,
  author       = {Manar Abu Talib and
                  Qassim Nasir and
                  Ali Bou Nassif and
                  Takua Mokhamed and
                  Nafisa Ahmed and
                  Bayan Mahfood},
  title        = {{APT} beaconing detection: {A} systematic review},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102875},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102875},
  doi          = {10.1016/J.COSE.2022.102875},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TalibNNMAM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TekerekY22,
  author       = {Adem Tekerek and
                  Muhammed Mutlu Yapici},
  title        = {A novel malware classification and augmentation model based on convolutional
                  neural network},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102515},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102515},
  doi          = {10.1016/J.COSE.2021.102515},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TekerekY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ThomasGOF22,
  author       = {Louise Thomas and
                  Iqbal Gondal and
                  Taiwo Oseni and
                  Selena (Sally) Firmin},
  title        = {A framework for data privacy and security accountability in data breach
                  communications},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102657},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102657},
  doi          = {10.1016/J.COSE.2022.102657},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ThomasGOF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianWLK22,
  author       = {Jiwei Tian and
                  Buhong Wang and
                  Jing Li and
                  Charalambos Konstantinou},
  title        = {Datadriven false data injection attacks against cyber-physical power
                  systems},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102836},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102836},
  doi          = {10.1016/J.COSE.2022.102836},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TianWLK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TianZZ22,
  author       = {Huan Tian and
                  Tianqing Zhu and
                  Wanlei Zhou},
  title        = {Fairness and privacy preservation for facial images: GAN-based methods},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102902},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102902},
  doi          = {10.1016/J.COSE.2022.102902},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/TianZZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TondelCJS22,
  author       = {Inger Anne T{\o}ndel and
                  Daniela Soares Cruzes and
                  Martin Gilje Jaatun and
                  Guttorm Sindre},
  title        = {Influencing the security prioritisation of an agile software development
                  project},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102744},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102744},
  doi          = {10.1016/J.COSE.2022.102744},
  timestamp    = {Mon, 24 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TondelCJS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TranO22,
  author       = {Duong Dinh Tran and
                  Kazuhiro Ogata},
  title        = {Formal verification of {TLS} 1.2 by automatically generating proof
                  scores},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102909},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102909},
  doi          = {10.1016/J.COSE.2022.102909},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TranO22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TuanLT22,
  author       = {Tong Anh Tuan and
                  Hoang Viet Long and
                  David Taniar},
  title        = {On Detecting and Classifying {DGA} Botnets and their Families},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102549},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102549},
  doi          = {10.1016/J.COSE.2021.102549},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TuanLT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/TundisRM22,
  author       = {Andrea Tundis and
                  Samuel Ruppert and
                  Max M{\"{u}}hlh{\"{a}}user},
  title        = {A Feature-driven Method for Automating the Assessment of {OSINT} Cyber
                  Threat Sources},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102576},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102576},
  doi          = {10.1016/J.COSE.2021.102576},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/TundisRM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UgurC22,
  author       = {Naciye G{\"{u}}liz Ugur and
                  K{\"{u}}bra {\c{C}}aliskan},
  title        = {Time for De-cluttering: Digital clutter scaling for individuals and
                  enterprises},
  journal      = {Comput. Secur.},
  volume       = {119},
  pages        = {102751},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102751},
  doi          = {10.1016/J.COSE.2022.102751},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UgurC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/UmarWL22,
  author       = {Mubarak Umar and
                  Zhenqiang Wu and
                  Xuening Liao},
  title        = {Authenticating tier-two body area network devices through user-specific
                  signal propagation characteristics},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102800},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102800},
  doi          = {10.1016/J.COSE.2022.102800},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/UmarWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VadilloS22,
  author       = {Jon Vadillo and
                  Roberto Santana},
  title        = {On the human evaluation of universal audio adversarial perturbations},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102495},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102495},
  doi          = {10.1016/J.COSE.2021.102495},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VadilloS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Villalon-Fonseca22,
  author       = {Ricardo Villal{\'{o}}n{-}Fonseca},
  title        = {The nature of security: {A} conceptual framework for integral-comprehensive
                  modeling of {IT} security and cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102805},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102805},
  doi          = {10.1016/J.COSE.2022.102805},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Villalon-Fonseca22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Villalon-Huerta22,
  author       = {Antonio Villal{\'{o}}n{-}Huerta and
                  Hector Marco{-}Gisbert and
                  Ismael Ripoll{-}Ripoll},
  title        = {A Taxonomy for Threat Actors' Persistence Techniques},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102855},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102855},
  doi          = {10.1016/J.COSE.2022.102855},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Villalon-Huerta22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/VorobyevK22,
  author       = {Ivan Vorobyev and
                  Anna Krivitskaya},
  title        = {Reducing false positives in bank anti-fraud systems based on rule
                  induction in distributed tree-based models},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102786},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102786},
  doi          = {10.1016/J.COSE.2022.102786},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/VorobyevK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Vu22,
  author       = {Duy{-}Hien Vu},
  title        = {Privacy-preserving Naive Bayes classification in semi-fully distributed
                  data model},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102630},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102630},
  doi          = {10.1016/J.COSE.2022.102630},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Vu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WalsheS22,
  author       = {Thomas Walshe and
                  Andrew C. Simpson},
  title        = {Coordinated Vulnerability Disclosure programme effectiveness: Issues
                  and recommendations},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102936},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102936},
  doi          = {10.1016/J.COSE.2022.102936},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WalsheS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangJTWH22,
  author       = {Wei Wang and
                  Songlei Jian and
                  Yusong Tan and
                  Qingbo Wu and
                  Chenlin Huang},
  title        = {Representation learning-based network intrusion detection system by
                  capturing explicit and implicit feature interactions},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102537},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102537},
  doi          = {10.1016/J.COSE.2021.102537},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangJTWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLCYW22,
  author       = {Zhi Wang and
                  Chaoge Liu and
                  Xiang Cui and
                  Jie Yin and
                  Xutong Wang},
  title        = {EvilModel 2.0: Bringing Neural Network Models into Malware Attacks},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102807},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102807},
  doi          = {10.1016/J.COSE.2022.102807},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLCYW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangLLS22,
  author       = {Jincheng Wang and
                  Zhuohua Li and
                  John C. S. Lui and
                  Mingshen Sun},
  title        = {Topology-theoretic approach to address attribute linkage attacks in
                  differential privacy},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102552},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102552},
  doi          = {10.1016/J.COSE.2021.102552},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSQLL22,
  author       = {Senmiao Wang and
                  Luli Sun and
                  Su{-}Juan Qin and
                  Wenmin Li and
                  Wentao Liu},
  title        = {KRTunnel: {DNS} channel detector for mobile devices},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102818},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102818},
  doi          = {10.1016/J.COSE.2022.102818},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSQLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangSWXZTZQ22,
  author       = {Jie Wang and
                  Jiaming Shi and
                  Xin Wen and
