


default search action
Computers & Security, Volume 109
Volume 109, October 2021
- Minh Pham, Kaiqi Xiong
:
A survey on security attacks and defense techniques for connected and autonomous vehicles. 102269 - Phan The Duy
, Le Khac Tien, Nghi Hoang Khoa
, Do Thi Thu Hien, Anh Gia-Tuan Nguyen, Van-Hau Pham
:
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks. 102367 - Lyuye Zhang, Maode Ma, Yue Qiu:
An enhanced handover authentication solution for 6LoWPAN networks. 102373 - John McGahagan IV
, Darshan Bhansali, Ciro Pinto-Coelho
, Michel Cukier:
Discovering features for detecting malicious websites: An empirical study. 102374 - Hongkyu Lee, Jeehyeong Kim, Seyoung Ahn
, Rasheed Hussain
, Sunghyun Cho
, Junggab Son
:
Digestive neural networks: A novel defense strategy against inference attacks in federated learning. 102378 - Rajasoundaran Soundararajan
, Prabu A. V., Sidheswar Routray
, Sripathi Venkata Naga Santhosh Kumar, Prince Priya Malla
, Suman Maloji, Amrit Mukherjee
, Uttam Ghosh
:
Machine learning based deep job exploration and secure transactions in virtual private cloud systems. 102379 - Salih Ismail
, Hani Ragab Hassen
, Mike Just
, Hind Zantout:
A review of amplification-based distributed denial of service attacks and their mitigation. 102380 - Maurice H. ter Beek
, Axel Legay, Alberto Lluch-Lafuente
, Andrea Vandin
:
Quantitative Security Risk Modeling and Analysis with RisQFLan. 102381 - Paul Formosa
, Michael Wilson
, Deborah Richards
:
A principlist framework for cybersecurity ethics. 102382 - Mona Mirtsch
, Knut Blind, Claudia Koch, Gabriele Dudek:
Information security management in ICT and non-ICT sector companies: A preventive innovation perspective. 102383 - Shuyu Li, Yue Geng, Yingle Li
:
A Differentially private hybrid decomposition algorithm based on quad-tree. 102384 - Tracy Tam
, Asha Rao
, Joanne L. Hall
:
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses. 102385 - Tatiana Frenklach
, Dvir Cohen
, Asaf Shabtai, Rami Puzis
:
Android malware detection via an app similarity graph. 102386 - Betsy Uchendu
, Jason R. C. Nurse
, Maria Bada, Steven Furnell:
Developing a cyber security culture: Current practices and future needs. 102387 - Javier Yuste
, Sergio Pastrana
:
Avaddon ransomware: An in-depth analysis and decryption of infected systems. 102388 - Markus Ring
, Daniel Schlör, Sarah Wunderlich, Dieter Landes, Andreas Hotho:
Malware detection on windows audit logs using LSTMs. 102389 - Quanqiang Zhou
, Liangliang Duan
:
Semi-supervised recommendation attack detection based on Co-Forest. 102390 - Sanghoon Jeon
, Huy Kang Kim
:
TZMon: Improving mobile game security with ARM trustzone. 102391 - Zhen Liu
, Changzhen Hu, Chun Shan:
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method. 102392 - Devrim Unal
, Mohammad Hammoudeh
, Muhammad Asif Khan
, Abdelrahman Abuarqoub, Gregory Epiphaniou
, Ridha Hamila:
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things. 102393 - Mevlut Serkan Tok
, Mehmet Demirci
:
Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard. 102394 - Mohamed A. El-Zawawy
, Eleonora Losiouk
, Mauro Conti
:
Vulnerabilities in Android webview objects: Still not the end! 102395 - Hinne Hettema
:
Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence. 102396 - Obi Ogbanufe
, Robert E. Crossler
, David Biros:
Exploring stewardship: A precursor to voluntary security behaviors. 102397 - Richard Smith
, Helge Janicke, Ying He, Fenia Ferra
, Adham Albakri:
The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework. 102398 - Yifei Jian, Hongbo Kuang, Chenglong Ren, Zicheng Ma, Haizhou Wang
:
A novel framework for image-based malware detection with a deep neural network. 102400 - Manisekaran Thangavelu, Venkataraghavan Krishnaswamy
, Mayank Sharma
:
Impact of comprehensive information security awareness and cognitive characteristics on security incident management - an empirical study. 102401 - Zahoor Ahmed Soomro
, Mahmood Hussain Shah
, Jason Thatcher
:
A framework for ID fraud prevention policies in E-tailing sector. 102403 - Siqi Hu
, Carol Hsu, Zhongyun Zhou
:
The impact of SETA event attributes on employees' security-related Intentions: An event system theory perspective. 102404 - Asaf Fried
, Mark Last
:
Facing airborne attacks on ADS-B data with autoencoders. 102405

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.