Stop the war!
Остановите войну!
for scientists:
default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec78.bht:"
@article{DBLP:journals/compsec/AlvesM18, author = {Thiago Alves and Thomas H. Morris}, title = {OpenPLC: An {IEC} 61, 131-3 compliant open source industrial controller for cyber security research}, journal = {Comput. Secur.}, volume = {78}, pages = {364--379}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.007}, doi = {10.1016/J.COSE.2018.07.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlvesM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AnthiARTB18, author = {Eirini Anthi and Shazaib Ahmad and Omer F. Rana and George Theodorakopoulos and Pete Burnap}, title = {EclipseIoT: {A} secure and adaptive hub for the Internet of Things}, journal = {Comput. Secur.}, volume = {78}, pages = {477--490}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.016}, doi = {10.1016/J.COSE.2018.07.016}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AnthiARTB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeuranTPCTS18, author = {Razvan Beuran and Dat Tang and Cuong Pham and Ken{-}ichi Chinen and Yasuo Tan and Yoichi Shinoda}, title = {Integrated framework for hands-on cybersecurity training: CyTrONE}, journal = {Comput. Secur.}, volume = {78}, pages = {43--59}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.001}, doi = {10.1016/J.COSE.2018.06.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeuranTPCTS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BottarelliEIKA18, author = {Mirko Bottarelli and Gregory Epiphaniou and Dhouha Kbaier Ben Ismail and Petros Karadimas and Haider M. Al{-}Khateeb}, title = {Physical characteristics of wireless communication channels for secret key establishment: {A} survey of the research}, journal = {Comput. Secur.}, volume = {78}, pages = {454--476}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.08.001}, doi = {10.1016/J.COSE.2018.08.001}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BottarelliEIKA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CarrascoS18, author = {Rafael San{-}Miguel Carrasco and Miguel{-}{\'{A}}ngel Sicilia}, title = {Unsupervised intrusion detection through skip-gram models of network behavior}, journal = {Comput. Secur.}, volume = {78}, pages = {187--197}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.003}, doi = {10.1016/J.COSE.2018.07.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CarrascoS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ChongGLP18, author = {Isis Chong and Huangyi Ge and Ninghui Li and Robert W. Proctor}, title = {Influence of privacy priming and security framing on mobile app selection}, journal = {Comput. Secur.}, volume = {78}, pages = {143--154}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.005}, doi = {10.1016/J.COSE.2018.06.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ChongGLP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/DalmazoVC18, author = {Bruno Lopes Dalmazo and Jo{\~{a}}o P. Vilela and Mar{\'{\i}}lia Curado}, title = {Triple-Similarity Mechanism for alarm management in the cloud}, journal = {Comput. Secur.}, volume = {78}, pages = {33--42}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.016}, doi = {10.1016/J.COSE.2018.05.016}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/DalmazoVC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GeethaJJ18, author = {P. Geetha and V. S. Jayanthi and A. N. Jayanthi}, title = {Optimal visual cryptographic scheme with multiple share creation for multimedia applications}, journal = {Comput. Secur.}, volume = {78}, pages = {301--320}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.009}, doi = {10.1016/J.COSE.2018.07.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GeethaJJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/GuerarMMP18, author = {Meriem Guerar and Alessio Merlo and Mauro Migliardi and Francesco Palmieri}, title = {Invisible {CAPPCHA:} {A} usable mechanism to distinguish between malware and humans on the mobile IoT}, journal = {Comput. Secur.}, volume = {78}, pages = {255--266}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.007}, doi = {10.1016/J.COSE.2018.06.007}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/GuerarMMP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HablerS18, author = {Edan Habler and Asaf Shabtai}, title = {Using {LSTM} encoder-decoder algorithm for detecting anomalous {ADS-B} messages}, journal = {Comput. Secur.}, volume = {78}, pages = {155--173}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.004}, doi = {10.1016/J.COSE.2018.07.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HablerS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HammiHBS18, author = {Mohamed Tahar Hammi and Badis Hammi and Patrick Bellot and Ahmed Serhrouchni}, title = {Bubbles of Trust: {A} decentralized blockchain-based authentication system for IoT}, journal = {Comput. Secur.}, volume = {78}, pages = {126--142}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.004}, doi = {10.1016/J.COSE.2018.06.004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HammiHBS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HaqCCJ18, author = {Irfan Ul Haq and Sergio Chica and Juan Caballero and Somesh Jha}, title = {Malware lineage in the wild}, journal = {Comput. Secur.}, volume = {78}, pages = {347--363}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.012}, doi = {10.1016/J.COSE.2018.07.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HaqCCJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HeartfieldLBBFF18, author = {Ryan Heartfield and George Loukas and Sanja Budimir and Anatolij Bezemskij and Johnny R. J. Fontaine and Avgoustinos Filippoupolitis and Etienne B. Roesch}, title = {A taxonomy of cyber-physical threats and impact in the smart home}, journal = {Comput. Secur.}, volume = {78}, pages = {398--428}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.011}, doi = {10.1016/J.COSE.2018.07.011}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HeartfieldLBBFF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuZMH18, author = {Qiao Hu and Jingyi Zhang and Aikaterini Mitrokotsa and Gerhard P. Hancke}, title = {Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context}, journal = {Comput. Secur.}, volume = {78}, pages = {281--300}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.009}, doi = {10.1016/J.COSE.2018.06.009}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuZMH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/JinLPJ18, author = {Lei Jin and Chao Li and Balaji Palanisamy and James Joshi}, title = {\emph{k-Trustee}: Location injection attack-resilient anonymization for location privacy}, journal = {Comput. Secur.}, volume = {78}, pages = {212--230}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.002}, doi = {10.1016/J.COSE.2018.07.