![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Computers & Security, Volume 89
Volume 89, February 2020
- Linan Huang
, Quanyan Zhu:
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. - Peng Luo
, Deqing Zou
, Yajuan Du, Hai Jin
, Changming Liu
, Jinan Shen:
Static detection of real-world buffer overflow induced by loop. - Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu:
Security of vehicular ad-hoc networks: A comprehensive survey. - Jiali Wang, Martin Neil, Norman E. Fenton
:
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. - Ehsan Mahdavi
, Ali Fanian, Fatima Amini:
A real-time alert correlation method based on code-books for intrusion detection systems. - Mohammed K. Alzaylaee
, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. - François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar
, Houda Jmila:
Solving security constraints for 5G slice embedding: A proof-of-concept. - Humaira Arshad
, Aman Jantan, Gan Keng Hoon, Oludare Isaac Abiodun:
Formal knowledge model for online social network forensics. - Vitor Hugo Galhardo Moia
, Frank Breitinger
, Marco Aurélio Amaral Henriques
:
The impact of excluding common blocks for approximate matching. - Deval Bhamare, Maede Zolanvari, Aiman Erbad
, Raj Jain, Khaled M. Khan
, Nader Meskin
:
Cybersecurity for industrial control systems: A survey. - Ye Wang
, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang:
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks. - Jianwu Zhang, Yu Ling, Xingbing Fu
, Xiongkun Yang, Gang Xiong, Rui Zhang:
Model of the intrusion detection system based on the integration of spatial-temporal features. - Darshana Upadhyay
, Srinivas Sampalli
:
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. - Stefan Rass, Quanyan Zhu:
Computer & security special issue editorial. - Amir Namavar Jahromi
, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo
, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. - Omer Shwartz
, Amir Cohen, Asaf Shabtai
, Yossi Oren
:
Inner conflict: How smart device components can cause harm. - Joel Höglund
, Samuel Lindemer, Martin Furuhed, Shahid Raza
:
PKI4IoT: Towards public key infrastructure for the Internet of Things. - Mohsen Ali Alawami
, Hyoungshick Kim
:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. - Oluwafemi Olukoya
, Lewis Mackenzie, Inah Omoronyia:
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. - Husam Al Jawaheri
, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
:
Deanonymizing Tor hidden service users through Bitcoin transactions analysis. - Xinbo Liu, Yaping Lin, He Li, Jiliang Zhang:
A novel method for malware detection on ML-based visualization technique.
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.