                  Liang Xu and
                  Ke Zhao and
                  Fuyang Tao and
                  Wenbiao Zhao and
                  Xiuying Qian},
  title        = {The effect of signal icon and persuasion strategy on warning design
                  in online fraud},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102839},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102839},
  doi          = {10.1016/J.COSE.2022.102839},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangSWXZTZQ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangWHLG22,
  author       = {Bo Wang and
                  Yue Wang and
                  Jiayao Hou and
                  Yi Li and
                  Yanqing Guo},
  title        = {Open-Set source camera identification based on envelope of data clustering
                  optimization {(EDCO)}},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102571},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102571},
  doi          = {10.1016/J.COSE.2021.102571},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangWHLG22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangWT22,
  author       = {Zihao Wang and
                  Fok Kar Wai and
                  Vrizlynn L. L. Thing},
  title        = {Machine learning for encrypted malicious traffic detection: Approaches,
                  datasets and comparative study},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102542},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102542},
  doi          = {10.1016/J.COSE.2021.102542},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangWT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangYJTL22,
  author       = {Jie Wang and
                  Zhaoxia Yin and
                  Jing Jiang and
                  Jin Tang and
                  Bin Luo},
  title        = {{PISA:} Pixel skipping-based attentional black-box adversarial attack},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102947},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102947},
  doi          = {10.1016/J.COSE.2022.102947},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangYJTL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangYWCZMR22,
  author       = {Qiuhua Wang and
                  Hui Yang and
                  Guohua Wu and
                  Kim{-}Kwang Raymond Choo and
                  Zheng Zhang and
                  Gongxun Miao and
                  Yizhi Ren},
  title        = {Black-box adversarial attacks on {XSS} attack detection model},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102554},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102554},
  doi          = {10.1016/J.COSE.2021.102554},
  timestamp    = {Wed, 10 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/WangYWCZMR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZXRC22,
  author       = {Chenguang Wang and
                  Tianqing Zhu and
                  Ping Xiong and
                  Wei Ren and
                  Kim{-}Kwang Raymond Choo},
  title        = {A privacy preservation method for multiple-source unstructured data
                  in online social networks},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102574},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102574},
  doi          = {10.1016/J.COSE.2021.102574},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZXRC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZXZH22,
  author       = {Chuanwang Wang and
                  Junjie Zhang and
                  Ming Xu and
                  Haodong Zhang and
                  Weili Han},
  title        = {{\#}Segments: {A} Dominant Factor of Password Security to Resist against
                  Data-driven Guessing},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102848},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102848},
  doi          = {10.1016/J.COSE.2022.102848},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZXZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangZZYC22,
  author       = {Zhen Wang and
                  Yitao Zheng and
                  Hai Zhu and
                  Chang Yang and
                  Tianyi Chen},
  title        = {Transferable adversarial examples can efficiently fool topic models},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102749},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102749},
  doi          = {10.1016/J.COSE.2022.102749},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangZZYC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WoodsB22,
  author       = {Daniel W. Woods and
                  Rainer B{\"{o}}hme},
  title        = {The commodification of consent},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102605},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102605},
  doi          = {10.1016/J.COSE.2022.102605},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WoodsB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuTCKS22,
  author       = {Jianyuan Wu and
                  Tianyao Tong and
                  Yifang Chen and
                  Xiangui Kang and
                  Wei Sun},
  title        = {An adversarial learning framework with cross-domain loss for median
                  filtered image restoration and anti-forensics},
  journal      = {Comput. Secur.},
  volume       = {112},
  pages        = {102497},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102497},
  doi          = {10.1016/J.COSE.2021.102497},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuTCKS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuWWFYL22,
  author       = {Songyun Wu and
                  Bo Wang and
                  Zhiliang Wang and
                  Shuhan Fan and
                  Jiahai Yang and
                  Jia Li},
  title        = {Joint prediction on security event and time interval through deep
                  learning},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102696},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102696},
  doi          = {10.1016/J.COSE.2022.102696},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuWWFYL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XieLZSX22,
  author       = {Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Peishuai Sun and
                  Hongbo Xu},
  title        = {Analysis and Detection against Network Attacks in the Overlapping
                  Phenomenon of Behavior Attribute},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102867},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102867},
  doi          = {10.1016/J.COSE.2022.102867},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XieLZSX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XueHWSZWL22,
  author       = {Mingfu Xue and
                  Can He and
                  Yinghao Wu and
                  Shichang Sun and
                  Yushu Zhang and
                  Jian Wang and
                  Weiqiang Liu},
  title        = {{PTB:} Robust physical backdoor attacks against deep neural networks
                  in real world},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102726},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102726},
  doi          = {10.1016/J.COSE.2022.102726},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XueHWSZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YadavMRVP22,
  author       = {Pooja Yadav and
                  Neeraj Menon and
                  Vinayakumar Ravi and
                  Sowmya Vishvanathan and
                  Tuan D. Pham},
  title        = {EfficientNet convolutional neural networks-based Android malware detection},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102622},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102622},
  doi          = {10.1016/J.COSE.2022.102622},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YadavMRVP22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YaminK22,
  author       = {Muhammad Mudassar Yamin and
                  Basel Katt},
  title        = {Modeling and executing cyber security exercise scenarios in cyber
                  ranges},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102635},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102635},
  doi          = {10.1016/J.COSE.2022.102635},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YaminK22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YaminK22a,
  author       = {Muhammad Mudassar Yamin and
                  Basel Katt},
  title        = {Use of cyber attack and defense agents in cyber ranges: {A} case study},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102892},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102892},
  doi          = {10.1016/J.COSE.2022.102892},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YaminK22a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YanM22,
  author       = {Xiaobei Yan and
                  Maode Ma},
  title        = {A privacy-preserving handover authentication protocol for a group
                  of {MTC} devices in 5G networks},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102601},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102601},
  doi          = {10.1016/J.COSE.2021.102601},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YanM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangHZWL22,
  author       = {Kunyu Yang and
                  Xuexian Hu and
                  Qihui Zhang and
                  Jianghong Wei and
                  Wenfen Liu},
  title        = {VAEPass: {A} lightweight passwords guessing model based on variational
                  auto-encoder},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102587},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102587},
  doi          = {10.1016/J.COSE.2021.102587},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangHZWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLLWWZH22,
  author       = {Zhen Yang and
                  Xiaodong Liu and
                  Tong Li and
                  Di Wu and
                  Jinjiang Wang and
                  Yunwei Zhao and
                  Han Han},
  title        = {A systematic literature review of methods and datasets for anomaly-based
                  network intrusion detection},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102675},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102675},
  doi          = {10.1016/J.COSE.2022.102675},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLLWWZH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangLSZW22,
  author       = {Jingcheng Yang and
                  Hongwei Li and
                  Shuo Shao and
                  Futai Zou and
                  Yue Wu},
  title        = {{FS-IDS:} {A} framework for intrusion detection based on few-shot
                  learning},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102899},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102899},
