Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "stream:streams/journals/compsec:"
more than 1000 matches, exporting first 1000 hits only!
@article{DBLP:journals/compsec/AhmedKH24, author = {Kashan Ahmed and Syed Khaldoon Khurshid and Sadaf Hina}, title = {CyberEntRel: Joint extraction of cyber entities and relations using deep learning}, journal = {Comput. Secur.}, volume = {136}, pages = {103579}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103579}, doi = {10.1016/J.COSE.2023.103579}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AhmedKH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AvolaCMFFMM24, author = {Danilo Avola and Luigi Cinque and Maria De Marsico and Alessio Fagioli and Gian Luca Foresti and Maurizio Mancini and Alessio Mecca}, title = {Signal enhancement and efficient DTW-based comparison for wearable gait recognition}, journal = {Comput. Secur.}, volume = {137}, pages = {103643}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103643}, doi = {10.1016/J.COSE.2023.103643}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AvolaCMFFMM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AzimjonovK24, author = {Jahongir Azimjonov and Taehong Kim}, title = {Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear {SVM} and feature selectors}, journal = {Comput. Secur.}, volume = {137}, pages = {103598}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103598}, doi = {10.1016/J.COSE.2023.103598}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AzimjonovK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerensBDKKV24, author = {Benjamin Maximilian Berens and Mark Bohlender and Heike Dietmann and Chiara Krisam and Oksana Kulyk and Melanie Volkamer}, title = {Cookie disclaimers: Dark patterns and lack of transparency}, journal = {Comput. Secur.}, volume = {136}, pages = {103507}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103507}, doi = {10.1016/J.COSE.2023.103507}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BerensBDKKV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerensMV24, author = {Benjamin Maximilian Berens and Mattia Mossano and Melanie Volkamer}, title = {Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video}, journal = {Comput. Secur.}, volume = {137}, pages = {103620}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103620}, doi = {10.1016/J.COSE.2023.103620}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BerensMV24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BilikaMAP24, author = {Domna Bilika and Nikoletta Michopoulou and Efthimios Alepis and Constantinos Patsakis}, title = {Hello me, meet the real me: Voice synthesis attacks on voice assistants}, journal = {Comput. Secur.}, volume = {137}, pages = {103617}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103617}, doi = {10.1016/J.COSE.2023.103617}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BilikaMAP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BrownGA24, author = {Austin Brown and Maanak Gupta and Mahmoud Abdelsalam}, title = {Automated machine learning for deep learning based malware detection}, journal = {Comput. Secur.}, volume = {137}, pages = {103582}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103582}, doi = {10.1016/J.COSE.2023.103582}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BrownGA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaiXLCZ24, author = {Saihua Cai and Han Xu and Mingjie Liu and Zhilin Chen and Guofeng Zhang}, title = {A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism}, journal = {Comput. Secur.}, volume = {136}, pages = {103580}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103580}, doi = {10.1016/J.COSE.2023.103580}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CaiXLCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoYLZG24, author = {Yu Cao and Ang Yang and Hanning Li and Qingcheng Zeng and Jing Gao}, title = {A comprehensive knowledge map for {AI} improving security management of cyber-physical system enabled smart manufacturing}, journal = {Comput. Secur.}, volume = {137}, pages = {103650}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103650}, doi = {10.1016/J.COSE.2023.103650}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CaoYLZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CasolaBMO24, author = {Valentina Casola and Alessandra De Benedictis and Carlo Mazzocca and Vittorio Orbinato}, title = {Secure software development and testing: {A} model-based methodology}, journal = {Comput. Secur.}, volume = {137}, pages = {103639}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103639}, doi = {10.1016/J.COSE.2023.103639}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CasolaBMO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CheeGBK24, author = {Kok Onn Chee and Mengmeng Ge and Guangdong Bai and Dan Dongseong Kim}, title = {IoTSecSim: {A} framework for modelling and simulation of security in Internet of things}, journal = {Comput. Secur.}, volume = {136}, pages = {103534}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103534}, doi = {10.1016/J.COSE.2023.103534}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CheeGBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenDLC24, author = {Peng Chen and Xin Du and Zhihui Lu and Hongfeng Chai}, title = {Universal adversarial backdoor attacks to fool vertical federated learning}, journal = {Comput. Secur.}, volume = {137}, pages = {103601}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103601}, doi = {10.1016/J.COSE.2023.103601}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenDLC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenHK24, author = {Jiayi Chen and Urs Hengartner and Hassan Khan}, title = {{SHRIMPS:} {A} framework for evaluating multi-user, multi-modal implicit authentication systems}, journal = {Comput. Secur.}, volume = {137}, pages = {103594}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103594}, doi = {10.1016/J.COSE.2023.103594}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenHK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenJCZZYY24, author = {Ruoxi Chen and Haibo Jin and Jinyin Chen and Haibin Zheng and Shilian Zheng and Xiaoniu Yang and Xing Yang}, title = {AdvCheck: Characterizing adversarial examples via local gradient checking}, journal = {Comput. Secur.}, volume = {136}, pages = {103540}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103540}, doi = {10.1016/J.COSE.2023.103540}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenJCZZYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLL24, author = {Hongsong Chen and Xingyu Li and Wenmao Liu}, title = {Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model}, journal = {Comput. Secur.}, volume = {137}, pages = {103581}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103581}, doi = {10.1016/J.COSE.2023.103581}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenWZYTP24, author = {Shi Chen and Wennan Wang and Yubin Zhong and Zuobin Ying and Weixuan Tang and Zijie Pan}, title = {{HP-MIA:} {A} novel membership inference attack scheme for high membership prediction precision}, journal = {Comput. Secur.}, volume = {136}, pages = {103571}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103571}, doi = {10.1016/J.COSE.2023.103571}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenWZYTP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenYCDJLL24, author = {Yufan Chen and Jiahai Yang and Susu Cui and Cong Dong and Bo Jiang and Yuling Liu and Zhigang Lu}, title = {Unveiling encrypted traffic types through hierarchical network characteristics}, journal = {Comput. Secur.}, volume = {138}, pages = {103645}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103645}, doi = {10.1016/J.COSE.2023.103645}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenYCDJLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZLZ24, author = {Tieming Chen and Huan Zeng and Mingqi Lv and Tiantian Zhu}, title = {{CTIMD:} Cyber threat intelligence enhanced malware detection using {API} call sequences with parameters}, journal = {Comput. Secur.}, volume = {136}, pages = {103518}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103518}, doi = {10.1016/J.COSE.2023.103518}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiSLK24, author = {Wonwoo Choi and Minjae Seo and Seongman Lee and Brent ByungHoon Kang}, title = {SuM: Efficient shadow stack protection on {ARM} Cortex-M}, journal = {Comput. Secur.}, volume = {136}, pages = {103568}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103568}, doi = {10.1016/J.COSE.2023.103568}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChoiSLK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChowdhuryAT24, author = {Noman H. Chowdhury and Marc T. P. Adam and Timm Teubner}, title = {Withdrawal notice to 'Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures' [Computers {\&} Security, 97 {(2020)} 101931]}, journal = {Comput. Secur.}, volume = {137}, pages = {103393}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103393}, doi = {10.1016/J.COSE.2023.103393}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChowdhuryAT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoppaS24, author = {Emilio Coppa and Sebastian Schrittwieser}, title = {Editorial: Special issue on {ARES} 2022}, journal = {Comput. Secur.}, volume = {138}, pages = {103662}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103662}, doi = {10.1016/J.COSE.2023.103662}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CoppaS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CorinS24, author = {Roberto Doriguzzi Corin and Domenico Siracusa}, title = {{FLAD:} Adaptive Federated Learning for DDoS attack detection}, journal = {Comput. Secur.}, volume = {137}, pages = {103597}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103597}, doi = {10.1016/J.COSE.2023.103597}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CorinS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Dubin24, author = {Ran Dubin}, title = {Content Disarm and Reconstruction of Microsoft Office {OLE} files}, journal = {Comput. Secur.}, volume = {137}, pages = {103647}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103647}, doi = {10.1016/J.COSE.2023.103647}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Dubin24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DunstonR24, author = {Snofy D. Dunston and V. Mary Anita Rajam}, title = {{AIPA:} An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability}, journal = {Comput. Secur.}, volume = {136}, pages = {103574}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103574}, doi = {10.1016/J.COSE.2023.103574}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DunstonR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DurstHZ24, author = {Susanne Durst and Christoph Hinteregger and Malgorzata Zieba}, title = {The effect of environmental turbulence on cyber security risk management and organizational resilience}, journal = {Comput. Secur.}, volume = {137}, pages = {103591}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103591}, doi = {10.1016/J.COSE.2023.103591}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DurstHZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandoK24, author = {Damien Warren Fernando and Nikos Komninos}, title = {FeSAD ransomware detection framework with machine learning using adaption to concept drift}, journal = {Comput. Secur.}, volume = {137}, pages = {103629}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103629}, doi = {10.1016/J.COSE.2023.103629}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FernandoK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GadallahIO24, author = {Waheed G. Gadallah and Hosny M. Ibrahim and Nagwa M. Omar}, title = {A deep learning technique to detect distributed denial of service attacks in software-defined networks}, journal = {Comput. Secur.}, volume = {137}, pages = {103588}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103588}, doi = {10.1016/J.COSE.2023.103588}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GadallahIO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GengWFZWG24, author = {Jiaxuan Geng and Junfeng Wang and Zhiyang Fang and Yingjie Zhou and Di Wu and Wenhan Ge}, title = {A survey of strategy-driven evasion methods for {PE} malware: Transformation, concealment, and attack}, journal = {Comput. Secur.}, volume = {137}, pages = {103595}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103595}, doi = {10.1016/J.COSE.2023.103595}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GengWFZWG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GernotR24, author = {Tanguy Gernot and Christophe Rosenberger}, title = {Robust biometric scheme against replay attacks using one-time biometric templates}, journal = {Comput. Secur.}, volume = {137}, pages = {103586}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103586}, doi = {10.1016/J.COSE.2023.103586}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GernotR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GongLLYG24, author = {Zhimao Gong and Junyi Li and Yaping Lin and Lening Yuan and Wen Gao}, title = {A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing}, journal = {Comput. Secur.}, volume = {138}, pages = {103659}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103659}, doi = {10.1016/J.COSE.2023.103659}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GongLLYG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuerraManzanares24, author = {Alejandro Guerra{-}Manzanares}, title = {Machine Learning for Android Malware Detection: Mission Accomplished? {A} Comprehensive Review of Open Challenges and Future Perspectives}, journal = {Comput. Secur.}, volume = {138}, pages = {103654}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103654}, doi = {10.1016/J.COSE.2023.103654}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuerraManzanares24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoLX24, author = {Ping Guo and Wenfeng Liang and Shuilong Xu}, title = {A privacy preserving four-factor authentication protocol for internet of medical things}, journal = {Comput. Secur.}, volume = {137}, pages = {103632}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103632}, doi = {10.1016/J.COSE.2023.103632}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoLX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeSXHTZ24, author = {Ying He and Zhili Shen and Chang Xia and Jingyu Hua and Wei Tong and Sheng Zhong}, title = {{SGBA:} {A} stealthy scapegoat backdoor attack against deep neural networks}, journal = {Comput. Secur.}, volume = {136}, pages = {103523}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103523}, doi = {10.1016/J.COSE.2023.103523}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HeSXHTZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeXZXY24, author = {Xinlong He and Yang Xu and Sicong Zhang and Weida Xu and Jiale Yan}, title = {Enhance membership inference attacks in federated learning}, journal = {Comput. Secur.}, volume = {136}, pages = {103535}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103535}, doi = {10.1016/J.COSE.2023.103535}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HeXZXY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HnamteNNHS24, author = {Vanlalruata Hnamte and Ashfaq Ahmad Najar and Hong Nhung{-}Nguyen and Jamal Hussain and Manohar Naik Sugali}, title = {DDoS attack detection and mitigation using deep neural network in {SDN} environment}, journal = {Comput. Secur.}, volume = {138}, pages = {103661}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103661}, doi = {10.1016/J.COSE.2023.103661}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HnamteNNHS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HoffmanHPMA24, author = {Cameron John Hoffman and C. Jordan Howell and Robert C. Perkins and David Maimon and Olena Antonaccio}, title = {Predicting new hackers' criminal careers: {A} group-based trajectory approach}, journal = {Comput. Secur.}, volume = {137}, pages = {103649}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103649}, doi = {10.1016/J.COSE.2023.103649}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HoffmanHPMA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangWWB24, author = {Jiahao Huang and Mi Wen and Minjie Wei and Yanbing Bi}, title = {Enhancing the transferability of adversarial samples with random noise techniques}, journal = {Comput. Secur.}, volume = {136}, pages = {103541}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103541}, doi = {10.1016/J.COSE.2023.103541}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuangWWB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangYZDYY24, author = {Yuxian Huang and Geng Yang and Hao Zhou and Hua Dai and Dong Yuan and Shui Yu}, title = {{VPPFL:} {A} verifiable privacy-preserving federated learning scheme against poisoning attacks}, journal = {Comput. Secur.}, volume = {136}, pages = {103562}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103562}, doi = {10.1016/J.COSE.2023.103562}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuangYZDYY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZZHC24, author = {Haoxiang Huang and Jianbiao Zhang and Lei Zhang and Jun Hu and Yihao Cao}, title = {{SABDTM:} Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node}, journal = {Comput. Secur.}, volume = {137}, pages = {103648}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103648}, doi = {10.1016/J.COSE.2023.103648}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuangZZHC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaLL24, author = {Cheng{-}kun Jia and Min Long and Yong{-}chao Liu}, title = {Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network}, journal = {Comput. Secur.}, volume = {137}, pages = {103640}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103640}, doi = {10.1016/J.COSE.2023.103640}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JiaLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KavrestadRN24, author = {Joakim K{\"{a}}vrestad and Jana Rambusch and Marcus Nohlberg}, title = {Design principles for cognitively accessible cybersecurity training}, journal = {Comput. Secur.}, volume = {137}, pages = {103630}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103630}, doi = {10.1016/J.COSE.2023.103630}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KavrestadRN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalilBK24, author = {Shaymaa Mamdouh Khalil and Hayretdin Bahsi and Tarmo Kor{\~{o}}tko}, title = {Threat modeling of industrial control systems: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {136}, pages = {103543}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103543}, doi = {10.1016/J.COSE.2023.103543}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KhalilBK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalilFHM24, author = {Fatima Mavra Khalil and Adnan Fazil and Muhammad Jawad Hussain and Ammar Masood}, title = {Cross-Layer {RF} Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems}, journal = {Comput. Secur.}, volume = {137}, pages = {103633}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103633}, doi = {10.1016/J.COSE.2023.103633}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KhalilFHM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KonstaLSD24, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Beatrice Spiga and Nicola Dragoni}, title = {Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers {\&} Security Volume 137, February 2024, 103602]}, journal = {Comput. Secur.}, volume = {138}, pages = {103660}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103660}, doi = {10.1016/J.COSE.2023.103660}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KonstaLSD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KonstaLSD24a, author = {Alyzia Maria Konsta and Alberto Lluch{-}Lafuente and Beatrice Spiga and Nicola Dragoni}, title = {Survey: Automatic generation of attack trees and attack graphs}, journal = {Comput. Secur.}, volume = {137}, pages = {103602}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103602}, doi = {10.1016/J.COSE.2023.103602}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KonstaLSD24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KozikFPPPC24, author = {Rafal Kozik and Massimo Ficco and Aleksandra Pawlicka and Marek Pawlicki and Francesco Palmieri and Michal Choras}, title = {When explainability turns into a threat - using xAI to fool a fake news detection method}, journal = {Comput. Secur.}, volume = {137}, pages = {103599}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103599}, doi = {10.1016/J.COSE.2023.103599}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KozikFPPPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KruzikovaMKDSM24, author = {Agata Kruzikova and Michal Muzik and Lenka Knapova and Lenka Dedkova and David Smahel and Vashek Matyas}, title = {Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction}, journal = {Comput. Secur.}, volume = {138}, pages = {103667}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103667}, doi = {10.1016/J.COSE.2023.103667}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KruzikovaMKDSM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KrzyworzekaOO24, author = {Natalia Krzyworzeka and Lidia Ogiela and Marek R. Ogiela}, title = {Personal CAPTCHA-based authentication protocol}, journal = {Comput. Secur.}, volume = {137}, pages = {103613}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103613}, doi = {10.1016/J.COSE.2023.103613}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KrzyworzekaOO24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LanduytWJ24, author = {Dimitri Van Landuyt and Vincent Wijshoff and Wouter Joosen}, title = {A study of NoSQL query injection in Neo4j}, journal = {Comput. Secur.}, volume = {137}, pages = {103590}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103590}, doi = {10.1016/J.COSE.2023.103590}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LanduytWJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCCZ24, author = {Junchen Li and Guang Cheng and Zongyao Chen and Peng Zhao}, title = {Protocol clustering of unknown traffic based on embedding of protocol specification}, journal = {Comput. Secur.}, volume = {136}, pages = {103575}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103575}, doi = {10.1016/J.COSE.2023.103575}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiHLFYL24, author = {Junhao Li and Junjiang He and Wenshan Li and Wenbo Fang and Geying Yang and Tao Li}, title = {SynDroid: An adaptive enhanced Android malware classification method based on {CTGAN-SVM}}, journal = {Comput. Secur.}, volume = {137}, pages = {103604}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103604}, doi = {10.1016/J.COSE.2023.103604}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiHLFYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiSGYL24, author = {Huang Li and Yiqin Sang and Hongjuan Ge and Jie Yan and Shijia Li}, title = {Anomaly detection of aviation data bus based on {SAE} and {IMD}}, journal = {Comput. Secur.}, volume = {137}, pages = {103619}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103619}, doi = {10.1016/J.COSE.2023.103619}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiSGYL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiXSSZLZ24, author = {Xiang Li and Jiang Xie and Qige Song and Yafei Sang and Yongzheng Zhang and Shuhao Li and Tianning Zang}, title = {Let model keep evolving: Incremental learning for encrypted traffic classification}, journal = {Comput. Secur.}, volume = {137}, pages = {103624}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103624}, doi = {10.1016/J.COSE.2023.103624}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiXSSZLZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZWWSW24, author = {Xixing Li and Lei Zhao and Qiang Wei and Zehui Wu and Weiming Shi and Yunchao Wang}, title = {SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices}, journal = {Comput. Secur.}, volume = {138}, pages = {103618}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103618}, doi = {10.1016/J.COSE.2023.103618}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiZWWSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangHZZ24, author = {Chuang Liang and Jie Huang and Zeping Zhang and Shuaishuai Zhang}, title = {Defending against model extraction attacks with {OOD} feature learning and decision boundary confusion}, journal = {Comput. Secur.}, volume = {136}, pages = {103563}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103563}, doi = {10.1016/J.COSE.2023.103563}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiangHZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LilhoreDS24, author = {Umesh Kumar Lilhore and Surjeet Dalal and Sarita Simaiya}, title = {A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning}, journal = {Comput. Secur.}, volume = {136}, pages = {103560}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103560}, doi = {10.1016/J.COSE.2023.103560}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LilhoreDS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuPZF24, author = {Side Liu and Guojun Peng and Haitao Zeng and Jianming Fu}, title = {A survey on the evolution of fileless attacks and detection techniques}, journal = {Comput. Secur.}, volume = {137}, pages = {103653}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103653}, doi = {10.1016/J.COSE.2023.103653}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuPZF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuSLL24, author = {Ming Liu and Xiao Song and Yong Li and Wenxin Li}, title = {Correlated differential privacy based logistic regression for supplier data protection}, journal = {Comput. Secur.}, volume = {136}, pages = {103542}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103542}, doi = {10.1016/J.COSE.2023.103542}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuSLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaG24, author = {Zihan Ma and Tianchong Gao}, title = {Federated learning backdoor attack detection with persistence diagram}, journal = {Comput. Secur.}, volume = {136}, pages = {103557}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103557}, doi = {10.1016/J.COSE.2023.103557}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MaG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaMJG24, author = {Xirong Ma and Chuan Ma and Yali Jiang and Chunpeng Ge}, title = {Improved privacy-preserving {PCA} using optimized homomorphic matrix multiplication}, journal = {Comput. Secur.}, volume = {138}, pages = {103658}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103658}, doi = {10.1016/J.COSE.2023.103658}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MaMJG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MayerHE24, author = {Rudolf Mayer and Markus Hittmeir and Andreas Ekelhart}, title = {Distance-based linkage of personal microbiome records for identification and its privacy implications}, journal = {Comput. Secur.}, volume = {136}, pages = {103538}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103538}, doi = {10.1016/J.COSE.2023.103538}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MayerHE24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MestariLD24, author = {Soumia Zohra El Mestari and Gabriele Lenzini and H{\"{u}}seyin Demirci}, title = {Preserving data privacy in machine learning systems}, journal = {Comput. Secur.}, volume = {137}, pages = {103605}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103605}, doi = {10.1016/J.COSE.2023.103605}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MestariLD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeursCCJA24, author = {Tom Meurs and Edward J. Cartwright and Anna Cartwright and Marianne Junger and Abhishta Abhishta}, title = {Deception in double extortion ransomware attacks: An analysis of profitability and credibility}, journal = {Comput. Secur.}, volume = {138}, pages = {103670}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103670}, doi = {10.1016/J.COSE.2023.103670}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MeursCCJA24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MikuleticVSZ24, author = {Samanta Mikuletic and Simon Vrhovec and Brigita Skela{-}Savic and Bostjan Zvanut}, title = {Security and privacy oriented information security culture {(ISC):} Explaining unauthorized access to healthcare data by nursing employees}, journal = {Comput. Secur.}, volume = {136}, pages = {103489}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103489}, doi = {10.1016/J.COSE.2023.103489}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MikuleticVSZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitchellMR24, author = {Jeff Mitchell and Niall McLaughlin and Jes{\'{u}}s Mart{\'{\i}}nez del Rinc{\'{o}}n}, title = {Generating sparse explanations for malicious Android opcode sequences using hierarchical {LIME}}, journal = {Comput. Secur.}, volume = {137}, pages = {103637}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103637}, doi = {10.1016/J.COSE.2023.103637}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MitchellMR24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NajafiPCM24, author = {Pejman Najafi and Wenzel P{\"{u}}nter and Feng Cheng and Christoph Meinel}, title = {You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation}, journal = {Comput. Secur.}, volume = {136}, pages = {103519}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103519}, doi = {10.1016/J.COSE.2023.103519}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NajafiPCM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OuytselDL24, author = {Charles{-}Henry Bertrand Van Ouytsel and Khanh{-}Huu{-}The Dam and Axel Legay}, title = {Analysis of machine learning approaches to packing detection}, journal = {Comput. Secur.}, volume = {136}, pages = {103536}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103536}, doi = {10.1016/J.COSE.2023.103536}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/OuytselDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkKPC24, author = {Eun Hee Park and Jongwoo Kim and Young Soon Park and Kyung Hee Chun}, title = {Facilitating and impeding factors to insiders' prosocial rule breaking in South Korea}, journal = {Comput. Secur.}, volume = {136}, pages = {103572}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103572}, doi = {10.1016/J.COSE.2023.103572}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ParkKPC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PayaAGG24, author = {Antonio Paya and Sergio Arroni and Vicente Garc{\'{\i}}a{-}D{\'{\i}}az and Alberto G{\'{o}}mez}, title = {Apollon: {A} robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems}, journal = {Comput. Secur.}, volume = {136}, pages = {103546}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103546}, doi = {10.1016/J.COSE.2023.103546}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PayaAGG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PiGCSYP24, author = {Ben Pi and Chun Guo and Yunhe Cui and Guowei Shen and Jialong Yang and Yuan Ping}, title = {Remote access trojan traffic early detection method based on Markov matrices and deep learning}, journal = {Comput. Secur.}, volume = {137}, pages = {103628}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103628}, doi = {10.1016/J.COSE.2023.103628}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PiGCSYP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PrasadC24, author = {Arvind Prasad and Shalini Chandra}, title = {PhiUSIIL: {A} diverse security profile empowered phishing {URL} detection framework based on similarity index and incremental learning}, journal = {Comput. Secur.}, volume = {136}, pages = {103545}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103545}, doi = {10.1016/J.COSE.2023.103545}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PrasadC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PrummerSB24, author = {Julia Pr{\"{u}}mmer and Tommy van Steen and Bibi van den Berg}, title = {A systematic review of current cybersecurity training methods}, journal = {Comput. Secur.}, volume = {136}, pages = {103585}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103585}, doi = {10.1016/J.COSE.2023.103585}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PrummerSB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QinJDD24, author = {Xingsheng Qin and Frank Jiang and Chengzu Dong and Robin Doss}, title = {A hybrid cyber defense framework for reconnaissance attack in industrial control systems}, journal = {Comput. Secur.}, volume = {136}, pages = {103506}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103506}, doi = {10.1016/J.COSE.2023.103506}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/QinJDD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RekaKRS24, author = {R. Reka and R. Karthick and R. Saravana Ram and Gurkirpal Singh}, title = {Multi head self-attention gated graph convolutional network based multi{\unicode{8209}}attack intrusion detection in {MANET}}, journal = {Comput. Secur.}, volume = {136}, pages = {103526}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103526}, doi = {10.1016/J.COSE.2023.103526}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RekaKRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RibeiroGC24, author = {Liliana Ribeiro and In{\^{e}}s Sousa Guedes and Carla Sofia Cardoso}, title = {Which factors predict susceptibility to phishing? An empirical study}, journal = {Comput. Secur.}, volume = {136}, pages = {103558}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103558}, doi = {10.1016/J.COSE.2023.103558}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RibeiroGC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RizviW24, author = {Syed Rizvi and Iyonna Williams}, title = {Analyzing transparency and malicious insiders prevention for cloud computing environment}, journal = {Comput. Secur.}, volume = {137}, pages = {103622}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103622}, doi = {10.1016/J.COSE.2023.103622}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RizviW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RodriguezKS24, author = {Jes{\'{u}}s Garc{\'{\i}}a Rodr{\'{\i}}guez and Stephan Krenn and Daniel Slamanig}, title = {To pass or not to pass: Privacy-preserving physical access control}, journal = {Comput. Secur.}, volume = {136}, pages = {103566}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103566}, doi = {10.1016/J.COSE.2023.103566}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RodriguezKS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RustamJ24, author = {Furqan Rustam and Anca Delia Jurcut}, title = {Malicious traffic detection in multi-environment networks using novel {S-DATE} and {PSO-D-SEM} approaches}, journal = {Comput. Secur.}, volume = {136}, pages = {103564}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103564}, doi = {10.1016/J.COSE.2023.103564}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RustamJ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SanchezCBP24, author = {Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Alberto Huertas Celdr{\'{a}}n and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Single-board device individual authentication based on hardware performance and autoencoder transformer models}, journal = {Comput. Secur.}, volume = {137}, pages = {103596}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103596}, doi = {10.1016/J.COSE.2023.103596}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SanchezCBP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Schiavone24, author = {Antonio Giovanni Schiavone}, title = {Municipality2HTTPS: {A} study on {HTTPS} protocol's usage in Italian municipalities' websites}, journal = {Comput. Secur.}, volume = {137}, pages = {103592}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103592}, doi = {10.1016/J.COSE.2023.103592}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Schiavone24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SethuramanSRRK24, author = {Sibi Chakkaravarthy Sethuraman and Devi Priya V. S and Tarun Reddi and Mulka Sai Tharun Reddy and Muhammad Khurram Khan}, title = {A comprehensive examination of email spoofing: Issues and prospects for email security}, journal = {Comput. Secur.}, volume = {137}, pages = {103600}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103600}, doi = {10.1016/J.COSE.2023.103600}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SethuramanSRRK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShankarAKJTK24, author = {Deepa D. Shankar and Adresya Suresh Azhakath and Nesma Khalil and Sajeev J and Mahalakshmi T and Sheeba K}, title = {Data mining for cyber biosecurity risk management - {A} comprehensive review}, journal = {Comput. Secur.}, volume = {137}, pages = {103627}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103627}, doi = {10.1016/J.COSE.2023.103627}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShankarAKJTK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenS24, author = {Quan Shen and Yanming Shen}, title = {Endpoint security reinforcement via integrated zero-trust systems: {A} collaborative approach}, journal = {Comput. Secur.}, volume = {136}, pages = {103537}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103537}, doi = {10.1016/J.COSE.2023.103537}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShenS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Skeoch24, author = {Henry R. K. Skeoch}, title = {Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers {\&} Security Volume 112 {(2022)} 102533]}, journal = {Comput. Secur.}, volume = {138}, pages = {103657}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103657}, doi = {10.1016/J.COSE.2023.103657}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Skeoch24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SongSZHWXZ24, author = {Haina Song and Hua Shen and Nan Zhao and Zhangqing He and Minghu Wu and Wei Xiong and Mingwu Zhang}, title = {{APLDP:} Adaptive personalized local differential privacy data collection in mobile crowdsensing}, journal = {Comput. Secur.}, volume = {136}, pages = {103517}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103517}, doi = {10.1016/J.COSE.2023.103517}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SongSZHWXZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SumanK24, author = {Suman and Raees Ahmad Khan}, title = {An optimized neural network for prediction of security threats on software testing}, journal = {Comput. Secur.}, volume = {137}, pages = {103626}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103626}, doi = {10.1016/J.COSE.2023.103626}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SumanK24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunZCZ24, author = {Hui Sun and Tianqing Zhu and Wenhan Chang and Wanlei Zhou}, title = {A two-stage model extraction attack on GANs with a small collected dataset}, journal = {Comput. Secur.}, volume = {137}, pages = {103634}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103634}, doi = {10.1016/J.COSE.2023.103634}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SunZCZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TahaYAMY24, author = {Kamal Taha and Paul D. Yoo and Yousof Al{-}Hammadi and Sami Muhaidat and Chan Yeob Yeun}, title = {Learning a deep-feature clustering model for gait-based individual identification}, journal = {Comput. Secur.}, volume = {136}, pages = {103559}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103559}, doi = {10.1016/J.COSE.2023.103559}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TahaYAMY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TaoLS24, author = {Shouzheng Tao and Yezheng Liu and Chunhua Sun}, title = {Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China}, journal = {Comput. Secur.}, volume = {138}, pages = {103646}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103646}, doi = {10.1016/J.COSE.2023.103646}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TaoLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TuptukH24, author = {Nilufer Tuptuk and Stephen Hailes}, title = {Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation}, journal = {Comput. Secur.}, volume = {137}, pages = {103593}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103593}, doi = {10.1016/J.COSE.2023.103593}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TuptukH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TurukmaneD24, author = {Anil V. Turukmane and Ramkumar Devendiran}, title = {M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning}, journal = {Comput. Secur.}, volume = {137}, pages = {103587}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103587}, doi = {10.1016/J.COSE.2023.103587}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TurukmaneD24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VoDN24, author = {Hoang V. Vo and Hanh Phuong Du and Hoa Ngoc Nguyen}, title = {{APELID:} Enhancing real-time intrusion detection with augmented {WGAN} and parallel ensemble learning}, journal = {Comput. Secur.}, volume = {136}, pages = {103567}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103567}, doi = {10.1016/J.COSE.2023.103567}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VoDN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSW24, author = {Wenjie Wang and Yuanhai Shao and Yiju Wang}, title = {Optimization-based adversarial perturbations against twin support vector machines}, journal = {Comput. Secur.}, volume = {136}, pages = {103573}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103573}, doi = {10.1016/J.COSE.2023.103573}, timestamp = {Fri, 12 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangWWS24, author = {Xintong Wang and Zixuan Wang and Enliang Wang and Zhixin Sun}, title = {Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection}, journal = {Comput. Secur.}, volume = {137}, pages = {103636}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103636}, doi = {10.1016/J.COSE.2023.103636}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangWWS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangYJZC24, author = {Wenbo Wang and Peng Yi and Junfang Jiang and Peng Zhang and Xiang Chen}, title = {Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack}, journal = {Comput. Secur.}, volume = {136}, pages = {103533}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103533}, doi = {10.1016/J.COSE.2023.103533}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangYJZC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangYLZZG24, author = {Xiaoyu Wang and Xiaobo Yang and Xueping Liang and Xiu Zhang and Wei Zhang and Xiaorui Gong}, title = {Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection}, journal = {Comput. Secur.}, volume = {137}, pages = {103583}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103583}, doi = {10.1016/J.COSE.2023.103583}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangYLZZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZCZL24, author = {Maoli Wang and Xiaodong Zang and Jianbo Cao and Bowen Zhang and Shengbao Li}, title = {PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network}, journal = {Comput. Secur.}, volume = {138}, pages = {103668}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103668}, doi = {10.1016/J.COSE.2023.103668}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangZCZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZW24, author = {Meng Wang and Yahao Zhang and WeiPing Wen}, title = {Improved capsule networks based on Nash equilibrium for malicious code classification}, journal = {Comput. Secur.}, volume = {136}, pages = {103503}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103503}, doi = {10.1016/J.COSE.2023.103503}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WengLLL24, author = {Juanjuan Weng and Zhiming Luo and Dazhen Lin and Shaozi Li}, title = {Comparative evaluation of recent universal adversarial perturbations in image classification}, journal = {Comput. Secur.}, volume = {136}, pages = {103576}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103576}, doi = {10.1016/J.COSE.2023.103576}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WengLLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WengLLL24a, author = {Juanjuan Weng and Zhiming Luo and Dazhen Lin and Shaozi Li}, title = {Learning transferable targeted universal adversarial perturbations by sequential meta-learning}, journal = {Comput. Secur.}, volume = {137}, pages = {103584}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103584}, doi = {10.1016/J.COSE.2023.103584}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WengLLL24a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WilliamsZG24, author = {Jason A. Williams and Humayun Zafar and Saurabh Gupta}, title = {Fortifying healthcare: An action research approach to developing an effective {SETA} program}, journal = {Comput. Secur.}, volume = {138}, pages = {103655}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103655}, doi = {10.1016/J.COSE.2023.103655}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WilliamsZG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WoodsS24, author = {Naomi Woods and Mikko T. Siponen}, title = {How memory anxiety can influence password security behavior}, journal = {Comput. Secur.}, volume = {137}, pages = {103589}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103589}, doi = {10.1016/J.COSE.2023.103589}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WoodsS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WurzenbergerHLS24, author = {Markus Wurzenberger and Georg H{\"{o}}ld and Max Landauer and Florian Skopik}, title = {Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security}, journal = {Comput. Secur.}, volume = {137}, pages = {103631}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103631}, doi = {10.1016/J.COSE.2023.103631}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WurzenbergerHLS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaoZYYZLL24, author = {Xi Xiao and Xiang Zhou and Zhenyu Yang and Le Yu and Bin Zhang and Qixu Liu and Xiapu Luo}, title = {A comprehensive analysis of website fingerprinting defenses on Tor}, journal = {Comput. Secur.}, volume = {136}, pages = {103577}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103577}, doi = {10.1016/J.COSE.2023.103577}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XiaoZYYZLL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiaoZZLDL24, author = {Haitao Xiao and Yan Zhu and Bin Zhang and Zhigang Lu and Dan Du and Yuling Liu}, title = {Unveiling shadows: {A} comprehensive framework for insider threat detection based on statistical and sequential analysis}, journal = {Comput. Secur.}, volume = {138}, pages = {103665}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103665}, doi = {10.1016/J.COSE.2023.103665}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XiaoZZLDL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuT24, author = {Jiacheng Xu and Chengxiang Tan}, title = {Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks}, journal = {Comput. Secur.}, volume = {137}, pages = {103565}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103565}, doi = {10.1016/J.COSE.2023.103565}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XuT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLW24, author = {Benyuan Yang and Lili Luo and Zhimeng Wang}, title = {Ensuring secure interoperation of access control in a multidomain environment}, journal = {Comput. Secur.}, volume = {137}, pages = {103621}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103621}, doi = {10.1016/J.COSE.2023.103621}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YangLW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWZCH24, author = {Hongyu Yang and Youwei Wang and Liang Zhang and Xiang Cheng and Ze Hu}, title = {A novel Android malware detection method with {API} semantics extraction}, journal = {Comput. Secur.}, volume = {137}, pages = {103651}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103651}, doi = {10.1016/J.COSE.2023.103651}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YangWZCH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YehASKXN24, author = {Jyh{-}haw Yeh and Md Mashrur Arifin and Ning Shen and Ujwal Karki and Yi Xie and Archana Nanjundarao}, title = {Integrity coded databases - protecting data integrity for outsourced databases}, journal = {Comput. Secur.}, volume = {136}, pages = {103569}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103569}, doi = {10.1016/J.COSE.2023.103569}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YehASKXN24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuWW24, author = {Rongwei Yu and Yong Wang and Wang Wang}, title = {{AMAD:} Active learning-based multivariate time series anomaly detection for large-scale {IT} systems}, journal = {Comput. Secur.}, volume = {137}, pages = {103603}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103603}, doi = {10.1016/J.COSE.2023.103603}, timestamp = {Fri, 09 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YuWW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuanHHYKZ24, author = {Xinwei Yuan and Shu Han and Wei Huang and Hongliang Ye and Xianglong Kong and Fan Zhang}, title = {A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system}, journal = {Comput. Secur.}, volume = {137}, pages = {103644}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103644}, doi = {10.1016/J.COSE.2023.103644}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YuanHHYKZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangXLYLGF24, author = {Xiyuan Zhang and Gang Xiong and Zhen Li and Chen Yang and Xinjie Lin and Gaopeng Gou and Binxing Fang}, title = {Traffic spills the beans: {A} robust video identification attack against YouTube}, journal = {Comput. Secur.}, volume = {137}, pages = {103623}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103623}, doi = {10.1016/J.COSE.2023.103623}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangXLYLGF24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangY24, author = {Longwen Zhang and Qiao Yan}, title = {Detect malicious websites by building a neural network to capture global and local features of websites}, journal = {Comput. Secur.}, volume = {137}, pages = {103641}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103641}, doi = {10.1016/J.COSE.2023.103641}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zhao24, author = {Rui Zhao}, title = {Toward the flow-centric detection of browser fingerprinting}, journal = {Comput. Secur.}, volume = {137}, pages = {103642}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103642}, doi = {10.1016/J.COSE.2023.103642}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Zhao24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoJHLP24, author = {Xiaojuan Zhao and Rong Jiang and Yue Han and Aiping Li and Zhichao Peng}, title = {A survey on cybersecurity knowledge graph construction}, journal = {Comput. Secur.}, volume = {136}, pages = {103524}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103524}, doi = {10.1016/J.COSE.2023.103524}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoJHLP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoLZYSXZZ24, author = {Ziming Zhao and Zhaoxuan Li and Zhihao Zhou and Jiongchi Yu and Zhuoxue Song and Xiaofei Xie and Fan Zhang and Rui Zhang}, title = {DDoS family: {A} novel perspective for massive types of DDoS attacks}, journal = {Comput. Secur.}, volume = {138}, pages = {103663}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103663}, doi = {10.1016/J.COSE.2023.103663}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoLZYSXZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoYGH24, author = {Xuan Zhao and Jia Yu and Xinrui Ge and Rong Hao}, title = {Towards efficient Secure Boolean Range Query over encrypted spatial data}, journal = {Comput. Secur.}, volume = {136}, pages = {103544}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103544}, doi = {10.1016/J.COSE.2023.103544}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoYGH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouC24, author = {Man Zhou and Xin Che}, title = {Stealthy attack detection based on controlled invariant subspace for autonomous vehicles}, journal = {Comput. Secur.}, volume = {137}, pages = {103635}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103635}, doi = {10.1016/J.COSE.2023.103635}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhouC24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouG24, author = {Peng Zhou and Yuhan Gao}, title = {Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs}, journal = {Comput. Secur.}, volume = {137}, pages = {103625}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103625}, doi = {10.1016/J.COSE.2023.103625}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhouG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuCZW24, author = {Erzhou Zhu and Kang Cheng and Zhizheng Zhang and Huabin Wang}, title = {{PDHF:} Effective phishing detection model combining optimal artificial and automatic deep features}, journal = {Comput. Secur.}, volume = {136}, pages = {103561}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103561}, doi = {10.1016/J.COSE.2023.103561}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhuCZW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuCZZ24, author = {Zhengwei Zhu and Miaojie Chen and Chenyang Zhu and Yanping Zhu}, title = {Effective defense strategies in network security using improved double dueling deep Q-network}, journal = {Comput. Secur.}, volume = {136}, pages = {103578}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103578}, doi = {10.1016/J.COSE.2023.103578}, timestamp = {Fri, 26 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhuCZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZouCWFQS24, author = {Binghui Zou and Chunjie Cao and Longjuan Wang and Sizheng Fu and Tonghua Qiao and Jingzhang Sun}, title = {{FACILE:} {A} capsule network with fewer capsules and richer hierarchical information for malware image classification}, journal = {Comput. Secur.}, volume = {137}, pages = {103606}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2023.103606}, doi = {10.1016/J.COSE.2023.103606}, timestamp = {Sat, 10 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZouCWFQS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/0001CE23, author = {Anna Cartwright and Edward J. Cartwright and Esther Solomon Edun}, title = {Cascading information on best practice: Cyber security risk management in {UK} micro and small businesses and the role of {IT} companies}, journal = {Comput. Secur.}, volume = {131}, pages = {103288}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103288}, doi = {10.1016/J.COSE.2023.103288}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0001CE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/0001R023, author = {Philipp K{\"{u}}hn and David N. Relke and Christian Reuter}, title = {Common vulnerability scoring system prediction based on open source intelligence information sources}, journal = {Comput. Secur.}, volume = {131}, pages = {103286}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103286}, doi = {10.1016/J.COSE.2023.103286}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0001R023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AabyGBT23, author = {Peter Aaby and Mario Valerio Giuffrida and William J. Buchanan and Zhiyuan Tan}, title = {An omnidirectional approach to touch-based continuous authentication}, journal = {Comput. Secur.}, volume = {128}, pages = {103146}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103146}, doi = {10.1016/J.COSE.2023.103146}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AabyGBT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AbuabedAT23, author = {Zaina Abuabed and Ahmad S. Alsadeh and Adel Taweel}, title = {{STRIDE} threat model-based framework for assessing the vulnerabilities of modern vehicles}, journal = {Comput. Secur.}, volume = {133}, pages = {103391}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103391}, doi = {10.1016/J.COSE.2023.103391}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AbuabedAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AebissaDM23, author = {Berhanu Aebissa and Gurpreet Dhillon and Million Meshesha}, title = {The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks}, journal = {Comput. Secur.