default search action
Journal of Computer Security, Volume 32
Volume 32, Number 1, 2024
- Stephen Kahara Wanjau, Geoffrey Mariga Wambugu, Aaron Mogeni Oirere, Geoffrey Muchiri Muketha:
Discriminative spatial-temporal feature learning for modeling network intrusion detection systems. 1-30 - Yubao Zhang, Haining Wang, Angelos Stavrou:
A multiview clustering framework for detecting deceptive reviews. 31-52 - Vinod Ramesh Falmari, M. Brindha:
Secure authentication protocols to resist off-line attacks on authentication data table. 53-76
Volume 32, Number 2, 2024
- Isaac Amankona Obiri, Abigail Akosua Addobea, Eric Affum, Jacob Ankamah, Albert Kofi Kwansah Ansah:
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud. 77-115 - Jianfeng Zhang, Wensheng Zhang, Jingdong Xu:
StegEraser: Defending cybersecurity against malicious covert communications. 117-139 - Jiale Luo, Zhewngyu Zhang, Jiesi Luo, Pin Yang, Runyu Jing:
Sequence-based malware detection using a single-bidirectional graph embedding and multi-task learning framework. 141-163 - Haopeng Fan, Wenhao Wang, Yongjuan Wang, Xiangbin Wang, Yang Gao:
Cache attacks on subkey calculation of Blowfish. 165-191
Volume 32, Number 3, 2024
- Qingtian Zou, Lan Zhang, Anoop Singhal, Xiaoyan Sun, Peng Liu:
Analysis of neural network detectors for network attacks. 193-220 - Jin Wei, Ping Chen:
DSLR-: A low-overhead data structure layout randomization for defending data-oriented programming. 221-246 - David A. Basin, Søren Debois, Thomas T. Hildebrandt:
Proactive enforcement of provisions and obligations. 247-289 - Yupeng Hu, Wenxin Kuang, Zhe Jin, Wenjia Li, Keqin Li, Jiliang Zhang, Qiao Hu:
SIAT: A systematic inter-component communication real-time analysis technique for detecting data leak threats on Android. 291-317
Volume 32, Number 4, 2024
- Prosanta Gope, Zhihui Lin, Yang Yang, Jianting Ning:
E-Tenon: An efficient privacy-preserving secure open data sharing scheme for EHR system. 319-348 - Malte Breuer, Pascal Hein, Leonardo Pompe, Urike Meyer, Susanne Wetzel:
Prioritization and exchange chains in privacy-preserving kidney exchange. 349-404 - Yan Gao, Ruizhong Du, Xiaofei Wang, Ruilin Li, Mingyue Li, Ziyuan Wang:
DRC-EDI: An integrity protection scheme based on data right confirmation for mobile edge computing. 405-423
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.