  doi          = {10.1016/J.COSE.2022.102899},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWKJB22,
  author       = {Wencheng Yang and
                  Song Wang and
                  James Jin Kang and
                  Michael N. Johnstone and
                  Aseel Bedari},
  title        = {A linear convolution-based cancelable fingerprint biometric authentication
                  system},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102583},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102583},
  doi          = {10.1016/J.COSE.2021.102583},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWKJB22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangWXXC22,
  author       = {Shaojie Yang and
                  Yongjun Wang and
                  Haoran Xu and
                  Fangliang Xu and
                  Mantun Chen},
  title        = {An Android Malware Detection and Classification Approach Based on
                  Contrastive Lerning},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102915},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102915},
  doi          = {10.1016/J.COSE.2022.102915},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangWXXC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YeohWPC22,
  author       = {William Yeoh and
                  Shan Wang and
                  Ales Popovic and
                  Noman H. Chowdhury},
  title        = {A systematic synthesis of critical success factors for cybersecurity},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102724},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102724},
  doi          = {10.1016/J.COSE.2022.102724},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YeohWPC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuS22,
  author       = {Mengran Yu and
                  Shiliang Sun},
  title        = {FE-DaST: Fast and effective data-free substitute training for black-box
                  adversarial attacks},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102555},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102555},
  doi          = {10.1016/J.COSE.2021.102555},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YuWWH22,
  author       = {Lianyi Yu and
                  Qiangjiang Wang and
                  Yan Wo and
                  Guoqiang Han},
  title        = {Secure biometric hashing against relation-based attacks via maximizing
                  min-entropy},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102750},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102750},
  doi          = {10.1016/J.COSE.2022.102750},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YuWWH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YunXLZS22,
  author       = {Xiaochun Yun and
                  Jiang Xie and
                  Shuhao Li and
                  Yongzheng Zhang and
                  Peishuai Sun},
  title        = {Detecting unknown HTTP-based malicious communication behavior via
                  generated adversarial flows and hierarchical traffic features},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102834},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102834},
  doi          = {10.1016/J.COSE.2022.102834},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YunXLZS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YustePT22,
  author       = {Javier Yuste and
                  Eduardo G. Pardo and
                  Juan Tapiador},
  title        = {Optimization of code caves in malware binaries to evade machine learning
                  detectors},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102643},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102643},
  doi          = {10.1016/J.COSE.2022.102643},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YustePT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangHLZD22,
  author       = {Zhaoxin Zhang and
                  Shize Huang and
                  Xiaowen Liu and
                  Bingjie Zhang and
                  Decun Dong},
  title        = {Adversarial attacks on {YOLACT} instance segmentation},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102682},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102682},
  doi          = {10.1016/J.COSE.2022.102682},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangHLZD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangJWWLY22,
  author       = {Chunying Zhang and
                  Donghao Jia and
                  Liya Wang and
                  Wenjie Wang and
                  Fengchun Liu and
                  Aimin Yang},
  title        = {Comparative research on network intrusion detection methods based
                  on machine learning},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102861},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102861},
  doi          = {10.1016/J.COSE.2022.102861},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangJWWLY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangLH22,
  author       = {Chunkai Zhang and
                  Xiaofeng Luo and
                  Peiyi Han},
  title        = {On-manifold adversarial attack based on latent space substitute model},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102770},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102770},
  doi          = {10.1016/J.COSE.2022.102770},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangM22,
  author       = {Haotian Zhang and
                  Xu Ma},
  title        = {Misleading attention and classification: An adversarial attack to
                  fool object detection models in the real world},
  journal      = {Comput. Secur.},
  volume       = {122},
  pages        = {102876},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102876},
  doi          = {10.1016/J.COSE.2022.102876},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhangYHGLWL22,
  author       = {Zongyang Zhang and
                  Jiayuan Yin and
                  Bin Hu and
                  Ting Gao and
                  Weihan Li and
                  Qianhong Wu and
                  Jianwei Liu},
  title        = {CLTracer: {A} Cross-Ledger Tracing framework based on address relationships},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102558},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102558},
  doi          = {10.1016/J.COSE.2021.102558},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhangYHGLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengLZC22,
  author       = {Tengfei Zheng and
                  Yuchuan Luo and
                  Tongqing Zhou and
                  Zhiping Cai},
  title        = {Towards differential access control and privacy-preserving for secure
                  media data sharing in the cloud},
  journal      = {Comput. Secur.},
  volume       = {113},
  pages        = {102553},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102553},
  doi          = {10.1016/J.COSE.2021.102553},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengLZC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengYLYM22,
  author       = {Faan Zheng and
                  Qiao Yan and
                  Victor C. M. Leung and
                  F. Richard Yu and
                  Zhong Ming},
  title        = {{HDP-CNN:} Highway deep pyramid convolution neural network combining
                  word-level and character-level representations for phishing website
                  detection},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102584},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102584},
  doi          = {10.1016/J.COSE.2021.102584},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengYLYM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhengZLRZW22,
  author       = {Zhangqi Zheng and
                  Bing Zhang and
                  Yongshan Liu and
                  Jiadong Ren and
                  Xuyang Zhao and
                  Qian Wang},
  title        = {An approach for predicting multiple-type overflow vulnerabilities
                  based on combination features and a time series neural network algorithm},
  journal      = {Comput. Secur.},
  volume       = {114},
  pages        = {102572},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2021.102572},
  doi          = {10.1016/J.COSE.2021.102572},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhengZLRZW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhongHZLC22,
  author       = {Fangtian Zhong and
                  Pengfei Hu and
                  Guoming Zhang and
                  Hong Li and
                  Xiuzhen Cheng},
  title        = {Reinforcement learning based adversarial malware example generation
                  against black-box detectors},
  journal      = {Comput. Secur.},
  volume       = {121},
  pages        = {102869},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102869},
  doi          = {10.1016/J.COSE.2022.102869},
  timestamp    = {Tue, 19 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhongHZLC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhouFWL22,
  author       = {Zhipeng Zhou and
                  Qiang Fu and
                  Qianjun Wei and
                  Qiang Li},
  title        = {{LEGO:} {A} hybrid toolkit for efficient 2PC-based privacy-preserving
                  machine learning},
  journal      = {Comput. Secur.},
  volume       = {120},
  pages        = {102782},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102782},
  doi          = {10.1016/J.COSE.2022.102782},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhouFWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuCDLLH22,
  author       = {Yiran Zhu and
                  Lei Cui and
                  Zhenquan Ding and
                  Lun Li and
                  Yongji Liu and
                  Zhiyu Hao},
  title        = {Black box attack and network intrusion detection using machine learning
                  for malicious traffic},
  journal      = {Comput. Secur.},
  volume       = {123},
  pages        = {102922},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102922},
  doi          = {10.1016/J.COSE.2022.102922},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuCDLLH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuJSWAC22,
  author       = {Jinting Zhu and
                  Julian Jang{-}Jaccard and
                  Amardeep Singh and
                  Ian Welch and
                  Harith Al{-}Sahaf and
                  Seyit Camtepe},
  title        = {A few-shot meta-learning based siamese neural network using entropy
                  features for ransomware classification},
  journal      = {Comput. Secur.},
  volume       = {117},
  pages        = {102691},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102691},