}, volume = {130}, pages = {103248}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103248}, doi = {10.1016/J.COSE.2023.103248}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AebissaDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Afzaal0J23, author = {Hamra Afzaal and Muhammad Imran and Muhammad Umar Janjua}, title = {Formal verification of fraud-resilience in a crowdsourcing consensus protocol}, journal = {Comput. Secur.}, volume = {131}, pages = {103290}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103290}, doi = {10.1016/J.COSE.2023.103290}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Afzaal0J23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AggarwalD23, author = {Akshay Aggarwal and Ram Kumar Dhurkari}, title = {Association between stress and information security policy non-compliance behavior: {A} meta-analysis}, journal = {Comput. Secur.}, volume = {124}, pages = {102991}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102991}, doi = {10.1016/J.COSE.2022.102991}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AggarwalD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AgyepongCRB23, author = {Enoch Agyepong and Yulia Cherdantseva and Philipp Reinecke and Pete Burnap}, title = {A systematic method for measuring the performance of a cyber security operations centre analyst}, journal = {Comput. Secur.}, volume = {124}, pages = {102959}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102959}, doi = {10.1016/J.COSE.2022.102959}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AgyepongCRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhnL23, author = {Na{-}Young Ahn and Dong Hoon Lee}, title = {IoT security: On-chip secure deletion scheme using {ECC} modulation in IoT appliances}, journal = {Comput. Secur.}, volume = {133}, pages = {103422}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103422}, doi = {10.1016/J.COSE.2023.103422}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhnL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhvanooeyZOMMCL23, author = {Milad Taleby Ahvanooey and Mark Xuefang Zhu and Shiyan Ou and Hassan Dana Mazraeh and Wojciech Mazurczyk and Kim{-}Kwang Raymond Choo and Chuan Li}, title = {AFPr-AM: {A} novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms}, journal = {Comput. Secur.}, volume = {130}, pages = {103263}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103263}, doi = {10.1016/J.COSE.2023.103263}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhvanooeyZOMMCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AinslieTMA23, author = {Scott Ainslie and Dean Thompson and Sean B. Maynard and Atif Ahmad}, title = {Cyber-threat intelligence for security decision-making: {A} review and research agenda for practice}, journal = {Comput. Secur.}, volume = {132}, pages = {103352}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103352}, doi = {10.1016/J.COSE.2023.103352}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AinslieTMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AkiyamaSFYSY23, author = {Mitsuaki Akiyama and Shugo Shiraishi and Akifumi Fukumoto and Ryota Yoshimoto and Eitaro Shioji and Toshihiro Yamauchi}, title = {Seeing is not always believing: Insights on IoT manufacturing from firmware composition analysis and vendor survey}, journal = {Comput. Secur.}, volume = {133}, pages = {103389}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103389}, doi = {10.1016/J.COSE.2023.103389}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkiyamaSFYSY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AktarN23, author = {Sharmin Aktar and Abdullah Yasin Nur}, title = {Towards DDoS attack detection using deep learning approach}, journal = {Comput. Secur.}, volume = {129}, pages = {103251}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103251}, doi = {10.1016/J.COSE.2023.103251}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AktarN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-SarairehA23, author = {Jaafer Al{-}Saraireh and Mohammad Rasool AlJa'afreh}, title = {Keystroke and swipe biometrics fusion to enhance smartphones authentication}, journal = {Comput. Secur.}, volume = {125}, pages = {103022}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103022}, doi = {10.1016/J.COSE.2022.103022}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Al-SarairehA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlEmariSF23, author = {Salam Al{-}Emari and Yousef K. Sanjalawe and Salam Fraihat}, title = {Detection of obfuscated Tor traffic based on bidirectional generative adversarial networks and vision transform}, journal = {Comput. Secur.}, volume = {135}, pages = {103512}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103512}, doi = {10.1016/J.COSE.2023.103512}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlEmariSF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlSlaimanSSW23, author = {Muhanned AlSlaiman and Mohammed I. Salman and Mariam M. Saleh and Bin Wang}, title = {Enhancing false negative and positive rates for efficient insider threat detection}, journal = {Comput. Secur.}, volume = {126}, pages = {103066}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103066}, doi = {10.1016/J.COSE.2022.103066}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlSlaimanSSW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlacaC23, author = {Yusuf Alaca and Y{\"{u}}ksel {\c{C}}elik}, title = {Cyber attack detection with {QR} code images using lightweight deep learning models}, journal = {Comput. Secur.}, volume = {126}, pages = {103065}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103065}, doi = {10.1016/J.COSE.2022.103065}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlacaC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlanaziMC23, author = {Manar Alanazi and Abdun Mahmood and Mohammad Jabed Morshed Chowdhury}, title = {{SCADA} vulnerabilities and attacks: {A} review of the state-of-the-art and open issues}, journal = {Comput. Secur.}, volume = {125}, pages = {103028}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103028}, doi = {10.1016/J.COSE.2022.103028}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlanaziMC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlaniMM23, author = {Mohammed M. Alani and Atefeh Mashatan and Ali Miri}, title = {XMal: {A} lightweight memory-based explainable obfuscated-malware detector}, journal = {Comput. Secur.}, volume = {133}, pages = {103409}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103409}, doi = {10.1016/J.COSE.2023.103409}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlaniMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlaouiTMN23, author = {El Arbi Abdellaoui Alaoui and St{\'{e}}phane C{\'{e}}dric Koum{\'{e}}tio T{\'{e}}kouabou and Yassine Maleh and Anand Nayyar}, title = {Corrigendum to "Towards to intelligent routing for {DTN} protocols using machine learning techniques" [Simulation Modelling Practice and Theory 117 {(2022)} 102475]}, journal = {Comput. Secur.}, volume = {124}, pages = {103012}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103012}, doi = {10.1016/J.COSE.2022.103012}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlaouiTMN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlbaneseIA23, author = {Massimiliano Albanese and Ibifubara Iganibo and Olutola Adebiyi}, title = {A framework for designing vulnerability metrics}, journal = {Comput. Secur.}, volume = {132}, pages = {103382}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103382}, doi = {10.1016/J.COSE.2023.103382}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlbaneseIA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlexCAAS23, author = {Christin Alex and Giselle Creado and Wesam Almobaideen and Orieb Abu Alghanam and Maha Saadeh}, title = {A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms}, journal = {Comput. Secur.}, volume = {132}, pages = {103283}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103283}, doi = {10.1016/J.COSE.2023.103283}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlexCAAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlghamdiB23, author = {Rubayyi Alghamdi and Martine Bella{\"{\i}}che}, title = {A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks}, journal = {Comput. Secur.}, volume = {125}, pages = {103014}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103014}, doi = {10.1016/J.COSE.2022.103014}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlghamdiB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlhelalyDO23, author = {Yasser Alhelaly and Gurpreet Dhillon and Tiago Oliveira}, title = {When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection}, journal = {Comput. Secur.}, volume = {134}, pages = {103470}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103470}, doi = {10.1016/J.COSE.2023.103470}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AlhelalyDO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AliKAAAAQ23, author = {Hassan Ali and Muhammad Suleman Khan and Amer AlGhadhban and Meshari Alazmi and Ahmed Alzamil and Khaled Al{-}Utaibi and Junaid Qadir}, title = {Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis}, journal = {Comput. Secur.}, volume = {132}, pages = {103367}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103367}, doi = {10.1016/J.COSE.2023.103367}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliKAAAAQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlrajaBA23, author = {Mansour Naser Alraja and Usman Javed Butt and Maysam Abbod}, title = {Information security policies compliance in a global setting: An employee's perspective}, journal = {Comput. Secur.}, volume = {129}, pages = {103208}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103208}, doi = {10.1016/J.COSE.2023.103208}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlrajaBA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Altaf00LB23, author = {Tanzeela Altaf and Xu Wang and Wei Ni and Ren Ping Liu and Robin Braun}, title = {NE-GConv: {A} lightweight node edge graph convolutional network for intrusion detection}, journal = {Comput. Secur.}, volume = {130}, pages = {103285}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103285}, doi = {10.1016/J.COSE.2023.103285}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Altaf00LB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlzaqebahAA23, author = {Abdullah Alzaqebah and Ibrahim Aljarah and Omar Sultan Al{-}Kadi}, title = {A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization}, journal = {Comput. Secur.}, volume = {124}, pages = {102957}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102957}, doi = {10.1016/J.COSE.2022.102957}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlzaqebahAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AndradeSJYHK23, author = {Ricardo de Andrade and Max Mauro Dias Santos and Jo{\~{a}}o Francisco Justo and Leopoldo Rideki Yoshioka and Hans{-}Joachim Hof and Jo{\~{a}}o Henrique Kleinschmidt}, title = {Security architecture for automotive communication networks with {CAN} {FD}}, journal = {Comput. Secur.}, volume = {129}, pages = {103203}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103203}, doi = {10.1016/J.COSE.2023.103203}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AndradeSJYHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AratA23, author = {Ferhat Arat and Sedat Akleylek}, title = {Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited}, journal = {Comput. Secur.}, volume = {128}, pages = {103174}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103174}, doi = {10.1016/J.COSE.2023.103174}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AratA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArroyabeAAA23, author = {Ignacio Fernandez De Arroyabe and Carlos F. A. Arranz and Marta F. Arroyabe and Juan Carlos Fernandez de Arroyabe}, title = {Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: {A} {UK} survey for 2018 and 2019}, journal = {Comput. Secur.}, volume = {124}, pages = {102954}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102954}, doi = {10.1016/J.COSE.2022.102954}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArroyabeAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AshrafRAG23, author = {Mohamed Ashraf and Sherine Rady and Tamer Abdelkader and Tarek F. Gharib}, title = {Efficient privacy preserving algorithms for hiding sensitive high utility itemsets}, journal = {Comput. Secur.}, volume = {132}, pages = {103360}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103360}, doi = {10.1016/J.COSE.2023.103360}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AshrafRAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AzzamPPN23, author = {Mazen Azzam and Liliana Pasquale and Gregory M. Provan and Bashar Nuseibeh}, title = {Forensic readiness of industrial control systems under stealthy attacks}, journal = {Comput. Secur.}, volume = {125}, pages = {103010}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103010}, doi = {10.1016/J.COSE.2022.103010}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AzzamPPN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BC23, author = {Judy Flavia B and Balika J. Chelliah}, title = {Artificial lizard search optimized fuzzy logic approach to addressing authentication and data security challenges in {P2P} cloud environments}, journal = {Comput. Secur.}, volume = {135}, pages = {103475}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103475}, doi = {10.1016/J.COSE.2023.103475}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BansalTS23, author = {Gaurav Bansal and Jason Thatcher and Sebastian Walter Schuetz}, title = {Where authorities fail and experts excel: Influencing internet users' compliance intentions}, journal = {Comput. Secur.}, volume = {128}, pages = {103164}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103164}, doi = {10.1016/J.COSE.2023.103164}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BansalTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarrereHO23, author = {Mart{\'{\i}}n Barr{\`{e}}re and Chris Hankin and Dean O'Reilly}, title = {Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems}, journal = {Comput. Secur.}, volume = {132}, pages = {103348}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103348}, doi = {10.1016/J.COSE.2023.103348}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarrereHO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarretoRWF23, author = {Carlos A. Barreto and Olof Reinert and Tobias Wiesinger and Ulrik Franke}, title = {Duopoly insurers' incentives for data quality under a mandatory cyber data sharing regime}, journal = {Comput. Secur.}, volume = {131}, pages = {103292}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103292}, doi = {10.1016/J.COSE.2023.103292}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarretoRWF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BashendyTE23, author = {May Bashendy and Ashraf Tantawy and Abdelkarim Erradi}, title = {Intrusion response systems for cyber-physical systems: {A} comprehensive survey}, journal = {Comput. Secur.}, volume = {124}, pages = {102984}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102984}, doi = {10.1016/J.COSE.2022.102984}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BashendyTE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BasileSCRC23, author = {Cataldo Basile and Bjorn De Sutter and Daniele Canavese and Leonardo Regano and Bart Coppens}, title = {Design, implementation, and automation of a risk management approach for man-at-the-End software protection}, journal = {Comput. Secur.}, volume = {132}, pages = {103321}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103321}, doi = {10.1016/J.COSE.2023.103321}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BasileSCRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BayerFR23, author = {Markus Bayer and Tobias Frey and Christian Reuter}, title = {Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence}, journal = {Comput. Secur.}, volume = {134}, pages = {103430}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103430}, doi = {10.1016/J.COSE.2023.103430}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BayerFR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BegovicAM23, author = {Kenan Begovic and Abdulaziz Al{-}Ali and Qutaibah M. Malluhi}, title = {Cryptographic ransomware encryption detection: Survey}, journal = {Comput. Secur.}, volume = {132}, pages = {103349}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103349}, doi = {10.1016/J.COSE.2023.103349}, timestamp = {Mon, 18 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BegovicAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BekkersGHHSL23, author = {Luuk Bekkers and Susanne van 't Hoff{-}De Goede and Ellen Misana{-}ter Huurne and Ynze van Houten and Remco Spithoven and Eric Rutger Leukfeldt}, title = {Protecting your business against ransomware attacks? Explaining the motivations of entrepreneurs to take future protective measures against cybercrimes using an extended protection motivation theory model}, journal = {Comput. Secur.}, volume = {127}, pages = {103099}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103099}, doi = {10.1016/J.COSE.2023.103099}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BekkersGHHSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BellmanO23, author = {Christopher Bellman and Paul C. van Oorschot}, title = {Systematic analysis and comparison of security advice as datasets}, journal = {Comput. Secur.}, volume = {124}, pages = {102989}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102989}, doi = {10.1016/J.COSE.2022.102989}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BellmanO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeltranC23, author = {Marta Beltr{\'{a}}n and Miguel Calvo}, title = {A privacy threat model for identity verification based on facial recognition}, journal = {Comput. Secur.}, volume = {132}, pages = {103324}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103324}, doi = {10.1016/J.COSE.2023.103324}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeltranC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerardiG0MOP23, author = {Davide Berardi and Saverio Giallorenzo and Andrea Melis and Simone Melloni and Loris Onori and Marco Prandini}, title = {Data Flooding against Ransomware: Concepts and Implementations}, journal = {Comput. Secur.}, volume = {131}, pages = {103295}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103295}, doi = {10.1016/J.COSE.2023.103295}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BerardiG0MOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BertoliJSS23, author = {Gustavo de Carvalho Bertoli and Louren{\c{c}}o Alves Pereira J{\'{u}}nior and Osamu Saotome and Aldri Luiz dos Santos}, title = {Generalizing intrusion detection for heterogeneous networks: {A} stacked-unsupervised federated learning approach}, journal = {Comput. Secur.}, volume = {127}, pages = {103106}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103106}, doi = {10.1016/J.COSE.2023.103106}, timestamp = {Wed, 17 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BertoliJSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeuJZ0HLB23, author = {Nathan Beu and Asangi Jayatilaka and Mansooreh Zahedi and Ali Babar and Laura Hartley and Winston Lewinsmith and Irina Baetu}, title = {Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation}, journal = {Comput. Secur.}, volume = {131}, pages = {103313}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103313}, doi = {10.1016/J.COSE.2023.103313}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeuJZ0HLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeuranVBCTS23, author = {Razvan Beuran and Jan Vykopal and Daniela Belajov{\'{a}} and Pavel Celeda and Yasuo Tan and Yoichi Shinoda}, title = {Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms}, journal = {Comput. Secur.}, volume = {128}, pages = {103120}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103120}, doi = {10.1016/J.COSE.2023.103120}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeuranVBCTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhardwajD23, author = {Sonam Bhardwaj and Mayank Dave}, title = {Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack}, journal = {Comput. Secur.}, volume = {135}, pages = {103521}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103521}, doi = {10.1016/J.COSE.2023.103521}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BhardwajD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BhatBD23, author = {Parnika Bhat and Sunny Behal and Kamlesh Dutta}, title = {A system call-based android malware detection approach with homogeneous {\&} heterogeneous ensemble machine learning}, journal = {Comput. Secur.}, volume = {130}, pages = {103277}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103277}, doi = {10.1016/J.COSE.2023.103277}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BhatBD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BinosiPCZ23, author = {Lorenzo Binosi and Mario Polino and Michele Carminati and Stefano Zanero}, title = {{BINO:} Automatic recognition of inline binary functions from template classes}, journal = {Comput. Secur.}, volume = {132}, pages = {103312}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103312}, doi = {10.1016/J.COSE.2023.103312}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BinosiPCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BitzerHLOSS23, author = {Michael Bitzer and Bj{\"{o}}rn H{\"{a}}ckel and Daniel Leuthe and Joshua Ott and Bastian Stahl and Jacqueline Strobel}, title = {Managing the Inevitable - {A} Maturity Model to Establish Incident Response Management Capabilities}, journal = {Comput. Secur.}, volume = {125}, pages = {103050}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103050}, doi = {10.1016/J.COSE.2022.103050}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BitzerHLOSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BojarajuluTS23, author = {Balaganesh Bojarajulu and Sarvesh Tanwar and Thipendra Pal Singh}, title = {Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model}, journal = {Comput. Secur.}, volume = {126}, pages = {103064}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103064}, doi = {10.1016/J.COSE.2022.103064}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BojarajuluTS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoveF23, author = {Davide Bove and Julian Funk}, title = {Basic secure services for standard {RISC-V} architectures}, journal = {Comput. Secur.}, volume = {133}, pages = {103415}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103415}, doi = {10.1016/J.COSE.2023.103415}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoveF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BovenziACMPP23, author = {Giampaolo Bovenzi and Giuseppe Aceto and Domenico Ciuonzo and Antonio Montieri and Valerio Persico and Antonio Pescap{\`{e}}}, title = {Network anomaly detection methods in IoT environments via deep learning: {A} Fair comparison of performance and robustness}, journal = {Comput. Secur.}, volume = {128}, pages = {103167}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103167}, doi = {10.1016/J.COSE.2023.103167}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BovenziACMPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BozkirDA23, author = {Ahmet Selman Bozkir and Firat Coskun Dalgic and Murat Aydos}, title = {GramBeddings: {A} New Neural Network for {URL} Based Identification of Phishing Web Pages Through N-gram Embeddings}, journal = {Comput. Secur.}, volume = {124}, pages = {102964}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102964}, doi = {10.1016/J.COSE.2022.102964}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BozkirDA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BraghinLR23, author = {Chiara Braghin and Mario Lilli and Elvinia Riccobene}, title = {A model-based approach for vulnerability analysis of IoT security protocols: The Z-Wave case study}, journal = {Comput. Secur.}, volume = {127}, pages = {103037}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103037}, doi = {10.1016/J.COSE.2022.103037}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BraghinLR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BridgesRONWSNHJWGBHE23, author = {Robert A. Bridges and Ashley E. Rice and Sean Oesch and Jeffrey A. Nichols and Cory L. Watson and Kevin D. Spakes and Savannah Norem and Mike Huettel and Brian Jewell and Brian Weber and Connor Gannon and Olivia Bizovi and Samuel C. Hollifield and Samantha Erwin}, title = {Testing {SOAR} tools in use}, journal = {Comput. Secur.}, volume = {129}, pages = {103201}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103201}, doi = {10.1016/J.COSE.2023.103201}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BridgesRONWSNHJWGBHE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BrustSG23, author = {Clemens{-}Alexander Brust and Tim Sonnekalb and Bernd Gruner}, title = {{ROMEO:} {A} binary vulnerability detection dataset for exploring Juliet through the lens of assembly language}, journal = {Comput. Secur.}, volume = {128}, pages = {103165}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103165}, doi = {10.1016/J.COSE.2023.103165}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BrustSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuddeKVSM23, author = {Carlos E. Budde and Anni Karinsalo and Silvia Vidor and Jarno Salonen and Fabio Massacci}, title = {Consolidating cybersecurity in Europe: {A} case study on job profiles assessment}, journal = {Comput. Secur.}, volume = {127}, pages = {103082}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103082}, doi = {10.1016/J.COSE.2022.103082}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuddeKVSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ButtQAAQ23, author = {Muhammad Atif Butt and Adnan Qayyum and Hassan Ali and Ala I. Al{-}Fuqaha and Junaid Qadir}, title = {Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study}, journal = {Comput. Secur.}, volume = {125}, pages = {103058}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103058}, doi = {10.1016/J.COSE.2022.103058}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ButtQAAQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cabrera-Arteaga23, author = {Javier Cabrera{-}Arteaga and Martin Monperrus and Tim Toady and Benoit Baudry}, title = {WebAssembly diversification for malware evasion}, journal = {Comput. Secur.}, volume = {131}, pages = {103296}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103296}, doi = {10.1016/J.COSE.2023.103296}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cabrera-Arteaga23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Camara0AUZ23, author = {Xabier S{\'{a}}ez de C{\'{a}}mara and Jose Luis Flores and Crist{\'{o}}bal Arellano and Aitor Urbieta and Urko Zurutuza}, title = {Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks}, journal = {Comput. Secur.}, volume = {131}, pages = {103299}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103299}, doi = {10.1016/J.COSE.2023.103299}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Camara0AUZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CanonicoS23, author = {Roberto Canonico and Giancarlo Sperl{\`{\i}}}, title = {Industrial cyber-physical systems protection: {A} methodological review}, journal = {Comput. Secur.}, volume = {135}, pages = {103531}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103531}, doi = {10.1016/J.COSE.2023.103531}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CanonicoS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoCHHY23, author = {Yungui Cao and Jiazhen Chen and Liqing Huang and Tianqian Huang and Feng Ye}, title = {Three-classification face manipulation detection using attention-based feature decomposition}, journal = {Comput. Secur.}, volume = {125}, pages = {103024}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103024}, doi = {10.1016/J.COSE.2022.103024}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CaoCHHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoSZQ23, author = {Wei Cao and Wenting Shen and Zhixiang Zhang and Jing Qin}, title = {Privacy-preserving healthcare monitoring for IoT devices under edge computing}, journal = {Comput. Secur.}, volume = {134}, pages = {103464}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103464}, doi = {10.1016/J.COSE.2023.103464}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoSZQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoWWZFC23, author = {Dongliang Cao and Kaimin Wei and Yongdong Wu and Jilian Zhang and Bingwen Feng and Jinpeng Chen}, title = {FePN: {A} robust feature purification network to defend against adversarial examples}, journal = {Comput. Secur.}, volume = {134}, pages = {103427}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103427}, doi = {10.1016/J.COSE.2023.103427}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoWWZFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CatalanPVT23, author = {David Nevado Catal{\'{a}}n and Sergio Pastrana and Narseo Vallina{-}Rodriguez and Juan Tapiador}, title = {An analysis of fake social media engagement services}, journal = {Comput. Secur.}, volume = {124}, pages = {103013}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103013}, doi = {10.1016/J.COSE.2022.103013}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CatalanPVT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CatilloPV23, author = {Marta Catillo and Antonio Pecchia and Umberto Villano}, title = {{CPS-GUARD:} Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders}, journal = {Comput. Secur.}, volume = {129}, pages = {103210}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103210}, doi = {10.1016/J.COSE.2023.103210}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CatilloPV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CeldranSASGBPS23, author = {Alberto Huertas Celdr{\'{a}}n and Pedro Miguel S{\'{a}}nchez S{\'{a}}nchez and Jan von der Assen and Dennis Shushack and {\'{A}}ngel Luis Perales G{\'{o}}mez and G{\'{e}}r{\^{o}}me Bovet and Gregorio Mart{\'{\i}}nez P{\'{e}}rez and Burkhard Stiller}, title = {Behavioral fingerprinting to detect ransomware in resource-constrained devices}, journal = {Comput. Secur.}, volume = {135}, pages = {103510}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103510}, doi = {10.1016/J.COSE.2023.103510}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CeldranSASGBPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CharanRCAS23, author = {P. V. Sai Charan and Gowtham Ratnakaram and Hrushikesh Chunduri and P. Mohan Anand and Sandeep Kumar Shukla}, title = {DKaaS: {DARK-KERNEL} as a service for active cyber threat intelligence}, journal = {Comput. Secur.}, volume = {132}, pages = {103329}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103329}, doi = {10.1016/J.COSE.2023.103329}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CharanRCAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CharmanasMA23, author = {Konstantinos Charmanas and Nikolaos Mittas and Lefteris Angelis}, title = {Topic and influence analysis on technological patents related to security vulnerabilities}, journal = {Comput. Secur.}, volume = {128}, pages = {103128}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103128}, doi = {10.1016/J.COSE.2023.103128}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CharmanasMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChatzoglouKKKG23, author = {Efstratios Chatzoglou and Vasileios Kouliaridis and Georgios Kambourakis and Georgios Karopoulos and Stefanos Gritzalis}, title = {A hands-on gaze on {HTTP/3} security through the lens of {HTTP/2} and a public dataset}, journal = {Comput. Secur.}, volume = {125}, pages = {103051}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103051}, doi = {10.1016/J.COSE.2022.103051}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChatzoglouKKKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenHZXZ23, author = {Jinyin Chen and Shulong Hu and Haibin Zheng and Chang{-}you Xing and Guomin Zhang}, title = {{GAIL-PT:} An intelligent penetration testing framework with generative adversarial imitation learning}, journal = {Comput. Secur.}, volume = {126}, pages = {103055}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103055}, doi = {10.1016/J.COSE.2022.103055}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenHZXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLCZ23, author = {Jinyin Chen and Mingjun Li and Yao Cheng and Haibin Zheng}, title = {FedRight: An effective model copyright protection for federated learning}, journal = {Comput. Secur.}, volume = {135}, pages = {103504}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103504}, doi = {10.1016/J.COSE.2023.103504}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenWHH23, author = {Shouhong Chen and Tao Wang and Zhentao Huang and Xingna Hou}, title = {Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism}, journal = {Comput. Secur.}, volume = {134}, pages = {103428}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103428}, doi = {10.1016/J.COSE.2023.103428}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenWHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenWZL23, author = {Qian Chen and Zilong Wang and Wenjing Zhang and Xiaodong Lin}, title = {{PPT:} {A} privacy-preserving global model training protocol for federated learning in {P2P} networks}, journal = {Comput. Secur.}, volume = {124}, pages = {102966}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102966}, doi = {10.1016/J.COSE.2022.102966}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenWZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZZXYYCL23, author = {Tieming Chen and Chenbin Zheng and Tiantian Zhu and Chunlin Xiong and Jie Ying and Qixuan Yuan and Wenrui Cheng and Mingqi Lv}, title = {System-level data management for endpoint advanced persistent threat detection: Issues, challenges and trends}, journal = {Comput. Secur.}, volume = {135}, pages = {103485}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103485}, doi = {10.1016/J.COSE.2023.103485}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenZZXYYCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChengYLSS23, author = {Yiran Cheng and Shouguo Yang and Zhe Lang and Zhiqiang Shi and Limin Sun}, title = {{VERI:} {A} Large-scale Open-Source Components Vulnerability Detection in IoT Firmware}, journal = {Comput. Secur.}, volume = {126}, pages = {103068}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103068}, doi = {10.1016/J.COSE.2022.103068}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChengYLSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CifuentesGHKM23, author = {Cristina Cifuentes and Fran{\c{c}}ois Gauthier and Behnaz Hassanshahi and Padmanabhan Krishnan and Davin McCall}, title = {The role of program analysis in security vulnerability detection: Then and now}, journal = {Comput. Secur.}, volume = {135}, pages = {103463}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103463}, doi = {10.1016/J.COSE.2023.103463}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CifuentesGHKM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CosciaDGMP23, author = {Antonio Coscia and Vincenzo Dentamaro and Stefano Galantucci and Antonio Maci and Giuseppe Pirlo}, title = {An innovative two-stage algorithm to optimize Firewall rule ordering}, journal = {Comput. Secur.}, volume = {134}, pages = {103423}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103423}, doi = {10.1016/J.COSE.2023.103423}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CosciaDGMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CostaDGS23, author = {Gabriele Costa and Pierpaolo Degano and Letterio Galletta and Simone Soderi}, title = {Formally verifying security protocols built on watermarking and jamming}, journal = {Comput. Secur.}, volume = {128}, pages = {103133}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103133}, doi = {10.1016/J.COSE.2023.103133}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CostaDGS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoutinhoFYF23, author = {Bruno Coutinho and Jo{\~{a}}o Ferreira and Iryna Yevseyeva and Vitor Basto{-}Fernandes}, title = {Integrated cybersecurity methodology and supporting tools for healthcare operational information systems}, journal = {Comput. Secur.}, volume = {129}, pages = {103189}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103189}, doi = {10.1016/J.COSE.2023.103189}, timestamp = {Tue, 09 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/CoutinhoFYF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CrespoMartinezVHCAL23, author = {Ignacio Samuel Crespo{-}Mart{\'{\i}}nez and Adri{\'{a}}n Campazas Vega and {\'{A}}ngel Manuel Guerrero Higueras and Virginia Riego{-}Del Castillo and Claudia {\'{A}}lvarez{-}Aparicio and Camino Fern{\'{a}}ndez Llamas}, title = {{SQL} injection attack detection in network flow data}, journal = {Comput. Secur.}, volume = {127}, pages = {103093}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103093}, doi = {10.1016/J.COSE.2023.103093}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CrespoMartinezVHCAL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DanglSR23, author = {Thomas Dangl and Stewart Sentanoe and Hans P. Reiser}, title = {VMIFresh: Efficient and fresh caches for virtual machine introspection}, journal = {Comput. Secur.}, volume = {135}, pages = {103527}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103527}, doi = {10.1016/J.COSE.2023.103527}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DanglSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DayalS23, author = {Neelam Dayal and Shashank Srivastava}, title = {Analyzing effective mitigation of DDoS attack with software defined networking}, journal = {Comput. Secur.}, volume = {130}, pages = {103269}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103269}, doi = {10.1016/J.COSE.2023.103269}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DayalS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DebichaCKDDM23, author = {Islam Debicha and Benjamin Cochez and Tayeb Kenaza and Thibault Debatty and Jean{-}Michel Dricot and Wim Mees}, title = {Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems}, journal = {Comput. Secur.}, volume = {129}, pages = {103176}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103176}, doi = {10.1016/J.COSE.2023.103176}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DebichaCKDDM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DengGSCP23, author = {Huaxin Deng and Chun Guo and Guowei Shen and Yunhe Cui and Yuan Ping}, title = {{MCTVD:} {A} malware classification method based on three-channel visualization and deep learning}, journal = {Comput. Secur.}, volume = {126}, pages = {103084}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103084}, doi = {10.1016/J.COSE.2022.103084}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DengGSCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DengWXLPS23, author = {Liting Deng and Hui Wen and Mingfeng Xin and Hong Li and Zhiwen Pan and Limin Sun}, title = {Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks}, journal = {Comput. Secur.}, volume = {132}, pages = {103323}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103323}, doi = {10.1016/J.COSE.2023.103323}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DengWXLPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DesgeorgesGD23, author = {Lo{\"{\i}}c Desgeorges and Jean{-}Philippe Georges and Thierry Divoux}, title = {Detection of anomalies of a non-deterministic software-defined networking control}, journal = {Comput. Secur.}, volume = {129}, pages = {103228}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103228}, doi = {10.1016/J.COSE.2023.103228}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DesgeorgesGD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DietrichJGSS23, author = {Aljoscha Dietrich and Kurunandan Jain and Georg Gutjahr and Bianca Steffes and Christoph Sorge}, title = {I recognize you by your steps: Privacy impact of pedometer data}, journal = {Comput. Secur.}, volume = {124}, pages = {102994}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102994}, doi = {10.1016/J.COSE.2022.102994}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DietrichJGSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongDWYG23, author = {Huoyuan Dong and Jialiang Dong and Shaohua Wan and Shuai Yuan and Zhitao Guan}, title = {Transferable adversarial distribution learning: Query-efficient adversarial attack against large language models}, journal = {Comput. Secur.}, volume = {135}, pages = {103482}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103482}, doi = {10.1016/J.COSE.2023.103482}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DongDWYG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongMMSJGT23, author = {Xingbo Dong and Zhihui Miao and Lan Ma and Jiajun Shen and Zhe Jin and Zhenhua Guo and Andrew Beng Jin Teoh}, title = {Reconstruct face from features based on genetic algorithm using {GAN} generator as a distribution constraint}, journal = {Comput. Secur.}, volume = {125}, pages = {103026}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103026}, doi = {10.1016/J.COSE.2022.103026}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DongMMSJGT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongYLWLL23, author = {Cong Dong and Jiahai Yang and Song Liu and Zhi Wang and Yuling Liu and Zhigang Lu}, title = {{C-BEDIM} and {S-BEDIM:} Lateral movement detection in enterprise network through behavior deviation measurement}, journal = {Comput. Secur.}, volume = {130}, pages = {103267}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103267}, doi = {10.1016/J.COSE.2023.103267}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DongYLWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DoshiPSS23, author = {Jay Doshi and Kunal Parmar and Raj Sanghavi and Narendra Shekokar}, title = {A comprehensive dual-layer architecture for phishing and spam email detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103378}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103378}, doi = {10.1016/J.COSE.2023.103378}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DoshiPSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuHLWLH23, author = {Linfeng Du and Junjiang He and Tao Li and Yunpeng Wang and Xiaolong Lan and Yunhua Huang}, title = {DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range}, journal = {Comput. Secur.}, volume = {129}, pages = {103202}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103202}, doi = {10.1016/J.COSE.2023.103202}, timestamp = {Wed, 12 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuHLWLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuncanC23, author = {Shawn P. Duncan and Hui Chen}, title = {Detecting network-based internet censorship via latent feature representation learning}, journal = {Comput. Secur.}, volume = {128}, pages = {103138}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103138}, doi = {10.1016/J.COSE.2023.103138}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuncanC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DupontSBL23, author = {Beno{\^{\i}}t Dupont and Clifford Shearing and Marilyne Bernier and Eric Rutger Leukfeldt}, title = {The tensions of cyber-resilience: From sensemaking to practice}, journal = {Comput. Secur.}, volume = {132}, pages = {103372}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103372}, doi = {10.1016/J.COSE.2023.103372}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DupontSBL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EbertSASZK23, author = {Nico Ebert and Thierry Schaltegger and Benjamin Ambuehl and Lorin Sch{\"{o}}ni and Verena Zimmermann and Melanie Knieps}, title = {Learning from safety science: {A} way forward for studying cybersecurity incidents in organizations}, journal = {Comput. Secur.}, volume = {134}, pages = {103435}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103435}, doi = {10.1016/J.COSE.2023.103435}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/EbertSASZK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EceizaFI23, author = {Maialen Eceiza and Jose Luis Flores and Mikel Iturbe}, title = {Improving fuzzing assessment methods through the analysis of metrics and experimental conditions}, journal = {Comput. Secur.}, volume = {124}, pages = {102946}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102946}, doi = {10.1016/J.COSE.2022.102946}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EceizaFI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EnBKKHFT23, author = {Ooi Sian En and Razvan Beuran and Takayuki Kuroda and Takuya Kuwahara and Ryosuke Hotchi and Norihito Fujita and Yasuo Tan}, title = {Intent-Driven Secure System Design: Methodology and Implementation}, journal = {Comput. Secur.}, volume = {124}, pages = {102955}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102955}, doi = {10.1016/J.COSE.2022.102955}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EnBKKHFT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EspositoMS23, author = {Christian Esposito and Vincenzo Moscato and Giancarlo Sperl{\`{\i}}}, title = {Detecting malicious reviews and users affecting social reviewing systems: {A} survey}, journal = {Comput. Secur.}, volume = {133}, pages = {103407}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103407}, doi = {10.1016/J.COSE.2023.103407}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EspositoMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FanWFHX23, author = {Yuanhai Fan and Chuanhao Wan and Cai Fu and Lansheng Han and Hao Xu}, title = {VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs}, journal = {Comput. Secur.}, volume = {130}, pages = {103247}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103247}, doi = {10.1016/J.COSE.2023.103247}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FanWFHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FasciFLQ23, author = {Lara Saidia Fasc{\`{\i}} and Marco Fisichella and Gianluca Lax and Chenyin Qian}, title = {Disarming visualization-based approaches in malware detection systems}, journal = {Comput. Secur.}, volume = {126}, pages = {103062}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103062}, doi = {10.1016/J.COSE.2022.103062}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FasciFLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ferguson-Walter23, author = {Kimberly J. Ferguson{-}Walter and Maxine M. Major and Chelsea K. Johnson and Craig J. Johnson and Dakota D. Scott and Robert S. Gutzwiller and Temmie Shade}, title = {Cyber expert feedback: Experiences, expectations, and opinions about cyber deception}, journal = {Comput. Secur.}, volume = {130}, pages = {103268}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103268}, doi = {10.1016/J.COSE.2023.103268}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ferguson-Walter23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandezFuentesPC23, author = {Xos{\'{e}} Fern{\'{a}}ndez{-}Fuentes and Tom{\'{a}}s F. Pena and Jos{\'{e}} Carlos Cabaleiro}, title = {Digital forensic analysis of the private mode of browsers on Android}, journal = {Comput. Secur.}, volume = {134}, pages = {103425}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103425}, doi = {10.1016/J.COSE.2023.103425}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FernandezFuentesPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FilusD23, author = {Katarzyna Filus and Joanna Domanska}, title = {Software vulnerabilities in TensorFlow-based deep learning applications}, journal = {Comput. Secur.}, volume = {124}, pages = {102948}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102948}, doi = {10.1016/J.COSE.2022.102948}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FilusD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FiskKL23, author = {Nathan Fisk and Nicholas M. Kelly and Lorie M. Liebrock}, title = {Cybersecurity communities of practice: Strategies for creating gateways to participation}, journal = {Comput. Secur.}, volume = {132}, pages = {103188}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103188}, doi = {10.1016/J.COSE.2023.103188}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FiskKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ForsbergF23, author = {Joonas Forsberg and Tapio Frantti}, title = {Technical performance metrics of a security operations center}, journal = {Comput. Secur.}, volume = {135}, pages = {103529}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103529}, doi = {10.1016/J.COSE.2023.103529}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ForsbergF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrankJR23, author = {Muriel Frank and Lennart Jaeger and Lukas Manuel Ranft}, title = {Using contextual factors to predict information security overconfidence: {A} machine learning approach}, journal = {Comput. Secur.}, volume = {125}, pages = {103046}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103046}, doi = {10.1016/J.COSE.2022.103046}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FrankJR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrankK23, author = {Muriel Frank and Vanessa Kohn}, title = {Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory}, journal = {Comput. Secur.}, volume = {132}, pages = {103386}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103386}, doi = {10.1016/J.COSE.2023.103386}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrankK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FreitasSCM23, author = {Tadeu Freitas and Jo{\~{a}}o Soares and Manuel Eduardo Correia and Rolando Martins}, title = {Deterministic or probabilistic? - {A} survey on Byzantine fault tolerant state machine replication}, journal = {Comput. Secur.}, volume = {129}, pages = {103200}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103200}, doi = {10.1016/J.COSE.2023.103200}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FreitasSCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrihaFBBKC23, author = {Othmane Friha and Mohamed Amine Ferrag and Mohamed Benbouzid and Tarek Berghout and Burak Kantarci and Kim{-}Kwang Raymond Choo}, title = {2DF-IDS: Decentralized and differentially private federated learning-based intrusion detection system for industrial IoT}, journal = {Comput. Secur.}, volume = {127}, pages = {103097}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103097}, doi = {10.1016/J.COSE.2023.103097}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FrihaFBBKC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FuNZHZ23, author = {Nan Fu and Weiwei Ni and Sen Zhang and Lihe Hou and Dongyue Zhang}, title = {{GC-NLDP:} {A} graph clustering algorithm with local differential privacy}, journal = {Comput. Secur.}, volume = {124}, pages = {102967}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102967}, doi = {10.1016/J.COSE.2022.102967}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FuNZHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FujsVV23, author = {Damjan Fujs and Simon Vrhovec and Damjan Vavpotic}, title = {Balancing software and training requirements for information security}, journal = {Comput. Secur.}, volume = {134}, pages = {103467}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103467}, doi = {10.1016/J.COSE.2023.103467}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FujsVV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GanapathiASTOW23, author = {Iyyakutti Iyappan Ganapathi and Syed Sadaf Ali and Uttam Sharma and Pradeep Tomar and Muhammad Owais and Naoufel Werghi}, title = {{RHEMAT:} Robust human ear based multimodal authentication technique}, journal = {Comput. Secur.}, volume = {132}, pages = {103356}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103356}, doi = {10.1016/J.COSE.2023.103356}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GanapathiASTOW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GandalMRB23, author = {Neil Gandal and Tyler Moore and Michael Riordan and Noa Barnir}, title = {Empirically evaluating the effect of security precautions on cyber incidents}, journal = {Comput. Secur.}, volume = {133}, pages = {103380}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103380}, doi = {10.1016/J.COSE.2023.103380}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GandalMRB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GandhiSSP23, author = {Jugal Gandhi and Diksha Shekhawat and M. Santosh and Jai Gopal Pandey}, title = {Logic locking for {IP} security: {A} comprehensive analysis on challenges, techniques, and trends}, journal = {Comput. Secur.}, volume = {129}, pages = {103196}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103196}, doi = {10.1016/J.COSE.2023.103196}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GandhiSSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GaoY23, author = {Chen Gao and Jia Yu}, title = {SecureRC: {A} system for privacy-preserving relation classification using secure multi-party computation}, journal = {Comput. Secur.}, volume = {128}, pages = {103142}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103142}, doi = {10.1016/J.COSE.2023.103142}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GaoY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GeHZS23, author = {Zhaocheng Ge and Hanping Hu and Tengfei Zhao and Dingmeng Shi}, title = {Reading is not believing: {A} multimodal adversarial attacker for Chinese-NLP model}, journal = {Comput. Secur.}, volume = {125}, pages = {103052}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103052}, doi = {10.1016/J.COSE.2022.103052}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GeHZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GeWLTL23, author = {Wenhan Ge and Junfeng Wang and Tongcan Lin and Binhui Tang and Xiaohui Li}, title = {Explainable cyber threat behavior identification based on self-adversarial topic generation}, journal = {Comput. Secur.}, volume = {132}, pages = {103369}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103369}, doi = {10.1016/J.COSE.2023.103369}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GeWLTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GedenR23, author = {Munir Geden and Kasper Rasmussen}, title = {RegGuard: Leveraging {CPU} registers for mitigation of control- and data-oriented attacks}, journal = {Comput. Secur.}, volume = {129}, pages = {103213}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103213}, doi = {10.1016/J.COSE.2023.103213}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GedenR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GegenhuberMHMMWU23, author = {Gabriel K. Gegenhuber and Markus Maier and Florian Holzbauer and Wilfried Mayer and Georg Merzdovnik and Edgar R. Weippl and Johanna Ullrich}, title = {An extended view on measuring tor AS-level adversaries}, journal = {Comput. Secur.}, volume = {132}, pages = {103302}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103302}, doi = {10.1016/J.COSE.2023.103302}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GegenhuberMHMMWU23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GeorgiadouMA23, author = {Anna Georgiadou and Ariadni Michalitsi{-}Psarrou and Dimitris Askounis}, title = {A security awareness and competency evaluation in the energy sector}, journal = {Comput. Secur.}, volume = {129}, pages = {103199}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103199}, doi = {10.1016/J.COSE.2023.103199}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GeorgiadouMA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GiboneyAWOTWJ23, author = {Justin Scott Giboney and Bonnie Brinton Anderson and Geoffrey A. Wright and Shayna Oh and Quincy Taylor and Megan Warren and Kylie Johnson}, title = {Barriers to a cybersecurity career: Analysis across career stage and gender}, journal = {Comput. Secur.