default search action
Computers & Security, Volume 138
Volume 138, March 2024
- Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang:
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. 103618 - Yufan Chen, Jiahai Yang, Susu Cui, Cong Dong, Bo Jiang, Yuling Liu, Zhigang Lu:
Unveiling encrypted traffic types through hierarchical network characteristics. 103645 - Shouzheng Tao, Yezheng Liu, Chunhua Sun:
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China. 103646 - Alejandro Guerra-Manzanares:
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives. 103654 - Jason A. Williams, Humayun Zafar, Saurabh Gupta:
Fortifying healthcare: An action research approach to developing an effective SETA program. 103655 - Henry R. K. Skeoch:
Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers & Security Volume 112 (2022) 102533]. 103657 - Xirong Ma, Chuan Ma, Yali Jiang, Chunpeng Ge:
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication. 103658 - Zhimao Gong, Junyi Li, Yaping Lin, Lening Yuan, Wen Gao:
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing. 103659 - Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni:
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. 103660 - Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong Nhung-Nguyen, Jamal Hussain, Manohar Naik Sugali:
DDoS attack detection and mitigation using deep neural network in SDN environment. 103661 - Emilio Coppa, Sebastian Schrittwieser:
Editorial: Special issue on ARES 2022. 103662 - Ziming Zhao, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang, Rui Zhang:
DDoS family: A novel perspective for massive types of DDoS attacks. 103663 - Haitao Xiao, Yan Zhu, Bin Zhang, Zhigang Lu, Dan Du, Yuling Liu:
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis. 103665 - Agata Kruzikova, Michal Muzik, Lenka Knapova, Lenka Dedkova, David Smahel, Vashek Matyas:
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction. 103667 - Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li:
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. 103668 - Tom Meurs, Edward J. Cartwright, Anna Cartwright, Marianne Junger, Abhishta Abhishta:
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. 103670
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.