![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 145
Volume 145, 2024
- Lata Nautiyal
, Awais Rashid
:
A framework for mapping organisational workforce knowledge profile in cyber security. 103925 - Nikolaos Lykousas
, Constantinos Patsakis
:
Decoding developer password patterns: A comparative analysis of password extraction and selection practices. 103974 - S. Senthil Pandi, D. Roja Ramani, A. Senthil Selvi, S. Dhanasekaran, B. Kalpana
, N. Alangudi Balaji:
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization. 103984 - Dincy R. Arikkat, P. Vinod, Rafidha Rehiman K. A.
, Serena Nicolazzo
, Antonino Nocera
, Georgiana Timpau, Mauro Conti
:
OSTIS: A novel Organization-Specific Threat Intelligence System. 103990 - Maximilian Wolf, Julian Tritscher, Dieter Landes
, Andreas Hotho, Daniel Schlör
:
Benchmarking of synthetic network data: Reviewing challenges and approaches. 103993 - Rongcun Wang, Senlei Xu, Yuan Tian
, Xingyu Ji, Xiaobing Sun, Shujuan Jiang:
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT. 103994 - Yi-Wei Ma
, Chia-Wei Tsou:
A novel passive-active detection system for false data injection attacks in industrial control systems. 103996 - Justin Woodring
, Katherine Perez
, Aisha I. Ali-Gombe:
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models. 103997 - Or Haim Anidjar
, Revital Marbel, Ran Dubin
, Amit Dvir, Chen Hajaj
:
Extending limited datasets with GAN-like self-supervision for SMS spam detection. 103998 - Yuelin Hu
, Futai Zou
, Jiajia Han, Xin Sun, Yilei Wang:
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model. 103999 - Zisheng Xu
, Qiao Yan:
Boosting the transferability of adversarial CAPTCHAs. 104000 - Fatma Foad Ashrif, Elankovan A. Sundararajan
, Mohammad Kamrul Hasan, Rami Ahmad
, Salwani Abdullah, Raniyah Wazirali
:
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications. 104002 - Yang Qin, Xiaofan Yang
, Lu-Xing Yang, Kaifan Huang:
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach. 104003 - Xinxing Zhao
, Kar-Wai Fok, Vrizlynn L. L. Thing
:
Enhancing network intrusion detection performance using generative adversarial networks. 104005 - Ali AlSabeh
, Kurt Friday, Elie F. Kfoury, Jorge Crichigno, Elias Bou-Harb:
On DGA Detection and Classification Using P4 Programmable Switches. 104007 - Unal Tatar
, Bilge Karabacak
, Omer F. Keskin
, Dominick P. Foti:
Charting new waters with CRAMMTS: A survey-driven cybersecurity risk analysis method for maritime stakeholders. 104015 - Marko Niemimaa
:
Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour. 103986 - Felix Viktor Jedrzejewski
, Lukas Thode
, Jannik Fischbach, Tony Gorschek, Daniel Méndez
, Niklas Lavesson
:
Adversarial Machine Learning in Industry: A Systematic Literature Review. 103988 - Arunachalam Rajesh, Kanmani Ruby Erode Dhanapal:
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection. 103991 - Aiyan Qu, Qiuhui Shen, Gholamreza Ahmadi
:
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network. 104004 - Mohammad Hamad
, Andreas Finkenzeller, Michael Kühr, Andrew Roberts
, Olaf Maennel
, Vassilis Prevelakis, Sebastian Steinhorst
:
REACT: Autonomous intrusion response system for intelligent vehicles. 104008 - Yiren Chen
, Mengjiao Cui, Ding Wang, Yiyang Cao
, Peian Yang
, Bo Jiang, Zhigang Lu, Baoxu Liu:
A survey of large language models for cyber threat detection. 104016 - Guiqi Zhang
, Yufeng Li:
Voltage inspector: Sender identification for in-vehicle CAN bus using voltage slice. 104017 - Malak Annabi, Abdelhafid Zeroual
, Nadhir Messai:
Towards zero trust security in connected vehicles: A comprehensive survey. 104018 - Yuxiang Ma
, Zhaodi Li, Haoming Xue, Jike Chang
:
A balanced supervised contrastive learning-based method for encrypted network traffic classification. 104023 - Jiaxuan Han, Cheng Huang
, Jiayong Liu:
bjCnet: A contrastive learning-based framework for software defect prediction. 104024 - Alladean Chidukwani
, Sebastian Zander, Polychronis Koutsakis:
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications. 104026 - Ke He
, Dan Dongseong Kim
, Muhammad Rizwan Asghar
:
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system. 104028 - Xunzhi Jiang
, Shen Wang, Yuxin Gong, Tingyue Yu
, Li Liu, Xiangzhan Yu:
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection. 104029
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.