default search action
Computers & Security, Volume 92
Volume 92, May 2020
- Xiuqing Lu, Zhenkuan Pan, Hequn Xian:
An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices. 101686 - Adéle da Veiga, Liudmila V. Astakhova, Adele Botha, Marlien Herselman:
Defining organisational information security culture - Perspectives from academia and industry. 101713 - Mattia Zago, Manuel Gil Pérez, Gregorio Martínez Pérez:
UMUDGA: A dataset for profiling DGA-based botnet. 101719 - Alexis R. Neigel, Victoria L. Claypoole, Grace E. Waldfogle, Subrata Acharya, Gabriella M. Hancock:
Holistic cyber hygiene education: Accounting for the human factors. 101731 - Komal Singh Gill, Sharad Saxena, Anju Sharma:
GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot. 101732 - Branka Stojanovic, Katharina Hofer-Schmitz, Ulrike Kleb:
APT datasets and attack modeling for automated detection methods: A review. 101734 - John A. Bland, Mikel D. Petty, Tymaine S. Whitaker, Katia P. Maxwell, Walter Alan Cantrell:
Machine Learning Cyberattack and Defense Strategies. 101738 - Max Landauer, Florian Skopik, Markus Wurzenberger, Andreas Rauber:
System log clustering approaches for cyber security applications: A survey. 101739 - Baoguo Yuan, Junfeng Wang, Dong Liu, Wen Guo, Peng Wu, Xuhua Bao:
Byte-level malware classification based on markov images and deep learning. 101740 - Ning Lu, Yongxin Zhang, Wenbo Shi, Saru Kumari, Kim-Kwang Raymond Choo:
A secure and scalable data integrity auditing scheme based on hyperledger fabric. 101741 - Matheus Torquato, Marco Vieira:
Moving target defense in cloud computing: A systematic mapping study. 101742 - Manel Jerbi, Zaineb Chelly Dagdia, Slim Bechikh, Lamjed Ben Said:
On the use of artificial malicious patterns for android malware detection. 101743 - David Ortega del Campo, Alberto Fernández-Isabel, Isaac Martín de Diego, Cristina Conde, Enrique Cabello:
Dynamic facial presentation attack detection for automated border control systems. 101744 - Pardon Blessings Maoneke, Stephen Flowerday, Naomi Isabirye:
Evaluating the strength of a multilingual passphrase policy. 101746 - Rainer Diesch, Matthias Pfaff, Helmut Krcmar:
A comprehensive model of information security factors for decision-makers. 101747 - Danish Vasan, Mamoun Alazab, Sobia Wassan, Babak Safaei, Zheng Qin:
Image-Based malware classification using ensemble of CNN architectures (IMCEC). 101748 - Lijuan Xu, Bailing Wang, Lianhai Wang, Dawei Zhao, Xiaohui Han, Shumian Yang:
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints. 101749 - Ke Tian, Gang Tan, Barbara G. Ryder, Danfeng (Daphne) Yao:
Prioritizing data flows and sinks for app security transformation. 101750 - Mark A. Williams, Roberto Camacho Barranco, Sheikh Motahar Naim, Sumi Dey, Mahmud Shahriar Hossain, Monika Akbar:
A vulnerability analysis and prediction framework. 101751 - Sydney Mambwe Kasongo, Yanxia Sun:
A deep learning method with wrapper based feature extraction for wireless intrusion detection system. 101752 - Wenjuan Liang, Hong Chen, Ruixuan Liu, Yuncheng Wu, Cuiping Li:
A Pufferfish privacy mechanism for monitoring web browsing behavior under temporal correlations. 101754 - Jianghua Liu, Jingyu Hou, Xinyi Huang, Yang Xiang, Tianqing Zhu:
Secure and efficient sharing of authenticated energy usage data with privacy preservation. 101756 - Carlos Javier Hernández-Castro, Shujun Li, María D. R.-Moreno:
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks. 101758 - Eslam Amer, Ivan Zelinka:
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence. 101760 - Bongsik Shin, Paul Benjamin Lowry:
A review and theoretical explanation of the 'Cyberthreat-Intelligence (CTI) capability' that needs to be fostered in information security practitioners and how this can be accomplished. 101761 - Per Håkon Meland, Yara Fareed Fahmy Bayoumy, Guttorm Sindre:
The Ransomware-as-a-Service economy within the darknet. 101762 - Amrita Dahiya, Brij B. Gupta:
Multi attribute auction based incentivized solution against DDoS attacks. 101763 - Jakapan Suaboot, Zahir Tari, Abdun Naser Mahmood, Albert Y. Zomaya, Wei Li:
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences. 101773 - Michael Brunner, Clemens Sauerwein, Michael Felderer, Ruth Breu:
Risk management practices in information security: Exploring the status quo in the DACH region. 101776 - Jonathan Oakley, Lu Yu, Xingsi Zhong, Ganesh Kumar Venayagamoorthy, Richard R. Brooks:
Protocol Proxy: An FTE-based covert channel. 101777 - Erfan Aghasian, Saurabh Garg, James Montgomery:
An automated model to score the privacy of unstructured information - Social media case. 101778 - Matej Zuzcák, Milan Zenka:
Expert system assessing threat level of attacks on a hybrid SSH honeynet. 101784
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.