}, volume = {132}, pages = {103316}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103316}, doi = {10.1016/J.COSE.2023.103316}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GiboneyAWOTWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GiboneySG23, author = {Justin Scott Giboney and Ryan M. Schuetzler and G. Mark Grimes}, title = {Know your enemy: Conversational agents for security, education, training, and awareness at scale}, journal = {Comput. Secur.}, volume = {129}, pages = {103207}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103207}, doi = {10.1016/J.COSE.2023.103207}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GiboneySG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GoelVJ23, author = {Shefali Goel and Abhishek Verma and Vinod Kumar Jain}, title = {{CRA-RPL:} {A} Novel Lightweight challenge-Response authentication-based technique for securing {RPL} against dropped {DAO} attacks}, journal = {Comput. Secur.}, volume = {132}, pages = {103346}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103346}, doi = {10.1016/J.COSE.2023.103346}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GoelVJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GovindarajanSG23, author = {Usharani Hareesh Govindarajan and Dhiraj Kumar Singh and Hardik A. Gohel}, title = {Forecasting cyber security threats landscape and associated technical trends in telehealth using Bidirectional Encoder Representations from Transformers {(BERT)}}, journal = {Comput. Secur.}, volume = {133}, pages = {103404}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103404}, doi = {10.1016/J.COSE.2023.103404}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GovindarajanSG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuB23, author = {Yuhao Gu and Yuebin Bai}, title = {{LR-BA:} Backdoor attack against vertical federated learning using local latent representations}, journal = {Comput. Secur.}, volume = {129}, pages = {103193}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103193}, doi = {10.1016/J.COSE.2023.103193}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuSK23, author = {Yeming Gu and Hui Shu and Fei Kang}, title = {BinAIV: Semantic-enhanced vulnerability detection for Linux x86 binaries}, journal = {Comput. Secur.}, volume = {135}, pages = {103508}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103508}, doi = {10.1016/J.COSE.2023.103508}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuamanTAS23, author = {Danny S. Guam{\'{a}}n and David Rodr{\'{\i}}guez Torrado and Jos{\'{e}} M. del {\'{A}}lamo and Jose M. Such}, title = {Automated {GDPR} compliance assessment for cross-border personal data transfers in android applications}, journal = {Comput. Secur.}, volume = {130}, pages = {103262}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103262}, doi = {10.1016/J.COSE.2023.103262}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuamanTAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuanLXLG23, author = {Zhong Guan and Chang Liu and Gang Xiong and Zhen Li and Gaopeng Gou}, title = {FlowTracker: Improved flow correlation attacks with denoising and contrastive learning}, journal = {Comput. Secur.}, volume = {125}, pages = {103018}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103018}, doi = {10.1016/J.COSE.2022.103018}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuanLXLG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares23, author = {Alejandro Guerra{-}Manzanares and Marcin Luckner and Hayretdin Bahsi}, title = {Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers {\&} Security, Volume 120, 102757}, journal = {Comput. Secur.}, volume = {124}, pages = {102998}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102998}, doi = {10.1016/J.COSE.2022.102998}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoLHWMGL23, author = {Yongyan Guo and Zhengyu Liu and Cheng Huang and Nannan Wang and Hai Min and Wenbo Guo and Jiayong Liu}, title = {A framework for threat intelligence extraction and fusion}, journal = {Comput. Secur.}, volume = {132}, pages = {103371}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103371}, doi = {10.1016/J.COSE.2023.103371}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoLHWMGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoPDZZ23, author = {Taolin Guo and Shunshun Peng and Kai Dong and You Zhao and Mingliang Zhou}, title = {{RDPCF:} Range-based differentially private user data perturbation for collaborative filtering}, journal = {Comput. Secur.}, volume = {134}, pages = {103452}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103452}, doi = {10.1016/J.COSE.2023.103452}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoPDZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoXZ23, author = {Zhenyuan Guo and Lei Xu and Liehuang Zhu}, title = {FedSIGN: {A} sign-based federated learning framework with privacy and robustness guarantees}, journal = {Comput. Secur.}, volume = {135}, pages = {103474}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103474}, doi = {10.1016/J.COSE.2023.103474}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoXZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoYWZLX23, author = {Pengfei Guo and Yingjian Yan and Junjie Wang and Jingxin Zhong and Yanjiang Liu and Jinsong Xu}, title = {Towards a metrics suite for evaluating cache side-channel vulnerability: Case studies on an open-source {RISC-V} processor}, journal = {Comput. Secur.}, volume = {135}, pages = {103480}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103480}, doi = {10.1016/J.COSE.2023.103480}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoYWZLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoYZZZD23, author = {Pengfei Guo and Yingjian Yan and Fan Zhang and Chunsheng Zhu and Lichao Zhang and Zibin Dai}, title = {Extending the classical side-channel analysis framework to access-driven cache attacks}, journal = {Comput. Secur.}, volume = {129}, pages = {103255}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103255}, doi = {10.1016/J.COSE.2023.103255}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoYZZZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuptaYGAG23, author = {Prajjwal Gupta and Krishna Yadav and Brij B. Gupta and Mamoun Alazab and Thippa Reddy Gadekallu}, title = {A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function}, journal = {Comput. Secur.}, volume = {130}, pages = {103270}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103270}, doi = {10.1016/J.COSE.2023.103270}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuptaYGAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanCLZJL23, author = {Xueying Han and Susu Cui and Song Liu and Chen Zhang and Bo Jiang and Zhigang Lu}, title = {Network intrusion detection based on n-gram frequency and time-aware transformer}, journal = {Comput. Secur.}, volume = {128}, pages = {103171}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103171}, doi = {10.1016/J.COSE.2023.103171}, timestamp = {Tue, 27 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanCLZJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanFLZ23, author = {Yinghua Han and Hantong Feng and Keke Li and Qiang Zhao}, title = {False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids}, journal = {Comput. Secur.}, volume = {124}, pages = {103016}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103016}, doi = {10.1016/J.COSE.2022.103016}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanFLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanMBY23, author = {Kyusuk Han and Hyeran Mun and Malavika Balakrishnan and Chan Yeob Yeun}, title = {Enhancing security and robustness of Cyphal on Controller Area Network in unmanned aerial vehicle environments}, journal = {Comput. Secur.}, volume = {135}, pages = {103481}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103481}, doi = {10.1016/J.COSE.2023.103481}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HanMBY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarborthP23, author = {David Harborth and Sebastian Pape}, title = {A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study}, journal = {Comput. Secur.}, volume = {132}, pages = {103338}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103338}, doi = {10.1016/J.COSE.2023.103338}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarborthP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeLQD23, author = {Xianglong He and Yuezun Li and Haipeng Qu and Junyu Dong}, title = {Improving transferable adversarial attack via feature-momentum}, journal = {Comput. Secur.}, volume = {128}, pages = {103135}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103135}, doi = {10.1016/J.COSE.2023.103135}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeLQD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeidingSOL23, author = {Fredrik Heiding and Emre S{\"{u}}ren and Johannes Oleg{\aa}rd and Robert Lagerstr{\"{o}}m}, title = {Penetration testing of connected households}, journal = {Comput. Secur.}, volume = {126}, pages = {103067}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103067}, doi = {10.1016/J.COSE.2022.103067}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeidingSOL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HengstlerKMNT23, author = {Sebastian Hengstler and Stephan Kuehnel and Kristin Masuch and Ilja Nastjuk and Simon Trang}, title = {Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior}, journal = {Comput. Secur.}, volume = {133}, pages = {103370}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103370}, doi = {10.1016/J.COSE.2023.103370}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HengstlerKMNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HillmanHT23, author = {Doron Hillman and Yaniv Harel and Eran Toch}, title = {Evaluating organizational phishing awareness training on an enterprise scale}, journal = {Comput. Secur.}, volume = {132}, pages = {103364}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103364}, doi = {10.1016/J.COSE.2023.103364}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HillmanHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HoheiselCSJ23, author = {Raphael Hoheisel and Guido van Capelleveen and Dipti K. Sarmah and Marianne Junger}, title = {The development of phishing during the {COVID-19} pandemic: An analysis of over 1100 targeted domains}, journal = {Comput. Secur.}, volume = {128}, pages = {103158}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103158}, doi = {10.1016/J.COSE.2023.103158}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HoheiselCSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HouNZFZ23, author = {Lihe Hou and Weiwei Ni and Sen Zhang and Nan Fu and Dongyue Zhang}, title = {Wdt-SCAN: Clustering decentralized social graphs with local differential privacy}, journal = {Comput. Secur.}, volume = {125}, pages = {103036}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103036}, doi = {10.1016/J.COSE.2022.103036}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HouNZFZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuXZTL23, author = {Tianle Hu and Chonghai Xu and Shenwen Zhang and Shuangshuang Tao and Luqun Li}, title = {Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism}, journal = {Comput. Secur.}, volume = {124}, pages = {102990}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102990}, doi = {10.1016/J.COSE.2022.102990}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuXZTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuZLDCWJ23, author = {Lifeng Hu and Fan Zhang and Ziyuan Liang and Ruyi Ding and Xingyu Cai and Zonghui Wang and Wenguang Jin}, title = {FaultMorse: An automated controlled-channel attack via longest recurring sequence}, journal = {Comput. Secur.}, volume = {124}, pages = {103003}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103003}, doi = {10.1016/J.COSE.2022.103003}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HuZLDCWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuZYT23, author = {Mingming Hu and Kun Zhang and Ruibang You and Bibo Tu}, title = {AuthConFormer: Sensor-based Continuous Authentication of Smartphone Users Using {A} Convolutional Transformer}, journal = {Comput. Secur.}, volume = {127}, pages = {103122}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103122}, doi = {10.1016/J.COSE.2023.103122}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuZYT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangM23, author = {Yunfan Huang and Maode Ma}, title = {{ILL-IDS:} An incremental lifetime learning {IDS} for VANETs}, journal = {Comput. Secur.}, volume = {124}, pages = {102992}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102992}, doi = {10.1016/J.COSE.2022.102992}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangSQH23, author = {Yinghui Huang and Wenting Shen and Jing Qin and Huiying Hou}, title = {Privacy-preserving certificateless public auditing supporting different auditing frequencies}, journal = {Comput. Secur.}, volume = {128}, pages = {103181}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103181}, doi = {10.1016/J.COSE.2023.103181}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangSQH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZGWLZ23, author = {Jia{-}Cheng Huang and Guo{-}Qiang Zeng and Guang{-}Gang Geng and Jian Weng and Kang{-}Di Lu and Yu Zhang}, title = {Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems}, journal = {Comput. Secur.}, volume = {132}, pages = {103310}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103310}, doi = {10.1016/J.COSE.2023.103310}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZGWLZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HullSL23, author = {David M. Hull and Sebastian Walter Schuetz and Paul Benjamin Lowry}, title = {Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training}, journal = {Comput. Secur.}, volume = {129}, pages = {103252}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103252}, doi = {10.1016/J.COSE.2023.103252}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HullSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IanniM23, author = {Michele Ianni and Elio Masciari}, title = {{SCOUT:} Security by computing OUTliers on activity logs}, journal = {Comput. Secur.}, volume = {132}, pages = {103355}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103355}, doi = {10.1016/J.COSE.2023.103355}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IanniM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ImranSRRRA23, author = {Muhammad Ali Imran and Hafeez Ur Rehman Siddiqui and Ali Raza and Muhammad Amjad Raza and Furqan Rustam and Imran Ashraf}, title = {A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems}, journal = {Comput. Secur.}, volume = {134}, pages = {103445}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103445}, doi = {10.1016/J.COSE.2023.103445}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ImranSRRRA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JafarianN23, author = {Jafar Haadi Jafarian and Amirreza Niakanlahiji}, title = {MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization}, journal = {Comput. Secur.}, volume = {124}, pages = {102958}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102958}, doi = {10.1016/J.COSE.2022.102958}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JafarianN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JayalaxmiSKACC23, author = {PLS Jayalaxmi and Rahul Saha and Gulshan Kumar and Mamoun Alazab and Mauro Conti and Xiaochun Cheng}, title = {{PIGNUS:} {A} Deep Learning model for {IDS} in industrial internet-of-things}, journal = {Comput. Secur.}, volume = {132}, pages = {103315}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103315}, doi = {10.1016/J.COSE.2023.103315}, timestamp = {Tue, 20 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JayalaxmiSKACC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaYZLM23, author = {Zhizhuang Jia and Chao Yang and Xiaoyun Zhao and Xinghua Li and Jian Feng Ma}, title = {Design and implementation of an efficient container tag dynamic taint analysis}, journal = {Comput. Secur.}, volume = {135}, pages = {103528}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103528}, doi = {10.1016/J.COSE.2023.103528}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JiaYZLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangZ23, author = {Randi Jiang and Jianru Zhang}, title = {The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention}, journal = {Comput. Secur.}, volume = {130}, pages = {103253}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103253}, doi = {10.1016/J.COSE.2023.103253}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinJWLJYZ23, author = {Xin Jin and Xin Jin and Ruxin Wang and Shin{-}Jye Lee and Qian Jiang and Shaowen Yao and Wei Zhou}, title = {Adversarial attacks on multi-focus image fusion models}, journal = {Comput. Secur.}, volume = {134}, pages = {103455}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103455}, doi = {10.1016/J.COSE.2023.103455}, timestamp = {Sun, 18 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JinJWLJYZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JingadeK23, author = {Raghuram Raghavendra Jingade and Rajaram Sanjeev Kunte}, title = {Extended right-angle difference ternary co-relation pattern: {A} new feature descriptor for face anti-spoofing}, journal = {Comput. Secur.}, volume = {134}, pages = {103421}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103421}, doi = {10.1016/J.COSE.2023.103421}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JingadeK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JohnAAWJ23, author = {Taran Cyriac John and Muhammad Shabbir Abbasi and Harith Al{-}Sahaf and Ian Welch and Julian Jang{-}Jaccard}, title = {Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution}, journal = {Comput. Secur.}, volume = {129}, pages = {103215}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103215}, doi = {10.1016/J.COSE.2023.103215}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JohnAAWJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JohnstonGBCSWS23, author = {Allen C. Johnston and Paul Michael Di Gangi and France B{\'{e}}langer and Robert E. Crossler and Mikko T. Siponen and Merrill Warkentin and Tripti Singh}, title = {Seeking rhetorical validity in fear appeal research: An application of rhetorical theory}, journal = {Comput. Secur.}, volume = {125}, pages = {103020}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103020}, doi = {10.1016/J.COSE.2022.103020}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/JohnstonGBCSWS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JoyceANR23, author = {Robert J. Joyce and Dev Amlani and Charles Nicholas and Edward Raff}, title = {{MOTIF:} {A} Malware Reference Dataset with Ground Truth Family Labels}, journal = {Comput. Secur.}, volume = {124}, pages = {102921}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102921}, doi = {10.1016/J.COSE.2022.102921}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JoyceANR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KaleT23, author = {Rahul Kale and Vrizlynn L. L. Thing}, title = {Few-shot weakly-supervised cybersecurity anomaly detection}, journal = {Comput. Secur.}, volume = {130}, pages = {103194}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103194}, doi = {10.1016/J.COSE.2023.103194}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KaleT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KampourakisGK23, author = {Vyron Kampourakis and Vasileios Gkioulos and Sokratis K. Katsikas}, title = {A systematic literature review on wireless security testbeds in the cyber-physical realm}, journal = {Comput. Secur.}, volume = {133}, pages = {103383}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103383}, doi = {10.1016/J.COSE.2023.103383}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KampourakisGK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KangLWZNL23, author = {Hongzhaoning Kang and Gang Liu and Quan Wang and Qi Zhang and Jiamin Niu and Nan Luo}, title = {An improved minimal noise role mining algorithm based on role interpretability}, journal = {Comput. Secur.}, volume = {127}, pages = {103100}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103100}, doi = {10.1016/J.COSE.2023.103100}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KangLWZNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KangXZJSZ23, author = {Zi Kang and Hui Xia and Rui Zhang and Shuliang Jiang and Xiaolong Shi and Zuming Zhang}, title = {{FGDA-GS:} Fast guided decision attack based on gradient signs for skeletal action recognition}, journal = {Comput. Secur.}, volume = {135}, pages = {103522}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103522}, doi = {10.1016/J.COSE.2023.103522}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KangXZJSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Kemp23, author = {Steven Kemp}, title = {Exploring public cybercrime prevention campaigns and victimization of businesses: {A} Bayesian model averaging approach}, journal = {Comput. Secur.}, volume = {127}, pages = {103089}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103089}, doi = {10.1016/J.COSE.2022.103089}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Kemp23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalilBDKMK23, author = {Shaymaa Mamdouh Khalil and Hayretdin Bahsi and Henry Ochieng' Dola and Tarmo Kor{\~{o}}tko and Kieran McLaughlin and Vahur Kotkas}, title = {Threat Modeling of Cyber-Physical Systems - {A} Case Study of a Microgrid System}, journal = {Comput. Secur.}, volume = {124}, pages = {102950}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102950}, doi = {10.1016/J.COSE.2022.102950}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhalilBDKMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalilEM23, author = {Maysaa Khalil and Moez Esseghir and Le{\"{\i}}la Merghem{-}Boulahia}, title = {Privacy-Preserving federated learning: An application for big data load forecast in buildings}, journal = {Comput. Secur.}, volume = {131}, pages = {103211}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103211}, doi = {10.1016/J.COSE.2023.103211}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhalilEM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanAUIRAAA23, author = {Saddam Hussain Khan and Tahani Jaser Alahmadi and Wasi Ullah and Javed Iqbal and Azizur Rahim and Hend Khalid Alkahtani and Wajdi Alghamdi and Alaa Omran Almagrabi}, title = {A new deep boosted {CNN} and ensemble learning based IoT malware detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103385}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103385}, doi = {10.1016/J.COSE.2023.103385}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhanAUIRAAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanIMJ23, author = {Naurin Farooq Khan and Naveed Ikram and Hajra Murtaza and Mehwish Javed}, title = {Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model}, journal = {Comput. Secur.}, volume = {125}, pages = {103049}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103049}, doi = {10.1016/J.COSE.2022.103049}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KhanIMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhurshidR23, author = {Anum Khurshid and Shahid Raza}, title = {AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance}, journal = {Comput. Secur.}, volume = {124}, pages = {102952}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102952}, doi = {10.1016/J.COSE.2022.102952}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhurshidR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimJPP23, author = {Sung{-}Kyung Kim and Eun{-}Tae Jang and Hanjin Park and Ki{-}Woong Park}, title = {Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges}, journal = {Comput. Secur.}, volume = {125}, pages = {103009}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103009}, doi = {10.1016/J.COSE.2022.103009}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimJPP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimKYPSP23, author = {Jinwoo Kim and Yeonkeun Kim and Vinod Yegneswaran and Phillip A. Porras and Seungwon Shin and Taejune Park}, title = {Extended data plane architecture for in-network security services in software-defined networks}, journal = {Comput. Secur.}, volume = {124}, pages = {102976}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102976}, doi = {10.1016/J.COSE.2022.102976}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimKYPSP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimSC23, author = {Suryeon Kim and Seungwon Shin and Hyunwoo Choi}, title = {{AVX-TSCHA:} Leaking information through {AVX} extensions in commercial processors}, journal = {Comput. Secur.}, volume = {134}, pages = {103437}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103437}, doi = {10.1016/J.COSE.2023.103437}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KimSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KingoA23, author = {Thomas Kingo and Diego F. Aranha}, title = {User-centric security analysis of MitID: The Danish passwordless digital identity solution}, journal = {Comput. Secur.}, volume = {132}, pages = {103376}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103376}, doi = {10.1016/J.COSE.2023.103376}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KingoA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KishoreBMM23, author = {Pushkar Kishore and Swadhin Kumar Barisal and Durga Prasad Mohapatra and Rajib Mall}, title = {An efficient two-stage pipeline model with filtering algorithm for mislabeled malware detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103499}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103499}, doi = {10.1016/J.COSE.2023.103499}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KishoreBMM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KitkowskaSMW23, author = {Agnieszka Kitkowska and Yefim Shulman and Leonardo A. Martucci and Erik W{\"{a}}stlund}, title = {Designing for privacy: Exploring the influence of affect and individual characteristics on users' interactions with privacy policies}, journal = {Comput. Secur.}, volume = {134}, pages = {103468}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103468}, doi = {10.1016/J.COSE.2023.103468}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KitkowskaSMW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KoKK23, author = {Kyoungmin Ko and Sunghwan Kim and Hyun Kwon}, title = {Multi-targeted audio adversarial example for use against speech recognition systems}, journal = {Comput. Secur.}, volume = {128}, pages = {103168}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103168}, doi = {10.1016/J.COSE.2023.103168}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KoKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KornyoAOOPBB23, author = {Oliver Kornyo and Michael Asante and Richard Opoku and Kwabena Owusu{-}Agyemang and Benjamin Tei Partey and Emmanuel Kwesi Baah and Nkrumah Boadu}, title = {Botnet attacks classification in {AMI} networks with recursive feature elimination {(RFE)} and machine learning algorithms}, journal = {Comput. Secur.}, volume = {135}, pages = {103456}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103456}, doi = {10.1016/J.COSE.2023.103456}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KornyoAOOPBB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarBAG23, author = {Chandan Kumar and Soham Biswas and Md. Sarfaraj Alam Ansari and Mahesh Chandra Govil}, title = {Nature-inspired intrusion detection system for protecting software-defined networks controller}, journal = {Comput. Secur.}, volume = {134}, pages = {103438}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103438}, doi = {10.1016/J.COSE.2023.103438}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarBAG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarLC23, author = {Kiran Kumar and Dapeng Liu and Lemuria D. Carter}, title = {Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy}, journal = {Comput. Secur.}, volume = {132}, pages = {103375}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103375}, doi = {10.1016/J.COSE.2023.103375}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarS23, author = {Yogendra Kumar and Basant Subba}, title = {Stacking \emph{ensemble-based} {HIDS} framework for detecting anomalous system processes in \emph{Windows} based operating systems using multiple word embedding}, journal = {Comput. Secur.}, volume = {125}, pages = {102961}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102961}, doi = {10.1016/J.COSE.2022.102961}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarS23a, author = {Vikash Kumar and Ditipriya Sinha}, title = {Synthetic attack data generation model applying generative adversarial network for intrusion detection}, journal = {Comput. Secur.}, volume = {125}, pages = {103054}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103054}, doi = {10.1016/J.COSE.2022.103054}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KumarS23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumariJ23, author = {Pooja Kumari and Ankit Kumar Jain}, title = {A comprehensive study of DDoS attacks over IoT network and their countermeasures}, journal = {Comput. Secur.}, volume = {127}, pages = {103096}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103096}, doi = {10.1016/J.COSE.2023.103096}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumariJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KwonL23, author = {Hyun Kwon and Sanghyun Lee}, title = {Erratum to 'Ensemble transfer attack targeting text classification systems' [Computers {\&} Security 117 {(2022)} 1-8/ 102695]}, journal = {Comput. Secur.}, volume = {124}, pages = {102944}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102944}, doi = {10.1016/J.COSE.2022.102944}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KwonL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KwonN23, author = {Hyun Kwon and Seung{-}Hun Nam}, title = {Audio adversarial detection through classification score on speech recognition systems}, journal = {Comput. Secur.}, volume = {126}, pages = {103061}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103061}, doi = {10.1016/J.COSE.2022.103061}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/KwonN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaiLLHLWC23, author = {Yuan{-}Cheng Lai and Jheng{-}Yan Lin and Ying{-}Dar Lin and Ren{-}Hung Hwang and Po{-}Ching Lin and Hsiao{-}Kuang Wu and Chung{-}Kuan Chen}, title = {Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection}, journal = {Comput. Secur.}, volume = {129}, pages = {103205}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103205}, doi = {10.1016/J.COSE.2023.103205}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaiLLHLWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Lee23, author = {In Lee}, title = {Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: {A} content analytics research method}, journal = {Comput. Secur.}, volume = {129}, pages = {103185}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103185}, doi = {10.1016/J.COSE.2023.103185}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Lee23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCL23, author = {Sunwoo Lee and Wonsuk Choi and Dong Hoon Lee}, title = {The vibration knows who you are! {A} further analysis on usable authentication for smartwatch users}, journal = {Comput. Secur.}, volume = {125}, pages = {103040}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103040}, doi = {10.1016/J.COSE.2022.103040}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeKL23, author = {Jiyeon Lee and Hyosu Kim and Kilho Lee}, title = {VRKeyLogger: Virtual keystroke inference attack via eavesdropping controller usage pattern in WebVR}, journal = {Comput. Secur.}, volume = {134}, pages = {103461}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103461}, doi = {10.1016/J.COSE.2023.103461}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeLJL23, author = {Sun{-}Jin Lee and Yu{-}Rim Lee and So{-}Eun Jeon and Il{-}Gu Lee}, title = {Machine learning-based jamming attack classification and effective defense technique}, journal = {Comput. Secur.}, volume = {128}, pages = {103169}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103169}, doi = {10.1016/J.COSE.2023.103169}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeLJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeiHH23, author = {Wenjing Lei and Siqi Hu and Carol Hsu}, title = {Unveiling the process of phishing precautions taking: The moderating role of optimism bias}, journal = {Comput. Secur.}, volume = {129}, pages = {103249}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103249}, doi = {10.1016/J.COSE.2023.103249}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeiHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LenzBWV23, author = {Julia Lenz and Zdravko Bozakov and Steffen Wendzel and Simon Vrhovec}, title = {Why people replace their aging smart devices: {A} push-pull-mooring perspective}, journal = {Comput. Secur.}, volume = {130}, pages = {103258}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103258}, doi = {10.1016/J.COSE.2023.103258}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LenzBWV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCAGPZ23, author = {Jingjin Li and Chao Chen and Mostafa Rahimi Azghadi and Hossein Ghodosi and Lei Pan and Jun Zhang}, title = {Security and privacy problems in voice assistant applications: {A} survey}, journal = {Comput. Secur.}, volume = {134}, pages = {103448}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103448}, doi = {10.1016/J.COSE.2023.103448}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCAGPZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCBC23, author = {Yong{-}Gang Li and JiaZhen Cai and Yu Bao and Yeh{-}Ching Chung}, title = {What you can read is what you can't execute}, journal = {Comput. Secur.}, volume = {132}, pages = {103377}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103377}, doi = {10.1016/J.COSE.2023.103377}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCBC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCPZWZX23, author = {Lin Li and Chao Chen and Lei Pan and Leo Yu Zhang and Zhifeng Wang and Jun Zhang and Yang Xiang}, title = {A Survey of PPG's Application in Authentication}, journal = {Comput. Secur.}, volume = {135}, pages = {103488}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103488}, doi = {10.1016/J.COSE.2023.103488}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCPZWZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCZY23, author = {Chao Li and Yanan Cheng and Zhaoxin Zhang and Ping Yu}, title = {Configuration anormaly detection and resolution risk assessment of authoritative domain name server}, journal = {Comput. Secur.}, volume = {135}, pages = {103426}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103426}, doi = {10.1016/J.COSE.2023.103426}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiCZY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiFHY23, author = {Jiawen Li and Kun Fang and Xiaolin Huang and Jie Yang}, title = {Improving adversarial robustness through a curriculum-guided reliable distillation}, journal = {Comput. Secur.}, volume = {133}, pages = {103411}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103411}, doi = {10.1016/J.COSE.2023.103411}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiFHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiGZD23, author = {Kun Li and Wei Guo and Fan Zhang and Jiayu Du}, title = {{GAMBD:} Generating adversarial malware against MalConv}, journal = {Comput. Secur.}, volume = {130}, pages = {103279}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103279}, doi = {10.1016/J.COSE.2023.103279}, timestamp = {Wed, 07 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiGZD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiHDQG23, author = {Zhengfa Li and Chuanhe Huang and Shuhua Deng and Wanyu Qiu and Xieping Gao}, title = {A soft actor-critic reinforcement learning algorithm for network intrusion detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103502}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103502}, doi = {10.1016/J.COSE.2023.103502}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiHDQG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiHX23, author = {Jiachun Li and Yuchao Hu and Fei Xia}, title = {A variable adversarial attack method based on filtering}, journal = {Comput. Secur.}, volume = {134}, pages = {103431}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103431}, doi = {10.1016/J.COSE.2023.103431}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLCZW23, author = {Li Li and Tianfeng Li and Hua Cai and Jian Zhang and Jianjun Wang}, title = {I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem}, journal = {Comput. Secur.}, volume = {128}, pages = {103156}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103156}, doi = {10.1016/J.COSE.2023.103156}, timestamp = {Thu, 05 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLCZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLFWP23, author = {Xiangjuan Li and Yang Li and Zhaowen Feng and Zhaoxuan Wang and Quan Pan}, title = {{ATS-O2A:} {A} state-based adversarial attack strategy on deep reinforcement learning}, journal = {Comput. Secur.}, volume = {129}, pages = {103259}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103259}, doi = {10.1016/J.COSE.2023.103259}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLFWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLJZZ23, author = {Munan Li and Hongbo Liu and Xiangdong Jiang and Zheng Zhao and Tianhao Zhang}, title = {{SENSE:} An unsupervised semantic learning model for cross-platform vulnerability search}, journal = {Comput. Secur.}, volume = {135}, pages = {103500}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103500}, doi = {10.1016/J.COSE.2023.103500}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiLJZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLWL23, author = {Yuzhe Li and Yong Liu and Bo Li and Weiping Wang and Nan Liu}, title = {Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private {ERM}}, journal = {Comput. Secur.}, volume = {128}, pages = {103147}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103147}, doi = {10.1016/J.COSE.2023.103147}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiLLWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiM23, author = {Yuying Li and Rogemar S. Mamon}, title = {Modelling health-data breaches with application to cyber insurance}, journal = {Comput. Secur.}, volume = {124}, pages = {102963}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102963}, doi = {10.1016/J.COSE.2022.102963}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiTZ23, author = {Wenjuan Li and Jiao Tan and Nan Zhu}, title = {Design of double-cross-based smartphone unlock mechanism}, journal = {Comput. Secur.}, volume = {129}, pages = {103204}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103204}, doi = {10.1016/J.COSE.2023.103204}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiXZYC23, author = {Xin Li and Yang Xin and Hongliang Zhu and Yixian Yang and Yuling Chen}, title = {Cross-domain vulnerability detection using graph embedding and domain adaptation}, journal = {Comput. Secur.}, volume = {125}, pages = {103017}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103017}, doi = {10.1016/J.COSE.2022.103017}, timestamp = {Mon, 06 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiXZYC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiYLLC23, author = {Yufeng Li and Fengyu Yang and Qi Liu and Jiangtao Li and Chenhong Cao}, title = {Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light}, journal = {Comput. Secur.}, volume = {132}, pages = {103345}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103345}, doi = {10.1016/J.COSE.2023.103345}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiYLLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiYSB23, author = {Yanli Li and Dong Yuan and Abubakar Sadiq Sani and Wei Bao}, title = {Enhancing federated learning robustness in adversarial environment through clustering Non-IID features}, journal = {Comput. Secur.}, volume = {132}, pages = {103319}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103319}, doi = {10.1016/J.COSE.2023.103319}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiYSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZRC23, author = {Jie Li and Tianqing Zhu and Wei Ren and Kim{-}Kwang Raymond Choo}, title = {Improve individual fairness in federated learning via adversarial training}, journal = {Comput. Secur.}, volume = {132}, pages = {103336}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103336}, doi = {10.1016/J.COSE.2023.103336}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiZRC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZSWHLH23, author = {Qianyu Li and Min Zhang and Yi Shen and Ruipeng Wang and Miao Hu and Yang Li and Hao Hao}, title = {A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testing}, journal = {Comput. Secur.}, volume = {132}, pages = {103358}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103358}, doi = {10.1016/J.COSE.2023.103358}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiZSWHLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangKSBS23, author = {Xueping Liang and Charalambos Konstantinou and Sachin Shetty and Eranga Bandara and Ruimin Sun}, title = {Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from {A} Cybersecurity Perspective}, journal = {Comput. Secur.}, volume = {124}, pages = {102953}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102953}, doi = {10.1016/J.COSE.2022.102953}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangKSBS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangWZC23, author = {Jianbing Liang and Suxia Wang and Shuang Zhao and Shuhui Chen}, title = {{FECC:} {DNS} tunnel detection model based on {CNN} and clustering}, journal = {Comput. Secur.}, volume = {128}, pages = {103132}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103132}, doi = {10.1016/J.COSE.2023.103132}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangWZC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LichyBDDH23, author = {Adi Lichy and Ofek Bader and Ran Dubin and Amit Dvir and Chen Hajaj}, title = {When a {RF} beats a {CNN} and GRU, together - {A} comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification}, journal = {Comput. Secur.}, volume = {124}, pages = {103000}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103000}, doi = {10.1016/J.COSE.2022.103000}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LichyBDDH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinXHLZL23, author = {Zhutian Lin and Xi Xiao and Guangwu Hu and Qing Li and Bin Zhang and Xiapu Luo}, title = {Tracking phishing on Ethereum: Transaction network embedding approach for accounts representation learning}, journal = {Comput. Secur.}, volume = {135}, pages = {103479}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103479}, doi = {10.1016/J.COSE.2023.103479}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LinXHLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LingWZQDCQWJLWW23, author = {Xiang Ling and Lingfei Wu and Jiangyu Zhang and Zhenqing Qu and Wei Deng and Xiang Chen and Yaguan Qian and Chunming Wu and Shouling Ji and Tianyue Luo and Jingzheng Wu and Yanjun Wu}, title = {Adversarial attacks against Windows {PE} malware detection: {A} survey of the state-of-the-art}, journal = {Comput. Secur.}, volume = {128}, pages = {103134}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103134}, doi = {10.1016/J.COSE.2023.103134}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LingWZQDCQWJLWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuFHX23, author = {Zhonglin Liu and Yong Fang and Cheng Huang and Yijia Xu}, title = {{MFXSS:} An effective {XSS} vulnerability detection method in JavaScript based on multi-feature model}, journal = {Comput. Secur.}, volume = {124}, pages = {103015}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103015}, doi = {10.1016/J.COSE.2022.103015}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuFHX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuL23, author = {Xiaojian Liu and Kehong Liu}, title = {A permission-carrying security policy and static enforcement for information flows in Android programs}, journal = {Comput. Secur.}, volume = {126}, pages = {103090}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103090}, doi = {10.1016/J.COSE.2022.103090}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuLXZX23, author = {Jiyuan Liu and Bingyi Lu and Mingkang Xiong and Tao Zhang and Huilin Xiong}, title = {Low frequency sparse adversarial attack}, journal = {Comput. Secur.}, volume = {132}, pages = {103379}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103379}, doi = {10.1016/J.COSE.2023.103379}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuLXZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuWLXN23, author = {Xueyan Liu and Jing Wang and Qiong Liu and Xin Xiong and Shufen Niu}, title = {Bidirectional location privacy protection scheme for epidemiological investigation based on {OT}}, journal = {Comput. Secur.}, volume = {135}, pages = {103453}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103453}, doi = {10.1016/J.COSE.2023.103453}, timestamp = {Thu, 14 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuWLXN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuZXWX23, author = {Linfeng Liu and Yaoze Zhou and Zhiyuan Xi and Jiagao Wu and Jia Xu}, title = {Defense against underwater spy-robots: {A} distributed anti-theft topology control mechanism for insecure {UASN}}, journal = {Comput. Secur.}, volume = {129}, pages = {103214}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103214}, doi = {10.1016/J.COSE.2023.103214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuZXWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LopesZAALRP23, author = {Ivandro Ortet Lopes and Deqing Zou and Ihsan H. Abdulqadder and Saeed Akbar and Zhen Li and Francis A. Ruambo and Wagner Pereira}, title = {Network intrusion detection based on the temporal convolutional model}, journal = {Comput. Secur.}, volume = {135}, pages = {103465}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103465}, doi = {10.1016/J.COSE.2023.103465}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LopesZAALRP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LoucaPS23, author = {Constantinos Louca and Adamantini Peratikou and Stavros Stavrou}, title = {A novel Evil Twin MiTM attack through 802.11v protocol exploitation}, journal = {Comput. Secur.}, volume = {130}, pages = {103261}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103261}, doi = {10.1016/J.COSE.2023.103261}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LoucaPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuLLGY23, author = {Shiwei Lu and Ruihu Li and Wenbin Liu and Chaofeng Guan and Xiaopeng Yang}, title = {Top-\emph{k} sparsification with secure aggregation for privacy-preserving federated learning}, journal = {Comput. Secur.}, volume = {124}, pages = {102993}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102993}, doi = {10.1016/J.COSE.2022.102993}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuLLGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuoLL23, author = {Shiyao Luo and Yingxu Lai and Jing Liu}, title = {Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network}, journal = {Comput. Secur.}, volume = {126}, pages = {103083}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103083}, doi = {10.1016/J.COSE.2022.103083}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LuoLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaLZZLGAA23, author = {Hua Ma and Qun Li and Yifeng Zheng and Zhi Zhang and Xiaoning Liu and Yansong Gao and Said F. Al{-}Sarawi and Derek Abbott}, title = {MUD-PQFed: Towards Malicious User Detection on model corruption in Privacy-preserving Quantized Federated learning}, journal = {Comput. Secur.}, volume = {133}, pages = {103406}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103406}, doi = {10.1016/J.COSE.2023.103406}, timestamp = {Fri, 01 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MaLZZLGAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaZWJGW23, author = {Xiuli Ma and Wenbin Zhu and Jieling Wei and Yanliang Jin and Dongsheng Gu and Rui Wang}, title = {{EETC:} An extended encrypted traffic classification algorithm based on variant resnet network}, journal = {Comput. Secur.}, volume = {128}, pages = {103175}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103175}, doi = {10.1016/J.COSE.2023.103175}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaZWJGW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaZWM23, author = {Binhao Ma and Can Zhao and Dejun Wang and Bo Meng}, title = {{DIHBA:} Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio}, journal = {Comput. Secur.}, volume = {129}, pages = {103212}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103212}, doi = {10.1016/J.COSE.2023.103212}, timestamp = {Sat, 20 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaZWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaesschalckSDGH23, author = {Sam Maesschalck and Alexander Staves and Richard Derbyshire and Benjamin Green and David Hutchison}, title = {Walking under the ladder logic: {PLC-VBS:} a {PLC} control logic vulnerability scanning tool}, journal = {Comput. Secur.}, volume = {127}, pages = {103116}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103116}, doi = {10.1016/J.COSE.2023.103116}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaesschalckSDGH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MahadikPM23, author = {Shalaka Mahadik and Pranav M. Pawar and Raja Muthalagu}, title = {Edge-HetIoT defense against DDoS attack using learning techniques}, journal = {Comput. Secur.}, volume = {132}, pages = {103347}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103347}, doi = {10.1016/J.COSE.2023.103347}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MahadikPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MakhdoomAFLZPS23, author = {Imran Makhdoom and Mehran Abolhasan and Daniel Robert Franklin and Justin Lipman and Christian Zimmermann and Massimo Piccardi and Negin Shariati}, title = {Detecting compromised IoT devices: Existing techniques, challenges, and a way forward}, journal = {Comput. Secur.}, volume = {132}, pages = {103384}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103384}, doi = {10.1016/J.COSE.2023.103384}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MakhdoomAFLZPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MandaS23, author = {Sridhar Manda and Charanjeet Singh}, title = {{CVFP:} Energy and trust aware data routing protocol based on Competitive Verse Flower Pollination algorithm in IoT}, journal = {Comput. Secur.}, volume = {127}, pages = {103035}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103035}, doi = {10.1016/J.COSE.2022.103035}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MandaS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoLCSZQ23, author = {Zhongshu Mao and Yiqin Lu and Zhe Cheng and Xiong Shen and Yang Zhang and Jiancheng Qin}, title = {Boosting adversarial attacks with future momentum and future transformation}, journal = {Comput. Secur.}, volume = {127}, pages = {103124}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103124}, doi = {10.1016/J.COSE.2023.103124}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoLCSZQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoQHLTWWY23, author = {Jiaoze Mao and Yaguan Qian and Jianchang Huang and Zejie Lian and Renhui Tao and Bin Wang and Wei Wang and Tengteng Yao}, title = {Object-free backdoor attack and defense on semantic segmentation}, journal = {Comput. Secur.}, volume = {132}, pages = {103365}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103365}, doi = {10.1016/J.COSE.2023.103365}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoQHLTWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McIntoshKCNW23, author = {Timothy R. McIntosh and A. S. M. Kayes and Yi{-}Ping Phoebe Chen and Alex Ng and Paul A. Watters}, title = {Applying staged event-driven access control to combat ransomware}, journal = {Comput. Secur.}, volume = {128}, pages = {103160}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103160}, doi = {10.1016/J.COSE.2023.103160}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McIntoshKCNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McIntoshLSANNW23, author = {Timothy R. McIntosh and Tong Liu and Teo Susnjak and Hooman Alavizadeh and Alex Ng and Raza Nowrozy and Paul A. Watters}, title = {Harnessing {GPT-4} for generation of cybersecurity {GRC} policies: {A} focus on ransomware attack mitigation}, journal = {Comput. Secur.}, volume = {134}, pages = {103424}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103424}, doi = {10.1016/J.COSE.2023.103424}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/McIntoshLSANNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MeidanBBAS23, author = {Yair Meidan and Daniel Benatar and Ron Bitton and Dan Avraham and Asaf Shabtai}, title = {D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks}, journal = {Comput. Secur.}, volume = {126}, pages = {103073}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103073}, doi = {10.1016/J.COSE.2022.103073}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MeidanBBAS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MengLQ0YZ23, author = {Shunmei Meng and Qianmu Li and Lianyong Qi and Xiaolong Xu and Rui Yuan and Xuyun Zhang}, title = {An intelligent recommendation method based on multi-interest network and adversarial deep learning}, journal = {Comput. Secur.}, volume = {130}, pages = {103264}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103264}, doi = {10.1016/J.COSE.2023.103264}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MengLQ0YZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MiculanV23, author = {Marino Miculan and Nicola Vitacolonna}, title = {Automated verification of Telegram's MTProto 2.0 in the symbolic model}, journal = {Comput. Secur.}, volume = {126}, pages = {103072}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103072}, doi = {10.1016/J.COSE.2022.103072}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MiculanV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MillsWL23, author = {Alan Mills and Jonathan White and Phil Legg}, title = {Longitudinal risk-based security assessment of docker software container images}, journal = {Comput. Secur.}, volume = {135}, pages = {103478}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103478}, doi = {10.1016/J.COSE.2023.103478}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MillsWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MinnaM23, author = {Francesco Minna and Fabio Massacci}, title = {SoK: Run-time security for cloud microservices. Are we there yet?}, journal = {Comput. Secur.}, volume = {127}, pages = {103119}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103119}, doi = {10.1016/J.COSE.2023.103119}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MinnaM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MirskyDKSGYZPLE23, author = {Yisroel Mirsky and Ambra Demontis and Jaidip Kotak and Ram Shankar and Gelei Deng and Liu Yang and Xiangyu Zhang and Maura Pintor and Wenke Lee and Yuval Elovici and Battista Biggio}, title = {The Threat of Offensive {AI} to Organizations}, journal = {Comput. Secur.}, volume = {124}, pages = {103006}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103006}, doi = {10.1016/J.COSE.2022.103006}, timestamp = {Mon, 04 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MirskyDKSGYZPLE23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MitsevaAP23, author = {Asya Mitseva and Marharyta Aleksandrova and Andriy Panchenko}, title = {Security and performance implications of {BGP} rerouting-resistant guard selection algorithms for Tor}, journal = {Comput. Secur.}, volume = {132}, pages = {103374}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103374}, doi = {10.1016/J.COSE.2023.103374}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MitsevaAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohammedARSB23, author = {Abubakar Sadiq Mohammed and Eirini Anthi and Omer F. Rana and Neetesh Saxena and Pete Burnap}, title = {Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication}, journal = {Comput. Secur.