  doi          = {10.1016/J.COSE.2022.102691},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuJSWAC22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhuYPT22,
  author       = {Hui Zhu and
                  Fan Yin and
                  Shuangrong Peng and
                  Xiaohu Tang},
  title        = {Differentially private hierarchical tree with high efficiency},
  journal      = {Comput. Secur.},
  volume       = {118},
  pages        = {102727},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102727},
  doi          = {10.1016/J.COSE.2022.102727},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhuYPT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZolaSBGU22,
  author       = {Francesco Zola and
                  Lander Segurola{-}Gil and
                  Jan Lukas Bruse and
                  Mikel Galar and
                  Raul Orduna Urrutia},
  title        = {Network traffic analysis through node behaviour classification: a
                  graph-based approach with temporal dissection and data-level preprocessing},
  journal      = {Comput. Secur.},
  volume       = {115},
  pages        = {102632},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102632},
  doi          = {10.1016/J.COSE.2022.102632},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZolaSBGU22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/0005U21,
  author       = {N. Saravanan and
                  A. Umamakeswari},
  title        = {Lattice based access control for protecting user data in cloud environments
                  with hybrid security},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102074},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102074},
  doi          = {10.1016/J.COSE.2020.102074},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/0005U21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Adesemowo21,
  author       = {A. Kayode Adesemowo},
  title        = {Towards a conceptual definition for {IT} assets through interrogating
                  their nature and epistemic uncertainty},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102131},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102131},
  doi          = {10.1016/J.COSE.2020.102131},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Adesemowo21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AdjaHSZ21,
  author       = {Yves{-}Christian Adja Elloh and
                  Badis Hammi and
                  Ahmed Serhrouchni and
                  Sherali Zeadally},
  title        = {A blockchain-based certificate revocation management and status verification
                  system},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102209},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102209},
  doi          = {10.1016/J.COSE.2021.102209},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AdjaHSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AhmadMDKWB21,
  author       = {Atif Ahmad and
                  Sean B. Maynard and
                  Kevin C. Desouza and
                  James Kotsias and
                  Monica T. Whitty and
                  Richard L. Baskerville},
  title        = {How can organizations develop situation awareness for incident response:
                  {A} case study of management practice},
  journal      = {Comput. Secur.},
  volume       = {101},
  pages        = {102122},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102122},
  doi          = {10.1016/J.COSE.2020.102122},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AhmadMDKWB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AikenKWR21,
  author       = {William Aiken and
                  Hyoungshick Kim and
                  Simon S. Woo and
                  Jungwoo Ryoo},
  title        = {Neural network laundering: Removing black-box backdoor watermarks
                  from deep neural networks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102277},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102277},
  doi          = {10.1016/J.COSE.2021.102277},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AikenKWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-DuwairiJS21,
  author       = {Basheer Al{-}Duwairi and
                  Moath H. A. Jarrah and
                  Ahmed S. Shatnawi},
  title        = {{PASSVM:} {A} highly accurate fast flux detection system},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102431},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102431},
  doi          = {10.1016/J.COSE.2021.102431},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-DuwairiJS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Al-MalikiA21,
  author       = {Ossama Al{-}Maliki and
                  Hisham Al{-}Assam},
  title        = {Challenge-response mutual authentication protocol for {EMV} contactless
                  cards},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102186},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102186},
  doi          = {10.1016/J.COSE.2021.102186},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Al-MalikiA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlD21,
  author       = {Samed Al and
                  Murat Dener},
  title        = {{STL-HDL:} {A} new hybrid network intrusion detection system for imbalanced
                  dataset on big data environment},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102435},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102435},
  doi          = {10.1016/J.COSE.2021.102435},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlHusainA21,
  author       = {Reem AlHusain and
                  Ali Alkhalifah},
  title        = {Evaluating fallback authentication research: {A} systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102487},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102487},
  doi          = {10.1016/J.COSE.2021.102487},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlHusainA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlavizadehHKJ21,
  author       = {Hooman Alavizadeh and
                  Jin B. Hong and
                  Dong Seong Kim and
                  Julian Jang{-}Jaccard},
  title        = {Evaluating the effectiveness of shuffle and redundancy {MTD} techniques
                  in the cloud},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102091},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102091},
  doi          = {10.1016/J.COSE.2020.102091},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlavizadehHKJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlexR21,
  author       = {Scaria Alex and
                  T. Dhiliphan Rajkumar},
  title        = {Spider bird swarm algorithm with deep belief network for malicious
                  JavaScript detection},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102301},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102301},
  doi          = {10.1016/J.COSE.2021.102301},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlexR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlfosailN21,
  author       = {Malak Alfosail and
                  Peter Norris},
  title        = {Tor forensics: Proposed workflow for client memory artefacts},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102311},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102311},
  doi          = {10.1016/J.COSE.2021.102311},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlfosailN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlhogailA21,
  author       = {Areej Abdullah Alhogail and
                  Afrah Alsabih},
  title        = {Applying machine learning and natural language processing to detect
                  phishing email},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102414},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102414},
  doi          = {10.1016/J.COSE.2021.102414},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlhogailA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AliKT21,
  author       = {Mansoor Ali and
                  Hadis Karimipour and
                  Muhammad Tariq},
  title        = {Integration of blockchain and federated learning for Internet of Things:
                  Recent advances and future challenges},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102355},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102355},
  doi          = {10.1016/J.COSE.2021.102355},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AliLDBLA21,
  author       = {Syed Emad Azhar Ali and
                  Fong{-}Woon Lai and
                  P. D. D. Dominic and
                  Nicholas James Brown and
                  Paul Benjamin Lowry and
                  Rao Faizan Ali},
  title        = {Stock market reactions to favorable and unfavorable information security
                  events: {A} systematic literature review},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102451},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102451},
  doi          = {10.1016/J.COSE.2021.102451},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AliLDBLA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlomSAA21,
  author       = {Md. Zulfikar Alom and
                  Bikash Chandra Singh and
                  Zeyar Aung and
                  Mohammad Abdul Azim},
  title        = {Knapsack graph-based privacy checking for smart environments},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102240},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102240},
  doi          = {10.1016/J.COSE.2021.102240},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlomSAA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AloufiHLCC21,
  author       = {Asma Aloufi and
                  Peizhao Hu and
                  Hang Liu and
                  Sherman S. M. Chow and
                  Kim{-}Kwang Raymond Choo},
  title        = {Universal location referencing and homomorphic evaluation of geospatial
                  query},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102137},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102137},
  doi          = {10.1016/J.COSE.2020.102137},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AloufiHLCC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AlshaikhMA21,
  author       = {Moneer Alshaikh and
                  Sean B. Maynard and
                  Atif Ahmad},
  title        = {Applying social marketing to evaluate current security education training
                  and awareness programs in organisations},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102090},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102090},
  doi          = {10.1016/J.COSE.2020.102090},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlshaikhMA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AltarawnehSBHYS21,
  author       = {Amani Altarawneh and
                  Fei Sun and
                  Richard R. Brooks and
                  Oluwakemi Hambolu and
                  Lu Yu and
