default search action
Computers & Security, Volume 118
Volume 118, July 2022
- Pooja Chaudhary, Brij B. Gupta, Awadhesh Kumar Singh:
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system. 102710 - Yong Fang, Chaoyi Huang, Minchuan Zeng, Zhiying Zhao, Cheng Huang:
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network. 102715 - Dogukan Aksu, Muhammed Ali Aydin:
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach. 102717 - Bin Li, Yijie Wang, Kele Xu, Li Cheng, Zhiquan Qin:
DFAID: Density-aware and feature-deviated active intrusion detection over network traffic streams. 102719 - Zhengyun He, Yexin Duan, Wu Zhang, Junhua Zou, Zhengfang He, Yunyun Wang, Zhisong Pan:
Boosting adversarial attacks with transformed gradient. 102720 - Jianan Chen, Qin Hu, Honglu Jiang:
Strategic signaling for utility control in audit games. 102721 - Sandeep Gupta, Mouna Kacimi, Bruno Crispo:
Step & turn - A novel bimodal behavioral biometric-based user verification scheme for physical access control. 102722 - Oualid Koucham, Stéphane Mocanu, Guillaume Hiet, Jean-Marc Thiriet, Frédéric Majorczyk:
Cross-domain alert correlation methodology for industrial control systems. 102723 - William Yeoh, Shan Wang, Ales Popovic, Noman H. Chowdhury:
A systematic synthesis of critical success factors for cybersecurity. 102724 - Hakan Aydin, Zeynep Orman, Muhammed Ali Aydin:
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment. 102725 - Mingfu Xue, Can He, Yinghao Wu, Shichang Sun, Yushu Zhang, Jian Wang, Weiqiang Liu:
PTB: Robust physical backdoor attacks against deep neural networks in real world. 102726 - Hui Zhu, Fan Yin, Shuangrong Peng, Xiaohu Tang:
Differentially private hierarchical tree with high efficiency. 102727 - Stephen Jacob, Yuansong Qiao, Yuhang Ye, Brian Lee:
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks. 102728 - S. Manimaran, V. N. Sastry, N. P. Gopalan:
SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning. 102729 - Kun Shao, Yu Zhang, Junan Yang, Xiaoshuai Li, Hui Liu:
The triggers that open the NLP model backdoors are hidden in the adversarial samples. 102730 - Hisham S. Galal, Mohammad Mannan, Amr M. Youssef:
Blindfold: Keeping private keys in PKIs and CDNs out of sight. 102731 - Maiju Kyytsönen, Jonna Ikonen, Anna-Mari Aalto, Tuulikki Vehko:
The self-assessed information security skills of the Finnish population: A regression analysis. 102732 - Xin Sun, Chengliang Tian, Changhui Hu, Weizhong Tian, Hanlin Zhang, Jia Yu:
Privacy-Preserving and verifiable SRC-based face recognition with cloud/edge server assistance. 102740 - M. Saqib Nawaz, Philippe Fournier-Viger, Muhammad Zohaib Nawaz, Guoting Chen, Youxi Wu:
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining. 102741 - Inger Anne Tøndel, Daniela Soares Cruzes, Martin Gilje Jaatun, Guttorm Sindre:
Influencing the security prioritisation of an agile software development project. 102744 - Tiago Brito, Pedro Lopes, Nuno Santos, José Fragoso Santos:
Wasmati: An efficient static vulnerability scanner for WebAssembly. 102745 - Yassine Himeur, Shahab Saquib Sohail, Faycal Bensaali, Abbes Amira, Mamoun Alazab:
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives. 102746 - Florian Guggenmos, Björn Häckel, Philipp Ollig, Bastian Stahl:
Security First, Security by Design, or Security Pragmatism - Strategic Roles of IT Security in Digitalization Projects. 102747 - Devrim Akgün, Selman Hizal, Ünal Çavusoglu:
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity. 102748 - Zhen Wang, Yitao Zheng, Hai Zhu, Chang Yang, Tianyi Chen:
Transferable adversarial examples can efficiently fool topic models. 102749 - Lianyi Yu, Qiangjiang Wang, Yan Wo, Guoqiang Han:
Secure biometric hashing against relation-based attacks via maximizing min-entropy. 102750
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.