}, volume = {124}, pages = {103007}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103007}, doi = {10.1016/J.COSE.2022.103007}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/MohammedARSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Molina-Coronado23, author = {Borja Molina{-}Coronado and Usue Mori and Alexander Mendiburu and Jos{\'{e}} Miguel{-}Alonso}, title = {Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning}, journal = {Comput. Secur.}, volume = {124}, pages = {102996}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102996}, doi = {10.1016/J.COSE.2022.102996}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Molina-Coronado23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MollaeefarR23, author = {Majid Mollaeefar and Silvio Ranise}, title = {Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the {GDPR}}, journal = {Comput. Secur.}, volume = {129}, pages = {103206}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103206}, doi = {10.1016/J.COSE.2023.103206}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MollaeefarR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MoreiraMS23, author = {Caio C. Moreira and Davi C. Moreira and Claudomiro de S. de Sales Jr.}, title = {Improving ransomware detection based on portable executable header using xception convolutional neural network}, journal = {Comput. Secur.}, volume = {130}, pages = {103265}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103265}, doi = {10.1016/J.COSE.2023.103265}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MoreiraMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MottTNMSCC23, author = {Gareth Mott and Sarah Turner and Jason R. C. Nurse and Jamie MacColl and James Sullivan and Anna Cartwright and Edward J. Cartwright}, title = {Between a rock and a hard(ening) place: Cyber insurance in the ransomware era}, journal = {Comput. Secur.}, volume = {128}, pages = {103162}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103162}, doi = {10.1016/J.COSE.2023.103162}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MottTNMSCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MouraLMPC23, author = {Ricardo Moura and Ricardo Lopes and David R. Matos and Miguel L. Pardal and Miguel Correia}, title = {MultiTLS: using multiple and diverse ciphers for stronger secure channels}, journal = {Comput. Secur.}, volume = {132}, pages = {103342}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103342}, doi = {10.1016/J.COSE.2023.103342}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MouraLMPC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MouratidisIPSI23, author = {Haralambos Mouratidis and Shareeful Islam and Antonio Santos{-}Olmo Parra and Lu{\'{\i}}s Enrique Sanchez and Umar Mukhtar Ismail}, title = {Modelling language for cyber security incident handling for critical infrastructures}, journal = {Comput. Secur.}, volume = {128}, pages = {103139}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103139}, doi = {10.1016/J.COSE.2023.103139}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MouratidisIPSI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MubarkootABEL23, author = {Mohammed Mubarkoot and J{\"{o}}rn Altmann and Morteza Rasti Barzoki and Bernhard Egger and Hyejin Lee}, title = {Software Compliance Requirements, Factors, and Policies: {A} Systematic Literature Review}, journal = {Comput. Secur.}, volume = {124}, pages = {102985}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102985}, doi = {10.1016/J.COSE.2022.102985}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MubarkootABEL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MunozRRL23, author = {Antonio Mu{\~{n}}oz and Ruben Rios and Rodrigo Rom{\'{a}}n and Javier L{\'{o}}pez}, title = {A survey on the (in)security of trusted execution environments}, journal = {Comput. Secur.}, volume = {129}, pages = {103180}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103180}, doi = {10.1016/J.COSE.2023.103180}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MunozRRL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MunsingerBR23, author = {Brita Munsinger and Nicole Beebe and Turquoise Richardson}, title = {Virtual reality for improving cyber situational awareness in security operations centers}, journal = {Comput. Secur.}, volume = {132}, pages = {103368}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103368}, doi = {10.1016/J.COSE.2023.103368}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MunsingerBR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MustaphaKZCFFA23, author = {Ali Mustapha and Rida Khatoun and Sherali Zeadally and Fadlallah Chbib and Ahmad Fadlallah and Walid Fahs and Ali El Attar}, title = {Detecting DDoS attacks using adversarial neural network}, journal = {Comput. Secur.}, volume = {127}, pages = {103117}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103117}, doi = {10.1016/J.COSE.2023.103117}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MustaphaKZCFFA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaqviPFMOP23, author = {Bilal Naqvi and Kseniia Perova and Ali Farooq and Imran Makhdoom and Shola Oyedeji and Jari Porras}, title = {Mitigation strategies against the phishing attacks: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {132}, pages = {103387}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103387}, doi = {10.1016/J.COSE.2023.103387}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NaqviPFMOP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaseerNAMS23, author = {Ayesha Naseer and Humza Naseer and Atif Ahmad and Sean B. Maynard and Adil Masood Siddiqui}, title = {Moving towards agile cybersecurity incident response: {A} case study exploring the enabling role of big data analytics-embedded dynamic capabilities}, journal = {Comput. Secur.}, volume = {135}, pages = {103525}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103525}, doi = {10.1016/J.COSE.2023.103525}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NaseerNAMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NasirAK23, author = {Muhammad Hassan Nasir and Junaid Arshad and Muhammad Mubashir Khan}, title = {Collaborative device-level botnet detection for internet of things}, journal = {Comput. Secur.}, volume = {129}, pages = {103172}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103172}, doi = {10.1016/J.COSE.2023.103172}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NasirAK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NayfehLSDK23, author = {Mohammad Nayfeh and Yuchen Li and Khair Al Shamaileh and Vijay Kumar Devabhaktuni and Naima Kaabouch}, title = {Machine Learning Modeling of {GPS} Features with Applications to {UAV} Location Spoofing Detection and Classification}, journal = {Comput. Secur.}, volume = {126}, pages = {103085}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103085}, doi = {10.1016/J.COSE.2022.103085}, timestamp = {Thu, 17 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NayfehLSDK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NgwobiaRKK23, author = {Sunday Cosmos Ngwobia and Anca L. Ralescu and David Kapp and Temesgen Kebede}, title = {Detection of malicious {PE} files using synthesized {DNA} artifacts}, journal = {Comput. Secur.}, volume = {134}, pages = {103457}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103457}, doi = {10.1016/J.COSE.2023.103457}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NgwobiaRKK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiakanlahijiOVJ23, author = {Amirreza Niakanlahiji and Soeren Orlowski and Alireza Vahid and Jafar Haadi Jafarian}, title = {Toward practical defense against traffic analysis attacks on encrypted {DNS} traffic}, journal = {Comput. Secur.}, volume = {124}, pages = {103001}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103001}, doi = {10.1016/J.COSE.2022.103001}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiakanlahijiOVJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NicheliniPLCZ23, author = {Alessandro Nichelini and Carlo Alberto Pozzoli and Stefano Longari and Michele Carminati and Stefano Zanero}, title = {CANova: {A} hybrid intrusion detection framework based on automatic signal classification for {CAN}}, journal = {Comput. Secur.}, volume = {128}, pages = {103166}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103166}, doi = {10.1016/J.COSE.2023.103166}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NicheliniPLCZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NieCWZCS23, author = {Xiaofan Nie and Liwei Chen and Haolai Wei and Yuantong Zhang and Ningning Cui and Gang Shi}, title = {{KPDFI:} Efficient data flow integrity based on key property against data corruption attack}, journal = {Comput. Secur.}, volume = {128}, pages = {103183}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103183}, doi = {10.1016/J.COSE.2023.103183}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NieCWZCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NirmalapriyaMLN23, author = {G. Nirmalapriya and Balajee Maram and Ramanathan Lakshmanan and M. Navaneethakrishnan}, title = {ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection}, journal = {Comput. Secur.}, volume = {128}, pages = {103155}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103155}, doi = {10.1016/J.COSE.2023.103155}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NirmalapriyaMLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiuGXWKH23, author = {Zequn Niu and Wenjie Guo and Jingfeng Xue and Yong Wang and Zixiao Kong and Lu Huang}, title = {A novel anomaly detection approach based on ensemble semi-supervised active learning {(ADESSA)}}, journal = {Comput. Secur.}, volume = {129}, pages = {103190}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103190}, doi = {10.1016/J.COSE.2023.103190}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiuGXWKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NovkovicG23, author = {Bojan Novkovic and Marin Golub}, title = {Improving monolithic kernel security and robustness through intra-kernel sandboxing}, journal = {Comput. Secur.}, volume = {127}, pages = {103104}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103104}, doi = {10.1016/J.COSE.2023.103104}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NovkovicG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NwankpaD23, author = {Joseph K. Nwankpa and Pratim Milton Datta}, title = {Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers}, journal = {Comput. Secur.}, volume = {130}, pages = {103266}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103266}, doi = {10.1016/J.COSE.2023.103266}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NwankpaD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OdeleyeLHSPS23, author = {Blessing Odeleye and George Loukas and Ryan Heartfield and Georgia Sakellari and Emmanouil Panaousis and Fotios Spyridonis}, title = {Virtually secure: {A} taxonomic assessment of cybersecurity challenges in virtual reality environments}, journal = {Comput. Secur.}, volume = {124}, pages = {102951}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102951}, doi = {10.1016/J.COSE.2022.102951}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OdeleyeLHSPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OfteK23, author = {H{\aa}vard Jakobsen Ofte and Sokratis K. Katsikas}, title = {Understanding situation awareness in SOCs, a systematic literature review}, journal = {Comput. Secur.}, volume = {126}, pages = {103069}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103069}, doi = {10.1016/J.COSE.2022.103069}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OfteK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OgbanufeCB23, author = {Obi Ogbanufe and Robert E. Crossler and David Biros}, title = {The valued coexistence of protection motivation and stewardship in information security behaviors}, journal = {Comput. Secur.}, volume = {124}, pages = {102960}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102960}, doi = {10.1016/J.COSE.2022.102960}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OgbanufeCB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OgbanufeG23, author = {Obi Ogbanufe and Ling Ge}, title = {A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations}, journal = {Comput. Secur.}, volume = {128}, pages = {103136}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103136}, doi = {10.1016/J.COSE.2023.103136}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OgbanufeG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OkeyURRK23, author = {Ogobuchi Daniel Okey and Ekikere Umoren Udo and Renata Lopes Rosa and Dem{\'{o}}stenes Zegarra Rodr{\'{\i}}guez and Jo{\~{a}}o Henrique Kleinschmidt}, title = {Investigating ChatGPT and cybersecurity: {A} perspective on topic modeling and sentiment analysis}, journal = {Comput. Secur.}, volume = {135}, pages = {103476}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103476}, doi = {10.1016/J.COSE.2023.103476}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/OkeyURRK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OlimpioCMF23, author = {Gilberto Olimpio and L{\'{a}}saro J. Camargos and Rodrigo Sanches Miani and Elaine Ribeiro de Faria}, title = {Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies}, journal = {Comput. Secur.}, volume = {134}, pages = {103451}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103451}, doi = {10.1016/J.COSE.2023.103451}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OlimpioCMF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PamiesEstremsG23, author = {David P{\`{a}}mies{-}Estrems and Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro}, title = {On the self-adjustment of privacy safeguards for query log streams}, journal = {Comput. Secur.}, volume = {134}, pages = {103450}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103450}, doi = {10.1016/J.COSE.2023.103450}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PamiesEstremsG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PandeyVARV23, author = {Bishwajeet K. Pandey and M. R. M. VeeraManickam and Shabeer Ahmad and Ciro Rodriguez Rodriguez and Doris Esenarro Vargas}, title = {ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework}, journal = {Comput. Secur.}, volume = {124}, pages = {102975}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102975}, doi = {10.1016/J.COSE.2022.102975}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PandeyVARV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PangLWGMX23, author = {Chengbin Pang and Hongbin Liu and Yifan Wang and Neil Zhenqiang Gong and Bing Mao and Jun Xu}, title = {Generation-based fuzzing? Don't build a new generator, reuse!}, journal = {Comput. Secur.}, volume = {129}, pages = {103178}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103178}, doi = {10.1016/J.COSE.2023.103178}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PangLWGMX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkJL23, author = {Sung Bum Park and Hyo Jin Jo and Dong Hoon Lee}, title = {Flooding attack mitigator for in-vehicle {CAN} using fault confinement in {CAN} protocol}, journal = {Comput. Secur.}, volume = {126}, pages = {103091}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103091}, doi = {10.1016/J.COSE.2023.103091}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkRPJ23, author = {Ah{-}hyun Park and Hyejin Ryu and Woobeen Park and Doowon Jeong}, title = {Forensic investigation framework for cryptocurrency wallet in the end device}, journal = {Comput. Secur.}, volume = {133}, pages = {103392}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103392}, doi = {10.1016/J.COSE.2023.103392}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkRPJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PasikhaniCG23, author = {Aryan Mohammadi Pasikhani and John A. Clark and Prosanta Gope}, title = {Incremental hybrid intrusion detection for 6LoWPAN}, journal = {Comput. Secur.}, volume = {135}, pages = {103447}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103447}, doi = {10.1016/J.COSE.2023.103447}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PasikhaniCG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PattersonNF23, author = {Clare M. Patterson and Jason R. C. Nurse and Virginia N. L. Franqueira}, title = {Learning from cyber security incidents: {A} systematic review and future research agenda}, journal = {Comput. Secur.}, volume = {132}, pages = {103309}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103309}, doi = {10.1016/J.COSE.2023.103309}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PattersonNF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PattnaikLN23, author = {Nandita Pattnaik and Shujun Li and Jason R. C. Nurse}, title = {Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter}, journal = {Comput. Secur.}, volume = {125}, pages = {103008}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103008}, doi = {10.1016/J.COSE.2022.103008}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PattnaikLN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Pirca023, author = {Ana Maria Pirca and Harjinder Singh Lallie}, title = {An empirical evaluation of the effectiveness of attack graphs and {MITRE} ATT{\&}CK matrices in aiding cyber attack perception amongst decision-makers}, journal = {Comput. Secur.}, volume = {130}, pages = {103254}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103254}, doi = {10.1016/J.COSE.2023.103254}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Pirca023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PlappertLEJFH23, author = {Christian Plappert and Dominik Lorych and Michael Eckel and Lukas J{\"{a}}ger and Andreas Fuchs and Ronald Heddergott}, title = {Evaluating the applicability of hardware trust anchors for automotive applications}, journal = {Comput. Secur.}, volume = {135}, pages = {103514}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103514}, doi = {10.1016/J.COSE.2023.103514}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PlappertLEJFH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PohnGZB23, author = {Daniela P{\"{o}}hn and Nils Gruschka and Leonhard Ziegler and Andre B{\"{u}}ttner}, title = {A framework for analyzing authentication risks in account networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103515}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103515}, doi = {10.1016/J.COSE.2023.103515}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PohnGZB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PourNFB23, author = {Morteza Safaei Pour and Christelle Nader and Kurt Friday and Elias Bou{-}Harb}, title = {A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security}, journal = {Comput. Secur.}, volume = {128}, pages = {103123}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103123}, doi = {10.1016/J.COSE.2023.103123}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PourNFB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PreuveneersJ23, author = {Davy Preuveneers and Wouter Joosen}, title = {Privacy-preserving correlation of cross-organizational cyber threat intelligence with private graph intersections}, journal = {Comput. Secur.}, volume = {135}, pages = {103505}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103505}, doi = {10.1016/J.COSE.2023.103505}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/PreuveneersJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QamarAA23, author = {Sara Qamar and Zahid Anwar and Mehreen Afzal}, title = {A systematic threat analysis and defense strategies for the metaverse and extended reality systems}, journal = {Comput. Secur.}, volume = {128}, pages = {103127}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103127}, doi = {10.1016/J.COSE.2023.103127}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QamarAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiaoMZWCXL23, author = {Tong Qiao and Yuyan Ma and Ning Zheng and Hanzhou Wu and Yanli Chen and Ming Xu and Xiangyang Luo}, title = {A novel model watermarking for protecting generative adversarial network}, journal = {Comput. Secur.}, volume = {127}, pages = {103102}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103102}, doi = {10.1016/J.COSE.2023.103102}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiaoMZWCXL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QinPLZCZS23, author = {Chuan Qin and Jiaqian Peng and Puzhuo Liu and Yaowen Zheng and Kai Cheng and Weidong Zhang and Limin Sun}, title = {{UCRF:} Static analyzing firmware to generate under-constrained seed for fuzzing {SOHO} router}, journal = {Comput. Secur.}, volume = {128}, pages = {103157}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103157}, doi = {10.1016/J.COSE.2023.103157}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QinPLZCZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QinZP23, author = {Yingxin Qin and Kejia Zhang and Haiwei Pan}, title = {Adversarial attack for object detectors under complex conditions}, journal = {Comput. Secur.}, volume = {134}, pages = {103460}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103460}, doi = {10.1016/J.COSE.2023.103460}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QinZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuXS23, author = {Leilei Qu and Ruojin Xiao and Wenchang Shi}, title = {Interactions of Framing and Timing in Nudging Online Game Security}, journal = {Comput. Secur.}, volume = {124}, pages = {102962}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102962}, doi = {10.1016/J.COSE.2022.102962}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QuXS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuanWLL23, author = {Hanyu Quan and Boyang Wang and Ming Li and Iraklis Leontiadis}, title = {FastReach: {A} system for privacy-preserving reachability queries over location data}, journal = {Comput. Secur.}, volume = {135}, pages = {103513}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103513}, doi = {10.1016/J.COSE.2023.103513}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/QuanWLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RacheracheSSD23, author = {Badis Racherache and Paria Shirani and Andrei Soeanu and Mourad Debbabi}, title = {{CPID:} Insider threat detection using profiling and cyber-persona identification}, journal = {Comput. Secur.}, volume = {132}, pages = {103350}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103350}, doi = {10.1016/J.COSE.2023.103350}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RacheracheSSD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RajashreeSSS23, author = {Harine Rajashree and K. Sundarakantham and E. Sivasankar and Mercy Shalinie Selvaraj}, title = {A hybrid deep learning framework for privacy preservation in edge computing}, journal = {Comput. Secur.}, volume = {129}, pages = {103209}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103209}, doi = {10.1016/J.COSE.2023.103209}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RajashreeSSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RaoCA23, author = {Siddharth Prakash Rao and Hsin Yi Chen and Tuomas Aura}, title = {Threat modeling framework for mobile communication systems}, journal = {Comput. Secur.}, volume = {125}, pages = {103047}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103047}, doi = {10.1016/J.COSE.2022.103047}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RaoCA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RashidS23, author = {Aqib Rashid and Jose M. Such}, title = {StratDef: Strategic defense against adversarial attacks in ML-based malware detection}, journal = {Comput. Secur.}, volume = {134}, pages = {103459}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103459}, doi = {10.1016/J.COSE.2023.103459}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RashidS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassKWVP23, author = {Stefan Rass and Sandra K{\"{o}}nig and Jasmin Wachter and V{\'{\i}}ctor Mayoral Vilches and Emmanouil Panaousis}, title = {Game-theoretic {APT} defense: An experimental study on robotics}, journal = {Comput. Secur.}, volume = {132}, pages = {103328}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103328}, doi = {10.1016/J.COSE.2023.103328}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassKWVP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RayDowlingHS23, author = {Aratrika Ray{-}Dowling and Daqing Hou and Stephanie Schuckers}, title = {Stationary mobile behavioral biometrics: {A} survey}, journal = {Comput. Secur.}, volume = {128}, pages = {103184}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103184}, doi = {10.1016/J.COSE.2023.103184}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RayDowlingHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ReevesCD23, author = {Andrew Reeves and Dragana Calic and Paul H. Delfabbro}, title = {"Generic and unusable"\({}^{\mbox{1}}\): Understanding employee perceptions of cybersecurity training and measuring advice fatigue}, journal = {Comput. Secur.}, volume = {128}, pages = {103137}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103137}, doi = {10.1016/J.COSE.2023.103137}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ReevesCD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ren0LLZS23, author = {Yimo Ren and Hong Li and Peipei Liu and Jie Liu and Hongsong Zhu and Limin Sun}, title = {{CL-GAN:} {A} GAN-based continual learning model for generating and detecting AGDs}, journal = {Comput. Secur.}, volume = {131}, pages = {103317}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103317}, doi = {10.1016/J.COSE.2023.103317}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ren0LLZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenaudD23, author = {Karen Renaud and Marc J. Dupuis}, title = {Cybersecurity Insights Gleaned from World Religions}, journal = {Comput. Secur.}, volume = {132}, pages = {103326}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103326}, doi = {10.1016/J.COSE.2023.103326}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RenaudD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenaudSM23, author = {Karen Renaud and Karl van der Schyff and Stuart MacDonald}, title = {Would {US} citizens accept cybersecurity deresponsibilization? Perhaps not}, journal = {Comput. Secur.}, volume = {131}, pages = {103301}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103301}, doi = {10.1016/J.COSE.2023.103301}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RenaudSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RendonSegadorAV23, author = {Fernando J. Rend{\'{o}}n{-}Segador and Juan Antonio {\'{A}}lvarez{-}Garc{\'{\i}}a and {\'{A}}ngel Jes{\'{u}}s Varela{-}Vaca}, title = {Paying attention to cyber-attacks: {A} multi-layer perceptron with self-attention mechanism}, journal = {Comput. Secur.}, volume = {132}, pages = {103318}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103318}, doi = {10.1016/J.COSE.2023.103318}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RendonSegadorAV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Repetto23, author = {Matteo Repetto}, title = {Adaptive monitoring, detection, and response for agile digital service chains}, journal = {Comput. Secur.}, volume = {132}, pages = {103343}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103343}, doi = {10.1016/J.COSE.2023.103343}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Repetto23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RibeiroFS23, author = {Marcos Aur{\'{e}}lio Ribeiro and Mauro Sergio Pereira Fonseca and Juliana de Santi}, title = {Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in {SDN} networks}, journal = {Comput. Secur.}, volume = {134}, pages = {103462}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103462}, doi = {10.1016/J.COSE.2023.103462}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RibeiroFS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RigakiG23, author = {Maria Rigaki and Sebastian Garc{\'{\i}}a}, title = {Stealing and evading malware classifiers and antivirus at low false positive conditions}, journal = {Comput. Secur.}, volume = {129}, pages = {103192}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103192}, doi = {10.1016/J.COSE.2023.103192}, timestamp = {Wed, 17 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RigakiG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RizviZTFCFH23, author = {Syed Rizvi and Tatiana Zwerling and Benjamin Thompson and Shawn Faiola and Shakir Campbell and Stephen Fisanick and Codi Hutnick}, title = {A modular framework for auditing IoT devices and networks}, journal = {Comput. Secur.}, volume = {132}, pages = {103327}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103327}, doi = {10.1016/J.COSE.2023.103327}, timestamp = {Wed, 06 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RizviZTFCFH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RoblesGonzalezCP23, author = {Antonio Robles{-}Gonz{\'{a}}lez and Patricia Arias Cabarcos and Javier Parra{-}Arnau}, title = {Privacy-centered authentication: {A} new framework and analysis}, journal = {Comput. Secur.}, volume = {132}, pages = {103353}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103353}, doi = {10.1016/J.COSE.2023.103353}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RoblesGonzalezCP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RodriguezMMP23, author = {Ricardo J. Rodr{\'{\i}}guez and Stefano Marrone and Ibai Marcos and Giuseppe Porzio}, title = {{MOSTO:} {A} toolkit to facilitate security auditing of {ICS} devices using Modbus/TCP}, journal = {Comput. Secur.}, volume = {132}, pages = {103373}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103373}, doi = {10.1016/J.COSE.2023.103373}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RodriguezMMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RomdhanaMCT23, author = {Andrea Romdhana and Alessio Merlo and Mariano Ceccato and Paolo Tonella}, title = {Assessing the security of inter-app communications in android through reinforcement learning}, journal = {Comput. Secur.}, volume = {131}, pages = {103311}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103311}, doi = {10.1016/J.COSE.2023.103311}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RomdhanaMCT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RostamipoorGP23, author = {Maryam Rostamipoor and Seyedhamed Ghavamnia and Michalis Polychronakis}, title = {Confine: Fine-grained system call filtering for container attack surface reduction}, journal = {Comput. Secur.}, volume = {132}, pages = {103325}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103325}, doi = {10.1016/J.COSE.2023.103325}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RostamipoorGP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RustNguyenSS23, author = {Nhien Rust{-}Nguyen and Shruti Sharma and Mark Stamp}, title = {Darknet traffic classification and adversarial attacks using machine learning}, journal = {Comput. Secur.}, volume = {127}, pages = {103098}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103098}, doi = {10.1016/J.COSE.2023.103098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RustNguyenSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SSK23, author = {Devi Priya V. S and Sibi Chakkaravarthy Sethuraman and Muhammad Khurram Khan}, title = {Container security: Precaution levels, mitigation strategies, and research perspectives}, journal = {Comput. Secur.}, volume = {135}, pages = {103490}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103490}, doi = {10.1016/J.COSE.2023.103490}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SahayEMJB23, author = {Rishikesh Sahay and Daniel A. Sepulveda Estay and Weizhi Meng and Christian Damsgaard Jensen and Michael Bruhn Barfod}, title = {A comparative risk analysis on CyberShip system with STPA-Sec, {STRIDE} and {CORAS}}, journal = {Comput. Secur.}, volume = {128}, pages = {103179}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103179}, doi = {10.1016/J.COSE.2023.103179}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SahayEMJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SalehAS023, author = {Mariam M. Saleh and Muhanned AlSlaiman and Mohammed I. Salman and Bin Wang}, title = {Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classification}, journal = {Comput. Secur.}, volume = {130}, pages = {103287}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103287}, doi = {10.1016/J.COSE.2023.103287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SalehAS023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SanchezGarciaGC23, author = {Isaac Daniel Sanchez{-}Garcia and Tom{\'{a}}s San Feliu Gilabert and Jos{\'{e}} Antonio Calvo{-}Manzano}, title = {Countermeasures and their taxonomies for risk treatment in cybersecurity: {A} systematic mapping review}, journal = {Comput. Secur.}, volume = {128}, pages = {103170}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103170}, doi = {10.1016/J.COSE.2023.103170}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SanchezGarciaGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SangY0LC23, author = {Yafei Sang and Jisong Yang and Yongzheng Zhang and Shuhao Li and Peng Chang}, title = {Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach}, journal = {Comput. Secur.}, volume = {131}, pages = {103145}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103145}, doi = {10.1016/J.COSE.2023.103145}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SangY0LC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SanoussiCOH23, author = {Nouhad Sanoussi and Kaouthar Chetioui and Ghizlane Orhanou and Said El Hajji}, title = {{ITC:} Intrusion tolerant controller for multicontroller {SDN} architecture}, journal = {Comput. Secur.}, volume = {132}, pages = {103351}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103351}, doi = {10.1016/J.COSE.2023.103351}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SanoussiCOH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SantosVST23, author = {Roger Robson dos Santos and Eduardo K. Viegas and Altair O. Santin and Pietro Tedeschi}, title = {Federated learning for reliable model updates in network-based intrusion detection}, journal = {Comput. Secur.}, volume = {133}, pages = {103413}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103413}, doi = {10.1016/J.COSE.2023.103413}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SantosVST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SaqibM23, author = {Manasha Saqib and Ayaz Hassan Moon}, title = {A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication}, journal = {Comput. Secur.}, volume = {125}, pages = {103053}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103053}, doi = {10.1016/J.COSE.2022.103053}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SaqibM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SarikayaKD23, author = {Alper Sarikaya and Banu G{\"{u}}nel Kili{\c{c}} and Mehmet Demirci}, title = {{RAIDS:} Robust autoencoder-based intrusion detection system model against adversarial attacks}, journal = {Comput. Secur.}, volume = {135}, pages = {103483}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103483}, doi = {10.1016/J.COSE.2023.103483}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SarikayaKD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SartayevaC23, author = {Yerkezhan Sartayeva and Henry C. B. Chan}, title = {A survey on indoor positioning security and privacy}, journal = {Comput. Secur.}, volume = {131}, pages = {103293}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103293}, doi = {10.1016/J.COSE.2023.103293}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SartayevaC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchuckertKL23, author = {Felix Schuckert and Basel Katt and Hanno Langweg}, title = {Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code}, journal = {Comput. Secur.}, volume = {128}, pages = {103121}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103121}, doi = {10.1016/J.COSE.2023.103121}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchuckertKL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchyffF23, author = {Karl van der Schyff and Stephen Flowerday}, title = {The mediating role of perceived risks and benefits when self-disclosing: {A} study of social media trust and FoMO}, journal = {Comput. Secur.}, volume = {126}, pages = {103071}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103071}, doi = {10.1016/J.COSE.2022.103071}, timestamp = {Wed, 21 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchyffF23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaikhS23, author = {Faheem Ahmed Shaikh and Mikko T. Siponen}, title = {Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity}, journal = {Comput. Secur.}, volume = {124}, pages = {102974}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102974}, doi = {10.1016/J.COSE.2022.102974}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaikhS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShajiJMP23, author = {Neena Susan Shaji and Tanushree Jain and Raja Muthalagu and Pranav Mothabhau Pawar}, title = {Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks}, journal = {Comput. Secur.}, volume = {132}, pages = {103320}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103320}, doi = {10.1016/J.COSE.2023.103320}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShajiJMP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShakedCBM23, author = {Avi Shaked and Yulia Cherdantseva and Pete Burnap and Peter Maynard}, title = {Operations-informed incident response playbooks}, journal = {Comput. Secur.}, volume = {134}, pages = {103454}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103454}, doi = {10.1016/J.COSE.2023.103454}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShakedCBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharifB23, author = {Dyari Mohammad Sharif and Hakem Beitollahi}, title = {Detection of application-layer DDoS attacks using machine learning and genetic algorithms}, journal = {Comput. Secur.}, volume = {135}, pages = {103511}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103511}, doi = {10.1016/J.COSE.2023.103511}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SharifB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaSC23, author = {Shreyansh Sharma and Anil K. Saini and Santanu Chaudhury}, title = {A survey on biometric cryptosystems and their applications}, journal = {Comput. Secur.}, volume = {134}, pages = {103458}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103458}, doi = {10.1016/J.COSE.2023.103458}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaSC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaSN23, author = {Abhishek Sharma and Sangeeta Sabharwal and Sushama Nagpal}, title = {A hybrid scoring system for prioritization of software vulnerabilities}, journal = {Comput. Secur.}, volume = {129}, pages = {103256}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103256}, doi = {10.1016/J.COSE.2023.103256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaSN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShvartzmanOZSOMGO23, author = {Oren Shvartzman and Adar Ovadya and Kfir Zvi and Omer Shwartz and Rom Ogen and Yakov Mallah and Niv Gilboa and Yossi Oren}, title = {Characterization and Detection of Cross-Router Covert Channels}, journal = {Comput. Secur.}, volume = {127}, pages = {103125}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103125}, doi = {10.1016/J.COSE.2023.103125}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShvartzmanOZSOMGO23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Silva23, author = {Joseph Da Silva}, title = {Protection, expertise and domination: Cyber masculinity in practice}, journal = {Comput. Secur.}, volume = {133}, pages = {103408}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103408}, doi = {10.1016/J.COSE.2023.103408}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Silva23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SingamPABN23, author = {Sai Bala Subrahmanyam Singam and Goutham Pooloth and Vasanth Kumar Reddy Ambati and C. V. Bijitha and Hiran V. Nath}, title = {A hybrid method for analysis and detection of malicious executables in IoT network}, journal = {Comput. Secur.}, volume = {132}, pages = {103339}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103339}, doi = {10.1016/J.COSE.2023.103339}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SingamPABN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinghARG23, author = {Kuldeep Singh and Palvi Aggarwal and Prashanth Rajivan and Cleotilde Gonzalez}, title = {Cognitive elements of learning and discriminability in anti-phishing training}, journal = {Comput. Secur.}, volume = {127}, pages = {103105}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103105}, doi = {10.1016/J.COSE.2023.103105}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinghARG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SongGY23, author = {Yunjiao Song and Xinrui Ge and Jia Yu}, title = {Privacy-preserving reachability query over graphs with result verifiability}, journal = {Comput. Secur.}, volume = {127}, pages = {103092}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103092}, doi = {10.1016/J.COSE.2023.103092}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SongGY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SoremekunUC23, author = {Ezekiel O. Soremekun and Sakshi Udeshi and Sudipta Chattopadhyay}, title = {Towards Backdoor Attacks and Defense in Robust Machine Learning Models}, journal = {Comput. Secur.}, volume = {127}, pages = {103101}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103101}, doi = {10.1016/J.COSE.2023.103101}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SoremekunUC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Spring23, author = {Jonathan M. Spring}, title = {An analysis of how many undiscovered vulnerabilities remain in information systems}, journal = {Comput. Secur.}, volume = {131}, pages = {103191}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103191}, doi = {10.1016/J.COSE.2023.103191}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Spring23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SrijayanthiS23, author = {S. Srijayanthi and T. Sethukarasi}, title = {Design of privacy preserving model based on clustering involved anonymization along with feature selection}, journal = {Comput. Secur.}, volume = {126}, pages = {103027}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103027}, doi = {10.1016/J.COSE.2022.103027}, timestamp = {Sun, 19 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SrijayanthiS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SrivastavaSK23, author = {Arpita Srivastava and Ditipriya Sinha and Vikash Kumar}, title = {{WCGAN-GP} based synthetic attack data generation with {GA} based feature selection for {IDS}}, journal = {Comput. Secur.}, volume = {134}, pages = {103432}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103432}, doi = {10.1016/J.COSE.2023.103432}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SrivastavaSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StudiawanGC23, author = {Hudan Studiawan and George Grispos and Kim{-}Kwang Raymond Choo}, title = {Unmanned Aerial Vehicle {(UAV)} Forensics: The Good, The Bad, and the Unaddressed}, journal = {Comput. Secur.}, volume = {132}, pages = {103340}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103340}, doi = {10.1016/J.COSE.2023.103340}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StudiawanGC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/StyliosCTK23, author = {Ioannis Stylios and Sotirios Chatzis and Olga Thanou and Spyros Kokolakis}, title = {Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues}, journal = {Comput. Secur.}, volume = {132}, pages = {103363}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103363}, doi = {10.1016/J.COSE.2023.103363}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/StyliosCTK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunL0X0Y23, author = {Peishuai Sun and Shuhao Li and Jiang Xie and Hongbo Xu and Zhenyu Cheng and Rong Yang}, title = {{GPMT:} Generating practical malicious traffic based on adversarial attacks with little prior knowledge}, journal = {Comput. Secur.}, volume = {130}, pages = {103257}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103257}, doi = {10.1016/J.COSE.2023.103257}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunL0X0Y23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunLDL23, author = {Xuekai Sun and Chunling Liu and Weiyu Dong and Tieming Liu}, title = {Improvements to code2vec: Generating path vectors using {RNN}}, journal = {Comput. Secur.}, volume = {132}, pages = {103322}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103322}, doi = {10.1016/J.COSE.2023.103322}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunLDL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunLL23, author = {Yanan Sun and Hengjian Li and Nianqiang Li}, title = {A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter}, journal = {Comput. Secur.}, volume = {125}, pages = {103021}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103021}, doi = {10.1016/J.COSE.2022.103021}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SunLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunOZLWZ23, author = {Hongyu Sun and Guoliang Ou and Ziqiu Zheng and Lei Liao and He Wang and Yuqing Zhang}, title = {Inconsistent measurement and incorrect detection of software names in security vulnerability reports}, journal = {Comput. Secur.}, volume = {135}, pages = {103477}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103477}, doi = {10.1016/J.COSE.2023.103477}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/SunOZLWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TajDiniSKG23, author = {Mahyar Taj Dini and Volodymyr Sokolov and Ievgeniia Kuzminykh and Bogdan Ghita}, title = {Brainwave-based authentication using features fusion}, journal = {Comput. Secur.}, volume = {129}, pages = {103198}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103198}, doi = {10.1016/J.COSE.2023.103198}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TajDiniSKG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TanXHWL23, author = {Xiao Tan and Qi Xie and Lidong Han and Shengbao Wang and Wenhao Liu}, title = {Proof of retrievability with flexible designated verification for cloud storage}, journal = {Comput. Secur.}, volume = {135}, pages = {103486}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103486}, doi = {10.1016/J.COSE.2023.103486}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TanXHWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangDYQ23, author = {Chenghua Tang and Zheng Du and Mengmeng Yang and Baohua Qiang}, title = {Android static taint analysis based on multi branch search association}, journal = {Comput. Secur.}, volume = {129}, pages = {103186}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103186}, doi = {10.1016/J.COSE.2023.103186}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangDYQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangQJLD23, author = {Yonghe Tang and Xuyan Qi and Jing Jing and Chunling Liu and Weiyu Dong}, title = {{BHMDC:} {A} byte and hex n-gram based malware detection and classification method}, journal = {Comput. Secur.}, volume = {128}, pages = {103118}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103118}, doi = {10.1016/J.COSE.2023.103118}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangQJLD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TangXYTZ23, author = {Chaofan Tang and Lijuan Xu and Bo Yang and Yongwei Tang and Dawei Zhao}, title = {GRU-Based Interpretable Multivariate Time Series Anomaly Detection in Industrial Control System}, journal = {Comput. Secur.}, volume = {127}, pages = {103094}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103094}, doi = {10.1016/J.COSE.2023.103094}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TangXYTZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TaoSWWZ23, author = {Wenxin Tao and Xiaohong Su and Jiayuan Wan and Hongwei Wei and Weining Zheng}, title = {Vulnerability detection through cross-modal feature enhancement and fusion}, journal = {Comput. Secur.}, volume = {132}, pages = {103341}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103341}, doi = {10.1016/J.COSE.2023.103341}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TaoSWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TarwireyiTA23, author = {Paul Tarwireyi and Alfredo Terzoli and Matthew O. Adigun}, title = {Using multi-audio feature fusion for android malware detection}, journal = {Comput. Secur.}, volume = {131}, pages = {103282}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103282}, doi = {10.1016/J.COSE.2023.103282}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TarwireyiTA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TayyabMJHUQ23, author = {Muhammad Tayyab and Mohsen Marjani and N. Z. Jhanjhi and Ibrahim Abaker Targio Hashem and Raja Sher Afgun Usmani and Faizan Qamar}, title = {A comprehensive review on deep learning algorithms: Security and privacy issues}, journal = {Comput. Secur.}, volume = {131}, pages = {103297}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103297}, doi = {10.1016/J.COSE.2023.103297}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TayyabMJHUQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianJD23, author = {Chuan (Annie) Tian and Matthew L. Jensen and Alexandra Durcikova}, title = {Phishing susceptibility across industries: The differential impact of influence techniques}, journal = {Comput. Secur.}, volume = {135}, pages = {103487}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103487}, doi = {10.1016/J.COSE.2023.103487}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TianJD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianZZWX23, author = {Miao Tian and Yushu Zhang and Youwen Zhu and Liangmin Wang and Yong Xiang}, title = {{DIVRS:} Data integrity verification based on ring signature in cloud storage}, journal = {Comput. Secur.}, volume = {124}, pages = {103002}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103002}, doi = {10.1016/J.COSE.2022.103002}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TianZZWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TrabelsiFJ23, author = {Rahma Trabelsi and Ghofrane Fersi and Mohamed Jmaiel}, title = {Access control in Internet of Things: {A} survey}, journal = {Comput. Secur.}, volume = {135}, pages = {103472}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103472}, doi = {10.1016/J.COSE.2023.103472}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TrabelsiFJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsengC23, author = {Chinyang Henry Tseng and Ya{-}Ting Chang}, title = {{EBDM:} Ensemble binary detection models for multi-class wireless intrusion detection based on deep neural network}, journal = {Comput. Secur.}, volume = {133}, pages = {103419}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103419}, doi = {10.1016/J.COSE.2023.103419}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsengC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TsoupidiTP23, author = {Rodothea{-}Myrsini Tsoupidi and Elena Troubitsyna and Panagiotis Papadimitratos}, title = {Thwarting code-reuse and side-channel attacks in embedded systems}, journal = {Comput. Secur.}, volume = {133}, pages = {103405}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103405}, doi = {10.1016/J.COSE.2023.103405}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TsoupidiTP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TuLS23, author = {Yu Tu and Shuang Liu and Qian Sun}, title = {{DNS} tunnelling detection by fusing encoding feature and behavioral feature}, journal = {Comput. Secur.}, volume = {132}, pages = {103357}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103357}, doi = {10.1016/J.COSE.2023.103357}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TuLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VerdejoEAM23, author = {Jes{\'{u}}s Esteban D{\'{\i}}az Verdejo and Rafael Estepa and Antonio Jose Estepa Alonso and Germ{\'{a}}n Madinabeitia}, title = {A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges}, journal = {Comput. Secur.}, volume = {124}, pages = {102997}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102997}, doi = {10.1016/J.COSE.2022.102997}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VerdejoEAM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VijayakanthanAA23, author = {Ramyapandian Vijayakanthan and Irfan Ahmed and Aisha I. Ali{-}Gombe}, title = {{SWMAT:} Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices}, journal = {Comput. Secur.}, volume = {132}, pages = {103298}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103298}, doi = {10.1016/J.COSE.2023.103298}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VijayakanthanAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Villar-Rodriguez23, author = {Esther Villar{-}Rodriguez and Mar{\'{\i}}a Arostegi P{\'{e}}rez and Ana I. Torre{-}Bastida and Cristina Regueiro Senderos and Juan L{\'{o}}pez{-}de{-}Armentia}, title = {Edge intelligence secure frameworks: Current state and future challenges}, journal = {Comput. Secur.}, volume = {130}, pages = {103278}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103278}, doi = {10.1016/J.COSE.2023.103278}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Villar-Rodriguez23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VimercatiFJLPS23, author = {Sabrina De Capitani di Vimercati and Sara Foresti and Sushil Jajodia and Giovanni Livraga and Stefano Paraboschi and Pierangela Samarati}, title = {Distributed query execution under access restrictions}, journal = {Comput. Secur.}, volume = {127}, pages = {103056}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103056}, doi = {10.1016/J.COSE.2022.103056}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VimercatiFJLPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VitorinoPM23, author = {Jo{\~{a}}o Vitorino and Isabel Pra{\c{c}}a and Eva Maia}, title = {SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection}, journal = {Comput. Secur.}, volume = {134}, pages = {103433}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103433}, doi = {10.1016/J.COSE.2023.103433}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/VitorinoPM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VondracekBCM23, author = {Martin Vondr{\'{a}}cek and Ibrahim M. Baggili and Peter Casey and Mehdi Mekni}, title = {Rise of the Metaverse's Immersive Virtual Reality Malware and the Man-in-the-Room Attack {\&} Defenses}, journal = {Comput. Secur.}, volume = {127}, pages = {102923}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102923}, doi = {10.1016/J.COSE.2022.102923}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VondracekBCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VrhovecBM23, author = {Simon Vrhovec and Igor Bernik and Blaz Markelj}, title = {Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign}, journal = {Comput. Secur.}, volume = {125}, pages = {103038}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103038}, doi = {10.1016/J.COSE.2022.103038}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VrhovecBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangCPLLLZZ23, author = {Ruipeng Wang and Kaixiang Chen and Zulie Pan and Yuwei Li and Qianyu Li and Yang Li and Min Zhang and Chao Zhang}, title = {Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration}, journal = {Comput. Secur.}, volume = {124}, pages = {102995}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102995}, doi = {10.1016/J.COSE.2022.102995}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangCPLLLZZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangCWYL23, author = {Yu Wang and Liquan Chen and Ge Wu and Kunliang Yu and Tianyu Lu}, title = {Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing}, journal = {Comput. Secur.