


default search action
Search dblp for Publications
export results for "toc:db/journals/compsec/compsec111.bht:"
@article{DBLP:journals/compsec/AlHusainA21, author = {Reem AlHusain and Ali Alkhalifah}, title = {Evaluating fallback authentication research: {A} systematic literature review}, journal = {Comput. Secur.}, volume = {111}, pages = {102487}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102487}, doi = {10.1016/J.COSE.2021.102487}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AlHusainA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/AndradeGVA21, author = {Eduardo Andrade and Jorge Granjal and Jo{\~{a}}o P. Vilela and Carlos Arantes}, title = {A Security Gateway for power distribution systems in open networks}, journal = {Comput. Secur.}, volume = {111}, pages = {102492}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102492}, doi = {10.1016/J.COSE.2021.102492}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/AndradeGVA21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/BeamanBAHK21, author = {Craig Beaman and Ashley Barkworth and Toluwalope David Akande and Saqib Hakak and Muhammad Khurram Khan}, title = {Ransomware: Recent advances, analysis, challenges and future research directions}, journal = {Comput. Secur.}, volume = {111}, pages = {102490}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102490}, doi = {10.1016/J.COSE.2021.102490}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Cabrero-Holgueras21, author = {Jos{\'{e}} Cabrero{-}Holgueras and Sergio Pastrana}, title = {A Methodology For Large-Scale Identification of Related Accounts in Underground Forums}, journal = {Comput. Secur.}, volume = {111}, pages = {102489}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102489}, doi = {10.1016/J.COSE.2021.102489}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Cabrero-Holgueras21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/CalzavaraJKR21, author = {Stefano Calzavara and Hugo Jonker and Benjamin Krumnow and Alvise Rabitti}, title = {Measuring Web Session Security at Scale}, journal = {Comput. Secur.}, volume = {111}, pages = {102472}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102472}, doi = {10.1016/J.COSE.2021.102472}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FilizACH21, author = {Burak Filiz and Budi Arief and Or{\c{c}}un {\c{C}}etin and Julio C. Hernandez{-}Castro}, title = {On the Effectiveness of Ransomware Decryption Tools}, journal = {Comput. Secur.}, volume = {111}, pages = {102469}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102469}, doi = {10.1016/J.COSE.2021.102469}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FilizACH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/HuZXLKXS21, author = {Yifan Hu and Peidong Zhu and Peng Xun and Bo Liu and Wenjie Kang and Yinqiao Xiong and Weiheng Shi}, title = {{CPMTD:} Cyber-physical moving target defense for hardening the security of power system against false data injected attack}, journal = {Comput. Secur.}, volume = {111}, pages = {102465}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102465}, doi = {10.1016/J.COSE.2021.102465}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HuZXLKXS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KalariaKRP21, author = {Rudri Kalaria and A. S. M. Kayes and Wenny Rahayu and Eric Pardede}, title = {A Secure Mutual authentication approach to fog computing environment}, journal = {Comput. Secur.}, volume = {111}, pages = {102483}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102483}, doi = {10.1016/J.COSE.2021.102483}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/KimEKCJ21, author = {Jong Wook Kim and Kennedy Edemacu and Jong Seon Kim and Yon Dohn Chung and Beakcheol Jang}, title = {A Survey Of differential privacy-based techniques and their applicability to location-Based services}, journal = {Comput. Secur.}, volume = {111}, pages = {102464}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102464}, doi = {10.1016/J.COSE.2021.102464}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/KimEKCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiLLZ21, author = {Ding Li and Wei Lin and Bin Lu and Yuefei Zhu}, title = {Exploiting side-channel leaks in web traffic of incremental search}, journal = {Comput. Secur.}, volume = {111}, pages = {102481}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102481}, doi = {10.1016/J.COSE.2021.102481}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiLLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuCCGWW21, author = {Xueqian Liu and Shoufeng Cao and Zhenzhong Cao and Qu Gao and Lin Wan and Fengyu Wang}, title = {{SELF:} {A} method of searching for library functions in stripped binary code}, journal = {Comput. Secur.}, volume = {111}, pages = {102473}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102473}, doi = {10.1016/J.COSE.2021.102473}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuCCGWW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LiuZDZ21, author = {Xiaohu Liu and Hengwei Zhang and Shuqin Dong and Yuchen Zhang}, title = {Network defense decision-making based on a stochastic game system and a deep recurrent Q-network}, journal = {Comput. Secur.