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/JinLPJ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KwonKPYC18, author = {Hyun Kwon and Yongchul Kim and Ki{-}Woong Park and Hyunsoo Yoon and Daeseon Choi}, title = {Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier}, journal = {Comput. Secur.}, volume = {78}, pages = {380--397}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.015}, doi = {10.1016/J.COSE.2018.07.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KwonKPYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Moreno-SanchezM18, author = {Pedro Moreno{-}Sanchez and Uzair Mahmood and Aniket Kate}, title = {ClearChart: Ensuring integrity of consumer ratings in online marketplaces}, journal = {Comput. Secur.}, volume = {78}, pages = {90--102}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.04.014}, doi = {10.1016/J.COSE.2018.04.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Moreno-SanchezM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MyersSRF18, author = {David Myers and Suriadi Suriadi and Kenneth Radke and Ernest Foo}, title = {Anomaly detection for industrial control systems using process mining}, journal = {Comput. Secur.}, volume = {78}, pages = {103--125}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.002}, doi = {10.1016/J.COSE.2018.06.002}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MyersSRF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NavarroNGRD18, author = {Luiz C. Navarro and Alexandre K. W. Navarro and Andr{\'{e}} Gr{\'{e}}gio and Anderson Rocha and Ricardo Dahab}, title = {Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems}, journal = {Comput. Secur.}, volume = {78}, pages = {429--453}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.013}, doi = {10.1016/J.COSE.2018.07.013}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NavarroNGRD18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Nguyen18, author = {Huu Hiep Nguyen}, title = {Privacy-preserving mechanisms for k-modes clustering}, journal = {Comput. Secur.}, volume = {78}, pages = {60--75}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.003}, doi = {10.1016/J.COSE.2018.06.003}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Nguyen18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NguyenM18, author = {Toan Nguyen and Nasir D. Memon}, title = {Tap-based user authentication for smartwatches}, journal = {Comput. Secur.}, volume = {78}, pages = {174--186}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.001}, doi = {10.1016/J.COSE.2018.07.001}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/NguyenM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/NyangKLKCLM18, author = {DaeHun Nyang and Hyoungshick Kim and Woojoo Lee and Sung{-}bae Kang and Geumhwan Cho and Mun{-}Kyu Lee and Aziz Mohaisen}, title = {Two-Thumbs-Up: Physical protection for {PIN} entry secure against recording attacks}, journal = {Comput. Secur.}, volume = {78}, pages = {1--15}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.012}, doi = {10.1016/J.COSE.2018.05.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/NyangKLKCLM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/RenaudFWCO18, author = {Karen Renaud and Stephen Flowerday and Merrill Warkentin and Paul Cockshott and Craig P. Orgeron}, title = {Is the responsibilization of the cyber security risk reasonable and judicious?}, journal = {Comput. Secur.}, volume = {78}, pages = {198--211}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.006}, doi = {10.1016/J.COSE.2018.06.006}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/RenaudFWCO18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShamsRU18, author = {Erfan A. Shams and Ahmet Rizaner and Ali Hakan Ulusoy}, title = {Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks}, journal = {Comput. Secur.}, volume = {78}, pages = {245--254}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.06.008}, doi = {10.1016/J.COSE.2018.06.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShamsRU18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShenMCQBK18, author = {Lixiang Shen and Dejun Mu and Guo Cao and Maoyuan Qin and Jeremy Blackstone and Ryan Kastner}, title = {Symbolic execution based test-patterns generation algorithm for hardware Trojan detection}, journal = {Comput. Secur.}, volume = {78}, pages = {267--280}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.006}, doi = {10.1016/J.COSE.2018.07.006}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShenMCQBK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/TripathyDJB18, author = {Bata Krishna Tripathy and Debi Prasad Das and Swagat Kumar Jena and Padmalochan Bera}, title = {Risk based Security Enforcement in Software Defined Network}, journal = {Comput. Secur.}, volume = {78}, pages = {321--335}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.010}, doi = {10.1016/J.COSE.2018.07.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/TripathyDJB18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ViegasSOFJP18, author = {Eduardo Viegas and Altair Olivo Santin and Luiz Oliveira and Andr{\'{e}} Fran{\c{c}}a and Ricardo P. Jasinski and Volnei A. Pedroni}, title = {A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems}, journal = {Comput. Secur.}, volume = {78}, pages = {16--32}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.014}, doi = {10.1016/J.COSE.2018.05.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ViegasSOFJP18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WaltEG18, author = {Est{\'{e}}e van der Walt and Jan H. P. Eloff and Jacomine Grobler}, title = {Cyber-security: Identity deception detection on social media platforms}, journal = {Comput. Secur.}, volume = {78}, pages = {76--89}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.05.015}, doi = {10.1016/J.COSE.2018.05.015}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WaltEG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuCDY18, author = {Zezhi Wu and Xingyuan Chen and Xuehui Du and Zhi Yang}, title = {CDroid: practically implementation a formal-analyzed {CIFC} model on Android}, journal = {Comput. Secur.}, volume = {78}, pages = {231--244}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.005}, doi = {10.1016/J.COSE.2018.07.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuCDY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YaoCH18, author = {Mei{-}Ling Yao and Ming{-}Chuen Chuang and Chun{-}Cheng Hsu}, title = {The Kano model analysis of features for mobile security applications}, journal = {Comput. Secur.}, volume = {78}, pages = {336--346}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2018.07.008}, doi = {10.1016/J.COSE.2018.07.008}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YaoCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.