}, volume = {128}, pages = {103163}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103163}, doi = {10.1016/J.COSE.2023.103163}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangCWYL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangCZW23, author = {Wenpeng Wang and Zhixiang Chen and Ziyang Zheng and Hui Wang}, title = {An adaptive fuzzing method based on transformer and protocol similarity mutation}, journal = {Comput. Secur.}, volume = {129}, pages = {103197}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103197}, doi = {10.1016/J.COSE.2023.103197}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangCZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangDJDLQHMWL23, author = {Qing Wang and Cong Dong and Shijie Jian and Dan Du and Zhigang Lu and Yinhao Qi and Dongxu Han and Xiaobo Ma and Fei Wang and Yuling Liu}, title = {{HANDOM:} Heterogeneous Attention Network Model for Malicious Domain Detection}, journal = {Comput. Secur.}, volume = {125}, pages = {103059}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103059}, doi = {10.1016/J.COSE.2022.103059}, timestamp = {Wed, 28 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangDJDLQHMWL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangGRZ23, author = {Qian Wang and Yuying Gao and Jiadong Ren and Bing Zhang}, title = {An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network}, journal = {Comput. Secur.}, volume = {126}, pages = {103070}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103070}, doi = {10.1016/J.COSE.2022.103070}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangGRZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangJPHL23, author = {Yan Wang and Peng Jia and Xi Peng and Cheng Huang and Jiayong Liu}, title = {BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention}, journal = {Comput. Secur.}, volume = {125}, pages = {103023}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103023}, doi = {10.1016/J.COSE.2022.103023}, timestamp = {Sun, 31 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangJPHL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangJTWH23, author = {Wei Wang and Songlei Jian and Yusong Tan and Qingbo Wu and Chenlin Huang}, title = {Robust unsupervised network intrusion detection with self-supervised masked context reconstruction}, journal = {Comput. Secur.}, volume = {128}, pages = {103131}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103131}, doi = {10.1016/J.COSE.2023.103131}, timestamp = {Tue, 02 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangJTWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLKT23, author = {Xuan Wang and Yaojie Li and Hanieh Javadi Khasraghi and Cherie Courseault Trumbach}, title = {The mediating role of security anxiety in internet threat avoidance behavior}, journal = {Comput. Secur.}, volume = {134}, pages = {103429}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103429}, doi = {10.1016/J.COSE.2023.103429}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLLXQK23, author = {Zhihua Wang and Zhenyu Li and Zeminghui Li and Yingheng Xu and Fazhi Qi and Jinsheng Kong}, title = {A low cost and effective multi-instance abnormal driving behavior detection system under edge computing}, journal = {Comput. Secur.}, volume = {132}, pages = {103362}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103362}, doi = {10.1016/J.COSE.2023.103362}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLLXQK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangMHER23, author = {Han Wang and Luis Mu{\~{n}}oz{-}Gonz{\'{a}}lez and Muhammad Zaid Hameed and David Eklund and Shahid Raza}, title = {SparSFA: Towards robust and communication-efficient peer-to-peer federated learning}, journal = {Comput. Secur.}, volume = {129}, pages = {103182}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103182}, doi = {10.1016/J.COSE.2023.103182}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangMHER23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangMK23, author = {Hang Wang and David J. Miller and George Kesidis}, title = {Anomaly detection of adversarial examples using class-conditional generative adversarial networks}, journal = {Comput. Secur.}, volume = {124}, pages = {102956}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102956}, doi = {10.1016/J.COSE.2022.102956}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangMK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangMLLWHC23, author = {Leiqi Wang and Xiu Ma and Ning Li and Qiujian Lv and Yan Wang and Weiqing Huang and Haiyan Chen}, title = {TGPrint: Attack fingerprint classification on encrypted network traffic based graph convolution attention networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103466}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103466}, doi = {10.1016/J.COSE.2023.103466}, timestamp = {Mon, 04 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangMLLWHC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangT23, author = {Zihao Wang and Vrizlynn L. L. Thing}, title = {Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms}, journal = {Comput. Secur.}, volume = {128}, pages = {103143}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103143}, doi = {10.1016/J.COSE.2023.103143}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangTL0C23, author = {Han Wang and Zhangguo Tang and Huanzhou Li and Jian Zhang and Cheng Cai}, title = {{DDOFM:} Dynamic malicious domain detection method based on feature mining}, journal = {Comput. Secur.}, volume = {130}, pages = {103260}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103260}, doi = {10.1016/J.COSE.2023.103260}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangTL0C23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangX23, author = {Ruiling Wang and Yakui Xue}, title = {Stability analysis and optimal control of worm propagation model with saturated incidence rate}, journal = {Comput. Secur.}, volume = {125}, pages = {103063}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103063}, doi = {10.1016/J.COSE.2022.103063}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZBKCR23, author = {Qifan Wang and Lei Zhou and Jianli Bai and Yun Sing Koh and Shujie Cui and Giovanni Russello}, title = {\emph{HT2ML}: An efficient hybrid framework for privacy-preserving Machine Learning using {HE} and {TEE}}, journal = {Comput. Secur.}, volume = {135}, pages = {103509}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103509}, doi = {10.1016/J.COSE.2023.103509}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangZBKCR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZX23, author = {Yongkang Wang and Di{-}Hua Zhai and Yuanqing Xia}, title = {{SCFL:} Mitigating backdoor attacks in federated learning based on {SVD} and clustering}, journal = {Comput. Secur.}, volume = {133}, pages = {103414}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103414}, doi = {10.1016/J.COSE.2023.103414}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WatsonJB23, author = {Katie Watson and Mike Just and Tessa Berg}, title = {A comic-based approach to permission request communication}, journal = {Comput. Secur.}, volume = {124}, pages = {102942}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102942}, doi = {10.1016/J.COSE.2022.102942}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WatsonJB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeiXD23, author = {Chongbo Wei and Gaogang Xie and Zulong Diao}, title = {A lightweight deep learning framework for botnet detecting at the IoT edge}, journal = {Comput. Secur.}, volume = {129}, pages = {103195}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103195}, doi = {10.1016/J.COSE.2023.103195}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WeiXD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WeickertJC23, author = {Tobias D. Weickert and Adam N. Joinson and Barnaby Craggs}, title = {Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice}, journal = {Comput. Secur.}, volume = {128}, pages = {103130}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103130}, doi = {10.1016/J.COSE.2023.103130}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WeickertJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WenK23, author = {Shao{-}Fang Wen and Basel Katt}, title = {A quantitative security evaluation and analysis model for web applications based on {OWASP} application security verification standard}, journal = {Comput. Secur.}, volume = {135}, pages = {103532}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103532}, doi = {10.1016/J.COSE.2023.103532}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WenK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WidelHEJL23, author = {Wojciech Widel and Simon Hacks and Mathias Ekstedt and Pontus Johnson and Robert Lagerstr{\"{o}}m}, title = {The meta attack language - a formal description}, journal = {Comput. Secur.}, volume = {130}, pages = {103284}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103284}, doi = {10.1016/J.COSE.2023.103284}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WidelHEJL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WongCOZ23, author = {Ann Yi Wong and Eyasu Getahun Chekole and Mart{\'{\i}}n Ochoa and Jianying Zhou}, title = {On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies}, journal = {Comput. Secur.}, volume = {128}, pages = {103140}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103140}, doi = {10.1016/J.COSE.2023.103140}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WongCOZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuBCTI23, author = {Chia{-}Yi Wu and Tao Ban and Shin{-}Ming Cheng and Takeshi Takahashi and Daisuke Inoue}, title = {IoT malware classification based on reinterpreted function-call graphs}, journal = {Comput. Secur.}, volume = {125}, pages = {103060}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103060}, doi = {10.1016/J.COSE.2022.103060}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WuBCTI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuFLX23, author = {Anbin Wu and Zhiyong Feng and Xiaohong Li and Jianmao Xiao}, title = {ZTWeb: Cross site scripting detection based on zero trust}, journal = {Comput. Secur.}, volume = {134}, pages = {103434}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103434}, doi = {10.1016/J.COSE.2023.103434}, timestamp = {Tue, 24 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuFLX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuLZYWFC23, author = {Yinwei Wu and Meijin Li and Qi Zeng and Tao Yang and Junfeng Wang and Zhiyang Fang and Luyu Cheng}, title = {DroidRL: Feature selection for android malware detection with reinforcement learning}, journal = {Comput. Secur.}, volume = {128}, pages = {103126}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103126}, doi = {10.1016/J.COSE.2023.103126}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuLZYWFC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuWLH23, author = {Yuanlu Wu and Yan Wo and Caiyu Li and Guoqiang Han}, title = {Learning domain-invariant representation for generalizing face forgery detection}, journal = {Comput. Secur.}, volume = {130}, pages = {103280}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103280}, doi = {10.1016/J.COSE.2023.103280}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuWLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuZYWZ23, author = {Bolun Wu and Futai Zou and Ping Yi and Yue Wu and Liang Zhang}, title = {SlicedLocator: Code vulnerability locator based on sliced dependence graph}, journal = {Comput. Secur.}, volume = {134}, pages = {103469}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103469}, doi = {10.1016/J.COSE.2023.103469}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuZYWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XingSK23, author = {Ying Xing and Hui Shu and Fei Kang}, title = {PeerRemove: An adaptive node removal strategy for {P2P} botnet based on deep reinforcement learning}, journal = {Comput. Secur.}, volume = {128}, pages = {103129}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103129}, doi = {10.1016/J.COSE.2023.103129}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XingSK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XiongLL23, author = {Wen Ding Xiong and Kai Lun Luo and Rui Li}, title = {{AIDTF:} Adversarial training framework for network intrusion detection}, journal = {Comput. Secur.}, volume = {128}, pages = {103141}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103141}, doi = {10.1016/J.COSE.2023.103141}, timestamp = {Wed, 19 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XiongLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuLGLBCWWLWML23, author = {Guangquan Xu and Wenqing Lei and Lixiao Gong and Jian Liu and Hongpeng Bai and Kai Chen and Ran Wang and Wei Wang and Kaitai Liang and Weizhe Wang and Weizhi Meng and Shaoying Liu}, title = {{UAF-GUARD:} Defending the use-after-free exploits via fine-grained memory permission management}, journal = {Comput. Secur.}, volume = {125}, pages = {103048}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103048}, doi = {10.1016/J.COSE.2022.103048}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XuLGLBCWWLWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuSCBLBLMZ23, author = {Guangquan Xu and Hongfei Shao and Jingyi Cui and Hongpeng Bai and Jiliang Li and Guangdong Bai and Shaoying Liu and Weizhi Meng and Xi Zheng}, title = {GenDroid: {A} query-efficient black-box android adversarial attack framework}, journal = {Comput. Secur.}, volume = {132}, pages = {103359}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103359}, doi = {10.1016/J.COSE.2023.103359}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XuSCBLBLMZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YanHY23, author = {Haotian Yan and Haibo Hu and Qingqing Ye}, title = {Partial message verification in fog-based industrial Internet of things}, journal = {Comput. Secur.}, volume = {135}, pages = {103530}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103530}, doi = {10.1016/J.COSE.2023.103530}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YanHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Yang23, author = {Benyuan Yang}, title = {Enforcement of separation of duty constraints in attribute-based access control}, journal = {Comput. Secur.}, volume = {131}, pages = {103294}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103294}, doi = {10.1016/J.COSE.2023.103294}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Yang23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangGCLY23, author = {Wang Yang and Mingzhe Gao and Ligeng Chen and Zhengxuan Liu and Lingyun Ying}, title = {RecMaL: Rectify the malware family label via hybrid analysis}, journal = {Comput. Secur.}, volume = {128}, pages = {103177}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103177}, doi = {10.1016/J.COSE.2023.103177}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangGCLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangHWQZ23, author = {Run Yang and Hui He and Yulong Wang and Yue Qu and Weizhe Zhang}, title = {Dependable federated learning for IoT intrusion detection against poisoning attacks}, journal = {Comput. Secur.}, volume = {132}, pages = {103381}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103381}, doi = {10.1016/J.COSE.2023.103381}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YangHWQZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangL23, author = {Xiaohui Yang and Xiang Li}, title = {{ATDAD:} One-class adversarial learning for tabular data anomaly detection}, journal = {Comput. Secur.}, volume = {134}, pages = {103449}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103449}, doi = {10.1016/J.COSE.2023.103449}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLL23, author = {Guangyi Yang and Xiaoxing Liu and Beixin Li}, title = {Anti-money laundering supervision by intelligent algorithm}, journal = {Comput. Secur.}, volume = {132}, pages = {103344}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103344}, doi = {10.1016/J.COSE.2023.103344}, timestamp = {Wed, 23 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangMZWLKSH23, author = {Haitian Yang and Xiang Meng and Xuan Zhao and Yan Wang and Yuejun Liu and Xiaoyu Kang and Jiahui Shen and Weiqing Huang}, title = {{CKDAN:} Content and keystroke dual attention networks with pre-trained models for continuous authentication}, journal = {Comput. Secur.}, volume = {128}, pages = {103159}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103159}, doi = {10.1016/J.COSE.2023.103159}, timestamp = {Tue, 10 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangMZWLKSH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YaoLDW23, author = {Lin Yao and Jia Li and Jing Deng and Guowei Wu}, title = {Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network}, journal = {Comput. Secur.}, volume = {124}, pages = {102965}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.102965}, doi = {10.1016/J.COSE.2022.102965}, timestamp = {Mon, 25 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YaoLDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YeohLSJ23, author = {William Yeoh and Marina Liu and Malcolm Shore and Frank Jiang}, title = {Zero trust cybersecurity: Critical success factors and {A} maturity assessment framework}, journal = {Comput. Secur.}, volume = {133}, pages = {103412}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103412}, doi = {10.1016/J.COSE.2023.103412}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YeohLSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YinHZ23, author = {Ya Yin and Carol Hsu and Zhongyun Zhou}, title = {Employees' in-role and extra-role information security behaviors from the {P-E} fit perspective}, journal = {Comput. Secur.}, volume = {133}, pages = {103390}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103390}, doi = {10.1016/J.COSE.2023.103390}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YinHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YousefiK23, author = {Fares Yousefi and Hoshang Kolivand}, title = {A robust brain pattern for brain-based authentication methods using deep breath}, journal = {Comput. Secur.}, volume = {135}, pages = {103520}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103520}, doi = {10.1016/J.COSE.2023.103520}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/YousefiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuCWW23, author = {Chuan Yu and Shuhui Chen and Ziling Wei and Fei Wang}, title = {\emph{SecChecker}: Inspecting the security implementation of 5G Commercial Off-The-Shelf {(COTS)} mobile devices}, journal = {Comput. Secur.}, volume = {132}, pages = {103361}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103361}, doi = {10.1016/J.COSE.2023.103361}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuCWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Yuan0YZ0WG23, author = {Qingjun Yuan and Chang Liu and Wentao Yu and Yuefei Zhu and Gang Xiong and Yongjuan Wang and Gaopeng Gou}, title = {BoAu: Malicious traffic detection with noise labels based on boundary augmentation}, journal = {Comput. Secur.}, volume = {131}, pages = {103300}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103300}, doi = {10.1016/J.COSE.2023.103300}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Yuan0YZ0WG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuanHY23, author = {Yachao Yuan and Yu Huang and Yali Yuan}, title = {PrSLoc: Sybil attack detection for localization with private observers using differential privacy}, journal = {Comput. Secur.}, volume = {131}, pages = {103289}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103289}, doi = {10.1016/J.COSE.2023.103289}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuanHY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZahoorCAP23, author = {Ehtesham Zahoor and Maryam Chaudhary and Sabina Akhtar and Olivier Perrin}, title = {A formal approach for the identification of redundant authorization policies in Kubernetes}, journal = {Comput. Secur.}, volume = {135}, pages = {103473}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103473}, doi = {10.1016/J.COSE.2023.103473}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZahoorCAP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZakariyyaKA23, author = {Idris Zakariyya and Harsha K. Kalutarage and M. Omar Al{-}Kadri}, title = {Towards a robust, effective and resource efficient machine learning technique for IoT security monitoring}, journal = {Comput. Secur.}, volume = {133}, pages = {103388}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103388}, doi = {10.1016/J.COSE.2023.103388}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZakariyyaKA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZangGZL23, author = {Xiaodong Zang and Jian Gong and Xinchang Zhang and Guiqing Li}, title = {Attack scenario reconstruction via fusing heterogeneous threat intelligence}, journal = {Comput. Secur.}, volume = {133}, pages = {103420}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103420}, doi = {10.1016/J.COSE.2023.103420}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZangGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZarinUKH23, author = {Rahat Zarin and Niamat Ullah and Amir Khan and Usa Wannasingha Humphries}, title = {A numerical study of a new non-linear fractal fractional mathematical model of malicious codes propagation in wireless sensor networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103484}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103484}, doi = {10.1016/J.COSE.2023.103484}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZarinUKH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZengKLJC23, author = {Qingyang Zeng and Mohammad Kavousi and Yinhong Luo and Ling Jin and Yan Chen}, title = {Full-stack vulnerability analysis of the cloud-native platform}, journal = {Comput. Secur.}, volume = {129}, pages = {103173}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103173}, doi = {10.1016/J.COSE.2023.103173}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZengKLJC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Zenitani23, author = {Kengo Zenitani}, title = {Attack graph analysis: An explanatory guide}, journal = {Comput. Secur.}, volume = {126}, pages = {103081}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103081}, doi = {10.1016/J.COSE.2022.103081}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Zenitani23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhanDHYPG23, author = {Dazhi Zhan and Yexin Duan and Yue Hu and Lujia Yin and Zhisong Pan and Shize Guo}, title = {AMGmal: Adaptive mask-guided adversarial attack against malware detection with minimal perturbation}, journal = {Comput. Secur.}, volume = {127}, pages = {103103}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103103}, doi = {10.1016/J.COSE.2023.103103}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhanDHYPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangCLW23, author = {Tianyue Zhang and Wei Chen and Yuxiao Liu and Lifa Wu}, title = {An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model}, journal = {Comput. Secur.}, volume = {128}, pages = {103144}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103144}, doi = {10.1016/J.COSE.2023.103144}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangCLW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJYWK23, author = {Wenfang Zhang and Heng Jiao and Zhuoqun Yan and Xiaomin Wang and Muhammad Khurram Khan}, title = {Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing}, journal = {Comput. Secur.}, volume = {125}, pages = {103019}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103019}, doi = {10.1016/J.COSE.2022.103019}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJYWK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangLCLL23, author = {Guiqi Zhang and Qi Liu and Chenhong Cao and Jiangtao Li and Yufeng Li}, title = {Bit scanner: Anomaly detection for in-vehicle {CAN} bus using binary sequence whitelisting}, journal = {Comput. Secur.}, volume = {134}, pages = {103436}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103436}, doi = {10.1016/J.COSE.2023.103436}, timestamp = {Wed, 20 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangLCLL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangMFLZWT23, author = {Hengwei Zhang and Yan Mi and Yumeng Fu and Xiaohu Liu and Yuchen Zhang and Jindong Wang and Jinglei Tan}, title = {Security defense decision method based on potential differential game for complex networks}, journal = {Comput. Secur.}, volume = {129}, pages = {103187}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103187}, doi = {10.1016/J.COSE.2023.103187}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangMFLZWT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangMLP23, author = {Yunxiao Zhang and Pasquale Malacaria and George Loukas and Emmanouil Panaousis}, title = {{CROSS:} {A} framework for cyber risk optimisation in smart homes}, journal = {Comput. Secur.}, volume = {130}, pages = {103250}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103250}, doi = {10.1016/J.COSE.2023.103250}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangMLP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangNFHZ23, author = {Dongyue Zhang and Weiwei Ni and Nan Fu and Lihe Hou and Ruyu Zhang}, title = {Locally differentially private multi-dimensional data collection via haar transform}, journal = {Comput. Secur.}, volume = {130}, pages = {103291}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103291}, doi = {10.1016/J.COSE.2023.103291}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangNFHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangTKSSKST23, author = {Jie Zhang and Min{-}Yen Tsai and Kotcharat Kitchat and Min{-}Te Sun and Kazuya Sakai and Wei{-}Shinn Ku and Thattapon Surasak and Tipajin Thaipisutikul}, title = {A secure annuli {CAPTCHA} system}, journal = {Comput. Secur.}, volume = {125}, pages = {103025}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103025}, doi = {10.1016/J.COSE.2022.103025}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangTKSSKST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangX23, author = {Chunyong Zhang and Yang Xin}, title = {VulGAI: vulnerability detection based on graphs and images}, journal = {Comput. Secur.}, volume = {135}, pages = {103501}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103501}, doi = {10.1016/J.COSE.2023.103501}, timestamp = {Fri, 19 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhangX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangZRXC23, author = {Zhiqiu Zhang and Tianqing Zhu and Wei Ren and Ping Xiong and Kim{-}Kwang Raymond Choo}, title = {Preserving data privacy in federated learning through large gradient pruning}, journal = {Comput. Secur.}, volume = {125}, pages = {103039}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103039}, doi = {10.1016/J.COSE.2022.103039}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangZRXC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoHJGL23, author = {Xu Zhao and Guangqiu Huang and Jin Jiang and Ling Gao and Maozhen Li}, title = {Corrigendum to 'Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing' Computer {\&} Security, 111(2021) 102463}, journal = {Comput. Secur.}, volume = {125}, pages = {103004}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103004}, doi = {10.1016/J.COSE.2022.103004}, timestamp = {Fri, 20 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoHJGL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoX23, author = {Xueli Zhao and Zhihua Xia}, title = {Secure outsourced {NB:} Accurate and efficient privacy-preserving Naive Bayes classification}, journal = {Comput. Secur.}, volume = {124}, pages = {103011}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103011}, doi = {10.1016/J.COSE.2022.103011}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoYJWM23, author = {Xiaoyun Zhao and Chao Yang and Zhizhuang Jia and Yue Wang and Jianfeng Ma}, title = {{FCEVAL:} An effective and quantitative platform for evaluating fuzzer combinations fairly and easily}, journal = {Comput. Secur.}, volume = {132}, pages = {103354}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103354}, doi = {10.1016/J.COSE.2023.103354}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoYJWM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengCSMYY23, author = {Haibin Zheng and Jinyin Chen and Wenchang Shangguan and Zhaoyan Ming and Xing Yang and Zhijun Yang}, title = {{GONE:} {A} generic {O(1)} NoisE layer for protecting privacy of deep neural networks}, journal = {Comput. Secur.}, volume = {135}, pages = {103471}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103471}, doi = {10.1016/J.COSE.2023.103471}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhengCSMYY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengLCDZL23, author = {Haibin Zheng and Xiaohao Li and Jinyin Chen and Jianfeng Dong and Yan Zhang and Changting Lin}, title = {One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning}, journal = {Comput. Secur.}, volume = {124}, pages = {103005}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103005}, doi = {10.1016/J.COSE.2022.103005}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhengLCDZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengLY23, author = {Chenming Zheng and Jun Li and Xuanxia Yao}, title = {Design and implementation of trusted boot based on a new trusted computing dual-architecture}, journal = {Comput. Secur.}, volume = {127}, pages = {103095}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103095}, doi = {10.1016/J.COSE.2023.103095}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhengLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhongLH23, author = {Meihui Zhong and Mingwei Lin and Zhu He}, title = {Dynamic multi-scale topological representation for enhancing network intrusion detection}, journal = {Comput. Secur.}, volume = {135}, pages = {103516}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103516}, doi = {10.1016/J.COSE.2023.103516}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhongLH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuZSCM23, author = {Chengcheng Zhu and Jiale Zhang and Xiaobing Sun and Bing Chen and Weizhi Meng}, title = {{ADFL:} Defending backdoor attacks in federated learning via adversarial distillation}, journal = {Comput. Secur.}, volume = {132}, pages = {103366}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103366}, doi = {10.1016/J.COSE.2023.103366}, timestamp = {Tue, 21 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhuZSCM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuZZRJ23, author = {Hegui Zhu and Ying Zhu and Haoran Zheng and Yuchen Ren and Wuming Jiang}, title = {{LIGAA:} Generative adversarial attack method based on low-frequency information}, journal = {Comput. Secur.}, volume = {125}, pages = {103057}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103057}, doi = {10.1016/J.COSE.2022.103057}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhuZZRJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZoppiCPB23, author = {Tommaso Zoppi and Andrea Ceccarelli and Tommaso Puccetti and Andrea Bondavalli}, title = {Which algorithm can detect unknown attacks? Comparison of supervised, unsupervised and meta-learning algorithms for intrusion detection}, journal = {Comput. Secur.}, volume = {127}, pages = {103107}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103107}, doi = {10.1016/J.COSE.2023.103107}, timestamp = {Sat, 13 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZoppiCPB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/dAmbrosioPR23, author = {Nicola d'Ambrosio and Gaetano Perrone and Simon Pietro Romano}, title = {Including insider threats into risk management through Bayesian threat graph networks}, journal = {Comput. Secur.}, volume = {133}, pages = {103410}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103410}, doi = {10.1016/J.COSE.2023.103410}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/dAmbrosioPR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AcaraliRRCG22, author = {Dilara Acarali and K. Rajesh Rao and Muttukrishnan Rajarajan and Doron Chema and Mark Ginzburg}, title = {Modelling smart grid {IT-OT} dependencies for DDoS impact propagation}, journal = {Comput. Secur.}, volume = {112}, pages = {102528}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102528}, doi = {10.1016/J.COSE.2021.102528}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AcaraliRRCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AdahmanMA22, author = {Zillah Adahman and Asad Waqar Malik and Zahid Anwar}, title = {An analysis of zero-trust architecture and its cost-effectiveness for organizational security}, journal = {Comput. Secur.}, volume = {122}, pages = {102911}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102911}, doi = {10.1016/J.COSE.2022.102911}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AdahmanMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AggarwalTJCLTG22, author = {Palvi Aggarwal and Omkar Thakoor and Shahin Jabbari and Edward A. Cranford and Christian Lebiere and Milind Tambe and Cleotilde Gonzalez}, title = {Designing effective masking strategies for cyberdefense through human experimentation and cognitive models}, journal = {Comput. Secur.}, volume = {117}, pages = {102671}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102671}, doi = {10.1016/J.COSE.2022.102671}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AggarwalTJCLTG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadAAT22, author = {Rasheed Ahmad and Izzat Alsmadi and Wasim Alhamdani and Lo'ai Tawalbeh}, title = {A comprehensive deep learning benchmark for IoT {IDS}}, journal = {Comput. Secur.}, volume = {114}, pages = {102588}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102588}, doi = {10.1016/J.COSE.2021.102588}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadAAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadMB22, author = {Atif Ahmad and Sean B. Maynard and Richard L. Baskerville}, title = {Editorial}, journal = {Comput. Secur.}, volume = {112}, pages = {102530}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102530}, doi = {10.1016/J.COSE.2021.102530}, timestamp = {Wed, 05 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AhmadMB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AkgunHC22, author = {Devrim Akg{\"{u}}n and Selman Hizal and {\"{U}}nal {\c{C}}avusoglu}, title = {A new DDoS attacks intrusion detection model based on deep learning for cybersecurity}, journal = {Comput. Secur.}, volume = {118}, pages = {102748}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102748}, doi = {10.1016/J.COSE.2022.102748}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AkgunHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AksuA22, author = {Dogukan Aksu and Muhammed Ali Aydin}, title = {{MGA-IDS:} Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach}, journal = {Comput. Secur.}, volume = {118}, pages = {102717}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102717}, doi = {10.1016/J.COSE.2022.102717}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AksuA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-BakaaA22, author = {Aliaa Al{-}Bakaa and Bahaa Al{-}Musawi}, title = {A new intrusion detection system based on using non-linear statistical analysis and features selection techniques}, journal = {Comput. Secur.}, volume = {122}, pages = {102906}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102906}, doi = {10.1016/J.COSE.2022.102906}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-BakaaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlahmadiAB22, author = {Amal Alahmadi and Norah Alkhraan and Wojdan Binsaeedan}, title = {MPSAutodetect: {A} Malicious Powershell Script Detection Model Based on Stacked Denoising Auto-Encoder}, journal = {Comput. Secur.}, volume = {116}, pages = {102658}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102658}, doi = {10.1016/J.COSE.2022.102658}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlahmadiAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlaniA22, author = {Mohammed M. Alani and Ali Ismail Awad}, title = {AdStop: Efficient flow-based mobile adware detection using machine learning}, journal = {Comput. Secur.}, volume = {117}, pages = {102718}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102718}, doi = {10.1016/J.COSE.2022.102718}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlaniA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AldaajehSABBC22, author = {Saleh H. Aldaajeh and Heba Saleous and Saed Alrabaee and Ezedin Barka and Frank Breitinger and Kim{-}Kwang Raymond Choo}, title = {The role of national cybersecurity strategies on the improvement of cybersecurity education}, journal = {Comput. Secur.}, volume = {119}, pages = {102754}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102754}, doi = {10.1016/J.COSE.2022.102754}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AldaajehSABBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AliKAQ22, author = {Hassan Ali and Muhammad Suleman Khan and Ala I. Al{-}Fuqaha and Junaid Qadir}, title = {Tamp-X: Attacking explainable natural language classifiers through tampered activations}, journal = {Comput. Secur.}, volume = {120}, pages = {102791}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102791}, doi = {10.1016/J.COSE.2022.102791}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliKAQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlishahiMN22, author = {Mina Alishahi and Vahideh Moghtadaiee and Hojjat Navidan}, title = {Add noise to remove noise: Local differential privacy for feature selection}, journal = {Comput. Secur.}, volume = {123}, pages = {102934}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102934}, doi = {10.1016/J.COSE.2022.102934}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlishahiMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlmashhadaniCKS22, author = {Ahmad O. Almashhadani and Domhnall Carlin and Mustafa Kaiiali and Sakir Sezer}, title = {{MFMCNS:} a multi-feature and multi-classifier network-based system for ransomworm detection}, journal = {Comput. Secur.}, volume = {121}, pages = {102860}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102860}, doi = {10.1016/J.COSE.2022.102860}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlmashhadaniCKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlobaidiCLA22, author = {Hind Alobaidi and Nathan L. Clarke and Fudong Li and Abdulrahman Alruban}, title = {Real-world smartphone-based gait recognition}, journal = {Comput. Secur.}, volume = {113}, pages = {102557}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102557}, doi = {10.1016/J.COSE.2021.102557}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlobaidiCLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Alqahtani22, author = {Sultan S. Alqahtani}, title = {A study on the use of vulnerabilities databases in software engineering domain}, journal = {Comput. Secur.}, volume = {116}, pages = {102661}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102661}, doi = {10.1016/J.COSE.2022.102661}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Alqahtani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AmerE22, author = {Eslam Amer and Shaker H. Ali El{-}Sappagh}, title = {Robust deep learning early alarm prediction model based on the behavioural smell for android malware}, journal = {Comput. Secur.}, volume = {116}, pages = {102670}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102670}, doi = {10.1016/J.COSE.2022.102670}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AmerE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ArshadBC22, author = {Elham Arshad and Michele Benolli and Bruno Crispo}, title = {Practical attacks on Login {CSRF} in OAuth}, journal = {Comput. Secur.}, volume = {121}, pages = {102859}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102859}, doi = {10.1016/J.COSE.2022.102859}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ArshadBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AshleyGBB22, author = {Travis Ashley and Sri Nikhil Gupta Gourisetti and Newton Brown and Christopher A. Bonebrake}, title = {Aggregate attack surface management for network discovery of operational technology}, journal = {Comput. Secur.}, volume = {123}, pages = {102939}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102939}, doi = {10.1016/J.COSE.2022.102939}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AshleyGBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AwadhutkarTGK22, author = {Payas Awadhutkar and Ahmed Tamrawi and Ryan Goluch and Suresh C. Kothari}, title = {Control flow equivalence method for establishing sanctity of compiling}, journal = {Comput. Secur.}, volume = {115}, pages = {102608}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102608}, doi = {10.1016/J.COSE.2022.102608}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AwadhutkarTGK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AydinOA22, author = {Hakan Aydin and Zeynep Orman and Muhammed Ali Aydin}, title = {A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment}, journal = {Comput. Secur.}, volume = {118}, pages = {102725}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102725}, doi = {10.1016/J.COSE.2022.102725}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AydinOA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BangRVBC22, author = {Ankur O. Bang and Udai Pratap Rao and Andrea Visconti and Alessandro Brighente and Mauro Conti}, title = {An IoT Inventory Before Deployment: {A} Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions}, journal = {Comput. Secur.}, volume = {123}, pages = {102914}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102914}, doi = {10.1016/J.COSE.2022.102914}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BangRVBC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarrosCOQR22, author = {Pedro H. Barros and Eduarda T. C. Chagas and Leonardo B. Oliveira and Fabiane Queiroz and Heitor S. Ramos}, title = {Malware-SMELL: {A} zero-shot learning strategy for detecting zero-day vulnerabilities}, journal = {Comput. Secur.}, volume = {120}, pages = {102785}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102785}, doi = {10.1016/J.COSE.2022.102785}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarrosCOQR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaskervilleKS22, author = {Richard L. Baskerville and Jongwoo Kim and Carl Stucke}, title = {The cybersecurity risk estimation engine: {A} tool for possibility based risk analysis}, journal = {Comput. Secur.}, volume = {120}, pages = {102752}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102752}, doi = {10.1016/J.COSE.2022.102752}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaskervilleKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeamanRMH22, author = {Craig Beaman and Michael Redbourne and J. Darren Mummery and Saqib Hakak}, title = {Fuzzing vulnerability discovery techniques: Survey, challenges and future directions}, journal = {Comput. Secur.}, volume = {120}, pages = {102813}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102813}, doi = {10.1016/J.COSE.2022.102813}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeamanRMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BelangerMM22, author = {France B{\'{e}}langer and J{\"{u}}rgen Maier and Michaela Maier}, title = {A longitudinal study on improving employee information protective knowledge and behaviors}, journal = {Comput. Secur.}, volume = {116}, pages = {102641}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102641}, doi = {10.1016/J.COSE.2022.102641}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BelangerMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BenyahyaCKN22, author = {Meriem Benyahya and Anastasija Collen and Sotiria Kechagia and Niels Alexander Nijdam}, title = {Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments}, journal = {Comput. Secur.}, volume = {122}, pages = {102904}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102904}, doi = {10.1016/J.COSE.2022.102904}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BenyahyaCKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BernalCP22, author = {Sergio L{\'{o}}pez Bernal and Alberto Huertas Celdr{\'{a}}n and Gregorio Mart{\'{\i}}nez P{\'{e}}rez}, title = {Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities}, journal = {Comput. Secur.}, volume = {112}, pages = {102534}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102534}, doi = {10.1016/J.COSE.2021.102534}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BernalCP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BerryK22, author = {Cate Berry and Nikos Komninos}, title = {Efficient optimisation framework for convolutional neural networks with secure multiparty computation}, journal = {Comput. Secur.}, volume = {117}, pages = {102679}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102679}, doi = {10.1016/J.COSE.2022.102679}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BerryK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BotacinDCMAGG22, author = {Marcus Botacin and Felipe Duarte Domingues and Fabr{\'{\i}}cio Ceschin and Raphael Machnicki and Marco Antonio Zanata Alves and Paulo L{\'{\i}}cio de Geus and Andr{\'{e}} Gr{\'{e}}gio}, title = {AntiViruses under the microscope: {A} hands-on perspective}, journal = {Comput. Secur.}, volume = {112}, pages = {102500}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102500}, doi = {10.1016/J.COSE.2021.102500}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BotacinDCMAGG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BritoLSS22, author = {Tiago Brito and Pedro Lopes and Nuno Santos and Jos{\'{e}} Fragoso Santos}, title = {Wasmati: An efficient static vulnerability scanner for WebAssembly}, journal = {Comput. Secur.}, volume = {118}, pages = {102745}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102745}, doi = {10.1016/J.COSE.2022.102745}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BritoLSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BroeckCS22, author = {Jens Van den Broeck and Bart Coppens and Bjorn De Sutter}, title = {Flexible software protection}, journal = {Comput. Secur.}, volume = {116}, pages = {102636}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102636}, doi = {10.1016/J.COSE.2022.102636}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BroeckCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuckleyHWE22, author = {Oliver Buckley and Duncan Hodges and Jonathan Windle and Sally Earl}, title = {{CLICKA:} Collecting and leveraging identity cues with keystroke dynamics}, journal = {Comput. Secur.}, volume = {120}, pages = {102780}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102780}, doi = {10.1016/J.COSE.2022.102780}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BuckleyHWE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ButaviciusTH22, author = {Marcus A. Butavicius and Ronnie Taib and Simon Jerome Han}, title = {Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails}, journal = {Comput. Secur.}, volume = {123}, pages = {102937}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102937}, doi = {10.1016/J.COSE.2022.102937}, timestamp = {Fri, 05 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ButaviciusTH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CalvoB22, author = {Miguel Calvo and Marta Beltr{\'{a}}n}, title = {A Model For risk-Based adaptive security controls}, journal = {Comput. Secur.}, volume = {115}, pages = {102612}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102612}, doi = {10.1016/J.COSE.2022.102612}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CalvoB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CalzavaraCLMO22, author = {Stefano Calzavara and Lorenzo Cazzaro and Claudio Lucchese and Federico Marcuzzi and Salvatore Orlando}, title = {Beyond robustness: Resilience verification of tree-based classifiers}, journal = {Comput. Secur.}, volume = {121}, pages = {102843}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102843}, doi = {10.1016/J.COSE.2022.102843}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CalzavaraCLMO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaoPTCZ22, author = {Yan Cao and Yuan Ping and Shaohua Tao and YongGang Chen and YanXia Zhu}, title = {Specification and adaptive verification of access control policy for cyber-physical-social spaces}, journal = {Comput. Secur.}, volume = {114}, pages = {102579}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102579}, doi = {10.1016/J.COSE.2021.102579}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaoPTCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CastelblancoRST22, author = {Alejandra Castelblanco and Esteban Rivera and Jesus Solano and Lizzy Tengana and Christian Lopez and Mart{\'{\i}}n Ochoa}, title = {Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms}, journal = {Comput. Secur.}, volume = {115}, pages = {102629}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102629}, doi = {10.1016/J.COSE.2022.102629}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CastelblancoRST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CeragioliDG22, author = {Lorenzo Ceragioli and Pierpaolo Degano and Letterio Galletta}, title = {Can my firewall system enforce this policy?}, journal = {Comput. Secur.}, volume = {117}, pages = {102683}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102683}, doi = {10.1016/J.COSE.2022.102683}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CeragioliDG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChagantiRP22, author = {Rajasekhar Chaganti and Vinayakumar Ravi and Tuan D. Pham}, title = {Deep learning based cross architecture internet of things malware detection and classification}, journal = {Comput. Secur.}, volume = {120}, pages = {102779}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102779}, doi = {10.1016/J.COSE.2022.102779}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChagantiRP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChahalBK22, author = {Navdeep S. Chahal and Preeti Bali and Praveen Kumar Khosla}, title = {A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform}, journal = {Comput. Secur.}, volume = {122}, pages = {102886}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102886}, doi = {10.1016/J.COSE.2022.102886}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChahalBK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChaudharyGS22, author = {Pooja Chaudhary and Brij B. Gupta and Awadhesh Kumar Singh}, title = {Securing heterogeneous embedded devices against {XSS} attack in intelligent IoT system}, journal = {Comput. Secur.}, volume = {118}, pages = {102710}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102710}, doi = {10.1016/J.COSE.2022.102710}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChaudharyGS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChawkiTAB22, author = {El Balmany Chawki and Zakariae Tbatou and Ahmed Asimi and Mohamed Bamarouf}, title = {Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage}, journal = {Comput. Secur.}, volume = {120}, pages = {102815}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102815}, doi = {10.1016/J.COSE.2022.102815}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChawkiTAB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenFZL22, author = {Aiguo Chen and Yang Fu and Xu Zheng and Guoming Lu}, title = {An efficient network behavior anomaly detection using a hybrid {DBN-LSTM} network}, journal = {Comput. Secur.}, volume = {114}, pages = {102600}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102600}, doi = {10.1016/J.COSE.2021.102600}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenFZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenHJ22, author = {Jianan Chen and Qin Hu and Honglu Jiang}, title = {Strategic signaling for utility control in audit games}, journal = {Comput. Secur.}, volume = {118}, pages = {102721}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102721}, doi = {10.1016/J.COSE.2022.102721}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenHJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLS22, author = {Tianrong Chen and Jie Ling and Yuping Sun}, title = {White-box content camouflage attacks against deep learning}, journal = {Comput. Secur.}, volume = {117}, pages = {102676}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102676}, doi = {10.1016/J.COSE.2022.102676}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenTHZLL22, author = {Li Chen and Cong Tang and Junjiang He and Hui Zhao and Xiaolong Lan and Tao Li}, title = {{XSS} adversarial example attacks based on deep reinforcement learning}, journal = {Comput. Secur.}, volume = {120}, pages = {102831}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102831}, doi = {10.1016/J.COSE.2022.102831}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenTHZLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenWLXZX22, author = {Fei Chen and Jiahao Wang and Jianqiang Li and Yang Xu and Cheng Zhang and Tao Xiang}, title = {TrustBuilder: {A} non-repudiation scheme for IoT cloud applications}, journal = {Comput. Secur.}, volume = {116}, pages = {102664}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102664}, doi = {10.1016/J.COSE.2022.102664}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenWLXZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenXC22, author = {Yan Chen and Weidong Xia and Karlene Cousins}, title = {Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence}, journal = {Comput. Secur.}, volume = {113}, pages = {102568}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102568}, doi = {10.1016/J.COSE.2021.102568}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZEWW22, author = {Xuyang Chen and Xiaolu Zhang and Michael Elliot and Xiaoyin Wang and Feng Wang}, title = {Fix the leaking tap: {A} survey of Trigger-Action Programming {(TAP)} security issues, detection techniques and solutions}, journal = {Comput. Secur.}, volume = {120}, pages = {102812}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102812}, doi = {10.1016/J.COSE.2022.102812}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZEWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChengZGCGZMNX22, author = {Yueqiang Cheng and Zhi Zhang and Yansong Gao and Zhaofeng Chen and Shengjian Guo and Qifei Zhang and Rui Mei and Surya Nepal and Yang Xiang}, title = {Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation}, journal = {Comput. Secur.}, volume = {113}, pages = {102556}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102556}, doi = {10.1016/J.COSE.2021.102556}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChengZGCGZMNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChevrotVL22, author = {Antoine Chevrot and Alexandre Vernotte and Bruno Legeard}, title = {{CAE:} Contextual auto-encoder for multivariate time-series anomaly detection in air transportation}, journal = {Comput. Secur.}, volume = {116}, pages = {102652}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102652}, doi = {10.1016/J.COSE.2022.102652}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChevrotVL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChohraSKD22, author = {Aniss Chohra and Paria Shirani and ElMouatez Billah Karbab and Mourad Debbabi}, title = {Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection}, journal = {Comput. Secur.}, volume = {117}, pages = {102684}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102684}, doi = {10.1016/J.COSE.2022.102684}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChohraSKD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoiJJKL22, author = {Yeseul Choi and Yunjong Jeong and DaeHee Jang and Brent ByungHoon Kang and Hojoon Lee}, title = {EmuID: Detecting presence of emulation through microarchitectural characteristic on {ARM}}, journal = {Comput. Secur.}, volume = {113}, pages = {102569}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102569}, doi = {10.1016/J.COSE.2021.102569}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoiJJKL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChowdhuryKG22, author = {Nabin Chowdhury and Sokratis K. Katsikas and Vasileios Gkioulos}, title = {Modeling effective cybersecurity training frameworks: {A} delphi method-based study}, journal = {Comput. Secur.