


default search action
Computers & Security, Volume 111
Volume 111, December 2021
- Shizra Sultan
, Christian Damsgaard Jensen:
Metadata based need-to-know view in large-scale video surveillance systems. 102452 - Jian Xu, Xuequn Wang
, Lvxin Yan:
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry. 102455 - Fangyuan Sun
, Jia Yu, Xinrui Ge
, Ming Yang
, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. 102456 - Rui Yang
, Tian-Jie Cao
, Xiu-Qing Chen, Feng-Rong Zhang:
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples. 102457 - Zhifeng Xu, Xianjin Fang
, Gaoming Yang
:
Malbert: A novel pre-training method for malware detection. 102458 - Jinxiong Zhao
, Sensen Guo, Dejun Mu:
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU. 102459 - Chuan Sheng
, Yu Yao, Qiang Fu
, Wei Yang, Ying Liu:
Study on the intelligent honeynet model for containing the spread of industrial viruses. 102460 - Timothy R. McIntosh
, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng, Paul A. Watters:
Dynamic user-centric access control for detection of ransomware attacks. 102461 - Leran Wang, Md. Shafaeat Hossain, Joshua Pulfrey, Lisa Lancor
:
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time. 102462 - Xu Zhao
, Guangqiu Huang, Jin Jiang, Ling Gao, Maozhen Li:
Research on lightweight anomaly detection of multimedia traffic in edge computing. 102463 - Jong Wook Kim
, Kennedy Edemacu
, Jong Seon Kim, Yon Dohn Chung, Beakcheol Jang
:
A Survey Of differential privacy-based techniques and their applicability to location-Based services. 102464 - Yifan Hu, Peidong Zhu, Peng Xun, Bo Liu, Wenjie Kang, Yinqiao Xiong
, Weiheng Shi
:
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. 102465 - Adam Zibak, Clemens Sauerwein, Andrew Simpson
:
A success model for cyber threat intelligence management platforms. 102466 - Christos Lyvas, Costas Lambrinoudakis
, Dimitris Geneiatakis:
On Android's activity hijacking prevention. 102468 - Burak Filiz
, Budi Arief
, Orçun Çetin
, Julio C. Hernandez-Castro
:
On the Effectiveness of Ransomware Decryption Tools. 102469 - Anh Nguyen-Duc
, Manh Viet Do, Quan Luong Hong, Kiem Nguyen Khac, Anh Nguyen Quang:
On the adoption of static analysis for software security assessment-A case study of an open-source e-government project. 102470 - Carlton Shepherd
, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine
, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. 102471 - Stefano Calzavara, Hugo Jonker
, Benjamin Krumnow, Alvise Rabitti
:
Measuring Web Session Security at Scale. 102472 - Xueqian Liu
, Shoufeng Cao, Zhenzhong Cao, Qu Gao, Lin Wan, Fengyu Wang:
SELF: A method of searching for library functions in stripped binary code. 102473 - Xiaohu Liu
, Hengwei Zhang
, Shuqin Dong
, Yuchen Zhang:
Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. 102480 - Ding Li
, Wei Lin, Bin Lu, Yuefei Zhu:
Exploiting side-channel leaks in web traffic of incremental search. 102481 - Daniel Schlette
, Manfred Vielberth, Günther Pernul:
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. 102482 - Rudri Kalaria
, A. S. M. Kayes
, Wenny Rahayu, Eric Pardede:
A Secure Mutual authentication approach to fog computing environment. 102483 - Reem AlHusain
, Ali Alkhalifah
:
Evaluating fallback authentication research: A systematic literature review. 102487 - Djordje Slijepcevic
, Maximilian Henzl, Lukas Daniel Klausner
, Tobias Dam
, Peter Kieseberg
, Matthias Zeppelzauer:
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers. 102488 - José Cabrero-Holgueras
, Sergio Pastrana
:
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums. 102489 - Craig Beaman
, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak
, Muhammad Khurram Khan
:
Ransomware: Recent advances, analysis, challenges and future research directions. 102490 - Moustafa Mamdouh, Ali Ismail Awad
, Ashraf A. M. Khalaf
, Hesham F. A. Hamed:
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. 102491 - Eduardo Andrade
, Jorge Granjal
, João P. Vilela
, Carlos Arantes:
A Security Gateway for power distribution systems in open networks. 102492 - Rajendra Kumar Solanki
, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
MapperDroid: Verifying app capabilities from description to permissions and API calls. 102493

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.