                  Anthony Skjellum},
  title        = {Availability analysis of a permissioned blockchain with a lightweight
                  consensus protocol},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102098},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102098},
  doi          = {10.1016/J.COSE.2020.102098},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AltarawnehSBHYS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AmerZE21,
  author       = {Eslam Amer and
                  Ivan Zelinka and
                  Shaker H. Ali El{-}Sappagh},
  title        = {A Multi-Perspective malware detection approach through behavioral
                  fusion of {API} call sequence},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102449},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102449},
  doi          = {10.1016/J.COSE.2021.102449},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AmerZE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AndradeGVA21,
  author       = {Eduardo Andrade and
                  Jorge Granjal and
                  Jo{\~{a}}o P. Vilela and
                  Carlos Arantes},
  title        = {A Security Gateway for power distribution systems in open networks},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102492},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102492},
  doi          = {10.1016/J.COSE.2021.102492},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AndradeGVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AnthiWJB21,
  author       = {Eirini Anthi and
                  Lowri Williams and
                  Amir Javed and
                  Pete Burnap},
  title        = {Hardening machine learning denial of service (DoS) defences against
                  adversarial attacks in IoT smart home networks},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102352},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102352},
  doi          = {10.1016/J.COSE.2021.102352},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AnthiWJB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AppiahQAK21,
  author       = {Benjamin Appiah and
                  Zhiguang Qin and
                  Mighty Abra Ayidzoe and
                  Ansuura JohnBosco Aristotle Kanpogninge},
  title        = {Decision tree pairwise metric learning against adversarial attacks},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102268},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102268},
  doi          = {10.1016/J.COSE.2021.102268},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AppiahQAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AriffinA21,
  author       = {Khairul Akram Zainol Ariffin and
                  Faris Hanif Ahmad},
  title        = {Indicators for maturity and readiness for digital forensic investigation
                  in era of industrial revolution 4.0},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102237},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102237},
  doi          = {10.1016/J.COSE.2021.102237},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AriffinA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AzeezMMSA21,
  author       = {Nureni Ayofe Azeez and
                  Sanjay Misra and
                  Ihotu Agbo Margaret and
                  Luis Fern{\'{a}}ndez Sanz and
                  Shafii Muhammad Abdulhamid},
  title        = {Adopting automated whitelist approach for detecting phishing attacks},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102328},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102328},
  doi          = {10.1016/J.COSE.2021.102328},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/AzeezMMSA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarracloughFW21,
  author       = {Phoebe A. Barraclough and
                  Gerhard Fehringer and
                  John Woodward},
  title        = {Intelligent cyber-phishing detection for online},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102123},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102123},
  doi          = {10.1016/J.COSE.2020.102123},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BarracloughFW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BaxMH21,
  author       = {Samantha Bax and
                  Tanya Jane McGill and
                  Valerie Hobbs},
  title        = {Maladaptive behaviour in response to email phishing threats: The roles
                  of rewards and response costs},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102278},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102278},
  doi          = {10.1016/J.COSE.2021.102278},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BaxMH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeamanBAHK21,
  author       = {Craig Beaman and
                  Ashley Barkworth and
                  Toluwalope David Akande and
                  Saqib Hakak and
                  Muhammad Khurram Khan},
  title        = {Ransomware: Recent advances, analysis, challenges and future research
                  directions},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102490},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102490},
  doi          = {10.1016/J.COSE.2021.102490},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeekLLV21,
  author       = {Maurice H. ter Beek and
                  Axel Legay and
                  Alberto Lluch{-}Lafuente and
                  Andrea Vandin},
  title        = {Quantitative Security Risk Modeling and Analysis with RisQFLan},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102381},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102381},
  doi          = {10.1016/J.COSE.2021.102381},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeekLLV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BinbeshrKPZ21,
  author       = {Farid Binbeshr and
                  Miss Laiha Mat Kiah and
                  Lip Yee Por and
                  Aws Alaa Zaidan},
  title        = {A systematic review of PIN-entry methods resistant to shoulder-surfing
                  attacks},
  journal      = {Comput. Secur.},
  volume       = {101},
  pages        = {102116},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102116},
  doi          = {10.1016/J.COSE.2020.102116},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BinbeshrKPZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BoahenBW21,
  author       = {Edward Kwadwo Boahen and
                  Brunel Elvire Bouya{-}Moko and
                  Changda Wang},
  title        = {Network anomaly detection in a controlled environment based on an
                  enhanced {PSOGSARFC}},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102225},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102225},
  doi          = {10.1016/J.COSE.2021.102225},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BoahenBW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BollmannTM21,
  author       = {Chad A. Bollmann and
                  Murali Tummala and
                  John C. McEachen},
  title        = {Resilient real-time network anomaly detection using novel non-parametric
                  statistical tests},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102146},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102146},
  doi          = {10.1016/J.COSE.2020.102146},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BollmannTM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BorzacchielloCD21,
  author       = {Luca Borzacchiello and
                  Emilio Coppa and
                  Camil Demetrescu},
  title        = {{FUZZOLIC:} Mixing fuzzing and concolic execution},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102368},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102368},
  doi          = {10.1016/J.COSE.2021.102368},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BorzacchielloCD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BostanipourT21,
  author       = {Behnaz Bostanipour and
                  George Theodorakopoulos},
  title        = {Joint obfuscation of location and its semantic information for privacy
                  protection},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102310},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102310},
  doi          = {10.1016/J.COSE.2021.102310},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BostanipourT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BotacinCSOG21,
  author       = {Marcus Botacin and
                  Fabricio Ceschin and
                  Ruimin Sun and
                  Daniela Oliveira and
                  Andr{\'{e}} Gr{\'{e}}gio},
  title        = {Challenges and pitfalls in malware research},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102287},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102287},
  doi          = {10.1016/J.COSE.2021.102287},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BotacinCSOG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BozkirTAK21,
  author       = {Ahmet Selman Bozkir and
                  Ersan Tahillioglu and
                  Murat Aydos and
                  Ilker Kara},
  title        = {Catch them alive: {A} malware detection approach through memory forensics,
                  manifold learning and computer vision},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102166},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102166},
  doi          = {10.1016/J.COSE.2020.102166},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BozkirTAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BrandaoRM21,
  author       = {Andr{\'{e}} Brand{\~{a}}o and
                  Jo{\~{a}}o S. Resende and
                  Rolando Martins},
  title        = {Hardening cryptographic operations through the use of secure enclaves},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102327},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102327},
  doi          = {10.1016/J.COSE.2021.102327},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BrandaoRM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BrownWBINSR21,
  author       = {Dane Brown and
                  T. Owens Walker III and
                  Justin A. Blanco and
                  Robert W. Ives and
                  Hau T. Ngo and
                  James Shey and
                  Ryan N. Rakvic},
  title        = {Detecting firmware modification on solid state drives via current
                  draw analysis},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102149},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102149},
  doi          = {10.1016/J.COSE.2020.102149},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BrownWBINSR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BuckOSVE21,
  author       = {Christoph Buck and
                  Christian Olenberger and
                  Andr{\'{e}} Schweizer and