}, volume = {113}, pages = {102551}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102551}, doi = {10.1016/J.COSE.2021.102551}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChowdhuryKG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CirneSRA22, author = {Andr{\'{e}} Cirne and Patr{\'{\i}}cia R. Sousa and Jo{\~{a}}o S. Resende and Luis Antunes}, title = {IoT security certifications: Challenges and potential approaches}, journal = {Comput. Secur.}, volume = {116}, pages = {102669}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102669}, doi = {10.1016/J.COSE.2022.102669}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CirneSRA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ColomboFT22, author = {Pietro Colombo and Elena Ferrari and Engin Deniz T{\"{u}}mer}, title = {Efficient {ABAC} based information sharing within {MQTT} environments under emergencies}, journal = {Comput. Secur.}, volume = {120}, pages = {102829}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102829}, doi = {10.1016/J.COSE.2022.102829}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ColomboFT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ConnollyB22, author = {Alena Yuryna Connolly and Herv{\'{e}} Borrion}, title = {Reducing Ransomware Crime: Analysis of Victims' Payment Decisions}, journal = {Comput. Secur.}, volume = {119}, pages = {102760}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102760}, doi = {10.1016/J.COSE.2022.102760}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ConnollyB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ContiKP22, author = {Mauro Conti and Shubham Khandhar and Vinod P.}, title = {A few-shot malware classification approach for unknown family recognition using malware feature visualization}, journal = {Comput. Secur.}, volume = {122}, pages = {102887}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102887}, doi = {10.1016/J.COSE.2022.102887}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ContiKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CoulterZPX22, author = {Rory Coulter and Jun Zhang and Lei Pan and Yang Xiang}, title = {Domain adaptation for Windows advanced persistent threat detection}, journal = {Comput. Secur.}, volume = {112}, pages = {102496}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102496}, doi = {10.1016/J.COSE.2021.102496}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CoulterZPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CuiCHLDL22, author = {Lei Cui and Jiancong Cui and Zhiyu Hao and Lun Li and Zhenquan Ding and Yongji Liu}, title = {An empirical study of vulnerability discovery methods over the past ten years}, journal = {Comput. Secur.}, volume = {120}, pages = {102817}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102817}, doi = {10.1016/J.COSE.2022.102817}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CuiCHLDL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DOnghiaSNCPZ22, author = {Mario D'Onghia and Matteo Salvadore and Benedetto Maria Nespoli and Michele Carminati and Mario Polino and Stefano Zanero}, title = {Ap{\'{\i}}cula: Static detection of {API} calls in generic streams of bytes}, journal = {Comput. Secur.}, volume = {119}, pages = {102775}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102775}, doi = {10.1016/J.COSE.2022.102775}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DOnghiaSNCPZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DamK22, author = {Gijs van Dam and Rabiah Abdul Kadir}, title = {Hiding payments in lightning network with approximate differentially private payment channels}, journal = {Comput. Secur.}, volume = {115}, pages = {102623}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102623}, doi = {10.1016/J.COSE.2022.102623}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DamK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Dang-PhamKHP22, author = {Duy Dang{-}Pham and Karlheinz Kautz and Ai{-}Phuong Hoang and Siddhi Pittayachawan}, title = {Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis}, journal = {Comput. Secur.}, volume = {112}, pages = {102505}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102505}, doi = {10.1016/J.COSE.2021.102505}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Dang-PhamKHP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DaveCSYC22, author = {Gaurav Dave and Gaurav Choudhary and Vikas Sihag and Ilsun You and Kim{-}Kwang Raymond Choo}, title = {Cyber security challenges in aviation communication, navigation, and surveillance}, journal = {Comput. Secur.}, volume = {112}, pages = {102516}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102516}, doi = {10.1016/J.COSE.2021.102516}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DaveCSYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DemirkiranCUD22, author = {Ferhat Demirkiran and Aykut {\c{C}}ayir and Ugur {\"{U}}nal and Hasan Dag}, title = {An ensemble of pre-trained transformer models for imbalanced multiclass malware classification}, journal = {Comput. Secur.}, volume = {121}, pages = {102846}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102846}, doi = {10.1016/J.COSE.2022.102846}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DemirkiranCUD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DesaiDCK22, author = {Nidhi Desai and Manik Lal Das and Payal Chaudhari and Naveen Kumar}, title = {Background knowledge attacks in privacy-preserving data publishing models}, journal = {Comput. Secur.}, volume = {122}, pages = {102874}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102874}, doi = {10.1016/J.COSE.2022.102874}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DesaiDCK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DharaniSSS22, author = {J. Dharani and K. Sundarakantham and Kunwar Singh and S. Mercy Shalinie}, title = {A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric}, journal = {Comput. Secur.}, volume = {116}, pages = {102637}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102637}, doi = {10.1016/J.COSE.2022.102637}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DharaniSSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DhillonS22, author = {Parveen Dhillon and Manpreet Singh}, title = {An ontology oriented service framework for social IoT}, journal = {Comput. Secur.}, volume = {122}, pages = {102895}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102895}, doi = {10.1016/J.COSE.2022.102895}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DhillonS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DongTTYD22, author = {Yansong Dong and Long Tang and Cong Tian and Bin Yu and Zhenhua Duan}, title = {Improving transferability of adversarial examples by saliency distribution and data augmentation}, journal = {Comput. Secur.}, volume = {120}, pages = {102811}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102811}, doi = {10.1016/J.COSE.2022.102811}, timestamp = {Thu, 14 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DongTTYD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuCHCZC22, author = {Xuechao Du and Andong Chen and Boyuan He and Hao Chen and Fan Zhang and Yan Chen}, title = {AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation}, journal = {Comput. Secur.}, volume = {122}, pages = {102889}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102889}, doi = {10.1016/J.COSE.2022.102889}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuCHCZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuZ22, author = {Ruizhong Du and Lin Zhen}, title = {Multiuser physical layer security mechanism in the wireless communication system of the {IIOT}}, journal = {Comput. Secur.}, volume = {113}, pages = {102559}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102559}, doi = {10.1016/J.COSE.2021.102559}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuanZZZHZZP22, author = {Yexin Duan and Junhua Zou and Xingyu Zhou and Wu Zhang and Zhengyun He and Dazhi Zhan and Jin Zhang and Zhisong Pan}, title = {Adversarial attack via dual-stage network erosion}, journal = {Comput. Secur.}, volume = {122}, pages = {102888}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102888}, doi = {10.1016/J.COSE.2022.102888}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuanZZZHZZP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/EngstromL22, author = {Viktor Engstr{\"{o}}m and Robert Lagerstr{\"{o}}m}, title = {Two decades of cyberattack simulations: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {116}, pages = {102681}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102681}, doi = {10.1016/J.COSE.2022.102681}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/EngstromL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ErolaANAGC22, author = {Arnau Erola and Ioannis Agrafiotis and Jason R. C. Nurse and Louise Axon and Michael Goldsmith and Sadie Creese}, title = {A system to calculate Cyber Value-at-Risk}, journal = {Comput. Secur.}, volume = {113}, pages = {102545}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102545}, doi = {10.1016/J.COSE.2021.102545}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ErolaANAGC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangHZZH22, author = {Yong Fang and Chaoyi Huang and Minchuan Zeng and Zhiying Zhao and Cheng Huang}, title = {JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network}, journal = {Comput. Secur.}, volume = {118}, pages = {102715}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102715}, doi = {10.1016/J.COSE.2022.102715}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/FangHZZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangXZ22, author = {Rui Fang and Maochao Xu and Peng Zhao}, title = {Determination of ransomware payment based on Bayesian game models}, journal = {Comput. Secur.}, volume = {116}, pages = {102685}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102685}, doi = {10.1016/J.COSE.2022.102685}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FathalizadehMA22, author = {Amir Fathalizadeh and Vahideh Moghtadaiee and Mina Alishahi}, title = {On the privacy protection of indoor location dataset using anonymization}, journal = {Comput. Secur.}, volume = {117}, pages = {102665}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102665}, doi = {10.1016/J.COSE.2022.102665}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FathalizadehMA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Fernandez-Fuentes22, author = {Xos{\'{e}} Fern{\'{a}}ndez{-}Fuentes and Tom{\'{a}}s F. Pena and Jos{\'{e}} Carlos Cabaleiro}, title = {Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study}, journal = {Comput. Secur.}, volume = {115}, pages = {102626}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102626}, doi = {10.1016/J.COSE.2022.102626}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/Fernandez-Fuentes22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FernandoK22, author = {Damien Warren Fernando and Nikos Komninos}, title = {FeSA: Feature selection architecture for ransomware detection under concept drift}, journal = {Comput. Secur.}, volume = {116}, pages = {102659}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102659}, doi = {10.1016/J.COSE.2022.102659}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FernandoK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FinderSN22, author = {Ido Finder and Eitam Sheetrit and Nir Nissim}, title = {A time-interval-based active learning framework for enhanced {PE} malware acquisition and detection}, journal = {Comput. Secur.}, volume = {121}, pages = {102838}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102838}, doi = {10.1016/J.COSE.2022.102838}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FinderSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FouladiEA22, author = {Ramin Fadaei Fouladi and Orhan Ermis and Emin Anarim}, title = {A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network}, journal = {Comput. Secur.}, volume = {112}, pages = {102524}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102524}, doi = {10.1016/J.COSE.2021.102524}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FouladiEA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrimpongMU22, author = {Eugene Frimpong and Antonis Michalas and Amjad Ullah}, title = {Footsteps in the fog: Certificateless fog-based access control}, journal = {Comput. Secur.}, volume = {121}, pages = {102866}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102866}, doi = {10.1016/J.COSE.2022.102866}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrimpongMU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FuDKLSZ22, author = {Anmin Fu and Weijia Ding and Boyu Kuang and Qianmu Li and Willy Susilo and Yuqing Zhang}, title = {{FH-CFI:} Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices}, journal = {Comput. Secur.}, volume = {116}, pages = {102666}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102666}, doi = {10.1016/J.COSE.2022.102666}, timestamp = {Thu, 18 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FuDKLSZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Furnell22, author = {Steven Furnell}, title = {Assessing website password practices - Unchanged after fifteen years?}, journal = {Comput. Secur.}, volume = {120}, pages = {102790}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102790}, doi = {10.1016/J.COSE.2022.102790}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Furnell22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FurnellHW22, author = {Steven Furnell and Kirsi Helkala and Naomi Woods}, title = {Accessible authentication: Assessing the applicability for users with disabilities}, journal = {Comput. Secur.}, volume = {113}, pages = {102561}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102561}, doi = {10.1016/J.COSE.2021.102561}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FurnellHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalalMY22, author = {Hisham S. Galal and Mohammad Mannan and Amr M. Youssef}, title = {Blindfold: Keeping private keys in PKIs and CDNs out of sight}, journal = {Comput. Secur.}, volume = {118}, pages = {102731}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102731}, doi = {10.1016/J.COSE.2022.102731}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalalMY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GaleBS22, author = {Megan Gale and Ivano Bongiovanni and Sergeja Slapnicar}, title = {Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead}, journal = {Comput. Secur.}, volume = {121}, pages = {102840}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102840}, doi = {10.1016/J.COSE.2022.102840}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GaleBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GallagherPCPMK22, author = {Michael Gallagher and Nikolaos Pitropakis and Christos Chrysoulas and Pavlos Papadopoulos and Alexios Mylonas and Sokratis K. Katsikas}, title = {Investigating machine learning attacks on financial time series models}, journal = {Comput. Secur.}, volume = {123}, pages = {102933}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102933}, doi = {10.1016/J.COSE.2022.102933}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GallagherPCPMK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalloroPCCZ22, author = {Nicola Galloro and Mario Polino and Michele Carminati and Andrea Continella and Stefano Zanero}, title = {A Systematical and longitudinal study of evasive behaviors in windows malware}, journal = {Comput. Secur.}, volume = {113}, pages = {102550}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102550}, doi = {10.1016/J.COSE.2021.102550}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalloroPCCZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GaoLZWWS22, author = {Yansong Gao and Qun Li and Yifeng Zheng and Guohong Wang and Jiannan Wei and Mang Su}, title = {{SEDML:} Securely and efficiently harnessing distributed knowledge in machine learning}, journal = {Comput. Secur.}, volume = {121}, pages = {102857}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102857}, doi = {10.1016/J.COSE.2022.102857}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GaoLZWWS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Garcia-TeodoroG22, author = {Pedro Garc{\'{\i}}a{-}Teodoro and Jos{\'{e}} Antonio G{\'{o}}mez{-}Hern{\'{a}}ndez and Alberto Abell{\'{a}}n{-}Galera}, title = {Multi-labeling of complex, multi-behavioral malware samples}, journal = {Comput. Secur.}, volume = {121}, pages = {102845}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102845}, doi = {10.1016/J.COSE.2022.102845}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Garcia-TeodoroG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GargG22, author = {Manika Garg and Anita Goel}, title = {A systematic literature review on online assessment security: Current challenges and integrity strategies}, journal = {Comput. Secur.}, volume = {113}, pages = {102544}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102544}, doi = {10.1016/J.COSE.2021.102544}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GargG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GarnZSLKK22, author = {Bernhard Garn and Stefan Zauner and Dimitris E. Simos and Manuel Leithner and D. Richard Kuhn and Raghu Kacker}, title = {A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences}, journal = {Comput. Secur.}, volume = {114}, pages = {102575}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102575}, doi = {10.1016/J.COSE.2021.102575}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GarnZSLKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GernotL22, author = {Tanguy Gernot and Patrick Lacharme}, title = {Biometric masterkeys}, journal = {Comput. Secur.}, volume = {116}, pages = {102642}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102642}, doi = {10.1016/J.COSE.2022.102642}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GernotL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GibertFMPL22, author = {Daniel Gibert and Matt Fredrikson and Carles Mateu and Jordi Planes and Quan Le}, title = {Enhancing the insertion of {NOP} instructions to obfuscate malware via deep reinforcement learning}, journal = {Comput. Secur.}, volume = {113}, pages = {102543}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102543}, doi = {10.1016/J.COSE.2021.102543}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GibertFMPL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GoswamiC22, author = {Hemangi Goswami and Hiten Choudhury}, title = {Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network}, journal = {Comput. Secur.}, volume = {120}, pages = {102806}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102806}, doi = {10.1016/J.COSE.2022.102806}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GoswamiC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GouveiaVV22, author = {In{\^{e}}s Pinto Gouveia and Marcus V{\"{o}}lp and Paulo Esteves Ver{\'{\i}}ssimo}, title = {Behind the last line of defense: Surviving SoC faults and intrusions}, journal = {Comput. Secur.}, volume = {123}, pages = {102920}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102920}, doi = {10.1016/J.COSE.2022.102920}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GouveiaVV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GravetoCS22, author = {Vitor Graveto and Tiago Cruz and Paulo Sim{\~{o}}es}, title = {Security of Building Automation and Control Systems: Survey and future research directions}, journal = {Comput. Secur.}, volume = {112}, pages = {102527}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102527}, doi = {10.1016/J.COSE.2021.102527}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GravetoCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GrosseLBPBM22, author = {Kathrin Grosse and Taesung Lee and Battista Biggio and Youngja Park and Michael Backes and Ian M. Molloy}, title = {Backdoor smoothing: Demystifying backdoor attacks on deep neural networks}, journal = {Comput. Secur.}, volume = {120}, pages = {102814}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102814}, doi = {10.1016/J.COSE.2022.102814}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GrosseLBPBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuSYM22, author = {Yeming Gu and Hui Shu and Pan Yang and Rongkuan Ma}, title = {MinSIB: Minimized static instrumentation for fuzzing binaries}, journal = {Comput. Secur.}, volume = {122}, pages = {102894}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102894}, doi = {10.1016/J.COSE.2022.102894}, timestamp = {Sun, 17 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuSYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuZLZRC22, author = {Xiuting Gu and Tianqing Zhu and Jie Li and Tao Zhang and Wei Ren and Kim{-}Kwang Raymond Choo}, title = {Privacy, accuracy, and model fairness trade-offs in federated learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102907}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102907}, doi = {10.1016/J.COSE.2022.102907}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuZLZRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares22, author = {Alejandro Guerra{-}Manzanares and Marcin Luckner and Hayretdin Bahsi}, title = {Concept drift and cross-device behavior: Challenges and implications for effective android malware detection}, journal = {Comput. Secur.}, volume = {120}, pages = {102757}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102757}, doi = {10.1016/J.COSE.2022.102757}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares22a, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi}, title = {On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection}, journal = {Comput. Secur.}, volume = {122}, pages = {102835}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102835}, doi = {10.1016/J.COSE.2022.102835}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuerraCV22, author = {Jorge L. Guerra and Carlos Adri{\'{a}}n Catania and Eduardo E. Veas}, title = {Datasets are not enough: Challenges in labeling network traffic}, journal = {Comput. Secur.}, volume = {120}, pages = {102810}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102810}, doi = {10.1016/J.COSE.2022.102810}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuerraCV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuggenmosHOS22, author = {Florian Guggenmos and Bj{\"{o}}rn H{\"{a}}ckel and Philipp Ollig and Bastian Stahl}, title = {Security First, Security by Design, or Security Pragmatism - Strategic Roles of {IT} Security in Digitalization Projects}, journal = {Comput. Secur.}, volume = {118}, pages = {102747}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102747}, doi = {10.1016/J.COSE.2022.102747}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuggenmosHOS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoFHOLG22, author = {Wenbo Guo and Yong Fang and Cheng Huang and Haoran Ou and Chun Lin and Yongyan Guo}, title = {HyVulDect: {A} hybrid semantic vulnerability mining system based on graph neural network}, journal = {Comput. Secur.}, volume = {121}, pages = {102823}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102823}, doi = {10.1016/J.COSE.2022.102823}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GuoFHOLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoYYK22, author = {Li Guo and Jia Yu and Ming Yang and Fanyu Kong}, title = {Privacy-Preserving Convolution Neural Network Inference with Edge-assistance}, journal = {Comput. Secur.}, volume = {123}, pages = {102910}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102910}, doi = {10.1016/J.COSE.2022.102910}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoYYK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuptaJB22, author = {Neha Gupta and Vinita Jindal and Punam Bedi}, title = {{CSE-IDS:} Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems}, journal = {Comput. Secur.}, volume = {112}, pages = {102499}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102499}, doi = {10.1016/J.COSE.2021.102499}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuptaJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuptaKC22, author = {Sandeep Gupta and Mouna Kacimi and Bruno Crispo}, title = {Step {\&} turn - {A} novel bimodal behavioral biometric-based user verification scheme for physical access control}, journal = {Comput. Secur.}, volume = {118}, pages = {102722}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102722}, doi = {10.1016/J.COSE.2022.102722}, timestamp = {Thu, 21 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuptaKC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuvenBA22, author = {Ebu Yusuf Guven and Ali Boyaci and Muhammed Ali Aydin}, title = {A Novel Password Policy Focusing on Altering User Password Selection Habits: {A} Statistical Analysis on Breached Data}, journal = {Comput. Secur.}, volume = {113}, pages = {102560}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102560}, doi = {10.1016/J.COSE.2021.102560}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuvenBA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HamidNHRNA22, author = {Nor Hasnul Azirah Abdul Hamid and Normalina Ibrahim @ Mat Nor and Fazlin Marini Hussain and Rajeswari Raju and Humza Naseer and Atif Ahmad}, title = {Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations}, journal = {Comput. Secur.}, volume = {122}, pages = {102893}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102893}, doi = {10.1016/J.COSE.2022.102893}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HamidNHRNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HammadHE22, author = {Mohamed Hammad and Nabil M. Hewahi and Wael Elmedany}, title = {{MMM-RF:} {A} novel high accuracy multinomial mixture model for network intrusion detection systems}, journal = {Comput. Secur.}, volume = {120}, pages = {102777}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102777}, doi = {10.1016/J.COSE.2022.102777}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HammadHE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HammiZKN22, author = {Badis Hammi and Sherali Zeadally and Rida Khatoun and Jamel Nebhen}, title = {Survey on smart homes: Vulnerabilities, risks, and countermeasures}, journal = {Comput. Secur.}, volume = {117}, pages = {102677}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102677}, doi = {10.1016/J.COSE.2022.102677}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HammiZKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaoLP22, author = {Jingwei Hao and Senlin Luo and Limin Pan}, title = {{EII-MBS:} Malware family classification via enhanced adversarial instruction behavior semantic learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102905}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102905}, doi = {10.1016/J.COSE.2022.102905}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaoLP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HartHS22, author = {Stephen Hart and Basel Halak and Vladimiro Sassone}, title = {{CIST:} {A} Serious Game for Hardware Supply Chain}, journal = {Comput. Secur.}, volume = {122}, pages = {102912}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102912}, doi = {10.1016/J.COSE.2022.102912}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HartHS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaseebMMW22, author = {Junaid Haseeb and Saif Ur Rehman Malik and Masood Mansoori and Ian Welch}, title = {Probabilistic modelling of deception-based security framework using markov decision process}, journal = {Comput. Secur.}, volume = {115}, pages = {102599}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102599}, doi = {10.1016/J.COSE.2021.102599}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaseebMMW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaseebMMW22a, author = {Junaid Haseeb and Saif Ur Rehman Malik and Masood Mansoori and Ian Welch}, title = {Corrigendum to 'Probabilistic modelling of deception-based security framework using markov decision process' [Computers {\&} Security 115 {(2022)/102599]}}, journal = {Comput. Secur.}, volume = {117}, pages = {102689}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102689}, doi = {10.1016/J.COSE.2022.102689}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaseebMMW22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HassaninMTC22, author = {Mohammed Hassanin and Nour Moustafa and Murat Tahtali and Kim{-}Kwang Raymond Choo}, title = {Rethinking maximum-margin softmax for adversarial robustness}, journal = {Comput. Secur.}, volume = {116}, pages = {102640}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102640}, doi = {10.1016/J.COSE.2022.102640}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HassaninMTC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeDZZHWP22, author = {Zhengyun He and Yexin Duan and Wu Zhang and Junhua Zou and Zhengfang He and Yunyun Wang and Zhisong Pan}, title = {Boosting adversarial attacks with transformed gradient}, journal = {Comput. Secur.}, volume = {118}, pages = {102720}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102720}, doi = {10.1016/J.COSE.2022.102720}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeDZZHWP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HenriquesCCS22, author = {Jo{\~{a}}o Henriques and Filipe Caldeira and Tiago Cruz and Paulo Sim{\~{o}}es}, title = {An automated closed-loop framework to enforce security policies from anomaly detection}, journal = {Comput. Secur.}, volume = {123}, pages = {102949}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102949}, doi = {10.1016/J.COSE.2022.102949}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HenriquesCCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HimeurSBAA22, author = {Yassine Himeur and Shahab Saquib Sohail and Faycal Bensaali and Abbes Amira and Mamoun Alazab}, title = {Latest trends of security and privacy in recommender systems: {A} comprehensive review and future perspectives}, journal = {Comput. Secur.}, volume = {118}, pages = {102746}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102746}, doi = {10.1016/J.COSE.2022.102746}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HimeurSBAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HoKM22, author = {Heemeng Ho and Ryan K. L. Ko and Lorraine Mazerolle}, title = {Situational Crime Prevention {(SCP)} techniques to prevent and control cybercrimes: {A} focused systematic review}, journal = {Comput. Secur.}, volume = {115}, pages = {102611}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102611}, doi = {10.1016/J.COSE.2022.102611}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HoKM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuHLLZ22, author = {Yun Hu and Aiqun Hu and Chunguo Li and Peng Li and Chunyu Zhang}, title = {Towards a privacy protection-capable noise fingerprinting for numerically aggregated data}, journal = {Comput. Secur.}, volume = {119}, pages = {102755}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102755}, doi = {10.1016/J.COSE.2022.102755}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuHLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangQLLGZ22, author = {Yizhao Huang and Meng Qiao and Fudong Liu and Xingwei Li and Hairen Gui and Chunyan Zhang}, title = {Binary code traceability of multigranularity information fusion from the perspective of software genes}, journal = {Comput. Secur.}, volume = {114}, pages = {102607}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102607}, doi = {10.1016/J.COSE.2022.102607}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangQLLGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangSK22, author = {Yuyao Huang and Hui Shu and Fei Kang}, title = {DeMal: Module decomposition of malware based on community discovery}, journal = {Comput. Secur.}, volume = {117}, pages = {102680}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102680}, doi = {10.1016/J.COSE.2022.102680}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuangZ22, author = {Linan Huang and Quanyan Zhu}, title = {{RADAMS:} Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks}, journal = {Comput. Secur.}, volume = {121}, pages = {102844}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102844}, doi = {10.1016/J.COSE.2022.102844}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuangZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HusakSSLJK22, author = {Martin Hus{\'{a}}k and Luk{\'{a}}s Sadlek and Stanislav Spacek and Martin Lastovicka and Michal Javorn{\'{\i}}k and Jana Kom{\'{a}}rkov{\'{a}}}, title = {{CRUSOE:} {A} toolset for cyber situational awareness and decision support in incident handling}, journal = {Comput. Secur.}, volume = {115}, pages = {102609}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102609}, doi = {10.1016/J.COSE.2022.102609}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HusakSSLJK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HussainYRIAS22, author = {Tariq Hussain and Bailin Yang and Haseeb Ur Rahman and Arshad Iqbal and Farman Ali and Babar Shah}, title = {Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique}, journal = {Comput. Secur.}, volume = {123}, pages = {102917}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102917}, doi = {10.1016/J.COSE.2022.102917}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HussainYRIAS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IbitoyeSM22, author = {Olakunle Ibitoye and M. Omair Shafiq and Ashraf Matrawy}, title = {Differentially private self-normalizing neural networks for adversarial robustness in federated learning}, journal = {Comput. Secur.}, volume = {116}, pages = {102631}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102631}, doi = {10.1016/J.COSE.2022.102631}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IbitoyeSM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IraqiB22, author = {Omar Iraqi and Hanan El Bakkali}, title = {Communizer: {A} collaborative cloud-based self-protecting software communities framework - Focus on the alert coordination system}, journal = {Comput. Secur.}, volume = {117}, pages = {102692}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102692}, doi = {10.1016/J.COSE.2022.102692}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IraqiB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IslamiFP22, author = {Lejla Islami and Simone Fischer{-}H{\"{u}}bner and Panos Papadimitratos}, title = {Capturing drivers' privacy preferences for intelligent transportation systems: An intercultural perspective}, journal = {Comput. Secur.}, volume = {123}, pages = {102913}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102913}, doi = {10.1016/J.COSE.2022.102913}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IslamiFP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/IyerMN22, author = {Padmavathi Iyer and Amirreza Masoumzadeh and Paliath Narendran}, title = {On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models}, journal = {Comput. Secur.}, volume = {116}, pages = {102586}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102586}, doi = {10.1016/J.COSE.2021.102586}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/IyerMN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JacobQYL22, author = {Stephen Jacob and Yuansong Qiao and Yuhang Ye and Brian Lee}, title = {Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks}, journal = {Comput. Secur.}, volume = {118}, pages = {102728}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102728}, doi = {10.1016/J.COSE.2022.102728}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JacobQYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Jang22, author = {DaeHee Jang}, title = {Badaslr: Exceptional cases of {ASLR} aiding exploitation}, journal = {Comput. Secur.}, volume = {112}, pages = {102510}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102510}, doi = {10.1016/J.COSE.2021.102510}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Jang22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JerbiDBS22, author = {Manel Jerbi and Zaineb Chelly Dagdia and Slim Bechikh and Lamjed Ben Said}, title = {Android malware detection as a Bi-level problem}, journal = {Comput. Secur.}, volume = {121}, pages = {102825}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102825}, doi = {10.1016/J.COSE.2022.102825}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JerbiDBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiaB22, author = {Haiyan Jia and Eric P. S. Baumer}, title = {Birds of a feather: Collective privacy of online social activist groups}, journal = {Comput. Secur.}, volume = {115}, pages = {102614}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102614}, doi = {10.1016/J.COSE.2022.102614}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JiangFQHLH22, author = {Shuai Jiang and Cai Fu and Yekui Qian and Shuai He and Jianqiang Lv and Lansheng Han}, title = {IFAttn: Binary code similarity analysis based on interpretable features with attention}, journal = {Comput. Secur.}, volume = {120}, pages = {102804}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102804}, doi = {10.1016/J.COSE.2022.102804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JiangFQHLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JimIG22, author = {Lincy Elizebeth Jim and Nahina Islam and Mark A. Gregory}, title = {Enhanced {MANET} security using artificial immune system based danger theory to detect selfish nodes}, journal = {Comput. Secur.}, volume = {113}, pages = {102538}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102538}, doi = {10.1016/J.COSE.2021.102538}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JimIG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinZQFZ22, author = {Chengbin Jin and Yongbin Zhou and Xinkuan Qiu and Qi Feng and Qian Zhang}, title = {Breaking real-world {COTS} {USIM} cards with unknown side-channel countermeasures}, journal = {Comput. Secur.}, volume = {113}, pages = {102531}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102531}, doi = {10.1016/J.COSE.2021.102531}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinZQFZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JoLS22, author = {Hyeonseong Jo and Yongjae Lee and Seungwon Shin}, title = {Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text}, journal = {Comput. Secur.}, volume = {120}, pages = {102763}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102763}, doi = {10.1016/J.COSE.2022.102763}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JoLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JungLB22, author = {Bill Jung and Yan Li and Tamir Bechor}, title = {{CAVP:} {A} context-aware vulnerability prioritization model}, journal = {Comput. Secur.}, volume = {116}, pages = {102639}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102639}, doi = {10.1016/J.COSE.2022.102639}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JungLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KarlssonKP22, author = {Fredrik Karlsson and Ella Kolkowska and Johan Petersson}, title = {Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis}, journal = {Comput. Secur.}, volume = {114}, pages = {102578}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102578}, doi = {10.1016/J.COSE.2021.102578}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KarlssonKP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KatsikeasJHL22, author = {Sotirios Katsikeas and Pontus Johnson and Simon Hacks and Robert Lagerstr{\"{o}}m}, title = {VehicleLang: {A} probabilistic modeling and simulation language for modern vehicle {IT} infrastructures}, journal = {Comput. Secur.}, volume = {117}, pages = {102705}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102705}, doi = {10.1016/J.COSE.2022.102705}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KatsikeasJHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhalidM22, author = {Fatima Khalid and Ammar Masood}, title = {Vulnerability analysis of Qualcomm Secure Execution Environment {(QSEE)}}, journal = {Comput. Secur.}, volume = {116}, pages = {102628}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102628}, doi = {10.1016/J.COSE.2022.102628}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhalidM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KhanYKI22, author = {Naurin Farooq Khan and Amber Yaqoob and Muhammad Saud Khan and Naveed Ikram}, title = {The cybersecurity behavioral research: {A} tertiary study}, journal = {Comput. Secur.}, volume = {120}, pages = {102826}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102826}, doi = {10.1016/J.COSE.2022.102826}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KhanYKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ki-AriesFDW22, author = {Duncan Ki{-}Aries and Shamal Faily and Huseyin Dogan and Christopher Williams}, title = {Assessing system of systems information security risk with OASoSIS}, journal = {Comput. Secur.}, volume = {117}, pages = {102690}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102690}, doi = {10.1016/J.COSE.2022.102690}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ki-AriesFDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimC22, author = {Jin{-}Young Kim and Sung{-}Bae Cho}, title = {Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features}, journal = {Comput. Secur.}, volume = {112}, pages = {102501}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102501}, doi = {10.1016/J.COSE.2021.102501}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimK22, author = {Jae{-}Yeol Kim and Hyuk{-}Yoon Kwon}, title = {Threat classification model for security information event management focusing on model efficiency}, journal = {Comput. Secur.}, volume = {120}, pages = {102789}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102789}, doi = {10.1016/J.COSE.2022.102789}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KleijSCY22, author = {Rick van der Kleij and Jan Maarten Schraagen and Beatrice Cadet and Heather Young}, title = {Developing decision support for cybersecurity threat and incident managers}, journal = {Comput. Secur.}, volume = {113}, pages = {102535}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102535}, doi = {10.1016/J.COSE.2021.102535}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KleijSCY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KongZYZ22, author = {Ke Kong and Zhichao Zhang and Ziyuan Yang and Zhaoxin Zhang}, title = {{FCSCNN:} Feature centralized Siamese CNN-based android malware identification}, journal = {Comput. Secur.}, volume = {112}, pages = {102514}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102514}, doi = {10.1016/J.COSE.2021.102514}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KongZYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KouchamMHTM22, author = {Oualid Koucham and St{\'{e}}phane Mocanu and Guillaume Hiet and Jean{-}Marc Thiriet and Fr{\'{e}}d{\'{e}}ric Majorczyk}, title = {Cross-domain alert correlation methodology for industrial control systems}, journal = {Comput. Secur.}, volume = {118}, pages = {102723}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102723}, doi = {10.1016/J.COSE.2022.102723}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KouchamMHTM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KoutsokostasLAO22, author = {Vasilios Koutsokostas and Nikolaos Lykousas and Theodoros Apostolopoulos and Gabriele Orazi and Amrita Ghosal and Fran Casino and Mauro Conti and Constantinos Patsakis}, title = {Invoice {\#}31415 attached: Automated analysis of malicious Microsoft Office documents}, journal = {Comput. Secur.}, volume = {114}, pages = {102582}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102582}, doi = {10.1016/J.COSE.2021.102582}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KoutsokostasLAO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KravchikDBS22, author = {Moshe Kravchik and Luca Demetrio and Battista Biggio and Asaf Shabtai}, title = {Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems}, journal = {Comput. Secur.}, volume = {122}, pages = {102901}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102901}, doi = {10.1016/J.COSE.2022.102901}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KravchikDBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KruzikovaKSDM22, author = {Agata Kruzikova and Lenka Knapova and David Smahel and Lenka Dedkova and Vashek Matyas}, title = {Usable and secure? User perception of four authentication methods for mobile banking}, journal = {Comput. Secur.}, volume = {115}, pages = {102603}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102603}, doi = {10.1016/J.COSE.2022.102603}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KruzikovaKSDM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KuangFSYG22, author = {Boyu Kuang and Anmin Fu and Willy Susilo and Shui Yu and Yansong Gao}, title = {A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects}, journal = {Comput. Secur.}, volume = {112}, pages = {102498}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102498}, doi = {10.1016/J.COSE.2021.102498}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KuangFSYG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarSSL22, author = {Ayush Kumar and Mrinalini Shridhar and Sahithya Swaminathan and Teng Joon Lim}, title = {Machine learning-based early detection of IoT botnets using network-edge traffic}, journal = {Comput. Secur.}, volume = {117}, pages = {102693}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102693}, doi = {10.1016/J.COSE.2022.102693}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarSSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KumarSVY22, author = {Rajesh Kumar and Siddharth Sharma and Chirag Vachhani and Nitish Yadav}, title = {What changed in the cyber-security after COVID-19?}, journal = {Comput. Secur.}, volume = {120}, pages = {102821}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102821}, doi = {10.1016/J.COSE.2022.102821}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KumarSVY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KurniawanEKQT22, author = {Kabul Kurniawan and Andreas Ekelhart and Elmar Kiesling and Gerald Quirchmayr and A Min Tjoa}, title = {{KRYSTAL:} Knowledge graph-based framework for tactical attack discovery in audit data}, journal = {Comput. Secur.}, volume = {121}, pages = {102828}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102828}, doi = {10.1016/J.COSE.2022.102828}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KurniawanEKQT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KwonL22, author = {Hyun Kwon and Sanghyun Lee}, title = {Ensemble transfer attack targeting text classification systems}, journal = {Comput. Secur.}, volume = {117}, pages = {102695}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102695}, doi = {10.1016/J.COSE.2022.102695}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KwonL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KyytsonenIAV22, author = {Maiju Kyyts{\"{o}}nen and Jonna Ikonen and Anna{-}Mari Aalto and Tuulikki Vehko}, title = {The self-assessed information security skills of the Finnish population: {A} regression analysis}, journal = {Comput. Secur.}, volume = {118}, pages = {102732}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102732}, doi = {10.1016/J.COSE.2022.102732}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KyytsonenIAV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LaiTLWTZQ22, author = {Yingxu Lai and Liyao Tong and Jing Liu and Yipeng Wang and Tong Tang and Zijian Zhao and Hua Qin}, title = {Identifying malicious nodes in wireless sensor networks based on correlation detection}, journal = {Comput. Secur.}, volume = {113}, pages = {102540}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102540}, doi = {10.1016/J.COSE.2021.102540}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LaiTLWTZQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LanLLLG22, author = {Jinghong Lan and Xudong Liu and Bo Li and Yanan Li and Tongtong Geng}, title = {DarknetSec: {A} novel self-attentive deep learning method for darknet traffic classification and application identification}, journal = {Comput. Secur.}, volume = {116}, pages = {102663}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102663}, doi = {10.1016/J.COSE.2022.102663}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LanLLLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LanLLSLZ22, author = {Jinghong Lan and Xudong Liu and Bo Li and Jie Sun and Beibei Li and Jun Zhao}, title = {{MEMBER:} {A} multi-task learning model with hybrid deep features for network intrusion detection}, journal = {Comput. Secur.}, volume = {123}, pages = {102919}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102919}, doi = {10.1016/J.COSE.2022.102919}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LanLLSLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeCCCHK22, author = {Jung{-}San Lee and Ying{-}Chin Chen and Chit{-}Jie Chew and Chih{-}Lung Chen and Thu{-}Nguyet Huynh and Chung{-}Wei Kuo}, title = {CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training}, journal = {Comput. Secur.}, volume = {122}, pages = {102908}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102908}, doi = {10.1016/J.COSE.2022.102908}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeCCCHK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeGWGR22, author = {Jaeung Lee and Melchor C. de Guzman and Jingguo Wang and Manish Gupta and H. Raghav Rao}, title = {Investigating perceptions about risk of data breaches in financial institutions: {A} routine activity-approach}, journal = {Comput. Secur.}, volume = {121}, pages = {102832}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102832}, doi = {10.1016/J.COSE.2022.102832}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LeeGWGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeJCKK22, author = {Seungkwang Lee and Nam{-}Su Jho and Doyoung Chung and Yousung Kang and Myungchul Kim}, title = {Rcryptect: Real-time detection of cryptographic function in the user-space filesystem}, journal = {Comput. Secur.}, volume = {112}, pages = {102512}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102512}, doi = {10.1016/J.COSE.2021.102512}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeJCKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeeL22, author = {Junwon Lee and Heejo Lee}, title = {Improving {SSH} detection model using {IPA} time and {WGAN-GP}}, journal = {Comput. Secur.}, volume = {116}, pages = {102672}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102672}, doi = {10.1016/J.COSE.2022.102672}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeeL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LeviHAE22, author = {Matan Levi and Itay Hazan and Noga Agmon and Sagi Eden}, title = {Behavioral embedding for continuous user verification in global settings}, journal = {Comput. Secur.}, volume = {119}, pages = {102716}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102716}, doi = {10.1016/J.COSE.2022.102716}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LeviHAE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCBLGL22, author = {Yong{-}Gang Li and Yeh{-}Ching Chung and Yu Bao and Yi Lu and Shanqing Guo and Guoyuan Lin}, title = {KPointer: Keep the code pointers on the stack point to the right code}, journal = {Comput. Secur.}, volume = {120}, pages = {102781}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102781}, doi = {10.1016/J.COSE.2022.102781}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCBLGL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiCZWLWLS22, author = {Ce Li and Zijun Cheng and He Zhu and Leiqi Wang and Qiujian Lv and Yan Wang and Ning Li and Degang Sun}, title = {DMalNet: Dynamic malware analysis based on {API} feature engineering and graph learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102872}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102872}, doi = {10.1016/J.COSE.2022.102872}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiCZWLWLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiL22, author = {Zhen Li and Qi Liao}, title = {Preventive portfolio against data-selling ransomware - {A} game theory of encryption and deception}, journal = {Comput. Secur.}, volume = {116}, pages = {102644}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102644}, doi = {10.1016/J.COSE.2022.102644}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLWSQ22, author = {Ce Li and Qiujian Lv and Ning Li and Yan Wang and Degang Sun and Yuanyuan Qiao}, title = {A novel deep framework for dynamic malware detection based on {API} sequence intrinsic features}, journal = {Comput. Secur.}, volume = {116}, pages = {102686}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102686}, doi = {10.1016/J.COSE.2022.102686}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLLWSQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiMDXZ22, author = {Kehong Li and Wengang Ma and Huawei Duan and Han Xie and Juanxiu Zhu}, title = {Few-shot IoT attack detection based on {RFP-CNN} and adversarial unsupervised domain-adaptive regularization}, journal = {Comput. Secur.}, volume = {121}, pages = {102856}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102856}, doi = {10.1016/J.COSE.2022.102856}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiMDXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiQHLLG22, author = {Yanan Li and Tao Qin and Yongzhong Huang and Jinghong Lan and ZanHao Liang and Tongtong Geng}, title = {{HDFEF:} {A} hierarchical and dynamic feature extraction framework for intrusion detection systems}, journal = {Comput. Secur.}, volume = {121}, pages = {102842}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102842}, doi = {10.1016/J.COSE.2022.102842}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiQHLLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiWXCQ22, author = {Bin Li and Yijie Wang and Kele Xu and Li Cheng and Zhiquan Qin}, title = {{DFAID:} Density-aware and feature-deviated active intrusion detection over network traffic streams}, journal = {Comput. Secur.}, volume = {118}, pages = {102719}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102719}, doi = {10.1016/J.COSE.2022.102719}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiWXCQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZCS22, author = {Bin Li and Qinglei Zhou and Yan Cao and Xueming Si}, title = {Cognitively reconfigurable mimic-based heterogeneous password recovery system}, journal = {Comput. Secur.}, volume = {116}, pages = {102667}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102667}, doi = {10.1016/J.COSE.2022.102667}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiZCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiZLLYL22, author = {Helin Li and Hui Zhu and Xiaodong Lin and Rongxing Lu and Zhipeng Yu and Wei Lan}, title = {Everything you control is not everything: Achieving intention-concealed visit on social networks}, journal = {Comput. Secur.}, volume = {119}, pages = {102778}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102778}, doi = {10.1016/J.COSE.2022.102778}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiZLLYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiangCWZZ22, author = {Jianbing Liang and Shuhui Chen and Ziling Wei and Shuang Zhao and Wei Zhao}, title = {HAGDetector: Heterogeneous {DGA} domain name detection model}, journal = {Comput. Secur.}, volume = {120}, pages = {102803}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102803}, doi = {10.1016/J.COSE.2022.102803}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiangCWZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LimaLLB22, author = {Milton V. M. Lima and Ricardo Lima and Fernando Lins and Michel S. Bonfim}, title = {Beholder - {A} CEP-based intrusion detection and prevention systems for IoT environments}, journal = {Comput. Secur.}, volume = {120}, pages = {102824}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102824}, doi = {10.1016/J.COSE.2022.102824}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LimaLLB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinLLXG22, author = {Xinjie Lin and Han Liu and Zhen Li and Gang Xiong and Gaopeng Gou}, title = {Privacy protection of China's top websites: {A} Multi-layer privacy measurement via network behaviours and privacy policies}, journal = {Comput. Secur.