


default search action
Computers & Security, Volume 139
Volume 139, 2024
- Zhiyu Chen
, Feng Chen, Yiming Sun, Mingjie Wang
, Shangdong Liu
, Yimu Ji:
Local aggressive and physically realizable adversarial attacks on 3D point cloud. 103539 - Haili Sun
, Yan Huang
, Lansheng Han, Cai Fu
, Hongle Liu, Xiang Long:
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network. 103570 - Abdullahi Aishatu Wabi
, Ismaila Idris, Olayemi Mikail Olaniyi, Joseph Adebayo Ojeniyi:
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps. 103652 - A. Parameswari, R. Ganeshan, V. Ragavi, M. Shereesha:
Hybrid rat swarm hunter prey optimization trained deep learning for network intrusion detection using CNN features. 103656 - Ashish Nanda
, Jongkil Jay Jeong
, Syed Wajid Ali Shah, Mohammad Reza Nosouhi, Robin Doss:
Examining usable security features and user perceptions of Physical Authentication Devices. 103664 - Srivathsan G. Morkonda
, Sonia Chiasson
, Paul C. van Oorschot
:
Influences of displaying permission-related information on web single sign-on login decisions. 103666 - A. Germán Márquez
, Ángel Jesús Varela-Vaca
, María Teresa Gómez-López
, José A. Galindo
, David Benavides
:
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT). 103669 - Luigi Gallo
, Danilo Gentile
, Saverio Ruggiero, Alessio Botta
, Giorgio Ventre:
The human factor in phishing: Collecting and analyzing user behavior when reading emails. 103671 - Giyoon Kim, Soojin Kang, Uk Hur, Jongsung Kim
:
A study on vulnerability of the Wickr login system in windows from a live forensics perspective. 103672 - Masoumeh Abolfathi
, Srivani Inturi, Farnoush Banaei Kashani
, Jafar Haadi Jafarian
:
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples. 103673 - Peican Zhu
, Zepeng Fan, Sensen Guo, Keke Tang, Xingyu Li:
Improving adversarial transferability through hybrid augmentation. 103674 - Yushan Fang, Yu Yao
, Xiaoli Lin, Jiaxuan Wang, Hao Zhai:
A feature selection based on genetic algorithm for intrusion detection of industrial control systems. 103675 - Hamid Bostani
, Veelasha Moonsamy:
EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection. 103676 - Miguel Antonio Caraveo-Cacep
, Rubén Vázquez-Medina, Antonio Hernández Zavala
:
A review on security implementations in soft-processors for IoT applications. 103677 - Balachandar Gowrisankar
, Vrizlynn L. L. Thing
:
An adversarial attack approach for eXplainable AI evaluation on deepfake detection models. 103684 - Zubaida Rehman
, Iqbal Gondal
, Mengmeng Ge, Hai Dong
, Mark A. Gregory
, Zahir Tari
:
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception. 103685 - Jing Zhao
, Qianqian Su
:
A threshold traceable delegation authorization scheme for data sharing in healthcare. 103686 - Ashley Allen
, Alexios Mylonas
, Stilianos Vidalis, Dimitris Gritzalis:
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks. 103687 - Steve G. A. van de Weijer
, Eric Rutger Leukfeldt, Asier Moneva
:
Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands. 103693 - Omar Alshaikh
, Simon Parkinson
, Saad Khan
:
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach. 103694 - Nina Marshall, Daniel Sturman
, Jaime C. Auton
:
Exploring the evidence for email phishing training: A scoping review. 103695 - Fabrice Mvah, Vianney Kengne Tchendji, Clémentin Tayou Djamégni, Ahmed H. Anwar, Deepak K. Tosh, Charles A. Kamhoua:
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach. 103696 - Yong Li
, Xiao Song, Yuchun Tu
, Ming Liu
:
GAPBAS: Genetic algorithm-based privacy budget allocation strategy in differential privacy K-means clustering algorithm. 103697 - Chengmei Zhao, Feng Gao, Zhihao Shen
:
Multi-motion sensor behavior based continuous authentication on smartphones using gated two-tower transformer fusion networks. 103698 - Clare M. Patterson
, Jason R. C. Nurse, Virginia N. L. Franqueira:
"I don't think we're there yet": The practices and challenges of organisational learning from cyber security incidents. 103699 - Benxin Yin
, Hanlin Zhang
, Jie Lin, Fanyu Kong
, Leyun Yu:
PVFL: Verifiable federated learning and prediction with privacy-preserving. 103700 - Wangxin Feng, Xiangyang Luo
, Tengyao Li
, Chunfang Yang:
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing. 103701 - Manish Snehi
, Abhinav Bhandari, Jyoti Verma
:
