default search action
Computers & Security, Volume 123
Volume 123, December 2022
- Duong Dinh Tran, Kazuhiro Ogata:
Formal verification of TLS 1.2 by automatically generating proof scores. 102909 - Li Guo, Jia Yu, Ming Yang, Fanyu Kong:
Privacy-Preserving Convolution Neural Network Inference with Edge-assistance. 102910 - Lejla Islami, Simone Fischer-Hübner, Panos Papadimitratos:
Capturing drivers' privacy preferences for intelligent transportation systems: An intercultural perspective. 102913
- Ankur O. Bang, Udai Pratap Rao, Andrea Visconti, Alessandro Brighente, Mauro Conti:
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions. 102914
- Shaojie Yang, Yongjun Wang, Haoran Xu, Fangliang Xu, Mantun Chen:
An Android Malware Detection and Classification Approach Based on Contrastive Lerning. 102915 - Tariq Hussain, Bailin Yang, Haseeb Ur Rahman, Arshad Iqbal, Farman Ali, Babar Shah:
Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique. 102917 - Michal Motylinski, Áine MacDermott, Farkhund Iqbal, Babar Shah:
A GPU-based machine learning approach for detection of botnet attacks. 102918 - Jinghong Lan, Xudong Liu, Bo Li, Jie Sun, Beibei Li, Jun Zhao:
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection. 102919 - Inês Pinto Gouveia, Marcus Völp, Paulo Esteves Veríssimo:
Behind the last line of defense: Surviving SoC faults and intrusions. 102920 - Yiran Zhu, Lei Cui, Zhenquan Ding, Lun Li, Yongji Liu, Zhiyu Hao:
Black box attack and network intrusion detection using machine learning for malicious traffic. 102922 - Michael Gallagher, Nikolaos Pitropakis, Christos Chrysoulas, Pavlos Papadopoulos, Alexios Mylonas, Sokratis K. Katsikas:
Investigating machine learning attacks on financial time series models. 102933 - Mina Alishahi, Vahideh Moghtadaiee, Hojjat Navidan:
Add noise to remove noise: Local differential privacy for feature selection. 102934 - Thomas Walshe, Andrew C. Simpson:
Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations. 102936 - Marcus A. Butavicius, Ronnie Taib, Simon Jerome Han:
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails. 102937 - Ferda Özdemir Sönmez, Chris Hankin, Pasquale Malacaria:
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases. 102938 - Travis Ashley, Sri Nikhil Gupta Gourisetti, Newton Brown, Christopher A. Bonebrake:
Aggregate attack surface management for network discovery of operational technology. 102939 - Marija S. Milosevic, Vladimir M. Ciric:
Extreme minority class detection in imbalanced data for network intrusion. 102940 - Neeraj Kumar Singh, Mahshooq Abdul Majeed, Vasundhara Mahajan:
Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network. 102941 - Yaguan Qian, Jiamin Wang, Haijiang Wang, Zhaoquan Gu, Bin Wang, Shaoning Zeng, Wassim Swaileh:
Visually imperceptible adversarial patch attacks. 102943 - Jie Wang, Zhaoxia Yin, Jing Jiang, Jin Tang, Bin Luo:
PISA: Pixel skipping-based attentional black-box adversarial attack. 102947 - João Henriques, Filipe Caldeira, Tiago Cruz, Paulo Simões:
An automated closed-loop framework to enforce security policies from anomaly detection. 102949
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.