                  Fabiane V{\"{o}}lter and
                  Torsten Eymann},
  title        = {Never trust, always verify: {A} multivocal literature review on current
                  knowledge and research gaps of zero-trust},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102436},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102436},
  doi          = {10.1016/J.COSE.2021.102436},
  timestamp    = {Wed, 13 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/BuckOSVE21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cabrero-Holgueras21,
  author       = {Jos{\'{e}} Cabrero{-}Holgueras and
                  Sergio Pastrana},
  title        = {A Methodology For Large-Scale Identification of Related Accounts in
                  Underground Forums},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102489},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102489},
  doi          = {10.1016/J.COSE.2021.102489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cabrero-Holgueras21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaiLX21,
  author       = {Lingru Cai and
                  Yao Li and
                  Zhi Xiong},
  title        = {JOWMDroid: Android malware detection based on feature weighting with
                  joint optimization of weight-mapping and classifier parameters},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102086},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102086},
  doi          = {10.1016/J.COSE.2020.102086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaiLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CalzavaraJKR21,
  author       = {Stefano Calzavara and
                  Hugo Jonker and
                  Benjamin Krumnow and
                  Alvise Rabitti},
  title        = {Measuring Web Session Security at Scale},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102472},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102472},
  doi          = {10.1016/J.COSE.2021.102472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CascavillaTH21,
  author       = {Giuseppe Cascavilla and
                  Damian A. Tamburri and
                  Willem{-}Jan van den Heuvel},
  title        = {Cybercrime threat intelligence: {A} systematic multi-vocal literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102258},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102258},
  doi          = {10.1016/J.COSE.2021.102258},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CascavillaTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CatilloPRV21,
  author       = {Marta Catillo and
                  Antonio Pecchia and
                  Massimiliano Rak and
                  Umberto Villano},
  title        = {Demystifying the role of public intrusion datasets: {A} replication
                  study of DoS network traffic data},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102341},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102341},
  doi          = {10.1016/J.COSE.2021.102341},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CatilloPRV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CaturanoPR21,
  author       = {Francesco Caturano and
                  Gaetano Perrone and
                  Simon Pietro Romano},
  title        = {Discovering reflected cross-site scripting vulnerabilities using a
                  multiobjective reinforcement learning environment},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102204},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102204},
  doi          = {10.1016/J.COSE.2021.102204},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CaturanoPR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CayirUD21,
  author       = {Aykut {\c{C}}ayir and
                  Ugur {\"{U}}nal and
                  Hasan Dag},
  title        = {Random CapsNet forest model for imbalanced malware type classification
                  task},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102133},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102133},
  doi          = {10.1016/J.COSE.2020.102133},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CayirUD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenLLLG21,
  author       = {Shaojie Chen and
                  Bo Lang and
                  Hongyu Liu and
                  Duokun Li and
                  Chuan Gao},
  title        = {{DNS} covert channel detection method using the {LSTM} model},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102095},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102095},
  doi          = {10.1016/J.COSE.2020.102095},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenLLLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenQLCL21,
  author       = {Haowen Chen and
                  Qiang Qu and
                  Yexiong Lin and
                  Xia Chen and
                  Keqin Li},
  title        = {Authenticity verification on social data outsourcing},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102077},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102077},
  doi          = {10.1016/J.COSE.2020.102077},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenQLCL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenYLJW21,
  author       = {Siqi Chen and
                  Yufei Yuan and
                  Xin (Robert) Luo and
                  Jie Jian and
                  Yan Wang},
  title        = {Discovering group-based transnational cyber fraud actives: {A} polymethodological
                  view},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102217},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102217},
  doi          = {10.1016/J.COSE.2021.102217},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenYLJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZSZX21,
  author       = {Xin Chen and
                  Tao Zhang and
                  Sheng Shen and
                  Tianqing Zhu and
                  Ping Xiong},
  title        = {An optimized differential privacy scheme with reinforcement learning
                  in {VANET}},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102446},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102446},
  doi          = {10.1016/J.COSE.2021.102446},
  timestamp    = {Wed, 06 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZSZX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZXCDHJ21,
  author       = {Jinyin Chen and
                  Haibin Zheng and
                  Hui Xiong and
                  Ruoxi Chen and
                  Tianyu Du and
                  Zhen Hong and
                  Shouling Ji},
  title        = {FineFool: {A} novel {DNN} object contour attack on image recognition
                  based on the attention perturbation adversarial technique},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102220},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102220},
  doi          = {10.1016/J.COSE.2021.102220},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZXCDHJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChenZZLF21,
  author       = {E. Chen and
                  Yan Zhu and
                  Guizhen Zhu and
                  Kaitai Liang and
                  Rongquan Feng},
  title        = {How to implement secure cloud file sharing using optimized attribute-based
                  access control with small policy matrix and minimized cumulative errors},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102318},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102318},
  doi          = {10.1016/J.COSE.2021.102318},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChenZZLF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChewCLCT21,
  author       = {Chit{-}Jie Chew and
                  Ying{-}Chin Chen and
                  Jung{-}San Lee and
                  Chih{-}Lung Chen and
                  Kuo{-}Yu Tsai},
  title        = {Preserving indomitable DDoS vitality through resurrection social hybrid
                  botnet},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102284},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102284},
  doi          = {10.1016/J.COSE.2021.102284},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChoJSJCK21,
  author       = {Mingi Cho and
                  Jaedong Jang and
                  Yezee Seo and
                  Seyeon Jeong and
                  Soochang Chung and
                  Taekyoung Kwon},
  title        = {Towards bidirectional LUT-level detection of hardware Trojans},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102223},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102223},
  doi          = {10.1016/J.COSE.2021.102223},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChoJSJCK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChooGCY21,
  author       = {Kim{-}Kwang Raymond Choo and
                  Keke Gai and
                  Luca Chiaraviglio and
                  Qing Yang},
  title        = {A multidisciplinary approach to Internet of Things (IoT) cybersecurity
                  and risk management},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102136},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102136},
  doi          = {10.1016/J.COSE.2020.102136},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChooGCY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ChuaOH21,
  author       = {Hui Na Chua and
                  Jie Sheng Ooi and
                  Anthony Jo{\'{e}}l Michel Herbland},
  title        = {The effects of different personal data categories on information privacy
                  concern and disclosure},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102453},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102453},
  doi          = {10.1016/J.COSE.2021.102453},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ChuaOH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CohenNTB21,
  author       = {Doron Cohen and
                  Or Naim and
                  Eran Toch and
                  Irad Ben{-}Gal},
  title        = {Website categorization via design attribute learning},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102312},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102312},
  doi          = {10.1016/J.COSE.2021.102312},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CohenNTB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CotroneoSN21,
  author       = {Domenico Cotroneo and
                  Luigi De Simone and
                  Roberto Natella},
  title        = {Timing covert channel analysis of the VxWorks {MILS} embedded hypervisor
                  under the common criteria security certification},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102307},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102307},
  doi          = {10.1016/J.COSE.2021.102307},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CotroneoSN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DabbaghCBTS21,