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems. 103702 - Sibel Gülmez
, Arzu Gorgulu Kakisim
, Ibrahim Sogukpinar:
XRan: Explainable deep learning-based ransomware detection using dynamic analysis. 103703 - Hameeza Ahmed
, Muhammad Faraz Hyder
, Muhammad Fahim ul Haque, Paulo C. Santos
:
Exploring compiler optimization space for control flow obfuscation. 103704 - Abebe Abeshu Diro
, Shahriar Kaisar
, Athanasios V. Vasilakos, Adnan Anwar, Araz Nasirian, Gaddisa Olani:
Anomaly detection for space information networks: A survey of challenges, techniques, and future directions. 103705 - Yongkang Jiang
, Gaolei Li, Shenghong Li, Ying Guo:
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift. 103706 - Taki Eddine Toufik Djaidja
, Bouziane Brik
, Abdelwahab Boualouache
, Sidi Mohammed Senouci, Yacine Ghamri-Doudane:
Federated learning for 5G and beyond, a blessing and a curse- an experimental study on intrusion detection systems. 103707 - Bert Valkenburg
, Ivano Bongiovanni
:
Unravelling the three lines model in cybersecurity: a systematic literature review. 103708 - Nur Imtiazul Haque
, Mohammad Ashiqur Rahman
, A. Selcuk Uluagac:
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems. 103709 - Matthew J. Vepraskas
, Benjamin W. Stirgwolt
:
A system dynamics approach to building counterfeit avoidance programs. 103711 - Muneeb Hassan Khan
, Abdul Rehman Javed, Zafar Iqbal, Muhammad Asim, Ali Ismail Awad
:
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning. 103712 - Yali Wu
, Yanghu Hu, Junhu Wang, Mengqi Feng, Ang Dong, Yanxi Yang:
An active learning framework using deep Q-network for zero-day attack detection. 103713 - Shoumik Saha
, Sadia Afroz, Atif Hasan Rahman
:
MAlign: Explainable static raw-byte based malware family classification using sequence alignment. 103714 - Jie Ling
, Junchang Zheng
, Jiahui Chen
:
Efficient federated learning privacy preservation method with heterogeneous differential privacy. 103715 - Ashfaq Ahmad Najar
, S. Manohar Naik
:
Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks. 103716 - Siyuan Shang
, Xiaohan Wang, Aodi Liu:
ABAC policy mining method based on hierarchical clustering and relationship extraction. 103717 - Yunwei Dai
, Tao Huang, Shuo Wang:
DAmpADF: A framework for DNS amplification attack defense based on Bloom filters and NAmpKeeper. 103718 - Sara Aboukadri, Aafaf Ouaddah
, Abdellatif Mezrioui:
Machine learning in identity and access management systems: Survey and deep dive. 103729 - Ehsan Hallaji
, Roozbeh Razavi-Far
, Mehrdad Saif
:
Expanding analytical capabilities in intrusion detection through ensemble-based multi-label classification. 103730 - Javier Cabrera-Arteaga
, Nicholas FitzGerald, Martin Monperrus
, Benoit Baudry
:
Wasm-Mutate: Fast and effective binary diversification for WebAssembly. 103731 - Hao Sun
, Lei Cui, Lun Li, Zhenquan Ding, Siyuan Li, Zhiyu Hao, Hongsong Zhu:
VDTriplet: Vulnerability detection with graph semantics using triplet model. 103732 - Willone Lim
, Kelvin Sheng Chek Yong, Bee Theng Lau
, Colin Choon Lin Tan
:
Future of generative adversarial networks (GAN) for anomaly detection in network security: A review. 103733 - Bona Xuan, Jin Li, Yafei Song
:
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion. 103734 - Rohini S, Gowtham Ramesh
, Anand R. Nair
:
MAGIC: Malware behaviour analysis and impact quantification through signature co-occurrence and regression. 103735 - R. J. van Geest, Giuseppe Cascavilla
, Joris Hulstijn
, Nicola Zannone
:
The applicability of a hybrid framework for automated phishing detection. 103736 - Muriel Figueredo Franco
, Fabian Künzler, Jan von der Assen
, Chao Feng, Burkhard Stiller
:
RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports. 103737 - Yinghui Huang, Wenting Shen
, Jing Qin:
Certificateless cloud storage auditing supporting data ownership transfer. 103738 - Amin Mahnamfar
, Kemal Bicakci
, Yusuf Uzunay:
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems. 103739 - Qixian Ren
, Yu Zheng, Chao Yang, Yue Li, Jian-Feng Ma:
Shadow backdoor attack: Multi-intensity backdoor attack against federated learning. 103740 - Wenhan Chang
, Tianqing Zhu
:
Gradient-based defense methods for data leakage in vertical federated learning. 103744

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.