}, volume = {114}, pages = {102606}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102606}, doi = {10.1016/J.COSE.2022.102606}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinLLXG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LinMZZ22, author = {Yu Lin and Yunlong Mao and Yuan Zhang and Sheng Zhong}, title = {Secure deduplication schemes for content delivery in mobile edge computing}, journal = {Comput. Secur.}, volume = {114}, pages = {102602}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102602}, doi = {10.1016/J.COSE.2022.102602}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LinMZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuFHH22, author = {Zhonglin Liu and Yong Fang and Cheng Huang and Jiaxuan Han}, title = {GraphXSS: An efficient {XSS} payload detection approach based on graph convolutional network}, journal = {Comput. Secur.}, volume = {114}, pages = {102597}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102597}, doi = {10.1016/J.COSE.2021.102597}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuFHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuFWSC22, author = {Songsong Liu and Pengbin Feng and Shu Wang and Kun Sun and Jiahao Cao}, title = {Enhancing malware analysis sandboxes with emulated user behavior}, journal = {Comput. Secur.}, volume = {115}, pages = {102613}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102613}, doi = {10.1016/J.COSE.2022.102613}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuFWSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuJJ22, author = {Yujia Liu and Ming Jiang and Tingting Jiang}, title = {Transferable adversarial examples based on global smooth perturbations}, journal = {Comput. Secur.}, volume = {121}, pages = {102816}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102816}, doi = {10.1016/J.COSE.2022.102816}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuJJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuQH22, author = {Yuanzhen Liu and Umair Mujtaba Qureshi and Gerhard Petrus Hancke}, title = {Keypad entry inference with sensor fusion from mobile and smart wearables}, journal = {Comput. Secur.}, volume = {121}, pages = {102837}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102837}, doi = {10.1016/J.COSE.2022.102837}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuQH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuRLLZ22, author = {Zhenpeng Liu and Lele Ren and Ruilin Li and Qiannan Liu and Yonggang Zhao}, title = {ID-based sanitizable signature data integrity auditing scheme with privacy-preserving}, journal = {Comput. Secur.}, volume = {121}, pages = {102858}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102858}, doi = {10.1016/J.COSE.2022.102858}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuRLLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuWZ22, author = {Tao Liu and He Wang and Yuqing Zhang}, title = {A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network}, journal = {Comput. Secur.}, volume = {112}, pages = {102467}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102467}, doi = {10.1016/J.COSE.2021.102467}, timestamp = {Tue, 19 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LiuWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuXZSL22, author = {Yaqun Liu and Chang{-}you Xing and Guomin Zhang and Lihua Song and Hongxiu Lin}, title = {\emph{AntiTomo}: Network topology obfuscation against adversarial tomography-based topology inference}, journal = {Comput. Secur.}, volume = {113}, pages = {102570}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102570}, doi = {10.1016/J.COSE.2021.102570}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuXZSL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuZGYL22, author = {Haiyang Liu and Hanlin Zhang and Li Guo and Jia Yu and Jie Lin}, title = {Privacy-Preserving cloud-Aided broad learning system}, journal = {Comput. Secur.}, volume = {112}, pages = {102503}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102503}, doi = {10.1016/J.COSE.2021.102503}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuZGYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LoftHYW22, author = {Paul Loft and Ying He and Iryna Yevseyeva and Isabel Wagner}, title = {{CAESAR8:} An agile enterprise architecture approach to managing information security risks}, journal = {Comput. Secur.}, volume = {122}, pages = {102877}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102877}, doi = {10.1016/J.COSE.2022.102877}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LoftHYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LongGXZ22, author = {Teng Long and Qi Gao and Lili Xu and Zhangbing Zhou}, title = {A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions}, journal = {Comput. Secur.}, volume = {121}, pages = {102847}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102847}, doi = {10.1016/J.COSE.2022.102847}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/LongGXZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LongW22, author = {Zhang Long and Jinsong Wang}, title = {A hybrid method of entropy and {SSAE-SVM} based DDoS detection and mitigation mechanism in {SDN}}, journal = {Comput. Secur.}, volume = {115}, pages = {102604}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102604}, doi = {10.1016/J.COSE.2022.102604}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LongW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuLLC22, author = {Shiwei Lu and Ruihu Li and Wenbin Liu and Xuan Chen}, title = {Defense against backdoor attack in federated learning}, journal = {Comput. Secur.}, volume = {121}, pages = {102819}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102819}, doi = {10.1016/J.COSE.2022.102819}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuLLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuLZJ22, author = {Qian Lu and Shihao Li and Jiahui Zhang and Ruobing Jiang}, title = {{PEDR:} Exploiting phase error drift range to detect full-model rogue access point attacks}, journal = {Comput. Secur.}, volume = {114}, pages = {102581}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102581}, doi = {10.1016/J.COSE.2021.102581}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuLZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LuSXJ22, author = {Jintian Lu and Jiakun Sun and Ruizhi Xiao and Shuyuan Jin}, title = {{DIFCS:} {A} Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control}, journal = {Comput. Secur.}, volume = {117}, pages = {102678}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102678}, doi = {10.1016/J.COSE.2022.102678}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LuSXJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaCS22, author = {Qian Ma and Baojiang Cui and Cong Sun}, title = {A novel privacy-aware model for nonparametric decentralized detection}, journal = {Comput. Secur.}, volume = {117}, pages = {102688}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102688}, doi = {10.1016/J.COSE.2022.102688}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaCS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaesschalckGGR22, author = {Sam Maesschalck and Vasileios Giotsas and Benjamin Green and Nicholas J. P. Race}, title = {Don't get stung, cover your {ICS} in honey: How do honeypots fit within industrial control system security}, journal = {Comput. Secur.}, volume = {114}, pages = {102598}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102598}, doi = {10.1016/J.COSE.2021.102598}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaesschalckGGR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MagesAR22, author = {Tobias Mages and Magnus Almgren and Christian Rohner}, title = {Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses}, journal = {Comput. Secur.}, volume = {116}, pages = {102633}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102633}, doi = {10.1016/J.COSE.2022.102633}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MagesAR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MakhdoomAL22, author = {Imran Makhdoom and Mehran Abolhasan and Justin Lipman}, title = {A comprehensive survey of covert communication techniques, limitations and future challenges}, journal = {Comput. Secur.}, volume = {120}, pages = {102784}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102784}, doi = {10.1016/J.COSE.2022.102784}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MakhdoomAL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ManimaranSG22, author = {S. Manimaran and V. N. Sastry and N. P. Gopalan}, title = {{SBTDDL:} {A} novel framework for sensor-based threats detection on Android smartphones using deep learning}, journal = {Comput. Secur.}, volume = {118}, pages = {102729}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102729}, doi = {10.1016/J.COSE.2022.102729}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ManimaranSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MartinezCJP22, author = {David Mart{\'{\i}}nez and Eusebi Calle and Albert Jov{\'{e}} and Cristina P{\'{e}}rez{-}Sol{\`{a}}}, title = {Web-tracking compliance: websites' level of confidence in the use of information-gathering technologies}, journal = {Comput. Secur.}, volume = {122}, pages = {102873}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102873}, doi = {10.1016/J.COSE.2022.102873}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MartinezCJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MasuchGTK22, author = {Kristin Masuch and Maike Greve and Simon Trang and Lutz M. Kolbe}, title = {Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?}, journal = {Comput. Secur.}, volume = {112}, pages = {102502}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102502}, doi = {10.1016/J.COSE.2021.102502}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MasuchGTK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MathovSSE22, author = {Yael Mathov and Tal Ben Senior and Asaf Shabtai and Yuval Elovici}, title = {Stop bugging me! Evading modern-day wiretapping using adversarial perturbations}, journal = {Comput. Secur.}, volume = {121}, pages = {102841}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102841}, doi = {10.1016/J.COSE.2022.102841}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MathovSSE22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McLeodD22, author = {Alexander J. McLeod Jr. and Diane Dolezel}, title = {Information security policy non-compliance: Can capitulation theory explain user behaviors?}, journal = {Comput. Secur.}, volume = {112}, pages = {102526}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102526}, doi = {10.1016/J.COSE.2021.102526}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McLeodD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MilosevicC22, author = {Marija S. Milosevic and Vladimir M. Ciric}, title = {Extreme minority class detection in imbalanced data for network intrusion}, journal = {Comput. Secur.}, volume = {123}, pages = {102940}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102940}, doi = {10.1016/J.COSE.2022.102940}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MilosevicC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MimranBKKBLES22, author = {Dudu Mimran and Ron Bitton and Yehonatan Kfir and Eitan Klevansky and Oleg Brodt and Heiko Lehmann and Yuval Elovici and Asaf Shabtai}, title = {Security of Open Radio Access Networks}, journal = {Comput. Secur.}, volume = {122}, pages = {102890}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102890}, doi = {10.1016/J.COSE.2022.102890}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MimranBKKBLES22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MishraAAG22, author = {Alok Mishra and Yehia Ibrahim Alzoubi and Memoona Javeria Anwar and Asif Qumer Gill}, title = {Attributes impacting cybersecurity policy development: An evidence from seven nations}, journal = {Comput. Secur.}, volume = {120}, pages = {102820}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102820}, doi = {10.1016/J.COSE.2022.102820}, timestamp = {Fri, 06 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MishraAAG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MohantyRL22, author = {Hardhik Mohanty and Arousha Haghighian Roudsari and Arash Habibi Lashkari}, title = {Robust stacking ensemble model for darknet traffic classification under adversarial settings}, journal = {Comput. Secur.}, volume = {120}, pages = {102830}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102830}, doi = {10.1016/J.COSE.2022.102830}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MohantyRL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MondejarMS22, author = {Javier Carrillo Mond{\'{e}}jar and Jos{\'{e}} Luis Mart{\'{\i}}nez and Guillermo Suarez{-}Tangil}, title = {On how VoIP attacks foster the malicious call ecosystem}, journal = {Comput. Secur.}, volume = {119}, pages = {102758}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102758}, doi = {10.1016/J.COSE.2022.102758}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MondejarMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MotylinskiMIS22, author = {Michal Motylinski and {\'{A}}ine MacDermott and Farkhund Iqbal and Babar Shah}, title = {A GPU-based machine learning approach for detection of botnet attacks}, journal = {Comput. Secur.}, volume = {123}, pages = {102918}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102918}, doi = {10.1016/J.COSE.2022.102918}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MotylinskiMIS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MuzaffarHLZ22, author = {Ali Muzaffar and Hani Ragab Hassen and Michael A. Lones and Hind Zantout}, title = {An in-depth review of machine learning based Android malware detection}, journal = {Comput. Secur.}, volume = {121}, pages = {102833}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102833}, doi = {10.1016/J.COSE.2022.102833}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MuzaffarHLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NadlerBBS22, author = {Asaf Nadler and Ron Bitton and Oleg Brodt and Asaf Shabtai}, title = {On the vulnerability of anti-malware solutions to {DNS} attacks}, journal = {Comput. Secur.}, volume = {116}, pages = {102687}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102687}, doi = {10.1016/J.COSE.2022.102687}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NadlerBBS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NaikGJNS22, author = {Nitin Naik and Paul Grace and Paul Jenkins and Kshirasagar Naik and Jingping Song}, title = {An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity}, journal = {Comput. Secur.}, volume = {120}, pages = {102808}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102808}, doi = {10.1016/J.COSE.2022.102808}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NaikGJNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NasrTBFA22, author = {Tony Nasr and Sadegh Torabi and Elias Bou{-}Harb and Claude Fachkha and Chadi Assi}, title = {Power jacking your station: In-depth security analysis of electric vehicle charging station management systems}, journal = {Comput. Secur.}, volume = {112}, pages = {102511}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102511}, doi = {10.1016/J.COSE.2021.102511}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NasrTBFA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NawazFNCW22, author = {M. Saqib Nawaz and Philippe Fournier{-}Viger and Muhammad Zohaib Nawaz and Guoting Chen and Youxi Wu}, title = {MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining}, journal = {Comput. Secur.}, volume = {118}, pages = {102741}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102741}, doi = {10.1016/J.COSE.2022.102741}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NawazFNCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NedeljkovicJ22, author = {Dusan Nedeljkovic and Zivana Jakovljevic}, title = {{CNN} based method for the development of cyber-attacks detection algorithms in industrial control systems}, journal = {Comput. Secur.}, volume = {114}, pages = {102585}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102585}, doi = {10.1016/J.COSE.2021.102585}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NedeljkovicJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NiuZZZPH22, author = {Weina Niu and Jie Zhou and Yibin Zhao and Xiaosong Zhang and Yujie Peng and Cheng Huang}, title = {Uncovering {APT} malware traffic using deep learning combined with time sequence and association analysis}, journal = {Comput. Secur.}, volume = {120}, pages = {102809}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102809}, doi = {10.1016/J.COSE.2022.102809}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NiuZZZPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NyangaresiR22, author = {Vincent Omollo Nyangaresi and Anthony Joachim Rodrigues}, title = {Efficient handover protocol for 5G and beyond networks}, journal = {Comput. Secur.}, volume = {113}, pages = {102546}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102546}, doi = {10.1016/J.COSE.2021.102546}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NyangaresiR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OShaughnessyS22, author = {Stephen O'Shaughnessy and Stephen Sheridan}, title = {Image-based malware classification hybrid framework based on space-filling curves}, journal = {Comput. Secur.}, volume = {116}, pages = {102660}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102660}, doi = {10.1016/J.COSE.2022.102660}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OShaughnessyS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ObaidatSPP22, author = {Islam Obaidat and Meera Sridhar and Khue M. Pham and Phu H. Phung}, title = {Jadeite: {A} novel image-behavior-based approach for Java malware detection using deep learning}, journal = {Comput. Secur.}, volume = {113}, pages = {102547}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102547}, doi = {10.1016/J.COSE.2021.102547}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ObaidatSPP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Olukoya22, author = {Oluwafemi Olukoya}, title = {Assessing frameworks for eliciting privacy {\&} security requirements from laws and regulations}, journal = {Comput. Secur.}, volume = {117}, pages = {102697}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102697}, doi = {10.1016/J.COSE.2022.102697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Olukoya22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OmolaraAAAAAA22, author = {Abiodun Esther Omolara and Abdullah Alabdulatif and Oludare Isaac Abiodun and Moatsum Alawida and Abdulatif Alabdulatif and Wafa' Hamdan Alshoura and Humaira Arshad}, title = {The internet of things security: {A} survey encompassing unexplored areas and new insights}, journal = {Comput. Secur.}, volume = {112}, pages = {102494}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102494}, doi = {10.1016/J.COSE.2021.102494}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OmolaraAAAAAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OuX22, author = {Fan Ou and Jian Xu}, title = {S\({}^{\mbox{3}}\)Feature: {A} static sensitive subgraph-based feature for android malware detection}, journal = {Comput. Secur.}, volume = {112}, pages = {102513}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102513}, doi = {10.1016/J.COSE.2021.102513}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OuX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/OzkanEO22, author = {Baris {\"{O}}zkan and Mehmet Erdem and Eren {\"{O}}zceylan}, title = {Evaluation of Asian Countries using Data Center Security Index: {A} Spherical Fuzzy AHP-based {EDAS} Approach}, journal = {Comput. Secur.}, volume = {122}, pages = {102900}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102900}, doi = {10.1016/J.COSE.2022.102900}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/OzkanEO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParastSNYKH22, author = {Fatemeh Khoda Parast and Chandni Sindhav and Seema Nikam and Hadiseh Izadi Yekta and Kenneth B. Kent and Saqib Hakak}, title = {Cloud computing security: {A} survey of service-based models}, journal = {Comput. Secur.}, volume = {114}, pages = {102580}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102580}, doi = {10.1016/J.COSE.2021.102580}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParastSNYKH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ParkSYHCKK22, author = {Kyung Ho Park and Hyun Min Song and Jeong Do Yoo and Su{-}Youn Hong and Byoungmo Cho and Kwangsoo Kim and Huy Kang Kim}, title = {Unsupervised malicious domain detection with less labeling effort}, journal = {Comput. Secur.}, volume = {116}, pages = {102662}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102662}, doi = {10.1016/J.COSE.2022.102662}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ParkSYHCKK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PashamokhtariBG22, author = {Arman Pashamokhtari and Gustavo Batista and Hassan Habibi Gharakheili}, title = {AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks}, journal = {Comput. Secur.}, volume = {120}, pages = {102801}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102801}, doi = {10.1016/J.COSE.2022.102801}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PashamokhtariBG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PatilSPSG22, author = {Rajendra Patil and Vinay Sachidananda and Hongyi Peng and Akshay Sachdeva and Mohan Gurusamy}, title = {{MARK:} Fill in the blanks through a JointGAN based data augmentation for network anomaly detection}, journal = {Comput. Secur.}, volume = {119}, pages = {102759}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102759}, doi = {10.1016/J.COSE.2022.102759}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PatilSPSG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PayaCR22, author = {Antonio Paya and Alba Cotarelo and Jose Manuel Redondo}, title = {Egida: Automated security configuration deployment systems with early error detection}, journal = {Comput. Secur.}, volume = {116}, pages = {102638}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102638}, doi = {10.1016/J.COSE.2022.102638}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PayaCR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PuC22, author = {Cong Pu and Kim{-}Kwang Raymond Choo}, title = {Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function}, journal = {Comput. Secur.}, volume = {113}, pages = {102541}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102541}, doi = {10.1016/J.COSE.2021.102541}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PuC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/PuLBET22, author = {Wenxi Pu and Siyuan Li and Gregory Bott and Marie Esposito and Jason Bennett Thatcher}, title = {To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency}, journal = {Comput. Secur.}, volume = {112}, pages = {102509}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102509}, doi = {10.1016/J.COSE.2021.102509}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/PuLBET22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QayyumJQ22, author = {Adnan Qayyum and Muhammad Umar Janjua and Junaid Qadir}, title = {Making federated learning robust to adversarial attacks by learning data and model association}, journal = {Comput. Secur.}, volume = {121}, pages = {102827}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102827}, doi = {10.1016/J.COSE.2022.102827}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QayyumJQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QianWWGWZS22, author = {Yaguan Qian and Jiamin Wang and Haijiang Wang and Zhaoquan Gu and Bin Wang and Shaoning Zeng and Wassim Swaileh}, title = {Visually imperceptible adversarial patch attacks}, journal = {Comput. Secur.}, volume = {123}, pages = {102943}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102943}, doi = {10.1016/J.COSE.2022.102943}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QianWWGWZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiangYJ22, author = {Weizhong Qiang and Lin Yang and Hai Jin}, title = {Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks}, journal = {Comput. Secur.}, volume = {122}, pages = {102871}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102871}, doi = {10.1016/J.COSE.2022.102871}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiangYJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiaoZTYLA22, author = {Yanchen Qiao and Weizhe Zhang and Zhicheng Tian and Laurence T. Yang and Yang Liu and Mamoun Alazab}, title = {Adversarial malware sample generation method based on the prototype of deep learning detector}, journal = {Comput. Secur.}, volume = {119}, pages = {102762}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102762}, doi = {10.1016/J.COSE.2022.102762}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiaoZTYLA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QinY22, author = {Yi Qin and Chuan Yue}, title = {Fuzzing-based hard-label black-box attacks against machine learning models}, journal = {Comput. Secur.}, volume = {117}, pages = {102694}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102694}, doi = {10.1016/J.COSE.2022.102694}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QinY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QiuMCYC22, author = {Weicheng Qiu and Yinghua Ma and Xiuzhen Chen and Haiyang Yu and Lixing Chen}, title = {Hybrid intrusion detection system based on Dempster-Shafer evidence theory}, journal = {Comput. Secur.}, volume = {117}, pages = {102709}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102709}, doi = {10.1016/J.COSE.2022.102709}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QiuMCYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuXSHQL22, author = {Leilei Qu and Ruojin Xiao and Wenchang Shi and Keman Huang and Bo Qin and Bin Liang}, title = {Your Behaviors Reveal What You Need: {A} Practical Scheme Based on User Behaviors for Personalized Security Nudges}, journal = {Comput. Secur.}, volume = {122}, pages = {102891}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102891}, doi = {10.1016/J.COSE.2022.102891}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QuXSHQL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/QuamaraS22, author = {Sidharth Quamara and Awadhesh Kumar Singh}, title = {A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives}, journal = {Comput. Secur.}, volume = {113}, pages = {102548}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102548}, doi = {10.1016/J.COSE.2021.102548}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/QuamaraS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RTV22, author = {Ramkumar M. P. and P. V. Bhaskar Reddy and J. T. Thirukrishna and Ch. Vidyadhari}, title = {Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture}, journal = {Comput. Secur.}, volume = {116}, pages = {102668}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102668}, doi = {10.1016/J.COSE.2022.102668}, timestamp = {Thu, 30 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RTV22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RashidKHIWGF22, author = {Md. Mamunur Rashid and Joarder Kamruzzaman and Mohammad Mehedi Hassan and Tasadduq Imam and Santoso Wibowo and Steven Gordon and Giancarlo Fortino}, title = {Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications}, journal = {Comput. Secur.}, volume = {120}, pages = {102783}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102783}, doi = {10.1016/J.COSE.2022.102783}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RashidKHIWGF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RassKWEH22, author = {Stefan Rass and Sandra K{\"{o}}nig and Jasmin Wachter and Manuel Egger and Manuel Hobisch}, title = {Supervised Machine Learning with Plausible Deniability}, journal = {Comput. Secur.}, volume = {112}, pages = {102506}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102506}, doi = {10.1016/J.COSE.2021.102506}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RassKWEH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RasslanNA22, author = {Mohamed Rasslan and Mahmoud M. Nasreldin and Heba Kamal Aslan}, title = {Ibn Sina: {A} patient privacy-preserving authentication protocol in medical internet of things}, journal = {Comput. Secur.}, volume = {119}, pages = {102753}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102753}, doi = {10.1016/J.COSE.2022.102753}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RasslanNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RathgebMSTN22, author = {Christian Rathgeb and Johannes Merkle and Johanna Scholz and Benjamin Tams and Vanessa Nesterowicz}, title = {Deep face fuzzy vault: Implementation and performance}, journal = {Comput. Secur.}, volume = {113}, pages = {102539}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102539}, doi = {10.1016/J.COSE.2021.102539}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/RathgebMSTN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Ray-DowlingHSB22, author = {Aratrika Ray{-}Dowling and Daqing Hou and Stephanie Schuckers and Abbie Barbir}, title = {Evaluating multi-modal mobile behavioral biometrics using public datasets}, journal = {Comput. Secur.}, volume = {121}, pages = {102868}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102868}, doi = {10.1016/J.COSE.2022.102868}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Ray-DowlingHSB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RieraHHMM22, author = {Tom{\'{a}}s Sureda Riera and Juan Ram{\'{o}}n Bermejo Higuera and Javier Bermejo Higuera and Jos{\'{e}} Javier Mart{\'{\i}}nez{-}Herr{\'{a}}iz and Juan Antonio Sicilia Montalvo}, title = {A new multi-label dataset for Web attacks {CAPEC} classification using machine learning techniques}, journal = {Comput. Secur.}, volume = {120}, pages = {102788}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102788}, doi = {10.1016/J.COSE.2022.102788}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RieraHHMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Roumani22, author = {Yaman Roumani}, title = {Detection time of data breaches}, journal = {Comput. Secur.}, volume = {112}, pages = {102508}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102508}, doi = {10.1016/J.COSE.2021.102508}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Roumani22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SadiqueS22, author = {Farhan Sadique and Shamik Sengupta}, title = {Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network {(TCN)}}, journal = {Comput. Secur.}, volume = {117}, pages = {102714}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102714}, doi = {10.1016/J.COSE.2022.102714}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SadiqueS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SalviSN22, author = {Andrea Salvi and Paolo Spagnoletti and Nadia Saad Noori}, title = {Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem}, journal = {Comput. Secur.}, volume = {112}, pages = {102507}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102507}, doi = {10.1016/J.COSE.2021.102507}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SalviSN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SaniBYMD22, author = {Abubakar Sadiq Sani and Elisa Bertino and Dong Yuan and Ke Meng and Zhao Yang Dong}, title = {SPrivAD: {A} secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities}, journal = {Comput. Secur.}, volume = {115}, pages = {102610}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102610}, doi = {10.1016/J.COSE.2022.102610}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SaniBYMD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchinaglSK22, author = {Stef Schinagl and Abbas Shahim and Svetlana Khapova}, title = {Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security}, journal = {Comput. Secur.}, volume = {122}, pages = {102903}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102903}, doi = {10.1016/J.COSE.2022.102903}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchinaglSK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShaoZYLL22, author = {Kun Shao and Yu Zhang and Junan Yang and Xiaoshuai Li and Hui Liu}, title = {The triggers that open the {NLP} model backdoors are hidden in the adversarial samples}, journal = {Comput. Secur.}, volume = {118}, pages = {102730}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102730}, doi = {10.1016/J.COSE.2022.102730}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShaoZYLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharevskiAJP22, author = {Filipo Sharevski and Raniem Alsaadi and Peter Jachim and Emma Pieroni}, title = {Misinformation warnings: Twitter's soft moderation effects on {COVID-19} vaccine belief echoes}, journal = {Comput. Secur.}, volume = {114}, pages = {102577}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102577}, doi = {10.1016/J.COSE.2021.102577}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharevskiAJP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaA22, author = {Shwadhin Sharma and Eduardo Aparicio}, title = {Organizational and team culture as antecedents of protection motivation among {IT} employees}, journal = {Comput. Secur.}, volume = {120}, pages = {102774}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102774}, doi = {10.1016/J.COSE.2022.102774}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SharmaGSS22, author = {Amit Sharma and Brij B. Gupta and Awadhesh Kumar Singh and V. K. Saraswat}, title = {Orchestration of {APT} malware evasive manoeuvers employed for eluding anti-virus and sandbox defense}, journal = {Comput. Secur.}, volume = {115}, pages = {102627}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102627}, doi = {10.1016/J.COSE.2022.102627}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SharmaGSS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenCWCW22, author = {Gaoning Shen and Zhixiang Chen and Hui Wang and Heng Chen and Shuqi Wang}, title = {Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM}, journal = {Comput. Secur.}, volume = {119}, pages = {102761}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102761}, doi = {10.1016/J.COSE.2022.102761}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenCWCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenGSDDZZJ22, author = {Yuncheng Shen and Bing Guo and Yan Shen and Xuliang Duan and Xiangqian Dong and Hong Zhang and Chuanwu Zhang and Yuming Jiang}, title = {Personal big data pricing method based on differential privacy}, journal = {Comput. Secur.}, volume = {113}, pages = {102529}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102529}, doi = {10.1016/J.COSE.2021.102529}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenGSDDZZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShillairEDCNS22, author = {Ruth Shillair and Patricia Esteve{-}Gonz{\'{a}}lez and William H. Dutton and Sadie Creese and Eva Nagyfejeo and Basie von Solms}, title = {Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise}, journal = {Comput. Secur.}, volume = {119}, pages = {102756}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102756}, doi = {10.1016/J.COSE.2022.102756}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShillairEDCNS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShinW22, author = {Youjin Shin and Simon S. Woo}, title = {PasswordTensor: Analyzing and explaining password strength using tensor decomposition}, journal = {Comput. Secur.}, volume = {116}, pages = {102634}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102634}, doi = {10.1016/J.COSE.2022.102634}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShinW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShowailTZNA22, author = {Ahmad Showail and Rashid Tahir and Muhammad Fareed Zaffar and Muhammad Haris Noor and Mohammed Alkhatib}, title = {An internet of secure and private things: {A} service-oriented architecture}, journal = {Comput. Secur.}, volume = {120}, pages = {102776}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102776}, doi = {10.1016/J.COSE.2022.102776}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShowailTZNA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SicariRC22, author = {Sabrina Sicari and Alessandra Rizzardi and Alberto Coen{-}Porisini}, title = {Insights into security and privacy towards fog computing evolution}, journal = {Comput. Secur.}, volume = {120}, pages = {102822}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102822}, doi = {10.1016/J.COSE.2022.102822}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SicariRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Silva22, author = {Joseph Da Silva}, title = {Cyber security and the Leviathan}, journal = {Comput. Secur.}, volume = {116}, pages = {102674}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102674}, doi = {10.1016/J.COSE.2022.102674}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Silva22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SinghMM22, author = {Neeraj Kumar Singh and Mahshooq Abdul Majeed and Vasundhara Mahajan}, title = {Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network}, journal = {Comput. Secur.}, volume = {123}, pages = {102941}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102941}, doi = {10.1016/J.COSE.2022.102941}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SinghMM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Skeoch22, author = {Henry R. K. Skeoch}, title = {Expanding the Gordon-Loeb model to cyber-insurance}, journal = {Comput. Secur.}, volume = {112}, pages = {102533}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102533}, doi = {10.1016/J.COSE.2021.102533}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Skeoch22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SongYHLL22, author = {Haina Song and Fangfang Yin and Xinyu Han and Tao Luo and Jianfeng Li}, title = {{MPDS-RCA:} Multi-level privacy-preserving data sharing for resisting collusion attacks based on an integration of {CP-ABE} and {LDP}}, journal = {Comput. Secur.}, volume = {112}, pages = {102523}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102523}, doi = {10.1016/J.COSE.2021.102523}, timestamp = {Sun, 23 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SongYHLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Sonmez22, author = {Ferda {\"{O}}zdemir S{\"{o}}nmez and Chris Hankin and Pasquale Malacaria}, title = {Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and {CVE} Databases}, journal = {Comput. Secur.}, volume = {123}, pages = {102938}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102938}, doi = {10.1016/J.COSE.2022.102938}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Sonmez22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SonmezHM22, author = {Ferda {\"{O}}zdemir S{\"{o}}nmez and Chris Hankin and Pasquale Malacaria}, title = {Decision support for healthcare cyber security}, journal = {Comput. Secur.}, volume = {122}, pages = {102865}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102865}, doi = {10.1016/J.COSE.2022.102865}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SonmezHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunTHTZY22, author = {Xin Sun and Chengliang Tian and Changhui Hu and Weizhong Tian and Hanlin Zhang and Jia Yu}, title = {Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance}, journal = {Comput. Secur.}, volume = {118}, pages = {102740}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102740}, doi = {10.1016/J.COSE.2022.102740}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunTHTZY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunZLLDWJ22, author = {Jie Sun and Lingchen Zhao and Zhuotao Liu and Qi Li and Xinhao Deng and Qian Wang and Yong Jiang}, title = {Practical differentially private online advertising}, journal = {Comput. Secur.}, volume = {112}, pages = {102504}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102504}, doi = {10.1016/J.COSE.2021.102504}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunZLLDWJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SungRM22, author = {Dillon Cheong Lien Sung and M. R. Gauthama Raman and Aditya P. Mathur}, title = {Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants}, journal = {Comput. Secur.}, volume = {113}, pages = {102532}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102532}, doi = {10.1016/J.COSE.2021.102532}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SungRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SyedSTD22, author = {Naeem Firdous Syed and Syed W. Shah and Rolando Trujillo{-}Rasua and Robin Doss}, title = {Traceability in supply chains: {A} Cyber security analysis}, journal = {Comput. Secur.}, volume = {112}, pages = {102536}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102536}, doi = {10.1016/J.COSE.2021.102536}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SyedSTD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TalibNNMAM22, author = {Manar Abu Talib and Qassim Nasir and Ali Bou Nassif and Takua Mokhamed and Nafisa Ahmed and Bayan Mahfood}, title = {{APT} beaconing detection: {A} systematic review}, journal = {Comput. Secur.}, volume = {122}, pages = {102875}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102875}, doi = {10.1016/J.COSE.2022.102875}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TalibNNMAM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TekerekY22, author = {Adem Tekerek and Muhammed Mutlu Yapici}, title = {A novel malware classification and augmentation model based on convolutional neural network}, journal = {Comput. Secur.}, volume = {112}, pages = {102515}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102515}, doi = {10.1016/J.COSE.2021.102515}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TekerekY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ThomasGOF22, author = {Louise Thomas and Iqbal Gondal and Taiwo Oseni and Selena (Sally) Firmin}, title = {A framework for data privacy and security accountability in data breach communications}, journal = {Comput. Secur.}, volume = {116}, pages = {102657}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102657}, doi = {10.1016/J.COSE.2022.102657}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ThomasGOF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianWLK22, author = {Jiwei Tian and Buhong Wang and Jing Li and Charalambos Konstantinou}, title = {Datadriven false data injection attacks against cyber-physical power systems}, journal = {Comput. Secur.}, volume = {121}, pages = {102836}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102836}, doi = {10.1016/J.COSE.2022.102836}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TianWLK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TianZZ22, author = {Huan Tian and Tianqing Zhu and Wanlei Zhou}, title = {Fairness and privacy preservation for facial images: GAN-based methods}, journal = {Comput. Secur.}, volume = {122}, pages = {102902}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102902}, doi = {10.1016/J.COSE.2022.102902}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/TianZZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TondelCJS22, author = {Inger Anne T{\o}ndel and Daniela Soares Cruzes and Martin Gilje Jaatun and Guttorm Sindre}, title = {Influencing the security prioritisation of an agile software development project}, journal = {Comput. Secur.}, volume = {118}, pages = {102744}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102744}, doi = {10.1016/J.COSE.2022.102744}, timestamp = {Mon, 24 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TondelCJS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TranO22, author = {Duong Dinh Tran and Kazuhiro Ogata}, title = {Formal verification of {TLS} 1.2 by automatically generating proof scores}, journal = {Comput. Secur.}, volume = {123}, pages = {102909}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102909}, doi = {10.1016/J.COSE.2022.102909}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TranO22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TuanLT22, author = {Tong Anh Tuan and Hoang Viet Long and David Taniar}, title = {On Detecting and Classifying {DGA} Botnets and their Families}, journal = {Comput. Secur.}, volume = {113}, pages = {102549}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102549}, doi = {10.1016/J.COSE.2021.102549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TuanLT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TundisRM22, author = {Andrea Tundis and Samuel Ruppert and Max M{\"{u}}hlh{\"{a}}user}, title = {A Feature-driven Method for Automating the Assessment of {OSINT} Cyber Threat Sources}, journal = {Comput. Secur.}, volume = {113}, pages = {102576}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102576}, doi = {10.1016/J.COSE.2021.102576}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TundisRM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UgurC22, author = {Naciye G{\"{u}}liz Ugur and K{\"{u}}bra {\c{C}}aliskan}, title = {Time for De-cluttering: Digital clutter scaling for individuals and enterprises}, journal = {Comput. Secur.}, volume = {119}, pages = {102751}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102751}, doi = {10.1016/J.COSE.2022.102751}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UgurC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/UmarWL22, author = {Mubarak Umar and Zhenqiang Wu and Xuening Liao}, title = {Authenticating tier-two body area network devices through user-specific signal propagation characteristics}, journal = {Comput. Secur.}, volume = {120}, pages = {102800}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102800}, doi = {10.1016/J.COSE.2022.102800}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/UmarWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VadilloS22, author = {Jon Vadillo and Roberto Santana}, title = {On the human evaluation of universal audio adversarial perturbations}, journal = {Comput. Secur.}, volume = {112}, pages = {102495}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102495}, doi = {10.1016/J.COSE.2021.102495}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VadilloS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Villalon-Fonseca22, author = {Ricardo Villal{\'{o}}n{-}Fonseca}, title = {The nature of security: {A} conceptual framework for integral-comprehensive modeling of {IT} security and cybersecurity}, journal = {Comput. Secur.}, volume = {120}, pages = {102805}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102805}, doi = {10.1016/J.COSE.2022.102805}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Villalon-Fonseca22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Villalon-Huerta22, author = {Antonio Villal{\'{o}}n{-}Huerta and Hector Marco{-}Gisbert and Ismael Ripoll{-}Ripoll}, title = {A Taxonomy for Threat Actors' Persistence Techniques}, journal = {Comput. Secur.}, volume = {121}, pages = {102855}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102855}, doi = {10.1016/J.COSE.2022.102855}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Villalon-Huerta22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/VorobyevK22, author = {Ivan Vorobyev and Anna Krivitskaya}, title = {Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models}, journal = {Comput. Secur.}, volume = {120}, pages = {102786}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102786}, doi = {10.1016/J.COSE.2022.102786}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/VorobyevK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Vu22, author = {Duy{-}Hien Vu}, title = {Privacy-preserving Naive Bayes classification in semi-fully distributed data model}, journal = {Comput. Secur.}, volume = {115}, pages = {102630}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102630}, doi = {10.1016/J.COSE.2022.102630}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Vu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WalsheS22, author = {Thomas Walshe and Andrew C. Simpson}, title = {Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations}, journal = {Comput. Secur.}, volume = {123}, pages = {102936}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102936}, doi = {10.1016/J.COSE.2022.102936}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WalsheS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangJTWH22, author = {Wei Wang and Songlei Jian and Yusong Tan and Qingbo Wu and Chenlin Huang}, title = {Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions}, journal = {Comput. Secur.}, volume = {112}, pages = {102537}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102537}, doi = {10.1016/J.COSE.2021.102537}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangJTWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLCYW22, author = {Zhi Wang and Chaoge Liu and Xiang Cui and Jie Yin and Xutong Wang}, title = {EvilModel 2.0: Bringing Neural Network Models into Malware Attacks}, journal = {Comput. Secur.}, volume = {120}, pages = {102807}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102807}, doi = {10.1016/J.COSE.2022.102807}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLCYW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangLLS22, author = {Jincheng Wang and Zhuohua Li and John C. S. Lui and Mingshen Sun}, title = {Topology-theoretic approach to address attribute linkage attacks in differential privacy}, journal = {Comput. Secur.}, volume = {113}, pages = {102552}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102552}, doi = {10.1016/J.COSE.2021.102552}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSQLL22, author = {Senmiao Wang and Luli Sun and Su{-}Juan Qin and Wenmin Li and Wentao Liu}, title = {KRTunnel: {DNS} channel detector for mobile devices}, journal = {Comput. Secur.}, volume = {120}, pages = {102818}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102818}, doi = {10.1016/J.COSE.2022.102818}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangSQLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangSWXZTZQ22, author = {Jie Wang and Jiaming Shi and Xin Wen and Liang Xu and Ke Zhao and Fuyang Tao and Wenbiao Zhao and Xiuying Qian}, title = {The effect of signal icon and persuasion strategy on warning design in online fraud}, journal = {Comput. Secur.}, volume = {121}, pages = {102839}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102839}, doi = {10.1016/J.COSE.2022.102839}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangSWXZTZQ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangWHLG22, author = {Bo Wang and Yue Wang and Jiayao Hou and Yi Li and Yanqing Guo}, title = {Open-Set source camera identification based on envelope of data clustering optimization {(EDCO)}}, journal = {Comput. Secur.}, volume = {113}, pages = {102571}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102571}, doi = {10.1016/J.COSE.2021.102571}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangWHLG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangWT22, author = {Zihao Wang and Fok Kar Wai and Vrizlynn L. L. Thing}, title = {Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study}, journal = {Comput. Secur.}, volume = {113}, pages = {102542}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102542}, doi = {10.1016/J.COSE.2021.102542}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangWT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangYJTL22, author = {Jie Wang and Zhaoxia Yin and Jing Jiang and Jin Tang and Bin Luo}, title = {{PISA:} Pixel skipping-based attentional black-box adversarial attack}, journal = {Comput. Secur.}, volume = {123}, pages = {102947}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102947}, doi = {10.1016/J.COSE.2022.102947}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangYJTL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangYWCZMR22, author = {Qiuhua Wang and Hui Yang and Guohua Wu and Kim{-}Kwang Raymond Choo and Zheng Zhang and Gongxun Miao and Yizhi Ren}, title = {Black-box adversarial attacks on {XSS} attack detection model}, journal = {Comput. Secur.}, volume = {113}, pages = {102554}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102554}, doi = {10.1016/J.COSE.2021.102554}, timestamp = {Wed, 10 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/WangYWCZMR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZXRC22, author = {Chenguang Wang and Tianqing Zhu and Ping Xiong and Wei Ren and Kim{-}Kwang Raymond Choo}, title = {A privacy preservation method for multiple-source unstructured data in online social networks}, journal = {Comput. Secur.}, volume = {113}, pages = {102574}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102574}, doi = {10.1016/J.COSE.2021.102574}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZXRC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZXZH22, author = {Chuanwang Wang and Junjie Zhang and Ming Xu and Haodong Zhang and Weili Han}, title = {{\#}Segments: {A} Dominant Factor of Password Security to Resist against Data-driven Guessing}, journal = {Comput. Secur.}, volume = {121}, pages = {102848}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102848}, doi = {10.1016/J.COSE.2022.102848}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZXZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangZZYC22, author = {Zhen Wang and Yitao Zheng and Hai Zhu and Chang Yang and Tianyi Chen}, title = {Transferable adversarial examples can efficiently fool topic models}, journal = {Comput. Secur.}, volume = {118}, pages = {102749}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102749}, doi = {10.1016/J.COSE.2022.102749}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangZZYC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WoodsB22, author = {Daniel W. Woods and Rainer B{\"{o}}hme}, title = {The commodification of consent}, journal = {Comput. Secur.}, volume = {115}, pages = {102605}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102605}, doi = {10.1016/J.COSE.2022.102605}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WoodsB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuTCKS22, author = {Jianyuan Wu and Tianyao Tong and Yifang Chen and Xiangui Kang and Wei Sun}, title = {An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics}, journal = {Comput. Secur.}, volume = {112}, pages = {102497}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102497}, doi = {10.1016/J.COSE.2021.102497}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuTCKS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuWWFYL22, author = {Songyun Wu and Bo Wang and Zhiliang Wang and Shuhan Fan and Jiahai Yang and Jia Li}, title = {Joint prediction on security event and time interval through deep learning}, journal = {Comput. Secur.}, volume = {117}, pages = {102696}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102696}, doi = {10.1016/J.COSE.2022.102696}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuWWFYL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XieLZSX22, author = {Jiang Xie and Shuhao Li and Yongzheng Zhang and Peishuai Sun and Hongbo Xu}, title = {Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute}, journal = {Comput. Secur.}, volume = {121}, pages = {102867}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102867}, doi = {10.1016/J.COSE.2022.102867}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XieLZSX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XueHWSZWL22, author = {Mingfu Xue and Can He and Yinghao Wu and Shichang Sun and Yushu Zhang and Jian Wang and Weiqiang Liu}, title = {{PTB:} Robust physical backdoor attacks against deep neural networks in real world}, journal = {Comput. Secur.}, volume = {118}, pages = {102726}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102726}, doi = {10.1016/J.COSE.2022.102726}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XueHWSZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YadavMRVP22, author = {Pooja Yadav and Neeraj Menon and Vinayakumar Ravi and Sowmya Vishvanathan and Tuan D. Pham}, title = {EfficientNet convolutional neural networks-based Android malware detection}, journal = {Comput. Secur.}, volume = {115}, pages = {102622}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102622}, doi = {10.1016/J.COSE.2022.102622}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YadavMRVP22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YaminK22, author = {Muhammad Mudassar Yamin and Basel Katt}, title = {Modeling and executing cyber security exercise scenarios in cyber ranges}, journal = {Comput. Secur.}, volume = {116}, pages = {102635}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102635}, doi = {10.1016/J.COSE.2022.102635}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YaminK22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YaminK22a, author = {Muhammad Mudassar Yamin and Basel Katt}, title = {Use of cyber attack and defense agents in cyber ranges: {A} case study}, journal = {Comput. Secur.}, volume = {122}, pages = {102892}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102892}, doi = {10.1016/J.COSE.2022.102892}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YaminK22a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YanM22, author = {Xiaobei Yan and Maode Ma}, title = {A privacy-preserving handover authentication protocol for a group of {MTC} devices in 5G networks}, journal = {Comput. Secur.}, volume = {116}, pages = {102601}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102601}, doi = {10.1016/J.COSE.2021.102601}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YanM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangHZWL22, author = {Kunyu Yang and Xuexian Hu and Qihui Zhang and Jianghong Wei and Wenfen Liu}, title = {VAEPass: {A} lightweight passwords guessing model based on variational auto-encoder}, journal = {Comput. Secur.}, volume = {114}, pages = {102587}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102587}, doi = {10.1016/J.COSE.2021.102587}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangHZWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLLWWZH22, author = {Zhen Yang and Xiaodong Liu and Tong Li and Di Wu and Jinjiang Wang and Yunwei Zhao and Han Han}, title = {A systematic literature review of methods and datasets for anomaly-based network intrusion detection}, journal = {Comput. Secur.}, volume = {116}, pages = {102675}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102675}, doi = {10.1016/J.COSE.2022.102675}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLLWWZH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangLSZW22, author = {Jingcheng Yang and Hongwei Li and Shuo Shao and Futai Zou and Yue Wu}, title = {{FS-IDS:} {A} framework for intrusion detection based on few-shot learning}, journal = {Comput. Secur.}, volume = {122}, pages = {102899}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102899}, doi = {10.1016/J.COSE.2022.102899}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangLSZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWKJB22, author = {Wencheng Yang and Song Wang and James Jin Kang and Michael N. Johnstone and Aseel Bedari}, title = {A linear convolution-based cancelable fingerprint biometric authentication system}, journal = {Comput. Secur.}, volume = {114}, pages = {102583}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102583}, doi = {10.1016/J.COSE.2021.102583}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWKJB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangWXXC22, author = {Shaojie Yang and Yongjun Wang and Haoran Xu and Fangliang Xu and Mantun Chen}, title = {An Android Malware Detection and Classification Approach Based on Contrastive Lerning}, journal = {Comput. Secur.}, volume = {123}, pages = {102915}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102915}, doi = {10.1016/J.COSE.2022.102915}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangWXXC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YeohWPC22, author = {William Yeoh and Shan Wang and Ales Popovic and Noman H. Chowdhury}, title = {A systematic synthesis of critical success factors for cybersecurity}, journal = {Comput. Secur.}, volume = {118}, pages = {102724}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102724}, doi = {10.1016/J.COSE.2022.102724}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YeohWPC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuS22, author = {Mengran Yu and Shiliang Sun}, title = {FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks}, journal = {Comput. Secur.}, volume = {113}, pages = {102555}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102555}, doi = {10.1016/J.COSE.2021.102555}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YuWWH22, author = {Lianyi Yu and Qiangjiang Wang and Yan Wo and Guoqiang Han}, title = {Secure biometric hashing against relation-based attacks via maximizing min-entropy}, journal = {Comput. Secur.}, volume = {118}, pages = {102750}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102750}, doi = {10.1016/J.COSE.2022.102750}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YuWWH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YunXLZS22, author = {Xiaochun Yun and Jiang Xie and Shuhao Li and Yongzheng Zhang and Peishuai Sun}, title = {Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features}, journal = {Comput. Secur.}, volume = {121}, pages = {102834}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102834}, doi = {10.1016/J.COSE.2022.102834}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YunXLZS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YustePT22, author = {Javier Yuste and Eduardo G. Pardo and Juan Tapiador}, title = {Optimization of code caves in malware binaries to evade machine learning detectors}, journal = {Comput. Secur.}, volume = {116}, pages = {102643}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102643}, doi = {10.1016/J.COSE.2022.102643}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YustePT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangHLZD22, author = {Zhaoxin Zhang and Shize Huang and Xiaowen Liu and Bingjie Zhang and Decun Dong}, title = {Adversarial attacks on {YOLACT} instance segmentation}, journal = {Comput. Secur.}, volume = {116}, pages = {102682}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102682}, doi = {10.1016/J.COSE.2022.102682}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangHLZD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangJWWLY22, author = {Chunying Zhang and Donghao Jia and Liya Wang and Wenjie Wang and Fengchun Liu and Aimin Yang}, title = {Comparative research on network intrusion detection methods based on machine learning}, journal = {Comput. Secur.}, volume = {121}, pages = {102861}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102861}, doi = {10.1016/J.COSE.2022.102861}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangJWWLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangLH22, author = {Chunkai Zhang and Xiaofeng Luo and Peiyi Han}, title = {On-manifold adversarial attack based on latent space substitute model}, journal = {Comput. Secur.}, volume = {120}, pages = {102770}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102770}, doi = {10.1016/J.COSE.2022.102770}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangM22, author = {Haotian Zhang and Xu Ma}, title = {Misleading attention and classification: An adversarial attack to fool object detection models in the real world}, journal = {Comput. Secur.}, volume = {122}, pages = {102876}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102876}, doi = {10.1016/J.COSE.2022.102876}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhangYHGLWL22, author = {Zongyang Zhang and Jiayuan Yin and Bin Hu and Ting Gao and Weihan Li and Qianhong Wu and Jianwei Liu}, title = {CLTracer: {A} Cross-Ledger Tracing framework based on address relationships}, journal = {Comput. Secur.}, volume = {113}, pages = {102558}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102558}, doi = {10.1016/J.COSE.2021.102558}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhangYHGLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengLZC22, author = {Tengfei Zheng and Yuchuan Luo and Tongqing Zhou and Zhiping Cai}, title = {Towards differential access control and privacy-preserving for secure media data sharing in the cloud}, journal = {Comput. Secur.}, volume = {113}, pages = {102553}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102553}, doi = {10.1016/J.COSE.2021.102553}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhengLZC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengYLYM22, author = {Faan Zheng and Qiao Yan and Victor C. M. Leung and F. Richard Yu and Zhong Ming}, title = {{HDP-CNN:} Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection}, journal = {Comput. Secur.}, volume = {114}, pages = {102584}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102584}, doi = {10.1016/J.COSE.2021.102584}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhengYLYM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhengZLRZW22, author = {Zhangqi Zheng and Bing Zhang and Yongshan Liu and Jiadong Ren and Xuyang Zhao and Qian Wang}, title = {An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm}, journal = {Comput. Secur.}, volume = {114}, pages = {102572}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2021.102572}, doi = {10.1016/J.COSE.2021.102572}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhengZLRZW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhongHZLC22, author = {Fangtian Zhong and Pengfei Hu and Guoming Zhang and Hong Li and Xiuzhen Cheng}, title = {Reinforcement learning based adversarial malware example generation against black-box detectors}, journal = {Comput. Secur.}, volume = {121}, pages = {102869}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102869}, doi = {10.1016/J.COSE.2022.102869}, timestamp = {Tue, 19 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhongHZLC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhouFWL22, author = {Zhipeng Zhou and Qiang Fu and Qianjun Wei and Qiang Li}, title = {{LEGO:} {A} hybrid toolkit for efficient 2PC-based privacy-preserving machine learning}, journal = {Comput. Secur.}, volume = {120}, pages = {102782}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102782}, doi = {10.1016/J.COSE.2022.102782}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhouFWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuCDLLH22, author = {Yiran Zhu and Lei Cui and Zhenquan Ding and Lun Li and Yongji Liu and Zhiyu Hao}, title = {Black box attack and network intrusion detection using machine learning for malicious traffic}, journal = {Comput. Secur.}, volume = {123}, pages = {102922}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102922}, doi = {10.1016/J.COSE.2022.102922}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhuCDLLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuJSWAC22, author = {Jinting Zhu and Julian Jang{-}Jaccard and Amardeep Singh and Ian Welch and Harith Al{-}Sahaf and Seyit Camtepe}, title = {A few-shot meta-learning based siamese neural network using entropy features for ransomware classification}, journal = {Comput. Secur.}, volume = {117}, pages = {102691}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102691}, doi = {10.1016/J.COSE.2022.102691}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhuJSWAC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhuYPT22, author = {Hui Zhu and Fan Yin and Shuangrong Peng and Xiaohu Tang}, title = {Differentially private hierarchical tree with high efficiency}, journal = {Comput. Secur.}, volume = {118}, pages = {102727}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102727}, doi = {10.1016/J.COSE.2022.102727}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZhuYPT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZolaSBGU22, author = {Francesco Zola and Lander Segurola{-}Gil and Jan Lukas Bruse and Mikel Galar and Raul Orduna Urrutia}, title = {Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing}, journal = {Comput. Secur.}, volume = {115}, pages = {102632}, year = {2022}, url = {https://doi.org/10.1016/j.cose.2022.102632}, doi = {10.1016/J.COSE.2022.102632}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZolaSBGU22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/0005U21, author = {N. Saravanan and A. Umamakeswari}, title = {Lattice based access control for protecting user data in cloud environments with hybrid security}, journal = {Comput. Secur.}, volume = {100}, pages = {102074}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102074}, doi = {10.1016/J.COSE.2020.102074}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/0005U21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Adesemowo21, author = {A. Kayode Adesemowo}, title = {Towards a conceptual definition for {IT} assets through interrogating their nature and epistemic uncertainty}, journal = {Comput. Secur.}, volume = {105}, pages = {102131}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102131}, doi = {10.1016/J.COSE.2020.102131}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Adesemowo21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AdjaHSZ21, author = {Yves{-}Christian Adja Elloh and Badis Hammi and Ahmed Serhrouchni and Sherali Zeadally}, title = {A blockchain-based certificate revocation management and status verification system}, journal = {Comput. Secur.}, volume = {104}, pages = {102209}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102209}, doi = {10.1016/J.COSE.2021.102209}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AdjaHSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AhmadMDKWB21, author = {Atif Ahmad and Sean B. Maynard and Kevin C. Desouza and James Kotsias and Monica T. Whitty and Richard L. Baskerville}, title = {How can organizations develop situation awareness for incident response: {A} case study of management practice}, journal = {Comput. Secur.}, volume = {101}, pages = {102122}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102122}, doi = {10.1016/J.COSE.2020.102122}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AhmadMDKWB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AikenKWR21, author = {William Aiken and Hyoungshick Kim and Simon S. Woo and Jungwoo Ryoo}, title = {Neural network laundering: Removing black-box backdoor watermarks from deep neural networks}, journal = {Comput. Secur.}, volume = {106}, pages = {102277}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102277}, doi = {10.1016/J.COSE.2021.102277}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AikenKWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-DuwairiJS21, author = {Basheer Al{-}Duwairi and Moath H. A. Jarrah and Ahmed S. Shatnawi}, title = {{PASSVM:} {A} highly accurate fast flux detection system}, journal = {Comput. Secur.}, volume = {110}, pages = {102431}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102431}, doi = {10.1016/J.COSE.2021.102431}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-DuwairiJS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Al-MalikiA21, author = {Ossama Al{-}Maliki and Hisham Al{-}Assam}, title = {Challenge-response mutual authentication protocol for {EMV} contactless cards}, journal = {Comput. Secur.}, volume = {103}, pages = {102186}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102186}, doi = {10.1016/J.COSE.2021.102186}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Al-MalikiA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlD21, author = {Samed Al and Murat Dener}, title = {{STL-HDL:} {A} new hybrid network intrusion detection system for imbalanced dataset on big data environment}, journal = {Comput. Secur.}, volume = {110}, pages = {102435}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102435}, doi = {10.1016/J.COSE.2021.102435}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlHusainA21, author = {Reem AlHusain and Ali Alkhalifah}, title = {Evaluating fallback authentication research: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {111}, pages = {102487}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102487}, doi = {10.1016/J.COSE.2021.102487}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlHusainA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlavizadehHKJ21, author = {Hooman Alavizadeh and Jin B. Hong and Dong Seong Kim and Julian Jang{-}Jaccard}, title = {Evaluating the effectiveness of shuffle and redundancy {MTD} techniques in the cloud}, journal = {Comput. Secur.}, volume = {102}, pages = {102091}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102091}, doi = {10.1016/J.COSE.2020.102091}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlavizadehHKJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlexR21, author = {Scaria Alex and T. Dhiliphan Rajkumar}, title = {Spider bird swarm algorithm with deep belief network for malicious JavaScript detection}, journal = {Comput. Secur.}, volume = {107}, pages = {102301}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102301}, doi = {10.1016/J.COSE.2021.102301}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlexR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlfosailN21, author = {Malak Alfosail and Peter Norris}, title = {Tor forensics: Proposed workflow for client memory artefacts}, journal = {Comput. Secur.}, volume = {106}, pages = {102311}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102311}, doi = {10.1016/J.COSE.2021.102311}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlfosailN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlhogailA21, author = {Areej Abdullah Alhogail and Afrah Alsabih}, title = {Applying machine learning and natural language processing to detect phishing email}, journal = {Comput. Secur.}, volume = {110}, pages = {102414}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102414}, doi = {10.1016/J.COSE.2021.102414}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlhogailA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AliKT21, author = {Mansoor Ali and Hadis Karimipour and Muhammad Tariq}, title = {Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges}, journal = {Comput. Secur.}, volume = {108}, pages = {102355}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102355}, doi = {10.1016/J.COSE.2021.102355}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AliLDBLA21, author = {Syed Emad Azhar Ali and Fong{-}Woon Lai and P. D. D. Dominic and Nicholas James Brown and Paul Benjamin Lowry and Rao Faizan Ali}, title = {Stock market reactions to favorable and unfavorable information security events: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {110}, pages = {102451}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102451}, doi = {10.1016/J.COSE.2021.102451}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AliLDBLA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlomSAA21, author = {Md. Zulfikar Alom and Bikash Chandra Singh and Zeyar Aung and Mohammad Abdul Azim}, title = {Knapsack graph-based privacy checking for smart environments}, journal = {Comput. Secur.}, volume = {105}, pages = {102240}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102240}, doi = {10.1016/J.COSE.2021.102240}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlomSAA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AloufiHLCC21, author = {Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S. M. Chow and Kim{-}Kwang Raymond Choo}, title = {Universal location referencing and homomorphic evaluation of geospatial query}, journal = {Comput. Secur.}, volume = {102}, pages = {102137}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102137}, doi = {10.1016/J.COSE.2020.102137}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AloufiHLCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AlshaikhMA21, author = {Moneer Alshaikh and Sean B. Maynard and Atif Ahmad}, title = {Applying social marketing to evaluate current security education training and awareness programs in organisations}, journal = {Comput. Secur.}, volume = {100}, pages = {102090}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102090}, doi = {10.1016/J.COSE.2020.102090}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlshaikhMA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AltarawnehSBHYS21, author = {Amani Altarawneh and Fei Sun and Richard R. Brooks and Oluwakemi Hambolu and Lu Yu and Anthony Skjellum}, title = {Availability analysis of a permissioned blockchain with a lightweight consensus protocol}, journal = {Comput. Secur.}, volume = {102}, pages = {102098}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102098}, doi = {10.1016/J.COSE.2020.102098}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AltarawnehSBHYS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AmerZE21, author = {Eslam Amer and Ivan Zelinka and Shaker H. Ali El{-}Sappagh}, title = {A Multi-Perspective malware detection approach through behavioral fusion of {API} call sequence}, journal = {Comput. Secur.}, volume = {110}, pages = {102449}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102449}, doi = {10.1016/J.COSE.2021.102449}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AmerZE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AndradeGVA21, author = {Eduardo Andrade and Jorge Granjal and Jo{\~{a}}o P. Vilela and Carlos Arantes}, title = {A Security Gateway for power distribution systems in open networks}, journal = {Comput. Secur.}, volume = {111}, pages = {102492}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102492}, doi = {10.1016/J.COSE.2021.102492}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AndradeGVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnthiWJB21, author = {Eirini Anthi and Lowri Williams and Amir Javed and Pete Burnap}, title = {Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks}, journal = {Comput. Secur.}, volume = {108}, pages = {102352}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102352}, doi = {10.1016/J.COSE.2021.102352}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnthiWJB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AppiahQAK21, author = {Benjamin Appiah and Zhiguang Qin and Mighty Abra Ayidzoe and Ansuura JohnBosco Aristotle Kanpogninge}, title = {Decision tree pairwise metric learning against adversarial attacks}, journal = {Comput. Secur.}, volume = {106}, pages = {102268}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102268}, doi = {10.1016/J.COSE.2021.102268}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AppiahQAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AriffinA21, author = {Khairul Akram Zainol Ariffin and Faris Hanif Ahmad}, title = {Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0}, journal = {Comput. Secur.}, volume = {105}, pages = {102237}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102237}, doi = {10.1016/J.COSE.2021.102237}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AriffinA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AzeezMMSA21, author = {Nureni Ayofe Azeez and Sanjay Misra and Ihotu Agbo Margaret and Luis Fern{\'{a}}ndez Sanz and Shafii Muhammad Abdulhamid}, title = {Adopting automated whitelist approach for detecting phishing attacks}, journal = {Comput. Secur.}, volume = {108}, pages = {102328}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102328}, doi = {10.1016/J.COSE.2021.102328}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/AzeezMMSA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BarracloughFW21, author = {Phoebe A. Barraclough and Gerhard Fehringer and John Woodward}, title = {Intelligent cyber-phishing detection for online}, journal = {Comput. Secur.}, volume = {104}, pages = {102123}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102123}, doi = {10.1016/J.COSE.2020.102123}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BarracloughFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BaxMH21, author = {Samantha Bax and Tanya Jane McGill and Valerie Hobbs}, title = {Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs}, journal = {Comput. Secur.}, volume = {106}, pages = {102278}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102278}, doi = {10.1016/J.COSE.2021.102278}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BaxMH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeamanBAHK21, author = {Craig Beaman and Ashley Barkworth and Toluwalope David Akande and Saqib Hakak and Muhammad Khurram Khan}, title = {Ransomware: Recent advances, analysis, challenges and future research directions}, journal = {Comput. Secur.}, volume = {111}, pages = {102490}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102490}, doi = {10.1016/J.COSE.2021.102490}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeekLLV21, author = {Maurice H. ter Beek and Axel Legay and Alberto Lluch{-}Lafuente and Andrea Vandin}, title = {Quantitative Security Risk Modeling and Analysis with RisQFLan}, journal = {Comput. Secur.}, volume = {109}, pages = {102381}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102381}, doi = {10.1016/J.COSE.2021.102381}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeekLLV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BinbeshrKPZ21, author = {Farid Binbeshr and Miss Laiha Mat Kiah and Lip Yee Por and Aws Alaa Zaidan}, title = {A systematic review of PIN-entry methods resistant to shoulder-surfing attacks}, journal = {Comput. Secur.}, volume = {101}, pages = {102116}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102116}, doi = {10.1016/J.COSE.2020.102116}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BinbeshrKPZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BoahenBW21, author = {Edward Kwadwo Boahen and Brunel Elvire Bouya{-}Moko and Changda Wang}, title = {Network anomaly detection in a controlled environment based on an enhanced {PSOGSARFC}}, journal = {Comput. Secur.}, volume = {104}, pages = {102225}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102225}, doi = {10.1016/J.COSE.2021.102225}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BoahenBW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BollmannTM21, author = {Chad A. Bollmann and Murali Tummala and John C. McEachen}, title = {Resilient real-time network anomaly detection using novel non-parametric statistical tests}, journal = {Comput. Secur.}, volume = {102}, pages = {102146}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102146}, doi = {10.1016/J.COSE.2020.102146}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BollmannTM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BorzacchielloCD21, author = {Luca Borzacchiello and Emilio Coppa and Camil Demetrescu}, title = {{FUZZOLIC:} Mixing fuzzing and concolic execution}, journal = {Comput. Secur.}, volume = {108}, pages = {102368}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102368}, doi = {10.1016/J.COSE.2021.102368}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BorzacchielloCD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BostanipourT21, author = {Behnaz Bostanipour and George Theodorakopoulos}, title = {Joint obfuscation of location and its semantic information for privacy protection}, journal = {Comput. Secur.}, volume = {107}, pages = {102310}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102310}, doi = {10.1016/J.COSE.2021.102310}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BostanipourT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BotacinCSOG21, author = {Marcus Botacin and Fabricio Ceschin and Ruimin Sun and Daniela Oliveira and Andr{\'{e}} Gr{\'{e}}gio}, title = {Challenges and pitfalls in malware research}, journal = {Comput. Secur.}, volume = {106}, pages = {102287}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102287}, doi = {10.1016/J.COSE.2021.102287}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BotacinCSOG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BozkirTAK21, author = {Ahmet Selman Bozkir and Ersan Tahillioglu and Murat Aydos and Ilker Kara}, title = {Catch them alive: {A} malware detection approach through memory forensics, manifold learning and computer vision}, journal = {Comput. Secur.}, volume = {103}, pages = {102166}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102166}, doi = {10.1016/J.COSE.2020.102166}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BozkirTAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BrandaoRM21, author = {Andr{\'{e}} Brand{\~{a}}o and Jo{\~{a}}o S. Resende and Rolando Martins}, title = {Hardening cryptographic operations through the use of secure enclaves}, journal = {Comput. Secur.}, volume = {108}, pages = {102327}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102327}, doi = {10.1016/J.COSE.2021.102327}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BrandaoRM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BrownWBINSR21, author = {Dane Brown and T. Owens Walker III and Justin A. Blanco and Robert W. Ives and Hau T. Ngo and James Shey and Ryan N. Rakvic}, title = {Detecting firmware modification on solid state drives via current draw analysis}, journal = {Comput. Secur.}, volume = {102}, pages = {102149}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102149}, doi = {10.1016/J.COSE.2020.102149}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BrownWBINSR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BuckOSVE21, author = {Christoph Buck and Christian Olenberger and Andr{\'{e}} Schweizer and Fabiane V{\"{o}}lter and Torsten Eymann}, title = {Never trust, always verify: {A} multivocal literature review on current knowledge and research gaps of zero-trust}, journal = {Comput. Secur.}, volume = {110}, pages = {102436}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102436}, doi = {10.1016/J.COSE.2021.102436}, timestamp = {Wed, 13 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/BuckOSVE21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cabrero-Holgueras21, author = {Jos{\'{e}} Cabrero{-}Holgueras and Sergio Pastrana}, title = {A Methodology For Large-Scale Identification of Related Accounts in Underground Forums}, journal = {Comput. Secur.}, volume = {111}, pages = {102489}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102489}, doi = {10.1016/J.COSE.2021.102489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cabrero-Holgueras21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaiLX21, author = {Lingru Cai and Yao Li and Zhi Xiong}, title = {JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters}, journal = {Comput. Secur.}, volume = {100}, pages = {102086}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102086}, doi = {10.1016/J.COSE.2020.102086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaiLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CalzavaraJKR21, author = {Stefano Calzavara and Hugo Jonker and Benjamin Krumnow and Alvise Rabitti}, title = {Measuring Web Session Security at Scale}, journal = {Comput. Secur.}, volume = {111}, pages = {102472}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102472}, doi = {10.1016/J.COSE.2021.102472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CascavillaTH21, author = {Giuseppe Cascavilla and Damian A. Tamburri and Willem{-}Jan van den Heuvel}, title = {Cybercrime threat intelligence: {A} systematic multi-vocal literature review}, journal = {Comput. Secur.}, volume = {105}, pages = {102258}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102258}, doi = {10.1016/J.COSE.2021.102258}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CascavillaTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CatilloPRV21, author = {Marta Catillo and Antonio Pecchia and Massimiliano Rak and Umberto Villano}, title = {Demystifying the role of public intrusion datasets: {A} replication study of DoS network traffic data}, journal = {Comput. Secur.}, volume = {108}, pages = {102341}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102341}, doi = {10.1016/J.COSE.2021.102341}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CatilloPRV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CaturanoPR21, author = {Francesco Caturano and Gaetano Perrone and Simon Pietro Romano}, title = {Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment}, journal = {Comput. Secur.}, volume = {103}, pages = {102204}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102204}, doi = {10.1016/J.COSE.2021.102204}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CaturanoPR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CayirUD21, author = {Aykut {\c{C}}ayir and Ugur {\"{U}}nal and Hasan Dag}, title = {Random CapsNet forest model for imbalanced malware type classification task}, journal = {Comput. Secur.}, volume = {102}, pages = {102133}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102133}, doi = {10.1016/J.COSE.2020.102133}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CayirUD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenLLLG21, author = {Shaojie Chen and Bo Lang and Hongyu Liu and Duokun Li and Chuan Gao}, title = {{DNS} covert channel detection method using the {LSTM} model}, journal = {Comput. Secur.}, volume = {104}, pages = {102095}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102095}, doi = {10.1016/J.COSE.2020.102095}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenLLLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenQLCL21, author = {Haowen Chen and Qiang Qu and Yexiong Lin and Xia Chen and Keqin Li}, title = {Authenticity verification on social data outsourcing}, journal = {Comput. Secur.}, volume = {100}, pages = {102077}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102077}, doi = {10.1016/J.COSE.2020.102077}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ChenQLCL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenYLJW21, author = {Siqi Chen and Yufei Yuan and Xin (Robert) Luo and Jie Jian and Yan Wang}, title = {Discovering group-based transnational cyber fraud actives: {A} polymethodological view}, journal = {Comput. Secur.}, volume = {104}, pages = {102217}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102217}, doi = {10.1016/J.COSE.2021.102217}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenYLJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZSZX21, author = {Xin Chen and Tao Zhang and Sheng Shen and Tianqing Zhu and Ping Xiong}, title = {An optimized differential privacy scheme with reinforcement learning in {VANET}}, journal = {Comput. Secur.}, volume = {110}, pages = {102446}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102446}, doi = {10.1016/J.COSE.2021.102446}, timestamp = {Wed, 06 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZSZX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZXCDHJ21, author = {Jinyin Chen and Haibin Zheng and Hui Xiong and Ruoxi Chen and Tianyu Du and Zhen Hong and Shouling Ji}, title = {FineFool: {A} novel {DNN} object contour attack on image recognition based on the attention perturbation adversarial technique}, journal = {Comput. Secur.}, volume = {104}, pages = {102220}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102220}, doi = {10.1016/J.COSE.2021.102220}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZXCDHJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChenZZLF21, author = {E. Chen and Yan Zhu and Guizhen Zhu and Kaitai Liang and Rongquan Feng}, title = {How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors}, journal = {Comput. Secur.}, volume = {107}, pages = {102318}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102318}, doi = {10.1016/J.COSE.2021.102318}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChenZZLF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChewCLCT21, author = {Chit{-}Jie Chew and Ying{-}Chin Chen and Jung{-}San Lee and Chih{-}Lung Chen and Kuo{-}Yu Tsai}, title = {Preserving indomitable DDoS vitality through resurrection social hybrid botnet}, journal = {Comput. Secur.}, volume = {106}, pages = {102284}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102284}, doi = {10.1016/J.COSE.2021.102284}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChewCLCT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChoJSJCK21, author = {Mingi Cho and Jaedong Jang and Yezee Seo and Seyeon Jeong and Soochang Chung and Taekyoung Kwon}, title = {Towards bidirectional LUT-level detection of hardware Trojans}, journal = {Comput. Secur.}, volume = {104}, pages = {102223}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102223}, doi = {10.1016/J.COSE.2021.102223}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChoJSJCK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChooGCY21, author = {Kim{-}Kwang Raymond Choo and Keke Gai and Luca Chiaraviglio and Qing Yang}, title = {A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management}, journal = {Comput. Secur.}, volume = {102}, pages = {102136}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102136}, doi = {10.1016/J.COSE.2020.102136}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChooGCY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChuaOH21, author = {Hui Na Chua and Jie Sheng Ooi and Anthony Jo{\'{e}}l Michel Herbland}, title = {The effects of different personal data categories on information privacy concern and disclosure}, journal = {Comput. Secur.}, volume = {110}, pages = {102453}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102453}, doi = {10.1016/J.COSE.2021.102453}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChuaOH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CohenNTB21, author = {Doron Cohen and Or Naim and Eran Toch and Irad Ben{-}Gal}, title = {Website categorization via design attribute learning}, journal = {Comput. Secur.}, volume = {107}, pages = {102312}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102312}, doi = {10.1016/J.COSE.2021.102312}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CohenNTB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CotroneoSN21, author = {Domenico Cotroneo and Luigi De Simone and Roberto Natella}, title = {Timing covert channel analysis of the VxWorks {MILS} embedded hypervisor under the common criteria security certification}, journal = {Comput. Secur.}, volume = {106}, pages = {102307}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102307}, doi = {10.1016/J.COSE.2021.102307}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CotroneoSN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DabbaghCBTS21, author = {Mohammad Dabbagh and Kim{-}Kwang Raymond Choo and Amin Beheshti and Mohammad Tahir and Nader Sohrabi Safa}, title = {A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities}, journal = {Comput. Secur.}, volume = {100}, pages = {102078}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102078}, doi = {10.1016/J.COSE.2020.102078}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DabbaghCBTS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DaiLQGYZ21, author = {Yusheng Dai and Hui Li and Yekui Qian and Yunling Guo and Ruipeng Yang and Min Zheng}, title = {Using {IRP} and local alignment method to detect distributed malware}, journal = {Comput. Secur.}, volume = {100}, pages = {102109}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102109}, doi = {10.1016/J.COSE.2020.102109}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DaiLQGYZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DaviesMB21, author = {Simon R. Davies and Richard Macfarlane and William J. Buchanan}, title = {Differential area analysis for ransomware attack detection within mixed file datasets}, journal = {Comput. Secur.}, volume = {108}, pages = {102377}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102377}, doi = {10.1016/J.COSE.2021.102377}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DaviesMB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DemighaL21, author = {Oualid Demigha and Ramzi Larguet}, title = {Hardware-based solutions for trusted cloud computing}, journal = {Comput. Secur.}, volume = {103}, pages = {102117}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102117}, doi = {10.1016/J.COSE.2020.102117}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DemighaL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DerbyshireGH21, author = {Richard Derbyshire and Benjamin Green and David Hutchison}, title = {"Talking a different Language": Anticipating adversary attack cost for cyber risk assessment}, journal = {Comput. Secur.}, volume = {103}, pages = {102163}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102163}, doi = {10.1016/J.COSE.2020.102163}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DerbyshireGH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DileeshS21, author = {E. D. Dileesh and A. P. Shanthi}, title = {An application specific dynamic behaviour model using function-call sequence and memory access-graph for execution integrity verification}, journal = {Comput. Secur.}, volume = {107}, pages = {102299}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102299}, doi = {10.1016/J.COSE.2021.102299}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DileeshS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuanZZQZP21, author = {Yexin Duan and Xingyu Zhou and Junhua Zou and Junyang Qiu and Jin Zhang and Zhisong Pan}, title = {Mask-guided noise restriction adversarial attacks for image classification}, journal = {Comput. Secur.}, volume = {100}, pages = {102111}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102111}, doi = {10.1016/J.COSE.2020.102111}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuanZZQZP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DuyTKHNP21, author = {Phan The Duy and Le Khac Tien and Nghi Hoang Khoa and Do Thi Thu Hien and Anh Gia{-}Tuan Nguyen and Van{-}Hau Pham}, title = {DIGFuPAS: Deceive {IDS} with {GAN} and function-preserving on adversarial samples in SDN-enabled networks}, journal = {Comput. Secur.}, volume = {109}, pages = {102367}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102367}, doi = {10.1016/J.COSE.2021.102367}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/DuyTKHNP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/El-ZawawyLC21, author = {Mohamed A. El{-}Zawawy and Eleonora Losiouk and Mauro Conti}, title = {Vulnerabilities in Android webview objects: Still not the end!}, journal = {Comput. Secur.}, volume = {109}, pages = {102395}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102395}, doi = {10.1016/J.COSE.2021.102395}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/El-ZawawyLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FangGHMFY21, author = {Chen Fang and Yuanbo Guo and Yongjin Hu and Bowen Ma and Li Feng and Anqi Yin}, title = {Privacy-preserving and communication-efficient federated learning in Internet of Things}, journal = {Comput. Secur.}, volume = {103}, pages = {102199}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102199}, doi = {10.1016/J.COSE.2021.102199}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FangGHMFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FarshadkhahSF21, author = {Sahar Farshadkhah and Craig Van Slyke and Bryan Fuller}, title = {Onlooker effect and affective responses in information security violation mitigation}, journal = {Comput. Secur.}, volume = {100}, pages = {102082}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102082}, doi = {10.1016/J.COSE.2020.102082}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FarshadkhahSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FerrettiMAC21, author = {Luca Ferretti and Federico Magnanini and Mauro Andreolini and Michele Colajanni}, title = {Survivable zero trust for cloud computing environments}, journal = {Comput. Secur.}, volume = {110}, pages = {102419}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102419}, doi = {10.1016/J.COSE.2021.102419}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FerrettiMAC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FilizACH21, author = {Burak Filiz and Budi Arief and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {On the Effectiveness of Ransomware Decryption Tools}, journal = {Comput. Secur.}, volume = {111}, pages = {102469}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102469}, doi = {10.1016/J.COSE.2021.102469}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FilizACH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FleurHGB21, author = {Claire La Fleur and Blaine Hoffman and C. Benjamin Gibson and Norbou Buchler}, title = {Team performance in a series of regional and national {US} cybersecurity defense competitions: Generalizable effects of training and functional role specialization}, journal = {Comput. Secur.}, volume = {104}, pages = {102229}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102229}, doi = {10.1016/J.COSE.2021.102229}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FleurHGB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FormosaWR21, author = {Paul Formosa and Michael Wilson and Deborah Richards}, title = {A principlist framework for cybersecurity ethics}, journal = {Comput. Secur.}, volume = {109}, pages = {102382}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102382}, doi = {10.1016/J.COSE.2021.102382}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FormosaWR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FrenklachCSP21, author = {Tatiana Frenklach and Dvir Cohen and Asaf Shabtai and Rami Puzis}, title = {Android malware detection via an app similarity graph}, journal = {Comput. Secur.}, volume = {109}, pages = {102386}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102386}, doi = {10.1016/J.COSE.2021.102386}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FrenklachCSP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FriedL21, author = {Asaf Fried and Mark Last}, title = {Facing airborne attacks on {ADS-B} data with autoencoders}, journal = {Comput. Secur.}, volume = {109}, pages = {102405}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102405}, doi = {10.1016/J.COSE.2021.102405}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FriedL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Furnell21, author = {Steven Furnell}, title = {The cybersecurity workforce and skills}, journal = {Comput. Secur.}, volume = {100}, pages = {102080}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102080}, doi = {10.1016/J.COSE.2020.102080}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Furnell21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GalloMBV21, author = {Luigi Gallo and Alessandro Maiello and Alessio Botta and Giorgio Ventre}, title = {2 Years in the anti-phishing group of a large company}, journal = {Comput. Secur.}, volume = {105}, pages = {102259}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102259}, doi = {10.1016/J.COSE.2021.102259}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GalloMBV21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GaoCZ21, author = {Han Gao and Shaoyin Cheng and Weiming Zhang}, title = {GDroid: Android malware detection and classification with graph convolutional network}, journal = {Comput. Secur.}, volume = {106}, pages = {102264}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102264}, doi = {10.1016/J.COSE.2021.102264}, timestamp = {Thu, 07 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GaoCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GarciaD21, author = {David Escudero Garc{\'{\i}}a and Noem{\'{\i}} DeCastro{-}Garc{\'{\i}}a}, title = {Optimal feature configuration for dynamic malware detection}, journal = {Comput. Secur.}, volume = {105}, pages = {102250}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102250}, doi = {10.1016/J.COSE.2021.102250}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GarciaD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GargB21, author = {Shivi Garg and Niyati Baliyan}, title = {Android security assessment: {A} review, taxonomy and research gap study}, journal = {Comput. Secur.}, volume = {100}, pages = {102087}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102087}, doi = {10.1016/J.COSE.2020.102087}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/GargB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GibertMPM21, author = {Daniel Gibert and Carles Mateu and Jordi Planes and Jo{\~{a}}o Marques{-}Silva}, title = {Auditing static machine learning anti-Malware tools against metamorphic attacks}, journal = {Comput. Secur.}, volume = {102}, pages = {102159}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102159}, doi = {10.1016/J.COSE.2020.102159}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GibertMPM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GreenDKKPS21, author = {Benjamin Green and Richard Derbyshire and Marina Krotofil and William Knowles and Daniel Prince and Neeraj Suri}, title = {PCaaD: Towards automated determination and exploitation of industrial systems}, journal = {Comput. Secur.}, volume = {110}, pages = {102424}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102424}, doi = {10.1016/J.COSE.2021.102424}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GreenDKKPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Griswold-Steiner21, author = {Isaac Griswold{-}Steiner and Zachary LeFevre and Abdul Serwadda}, title = {Smartphone speech privacy concerns from side-channel attacks on facial biomechanics}, journal = {Comput. Secur.}, volume = {100}, pages = {102110}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102110}, doi = {10.1016/J.COSE.2020.102110}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Griswold-Steiner21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuL21, author = {Jie Gu and Shan Lu}, title = {An effective intrusion detection approach using {SVM} with na{\"{\i}}ve Bayes feature embedding}, journal = {Comput. Secur.}, volume = {103}, pages = {102158}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102158}, doi = {10.1016/J.COSE.2020.102158}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GudemePK21, author = {Jaya Rao Gudeme and Syam Kumar Pasupuleti and Ramesh Kandukuri}, title = {Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage}, journal = {Comput. Secur.}, volume = {103}, pages = {102176}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102176}, doi = {10.1016/J.COSE.2020.102176}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GudemePK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Guerra-Manzanares21, author = {Alejandro Guerra{-}Manzanares and Hayretdin Bahsi and Sven N{\~{o}}mm}, title = {KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization}, journal = {Comput. Secur.}, volume = {110}, pages = {102399}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102399}, doi = {10.1016/J.COSE.2021.102399}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Guerra-Manzanares21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GunesKB21, author = {Bunyamin Gunes and Gizem Kayisoglu and Pelin Bolat}, title = {Cyber security risk assessment for seaports: {A} case study of a container port}, journal = {Comput. Secur.}, volume = {103}, pages = {102196}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102196}, doi = {10.1016/J.COSE.2021.102196}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GunesKB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoG21, author = {Yimin Guo and Yajun Guo}, title = {FogHA: An efficient handover authentication for mobile devices in fog computing}, journal = {Comput. Secur.}, volume = {108}, pages = {102358}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102358}, doi = {10.1016/J.COSE.2021.102358}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoLTH21, author = {Yongyan Guo and Jiayong Liu and Wenwu Tang and Cheng Huang}, title = {Exsense: Extract sensitive information from unstructured data}, journal = {Comput. Secur.}, volume = {102}, pages = {102156}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102156}, doi = {10.1016/J.COSE.2020.102156}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoLTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuoZG21, author = {Yimin Guo and Zhenfeng Zhang and Yajun Guo}, title = {Superword: {A} honeyword system for achieving higher security goals}, journal = {Comput. Secur.}, volume = {103}, pages = {101689}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2019.101689}, doi = {10.1016/J.COSE.2019.101689}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuoZG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HajarAK21, author = {Muhammad Shadi Hajar and M. Omar Al{-}Kadri and Harsha Kumara Kalutarage}, title = {A survey on wireless body area networks: architecture, security challenges and research opportunities}, journal = {Comput. Secur.}, volume = {104}, pages = {102211}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102211}, doi = {10.1016/J.COSE.2021.102211}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HajarAK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HalimYWSAHAH21, author = {Zahid Halim and Muhammad Nadeem Yousaf and Muhammad Waqas and Muhammad Sulaiman and Ghulam Abbas and Masroor Hussain and Iftekhar Ahmad and Muhammad Hanif}, title = {An effective genetic algorithm-based feature selection method for intrusion detection systems}, journal = {Comput. Secur.}, volume = {110}, pages = {102448}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102448}, doi = {10.1016/J.COSE.2021.102448}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HalimYWSAHAH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HanX21, author = {Chunling Han and Rui Xue}, title = {Differentially private GANs by adding noise to Discriminator's loss}, journal = {Comput. Secur.}, volume = {107}, pages = {102322}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102322}, doi = {10.1016/J.COSE.2021.102322}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HanX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HannousseY21, author = {Abdelhakim Hannousse and Salima Yahiouche}, title = {Handling webshell attacks: {A} systematic mapping and survey}, journal = {Comput. Secur.}, volume = {108}, pages = {102366}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102366}, doi = {10.1016/J.COSE.2021.102366}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HannousseY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HariyantiDS21, author = {Eva Hariyanti and Arif Djunaidy and Daniel Siahaan}, title = {Information security vulnerability prediction based on business process model using machine learning approach}, journal = {Comput. Secur.}, volume = {110}, pages = {102422}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102422}, doi = {10.1016/J.COSE.2021.102422}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HariyantiDS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarshaMBSD21, author = {Benjamin Harsha and Robert Morton and Jeremiah Blocki and John A. Springer and Melissa Dark}, title = {Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage}, journal = {Comput. Secur.}, volume = {100}, pages = {102068}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102068}, doi = {10.1016/J.COSE.2020.102068}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/HarshaMBSD21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HarushMS21, author = {Shimon Harush and Yair Meidan and Asaf Shabtai}, title = {DeepStream: Autoencoder-based stream temporal clustering and anomaly detection}, journal = {Comput. Secur.}, volume = {106}, pages = {102276}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102276}, doi = {10.1016/J.COSE.2021.102276}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HarushMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeLLLLW21, author = {Junjiang He and Tao Li and Beibei Li and Xiaolong Lan and Zhiyong Li and Yunpeng Wang}, title = {An immune-based risk assessment method for digital virtual assets}, journal = {Comput. Secur.}, volume = {102}, pages = {102134}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2020.102134}, doi = {10.1016/J.COSE.2020.102134}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeLLLLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeZM21, author = {Ting He and Yong Zheng and Zherui Ma}, title = {Study of network time synchronisation security strategy based on polar coding}, journal = {Comput. Secur.}, volume = {104}, pages = {102214}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102214}, doi = {10.1016/J.COSE.2021.102214}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeZM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.