![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 113
Volume 113, February 2022
- Yuncheng Shen, Bing Guo, Yan Shen, Xuliang Duan
, Xiangqian Dong, Hong Zhang, Chuanwu Zhang, Yuming Jiang:
Personal big data pricing method based on differential privacy. 102529 - Chengbin Jin, Yongbin Zhou
, Xinkuan Qiu, Qi Feng, Qian Zhang:
Breaking real-world COTS USIM cards with unknown side-channel countermeasures. 102531 - Dillon Cheong Lien Sung, M. R. Gauthama Raman
, Aditya P. Mathur:
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants. 102532 - Rick van der Kleij, Jan Maarten Schraagen
, Beatrice Cadet
, Heather Young:
Developing decision support for cybersecurity threat and incident managers. 102535 - Lincy Elizebeth Jim, Nahina Islam
, Mark A. Gregory
:
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes. 102538 - Christian Rathgeb
, Johannes Merkle, Johanna Scholz, Benjamin Tams, Vanessa Nesterowicz:
Deep face fuzzy vault: Implementation and performance. 102539 - Yingxu Lai
, Liyao Tong
, Jing Liu
, Yipeng Wang, Tong Tang, Zijian Zhao, Hua Qin:
Identifying malicious nodes in wireless sensor networks based on correlation detection. 102540 - Cong Pu
, Kim-Kwang Raymond Choo
:
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function. 102541 - Zihao Wang
, Fok Kar Wai, Vrizlynn L. L. Thing
:
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study. 102542 - Daniel Gibert
, Matt Fredrikson
, Carles Mateu
, Jordi Planes
, Quan Le:
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning. 102543 - Manika Garg
, Anita Goel:
A systematic literature review on online assessment security: Current challenges and integrity strategies. 102544 - Arnau Erola, Ioannis Agrafiotis, Jason R. C. Nurse, Louise Axon, Michael Goldsmith, Sadie Creese:
A system to calculate Cyber Value-at-Risk. 102545 - Vincent Omollo Nyangaresi
, Anthony Joachim Rodrigues:
Efficient handover protocol for 5G and beyond networks. 102546 - Islam Obaidat
, Meera Sridhar, Khue M. Pham, Phu H. Phung:
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning. 102547 - Sidharth Quamara
, Awadhesh Kumar Singh:
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives. 102548 - Tong Anh Tuan, Hoang Viet Long, David Taniar
:
On Detecting and Classifying DGA Botnets and their Families. 102549 - Nicola Galloro, Mario Polino, Michele Carminati
, Andrea Continella
, Stefano Zanero:
A Systematical and longitudinal study of evasive behaviors in windows malware. 102550 - Nabin Chowdhury
, Sokratis K. Katsikas, Vasileios Gkioulos:
Modeling effective cybersecurity training frameworks: A delphi method-based study. 102551 - Jincheng Wang, Zhuohua Li
, John C. S. Lui, Mingshen Sun:
Topology-theoretic approach to address attribute linkage attacks in differential privacy. 102552 - Tengfei Zheng, Yuchuan Luo, Tongqing Zhou, Zhiping Cai:
Towards differential access control and privacy-preserving for secure media data sharing in the cloud. 102553 - Qiuhua Wang, Hui Yang, Guohua Wu, Kim-Kwang Raymond Choo, Zheng Zhang, Gongxun Miao, Yizhi Ren:
Black-box adversarial attacks on XSS attack detection model. 102554 - Mengran Yu, Shiliang Sun:
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks. 102555 - Yueqiang Cheng, Zhi Zhang
, Yansong Gao, Zhaofeng Chen, Shengjian Guo, Qifei Zhang, Rui Mei
, Surya Nepal
, Yang Xiang
:
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation. 102556 - Hind Alobaidi, Nathan L. Clarke
, Fudong Li, Abdulrahman Alruban:
Real-world smartphone-based gait recognition. 102557 - Zongyang Zhang, Jiayuan Yin, Bin Hu
, Ting Gao, Weihan Li
, Qianhong Wu, Jianwei Liu:
CLTracer: A Cross-Ledger Tracing framework based on address relationships. 102558 - Ruizhong Du, Lin Zhen:
Multiuser physical layer security mechanism in the wireless communication system of the IIOT. 102559 - Ebu Yusuf Güven
, Ali Boyaci, Muhammed Ali Aydin:
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data. 102560 - Steven Furnell, Kirsi Helkala, Naomi Woods
:
Accessible authentication: Assessing the applicability for users with disabilities. 102561 - Yan Chen
, Weidong Xia
, Karlene Cousins
:
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence. 102568 - Yeseul Choi, Yunjong Jeong, DaeHee Jang, Brent ByungHoon Kang, Hojoon Lee:
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM. 102569 - Yaqun Liu
, Chang-you Xing, Guomin Zhang, Lihua Song, Hongxiu Lin:
AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference. 102570 - Bo Wang, Yue Wang, Jiayao Hou, Yi Li, Yanqing Guo:
Open-Set source camera identification based on envelope of data clustering optimization (EDCO). 102571 - Chenguang Wang
, Tianqing Zhu, Ping Xiong, Wei Ren, Kim-Kwang Raymond Choo:
A privacy preservation method for multiple-source unstructured data in online social networks. 102574 - Andrea Tundis, Samuel Ruppert, Max Mühlhäuser:
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources. 102576
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.