  author       = {Mohammad Dabbagh and
                  Kim{-}Kwang Raymond Choo and
                  Amin Beheshti and
                  Mohammad Tahir and
                  Nader Sohrabi Safa},
  title        = {A survey of empirical performance evaluation of permissioned blockchain
                  platforms: Challenges and opportunities},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102078},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102078},
  doi          = {10.1016/J.COSE.2020.102078},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DabbaghCBTS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DaiLQGYZ21,
  author       = {Yusheng Dai and
                  Hui Li and
                  Yekui Qian and
                  Yunling Guo and
                  Ruipeng Yang and
                  Min Zheng},
  title        = {Using {IRP} and local alignment method to detect distributed malware},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102109},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102109},
  doi          = {10.1016/J.COSE.2020.102109},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DaiLQGYZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DaviesMB21,
  author       = {Simon R. Davies and
                  Richard Macfarlane and
                  William J. Buchanan},
  title        = {Differential area analysis for ransomware attack detection within
                  mixed file datasets},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102377},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102377},
  doi          = {10.1016/J.COSE.2021.102377},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DaviesMB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DemighaL21,
  author       = {Oualid Demigha and
                  Ramzi Larguet},
  title        = {Hardware-based solutions for trusted cloud computing},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102117},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102117},
  doi          = {10.1016/J.COSE.2020.102117},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DemighaL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DerbyshireGH21,
  author       = {Richard Derbyshire and
                  Benjamin Green and
                  David Hutchison},
  title        = {"Talking a different Language": Anticipating adversary attack cost
                  for cyber risk assessment},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102163},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102163},
  doi          = {10.1016/J.COSE.2020.102163},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DerbyshireGH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DileeshS21,
  author       = {E. D. Dileesh and
                  A. P. Shanthi},
  title        = {An application specific dynamic behaviour model using function-call
                  sequence and memory access-graph for execution integrity verification},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102299},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102299},
  doi          = {10.1016/J.COSE.2021.102299},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DileeshS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuanZZQZP21,
  author       = {Yexin Duan and
                  Xingyu Zhou and
                  Junhua Zou and
                  Junyang Qiu and
                  Jin Zhang and
                  Zhisong Pan},
  title        = {Mask-guided noise restriction adversarial attacks for image classification},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102111},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102111},
  doi          = {10.1016/J.COSE.2020.102111},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuanZZQZP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/DuyTKHNP21,
  author       = {Phan The Duy and
                  Le Khac Tien and
                  Nghi Hoang Khoa and
                  Do Thi Thu Hien and
                  Anh Gia{-}Tuan Nguyen and
                  Van{-}Hau Pham},
  title        = {DIGFuPAS: Deceive {IDS} with {GAN} and function-preserving on adversarial
                  samples in SDN-enabled networks},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102367},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102367},
  doi          = {10.1016/J.COSE.2021.102367},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/DuyTKHNP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/El-ZawawyLC21,
  author       = {Mohamed A. El{-}Zawawy and
                  Eleonora Losiouk and
                  Mauro Conti},
  title        = {Vulnerabilities in Android webview objects: Still not the end!},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102395},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102395},
  doi          = {10.1016/J.COSE.2021.102395},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/El-ZawawyLC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangGHMFY21,
  author       = {Chen Fang and
                  Yuanbo Guo and
                  Yongjin Hu and
                  Bowen Ma and
                  Li Feng and
                  Anqi Yin},
  title        = {Privacy-preserving and communication-efficient federated learning
                  in Internet of Things},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102199},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102199},
  doi          = {10.1016/J.COSE.2021.102199},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangGHMFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FarshadkhahSF21,
  author       = {Sahar Farshadkhah and
                  Craig Van Slyke and
                  Bryan Fuller},
  title        = {Onlooker effect and affective responses in information security violation
                  mitigation},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102082},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102082},
  doi          = {10.1016/J.COSE.2020.102082},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FarshadkhahSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FerrettiMAC21,
  author       = {Luca Ferretti and
                  Federico Magnanini and
                  Mauro Andreolini and
                  Michele Colajanni},
  title        = {Survivable zero trust for cloud computing environments},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102419},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102419},
  doi          = {10.1016/J.COSE.2021.102419},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FerrettiMAC21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FilizACH21,
  author       = {Burak Filiz and
                  Budi Arief and
                  Or{\c{c}}un {\c{C}}etin and
                  Julio C. Hernandez{-}Castro},
  title        = {On the Effectiveness of Ransomware Decryption Tools},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102469},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102469},
  doi          = {10.1016/J.COSE.2021.102469},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FilizACH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FleurHGB21,
  author       = {Claire La Fleur and
                  Blaine Hoffman and
                  C. Benjamin Gibson and
                  Norbou Buchler},
  title        = {Team performance in a series of regional and national {US} cybersecurity
                  defense competitions: Generalizable effects of training and functional
                  role specialization},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102229},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102229},
  doi          = {10.1016/J.COSE.2021.102229},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FleurHGB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FormosaWR21,
  author       = {Paul Formosa and
                  Michael Wilson and
                  Deborah Richards},
  title        = {A principlist framework for cybersecurity ethics},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102382},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102382},
  doi          = {10.1016/J.COSE.2021.102382},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FormosaWR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FrenklachCSP21,
  author       = {Tatiana Frenklach and
                  Dvir Cohen and
                  Asaf Shabtai and
                  Rami Puzis},
  title        = {Android malware detection via an app similarity graph},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102386},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102386},
  doi          = {10.1016/J.COSE.2021.102386},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FriedL21,
  author       = {Asaf Fried and
                  Mark Last},
  title        = {Facing airborne attacks on {ADS-B} data with autoencoders},
  journal      = {Comput. Secur.},
  volume       = {109},
  pages        = {102405},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102405},
  doi          = {10.1016/J.COSE.2021.102405},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FriedL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Furnell21,
  author       = {Steven Furnell},
  title        = {The cybersecurity workforce and skills},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102080},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102080},
  doi          = {10.1016/J.COSE.2020.102080},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Furnell21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GalloMBV21,
  author       = {Luigi Gallo and
                  Alessandro Maiello and
                  Alessio Botta and
                  Giorgio Ventre},
  title        = {2 Years in the anti-phishing group of a large company},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102259},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102259},
  doi          = {10.1016/J.COSE.2021.102259},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GalloMBV21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GaoCZ21,
  author       = {Han Gao and
                  Shaoyin Cheng and
                  Weiming Zhang},
  title        = {GDroid: Android malware detection and classification with graph convolutional
                  network},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102264},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102264},
  doi          = {10.1016/J.COSE.2021.102264},
  timestamp    = {Thu, 07 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GaoCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GarciaD21,
  author       = {David Escudero Garc{\'{\i}}a and
                  Noem{\'{\i}} DeCastro{-}Garc{\'{\i}}a},
  title        = {Optimal feature configuration for dynamic malware detection},
  journal      = {Comput. Secur.},
