


default search action
Computers & Security, Volume 118
Volume 118, July 2022
- Pooja Chaudhary
, Brij B. Gupta
, Awadhesh Kumar Singh:
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. 102710 - Yong Fang
, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang
:
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. 102715 - Dogukan Aksu
, Muhammed Ali Aydin:
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach. 102717 - Bin Li, Yijie Wang, Kele Xu
, Li Cheng, Zhiquan Qin:
DFAID: Density-aware and feature-deviated active intrusion detection over network traffic streams. 102719 - Zhengyun He, Yexin Duan, Wu Zhang, Junhua Zou, Zhengfang He, Yunyun Wang, Zhisong Pan:
Boosting adversarial attacks with transformed gradient. 102720 - Jianan Chen
, Qin Hu, Honglu Jiang
:
Strategic signaling for utility control in audit games. 102721 - Sandeep Gupta
, Mouna Kacimi, Bruno Crispo:
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control. 102722 - Oualid Koucham, Stéphane Mocanu
, Guillaume Hiet
, Jean-Marc Thiriet, Frédéric Majorczyk:
Cross-domain alert correlation methodology for industrial control systems. 102723 - William Yeoh
, Shan Wang, Ales Popovic
, Noman H. Chowdhury:
A systematic synthesis of critical success factors for cybersecurity. 102724 - Hakan Aydin
, Zeynep Orman
, Muhammed Ali Aydin:
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. 102725 - Mingfu Xue
, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. 102726 - Hui Zhu
, Fan Yin, Shuangrong Peng, Xiaohu Tang:
Differentially private hierarchical tree with high efficiency. 102727 - Stephen Jacob
, Yuansong Qiao
, Yuhang Ye, Brian Lee:
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks. 102728 - S. Manimaran, V. N. Sastry, N. P. Gopalan:
SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning. 102729 - Kun Shao
, Yu Zhang, Junan Yang, Xiaoshuai Li
, Hui Liu:
The triggers that open the NLP model backdoors are hidden in the adversarial samples. 102730 - Hisham S. Galal
, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. 102731 - Maiju Kyytsönen
, Jonna Ikonen, Anna-Mari Aalto, Tuulikki Vehko
:
The self-assessed information security skills of the Finnish population: A regression analysis. 102732 - Xin Sun, Chengliang Tian
, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. 102740 - M. Saqib Nawaz
, Philippe Fournier-Viger
, Muhammad Zohaib Nawaz, Guoting Chen, Youxi Wu:
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining. 102741 - Inger Anne Tøndel
, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. 102744 - Tiago Brito
, Pedro Lopes, Nuno Santos, José Fragoso Santos
:
Wasmati: An efficient static vulnerability scanner for WebAssembly. 102745 - Yassine Himeur
, Shahab Saquib Sohail
, Faycal Bensaali, Abbes Amira
, Mamoun Alazab
:
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives. 102746 - Florian Guggenmos, Björn Häckel, Philipp Ollig, Bastian Stahl:
Security First, Security by Design, or Security Pragmatism - Strategic Roles of IT Security in Digitalization Projects. 102747 - Devrim Akgün
, Selman Hizal, Ünal Çavusoglu:
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. 102748 - Zhen Wang, Yitao Zheng, Hai Zhu, Chang Yang, Tianyi Chen
:
Transferable adversarial examples can efficiently fool topic models. 102749 - Lianyi Yu, Qiangjiang Wang, Yan Wo, Guoqiang Han:
Secure biometric hashing against relation-based attacks via maximizing min-entropy. 102750

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.