![](https://dblp.uni-trier.de./img/logo.ua.320x120.png)
![](https://dblp.uni-trier.de./img/dropdown.dark.16x16.png)
![](https://dblp.uni-trier.de./img/peace.dark.16x16.png)
Остановите войну!
for scientists:
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 106
Volume 106, July 2021
- Han Gao, Shaoyin Cheng
, Weiming Zhang:
GDroid: Android malware detection and classification with graph convolutional network. 102264 - Yudhistira Nugraha, Andrew Martin
:
Towards a framework for trustworthy data security level agreement in cloud procurement. 102266 - Khando Khando
, Shang Gao
, Sirajul M. Islam
, Ali Salman:
Enhancing employees information security awareness in private and public organisations: A systematic literature review. 102267 - Benjamin Appiah
, Zhiguang Qin, Mighty Abra Ayidzoe
, Ansuura JohnBosco Aristotle Kanpogninge:
Decision tree pairwise metric learning against adversarial attacks. 102268 - Chenxi Li, Jia Li, Jiahai Yang, Jinlei Lin:
A novel workload scheduling framework for intrusion detection system in NFV scenario. 102271 - Pan Jun Sun:
A tripartite game model of trust cooperation in cloud service. 102272 - Peng Wang, Zhijie Tang, Junfeng Wang:
A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling. 102273 - Ashraf Neisari, Luis Rueda
, Sherif Saad:
Spam review detection using self-organizing maps and convolutional neural networks. 102274 - Yilin Kang, Yong Liu, Ben Niu, Weiping Wang:
Weighted distributed differential privacy ERM: Convex and non-convex. 102275 - Shimon Harush, Yair Meidan, Asaf Shabtai
:
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection. 102276 - William Aiken, Hyoungshick Kim
, Simon S. Woo, Jungwoo Ryoo
:
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks. 102277 - Samantha Bax, Tanya Jane McGill, Valerie Hobbs:
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs. 102278 - Zhen Xiang
, David J. Miller, George Kesidis:
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing. 102280 - Andrew Reeves
, Dragana Calic, Paul H. Delfabbro:
"Get a red-hot poker and open up my eyes, it's so boring"1: Employee perceptions of cybersecurity training. 102281 - Zhenyuan Li, Qi Alfred Chen, Runqing Yang, Yan Chen, Wei Ruan:
Threat detection and investigation with system-level provenance graphs: A survey. 102282 - Chit-Jie Chew, Ying-Chin Chen, Jung-San Lee, Chih-Lung Chen, Kuo-Yu Tsai
:
Preserving indomitable DDoS vitality through resurrection social hybrid botnet. 102284 - Sen Zhang, Weiwei Ni, Nan Fu
:
Differentially private graph publishing with degree distribution preservation. 102285 - Marcus Botacin
, Fabricio Ceschin, Ruimin Sun
, Daniela Oliveira, André Grégio:
Challenges and pitfalls in malware research. 102287 - Li Zhang, Vrizlynn L. L. Thing
:
Three decades of deception techniques in active cyber defense - Retrospect and outlook. 102288 - Jingmei Liu
, Yuanbo Gao, Fengjie Hu:
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM. 102289 - Manoel Domingues Junior, Nelson F. F. Ebecken:
A new WAF architecture with machine learning for resource-efficient use. 102290 - Susil Kumar Mohanty
, Somanath Tripathy
:
n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks. 102291 - Michal Kucab
, Piotr Borylo
, Piotr Cholda
:
Remote attestation and integrity measurements with Intel SGX for virtual machines. 102300 - Domenico Cotroneo, Luigi De Simone
, Roberto Natella
:
Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification. 102307 - Sanghoon Jeon
, Huy Kang Kim
:
AutoVAS: An automated vulnerability analysis system with a deep learning approach. 102308 - Simon Vrhovec
, Anze Mihelic:
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation. 102309 - Malak Alfosail
, Peter Norris:
Tor forensics: Proposed workflow for client memory artefacts. 102311 - Karl van der Schyff
, Stephen Flowerday
:
Mediating effects of information security awareness. 102313
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.