  volume       = {105},
  pages        = {102250},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102250},
  doi          = {10.1016/J.COSE.2021.102250},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GarciaD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GargB21,
  author       = {Shivi Garg and
                  Niyati Baliyan},
  title        = {Android security assessment: {A} review, taxonomy and research gap
                  study},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102087},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102087},
  doi          = {10.1016/J.COSE.2020.102087},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/GargB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GibertMPM21,
  author       = {Daniel Gibert and
                  Carles Mateu and
                  Jordi Planes and
                  Jo{\~{a}}o Marques{-}Silva},
  title        = {Auditing static machine learning anti-Malware tools against metamorphic
                  attacks},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102159},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102159},
  doi          = {10.1016/J.COSE.2020.102159},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GibertMPM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GreenDKKPS21,
  author       = {Benjamin Green and
                  Richard Derbyshire and
                  Marina Krotofil and
                  William Knowles and
                  Daniel Prince and
                  Neeraj Suri},
  title        = {PCaaD: Towards automated determination and exploitation of industrial
                  systems},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102424},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102424},
  doi          = {10.1016/J.COSE.2021.102424},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GreenDKKPS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Griswold-Steiner21,
  author       = {Isaac Griswold{-}Steiner and
                  Zachary LeFevre and
                  Abdul Serwadda},
  title        = {Smartphone speech privacy concerns from side-channel attacks on facial
                  biomechanics},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102110},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102110},
  doi          = {10.1016/J.COSE.2020.102110},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Griswold-Steiner21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuL21,
  author       = {Jie Gu and
                  Shan Lu},
  title        = {An effective intrusion detection approach using {SVM} with na{\"{\i}}ve
                  Bayes feature embedding},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102158},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102158},
  doi          = {10.1016/J.COSE.2020.102158},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GudemePK21,
  author       = {Jaya Rao Gudeme and
                  Syam Kumar Pasupuleti and
                  Ramesh Kandukuri},
  title        = {Certificateless multi-replica public integrity auditing scheme for
                  dynamic shared data in cloud storage},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102176},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102176},
  doi          = {10.1016/J.COSE.2020.102176},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GudemePK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Guerra-Manzanares21,
  author       = {Alejandro Guerra{-}Manzanares and
                  Hayretdin Bahsi and
                  Sven N{\~{o}}mm},
  title        = {KronoDroid: Time-based Hybrid-featured Dataset for Effective Android
                  Malware Detection and Characterization},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102399},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102399},
  doi          = {10.1016/J.COSE.2021.102399},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GunesKB21,
  author       = {Bunyamin Gunes and
                  Gizem Kayisoglu and
                  Pelin Bolat},
  title        = {Cyber security risk assessment for seaports: {A} case study of a container
                  port},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {102196},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102196},
  doi          = {10.1016/J.COSE.2021.102196},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GunesKB21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoG21,
  author       = {Yimin Guo and
                  Yajun Guo},
  title        = {FogHA: An efficient handover authentication for mobile devices in
                  fog computing},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102358},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102358},
  doi          = {10.1016/J.COSE.2021.102358},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoLTH21,
  author       = {Yongyan Guo and
                  Jiayong Liu and
                  Wenwu Tang and
                  Cheng Huang},
  title        = {Exsense: Extract sensitive information from unstructured data},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102156},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102156},
  doi          = {10.1016/J.COSE.2020.102156},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoLTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/GuoZG21,
  author       = {Yimin Guo and
                  Zhenfeng Zhang and
                  Yajun Guo},
  title        = {Superword: {A} honeyword system for achieving higher security goals},
  journal      = {Comput. Secur.},
  volume       = {103},
  pages        = {101689},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2019.101689},
  doi          = {10.1016/J.COSE.2019.101689},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/GuoZG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HajarAK21,
  author       = {Muhammad Shadi Hajar and
                  M. Omar Al{-}Kadri and
                  Harsha Kumara Kalutarage},
  title        = {A survey on wireless body area networks: architecture, security challenges
                  and research opportunities},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102211},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102211},
  doi          = {10.1016/J.COSE.2021.102211},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HajarAK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HalimYWSAHAH21,
  author       = {Zahid Halim and
                  Muhammad Nadeem Yousaf and
                  Muhammad Waqas and
                  Muhammad Sulaiman and
                  Ghulam Abbas and
                  Masroor Hussain and
                  Iftekhar Ahmad and
                  Muhammad Hanif},
  title        = {An effective genetic algorithm-based feature selection method for
                  intrusion detection systems},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102448},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102448},
  doi          = {10.1016/J.COSE.2021.102448},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HalimYWSAHAH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HanX21,
  author       = {Chunling Han and
                  Rui Xue},
  title        = {Differentially private GANs by adding noise to Discriminator's loss},
  journal      = {Comput. Secur.},
  volume       = {107},
  pages        = {102322},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102322},
  doi          = {10.1016/J.COSE.2021.102322},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HanX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HannousseY21,
  author       = {Abdelhakim Hannousse and
                  Salima Yahiouche},
  title        = {Handling webshell attacks: {A} systematic mapping and survey},
  journal      = {Comput. Secur.},
  volume       = {108},
  pages        = {102366},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102366},
  doi          = {10.1016/J.COSE.2021.102366},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HannousseY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HariyantiDS21,
  author       = {Eva Hariyanti and
                  Arif Djunaidy and
                  Daniel Siahaan},
  title        = {Information security vulnerability prediction based on business process
                  model using machine learning approach},
  journal      = {Comput. Secur.},
  volume       = {110},
  pages        = {102422},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102422},
  doi          = {10.1016/J.COSE.2021.102422},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HariyantiDS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarshaMBSD21,
  author       = {Benjamin Harsha and
                  Robert Morton and
                  Jeremiah Blocki and
                  John A. Springer and
                  Melissa Dark},
  title        = {Bicycle attacks considered harmful: Quantifying the damage of widespread
                  password length leakage},
  journal      = {Comput. Secur.},
  volume       = {100},
  pages        = {102068},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102068},
  doi          = {10.1016/J.COSE.2020.102068},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/HarshaMBSD21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HarushMS21,
  author       = {Shimon Harush and
                  Yair Meidan and
                  Asaf Shabtai},
  title        = {DeepStream: Autoencoder-based stream temporal clustering and anomaly
                  detection},
  journal      = {Comput. Secur.},
  volume       = {106},
  pages        = {102276},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102276},
  doi          = {10.1016/J.COSE.2021.102276},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HarushMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeLLLLW21,
  author       = {Junjiang He and
                  Tao Li and
                  Beibei Li and
                  Xiaolong Lan and
                  Zhiyong Li and
                  Yunpeng Wang},
  title        = {An immune-based risk assessment method for digital virtual assets},
  journal      = {Comput. Secur.},
  volume       = {102},
  pages        = {102134},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2020.102134},
  doi          = {10.1016/J.COSE.2020.102134},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeLLLLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HeZM21,
  author       = {Ting He and
                  Yong Zheng and
                  Zherui Ma},
  title        = {Study of network time synchronisation security strategy based on polar
                  coding},
  journal      = {Comput. Secur.},
  volume       = {104},
  pages        = {102214},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102214},
  doi          = {10.1016/J.COSE.2021.102214},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HeZM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics