default search action
Computers & Security, Volume 145
Volume 145, 2024
- Lata Nautiyal, Awais Rashid:
A framework for mapping organisational workforce knowledge profile in cyber security. 103925 - Nikolaos Lykousas, Constantinos Patsakis:
Decoding developer password patterns: A comparative analysis of password extraction and selection practices. 103974 - S. Senthil Pandi, D. Roja Ramani, A. Senthil Selvi, S. Dhanasekaran, B. Kalpana, N. Alangudi Balaji:
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization. 103984 - Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A., Serena Nicolazzo, Antonino Nocera, Georgiana Timpau, Mauro Conti:
OSTIS: A novel Organization-Specific Threat Intelligence System. 103990 - Maximilian Wolf, Julian Tritscher, Dieter Landes, Andreas Hotho, Daniel Schlör:
Benchmarking of synthetic network data: Reviewing challenges and approaches. 103993 - Rongcun Wang, Senlei Xu, Yuan Tian, Xingyu Ji, Xiaobing Sun, Shujuan Jiang:
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT. 103994 - Yi-Wei Ma, Chia-Wei Tsou:
A novel passive-active detection system for false data injection attacks in industrial control systems. 103996 - Justin Woodring, Katherine Perez, Aisha I. Ali-Gombe:
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models. 103997 - Or Haim Anidjar, Revital Marbel, Ran Dubin, Amit Dvir, Chen Hajaj:
Extending limited datasets with GAN-like self-supervision for SMS spam detection. 103998 - Yuelin Hu, Futai Zou, Jiajia Han, Xin Sun, Yilei Wang:
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model. 103999 - Zisheng Xu, Qiao Yan:
Boosting the transferability of adversarial CAPTCHAs. 104000 - Fatma Foad Ashrif, Elankovan A. Sundararajan, Mohammad Kamrul Hasan, Rami Ahmad, Salwani Abdullah, Raniyah Wazirali:
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications. 104002 - Yang Qin, Xiaofan Yang, Lu-Xing Yang, Kaifan Huang:
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach. 104003 - Xinxing Zhao, Kar-Wai Fok, Vrizlynn L. L. Thing:
Enhancing network intrusion detection performance using generative adversarial networks. 104005 - Ali AlSabeh, Kurt Friday, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
On DGA Detection and Classification Using P4 Programmable Switches. 104007 - Unal Tatar, Bilge Karabacak, Omer F. Keskin, Dominick P. Foti:
Charting new waters with CRAMMTS: A survey-driven cybersecurity risk analysis method for maritime stakeholders. 104015 - Marko Niemimaa:
Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour. 103986 - Felix Viktor Jedrzejewski, Lukas Thode, Jannik Fischbach, Tony Gorschek, Daniel Méndez, Niklas Lavesson:
Adversarial Machine Learning in Industry: A Systematic Literature Review. 103988 - Arunachalam Rajesh, Kanmani Ruby Erode Dhanapal:
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection. 103991 - Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi:
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network. 104004 - Mohammad Hamad, Andreas Finkenzeller, Michael Kühr, Andrew Roberts, Olaf Maennel, Vassilis Prevelakis, Sebastian Steinhorst:
REACT: Autonomous intrusion response system for intelligent vehicles. 104008 - Yiren Chen, Mengjiao Cui, Ding Wang, Yiyang Cao, Peian Yang, Bo Jiang, Zhigang Lu, Baoxu Liu:
A survey of large language models for cyber threat detection. 104016 - Guiqi Zhang, Yufeng Li:
Voltage inspector: Sender identification for in-vehicle CAN bus using voltage slice. 104017 - Malak Annabi, Abdelhafid Zeroual, Nadhir Messai:
Towards zero trust security in connected vehicles: A comprehensive survey. 104018 - Yuxiang Ma, Zhaodi Li, Haoming Xue, Jike Chang:
A balanced supervised contrastive learning-based method for encrypted network traffic classification. 104023 - Jiaxuan Han, Cheng Huang, Jiayong Liu:
bjCnet: A contrastive learning-based framework for software defect prediction. 104024 - Alladean Chidukwani, Sebastian Zander, Polychronis Koutsakis:
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications. 104026 - Ke He, Dan Dongseong Kim, Muhammad Rizwan Asghar:
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. 104028 - Xunzhi Jiang, Shen Wang, Yuxin Gong, Tingyue Yu, Li Liu, Xiangzhan Yu:
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection. 104029
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.