![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 111
Volume 111, December 2021
- Shizra Sultan
, Christian Damsgaard Jensen:
Metadata based need-to-know view in large-scale video surveillance systems. 102452 - Jian Xu, Xuequn Wang
, Lvxin Yan:
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry. 102455 - Fangyuan Sun
, Jia Yu, Xinrui Ge
, Ming Yang
, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. 102456 - Rui Yang
, Tian-Jie Cao
, Xiu-Qing Chen, Feng-Rong Zhang:
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples. 102457 - Zhifeng Xu, Xianjin Fang
, Gaoming Yang
:
Malbert: A novel pre-training method for malware detection. 102458 - Jinxiong Zhao
, Sensen Guo, Dejun Mu:
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU. 102459 - Chuan Sheng
, Yu Yao, Qiang Fu
, Wei Yang, Ying Liu:
Study on the intelligent honeynet model for containing the spread of industrial viruses. 102460 - Timothy R. McIntosh
, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng, Paul A. Watters:
Dynamic user-centric access control for detection of ransomware attacks. 102461 - Leran Wang, Md. Shafaeat Hossain, Joshua Pulfrey, Lisa Lancor
:
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time. 102462 - Xu Zhao
, Guangqiu Huang, Jin Jiang, Ling Gao, Maozhen Li:
Research on lightweight anomaly detection of multimedia traffic in edge computing. 102463 - Jong Wook Kim
, Kennedy Edemacu
, Jong Seon Kim, Yon Dohn Chung, Beakcheol Jang
:
A Survey Of differential privacy-based techniques and their applicability to location-Based services. 102464 - Yifan Hu, Peidong Zhu, Peng Xun, Bo Liu, Wenjie Kang, Yinqiao Xiong
, Weiheng Shi
:
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. 102465 - Adam Zibak, Clemens Sauerwein, Andrew Simpson
:
A success model for cyber threat intelligence management platforms. 102466 - Christos Lyvas, Costas Lambrinoudakis
, Dimitris Geneiatakis:
On Android's activity hijacking prevention. 102468 - Burak Filiz
, Budi Arief
, Orçun Çetin
, Julio C. Hernandez-Castro
:
On the Effectiveness of Ransomware Decryption Tools. 102469 - Anh Nguyen-Duc
, Manh Viet Do, Quan Luong Hong, Kiem Nguyen Khac, Anh Nguyen Quang:
On the adoption of static analysis for software security assessment-A case study of an open-source e-government project. 102470 - Carlton Shepherd
, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine
, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. 102471 - Stefano Calzavara, Hugo Jonker
, Benjamin Krumnow, Alvise Rabitti
:
Measuring Web Session Security at Scale. 102472 - Xueqian Liu
, Shoufeng Cao, Zhenzhong Cao, Qu Gao, Lin Wan, Fengyu Wang:
SELF: A method of searching for library functions in stripped binary code. 102473 - Xiaohu Liu
, Hengwei Zhang
, Shuqin Dong
, Yuchen Zhang:
Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. 102480 - Ding Li
, Wei Lin, Bin Lu, Yuefei Zhu:
Exploiting side-channel leaks in web traffic of incremental search. 102481 - Daniel Schlette
, Manfred Vielberth, Günther Pernul:
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. 102482 - Rudri Kalaria
, A. S. M. Kayes
, Wenny Rahayu, Eric Pardede:
A Secure Mutual authentication approach to fog computing environment. 102483 - Reem AlHusain
, Ali Alkhalifah
:
Evaluating fallback authentication research: A systematic literature review. 102487 - Djordje Slijepcevic
, Maximilian Henzl, Lukas Daniel Klausner
, Tobias Dam
, Peter Kieseberg
, Matthias Zeppelzauer:
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers. 102488 - José Cabrero-Holgueras
, Sergio Pastrana
:
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums. 102489 - Craig Beaman
, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak
, Muhammad Khurram Khan
:
Ransomware: Recent advances, analysis, challenges and future research directions. 102490 - Moustafa Mamdouh, Ali Ismail Awad
, Ashraf A. M. Khalaf
, Hesham F. A. Hamed:
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. 102491 - Eduardo Andrade
, Jorge Granjal
, João P. Vilela
, Carlos Arantes:
A Security Gateway for power distribution systems in open networks. 102492 - Rajendra Kumar Solanki
, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
MapperDroid: Verifying app capabilities from description to permissions and API calls. 102493
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.