


default search action
Computers & Security, Volume 126
Volume 126, March 2023
- S. Srijayanthi, T. Sethukarasi:
Design of privacy preserving model based on clustering involved anonymization along with feature selection. 103027 - Jinyin Chen
, Shulong Hu, Haibin Zheng, Chang-you Xing
, Guomin Zhang:
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning. 103055 - Hyun Kwon
, Seung-Hun Nam:
Audio adversarial detection through classification score on speech recognition systems. 103061 - Lara Saidia Fascì, Marco Fisichella
, Gianluca Lax
, Chenyin Qian:
Disarming visualization-based approaches in malware detection systems. 103062 - Balaganesh Bojarajulu
, Sarvesh Tanwar
, Thipendra Pal Singh
:
Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model. 103064 - Yusuf Alaca
, Yüksel Çelik
:
Cyber attack detection with QR code images using lightweight deep learning models. 103065 - Muhanned AlSlaiman
, Mohammed I. Salman
, Mariam M. Saleh, Bin Wang:
Enhancing false negative and positive rates for efficient insider threat detection. 103066 - Fredrik Heiding
, Emre Süren
, Johannes Olegård
, Robert Lagerström
:
Penetration testing of connected households. 103067 - Yiran Cheng, Shouguo Yang, Zhe Lang
, Zhiqiang Shi, Limin Sun:
VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware. 103068 - Håvard Jakobsen Ofte
, Sokratis K. Katsikas
:
Understanding situation awareness in SOCs, a systematic literature review. 103069 - Qian Wang, Yuying Gao, Jiadong Ren, Bing Zhang:
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network. 103070 - Karl van der Schyff
, Stephen Flowerday
:
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO. 103071 - Marino Miculan
, Nicola Vitacolonna:
Automated verification of Telegram's MTProto 2.0 in the symbolic model. 103072 - Yair Meidan
, Daniel Benatar, Ron Bitton, Dan Avraham, Asaf Shabtai:
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks. 103073 - Kengo Zenitani
:
Attack graph analysis: An explanatory guide. 103081 - Shiyao Luo, Yingxu Lai
, Jing Liu:
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network. 103083 - Huaxin Deng, Chun Guo
, Guowei Shen, Yunhe Cui, Yuan Ping
:
MCTVD: A malware classification method based on three-channel visualization and deep learning. 103084 - Mohammad Nayfeh
, Yuchen Li
, Khair Al Shamaileh
, Vijay Kumar Devabhaktuni, Naima Kaabouch:
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification. 103085 - Xiaojian Liu
, Kehong Liu:
A permission-carrying security policy and static enforcement for information flows in Android programs. 103090 - Sung Bum Park
, Hyo Jin Jo
, Dong Hoon Lee:
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol. 103091

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.