


default search action
Computers & Security, Volume 149
Volume 149, 2025
- Samuel Ansong
, Windhya Rankothge
, Somayeh Sadeghi, Hesamodin Mohammadian
, Farrukh Bin Rashid
, Ali A. Ghorbani:
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications. 104156 - Manas Kumar Yogi, A. S. N. Chakravarthy:
A novel user centric privacy mechanism in cyber physical system. 104163 - Mauro Allegretta, Giuseppe Siracusano, Roberto Gonzalez, Marco Gramaglia
, Juan Caballero:
Web of shadows: Investigating malware abuse of internet services. 104182 - Abdullah Al Mamun
, Harith Al-Sahaf
, Ian Welch
, Seyit Camtepe
:
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction. 104185 - Yefei Zhang, Sadegh Torabi
, Jun Yan, Chadi Assi
:
Dynamic trigger-based attacks against next-generation IoT malware family classifiers. 104187 - Christos Smiliotopoulos
, Georgios Kambourakis
, Constantinos Kolias, Stefanos Gritzalis
:
Assessing the detection of lateral movement through unsupervised learning techniques. 104190 - Shifa Shoukat, Tianhan Gao, Danish Javeed
, Muhammad Shahid Saeed
, Muhammad Adil:
Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks. 104191 - Xiaojian Liu
, Xinwei Guo, Wen Gu:
SecKG2vec: A novel security knowledge graph relational reasoning method based on semantic and structural fusion embedding. 104192 - Vasilis Vouvoutsis
, Fran Casino
, Constantinos Patsakis
:
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification. 104193 - Junbo Jia
, Li Yang, Yuchen Wang
, Anyuan Sang
:
Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis. 104194 - Zhiyuan Li, Lingbin Bu, Yifan Wang, Qiming Ma, Lin Tan, Fanliang Bu:
Hierarchical Perception for Encrypted Traffic Classification via Class Incremental Learning. 104195 - Uzma Kiran
, Naurin Farooq Khan, Hajra Murtaza
, Ali Farooq
, Henri Pirkkalainen:
Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory. 104204 - Razib Chandra Chanda, Ali Vafaei-Zadeh
, Haniruzila Hanifah, Davoud Nikbin:
Assessing cybersecurity awareness among bank employees: A multi-stage analytical approach using PLS-SEM, ANN, and fsQCA in a developing country context. 104208 - Jung-San Lee
, Yun-Yi Fan, Chia-Hao Cheng, Chit-Jie Chew, Chung-Wei Kuo:
ML-based intrusion detection system for precise APT cyber-clustering. 104209 - Dongping Zhang
, Mengting Wang, Yuzhen Bu, Jiabin Yu
, Li Yang
:
PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention. 104210

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.