}, volume = {111}, pages = {102480}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102480}, doi = {10.1016/J.COSE.2021.102480}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LiuZDZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/LyvasLG21, author = {Christos Lyvas and Costas Lambrinoudakis and Dimitris Geneiatakis}, title = {On Android's activity hijacking prevention}, journal = {Comput. Secur.}, volume = {111}, pages = {102468}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102468}, doi = {10.1016/J.COSE.2021.102468}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/LyvasLG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MamdouhAKH21, author = {Moustafa Mamdouh and Ali Ismail Awad and Ashraf A. M. Khalaf and Hesham F. A. Hamed}, title = {Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions}, journal = {Comput. Secur.}, volume = {111}, pages = {102491}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102491}, doi = {10.1016/J.COSE.2021.102491}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MamdouhAKH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/McIntoshKCNW21, author = {Timothy R. McIntosh and A. S. M. Kayes and Yi{-}Ping Phoebe Chen and Alex Ng and Paul A. Watters}, title = {Dynamic user-centric access control for detection of ransomware attacks}, journal = {Comput. Secur.}, volume = {111}, pages = {102461}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102461}, doi = {10.1016/J.COSE.2021.102461}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/McIntoshKCNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/Nguyen-DucDHKN21, author = {Anh Nguyen{-}Duc and Manh Viet Do and Quan Luong Hong and Kiem Nguyen Khac and Anh Nguyen Quang}, title = {On the adoption of static analysis for software security assessment-A case study of an open-source e-government project}, journal = {Comput. Secur.}, volume = {111}, pages = {102470}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102470}, doi = {10.1016/J.COSE.2021.102470}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/Nguyen-DucDHKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SchletteVP21, author = {Daniel Schlette and Manfred Vielberth and G{\"{u}}nther Pernul}, title = {{CTI-SOC2M2} - The quest for mature, intelligence-driven security operations and incident response capabilities}, journal = {Comput. Secur.}, volume = {111}, pages = {102482}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102482}, doi = {10.1016/J.COSE.2021.102482}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SchletteVP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShengYFYL21, author = {Chuan Sheng and Yu Yao and Qiang Fu and Wei Yang and Ying Liu}, title = {Study on the intelligent honeynet model for containing the spread of industrial viruses}, journal = {Comput. Secur.}, volume = {111}, pages = {102460}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102460}, doi = {10.1016/J.COSE.2021.102460}, timestamp = {Wed, 05 Feb 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ShengYFYL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ShepherdMHAGHN21, author = {Carlton Shepherd and Konstantinos Markantonakis and Nico van Heijningen and Driss Aboulkassimi and Cl{\'{e}}ment Gaine and Thibaut Heckmann and David Naccache}, title = {Physical fault injection and side-channel attacks on mobile devices: {A} comprehensive analysis}, journal = {Comput. Secur.}, volume = {111}, pages = {102471}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102471}, doi = {10.1016/J.COSE.2021.102471}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ShepherdMHAGHN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SlijepcevicHKDK21, author = {Djordje Slijepcevic and Maximilian Henzl and Lukas Daniel Klausner and Tobias Dam and Peter Kieseberg and Matthias Zeppelzauer}, title = {k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers}, journal = {Comput. Secur.}, volume = {111}, pages = {102488}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102488}, doi = {10.1016/J.COSE.2021.102488}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SlijepcevicHKDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SolankiLBG21, author = {Rajendra Kumar Solanki and Vijay Laxmi and Bruhadeshwar Bezawada and Manoj Singh Gaur}, title = {MapperDroid: Verifying app capabilities from description to permissions and {API} calls}, journal = {Comput. Secur.}, volume = {111}, pages = {102493}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102493}, doi = {10.1016/J.COSE.2021.102493}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SolankiLBG21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SultanJ21, author = {Shizra Sultan and Christian Damsgaard Jensen}, title = {Metadata based need-to-know view in large-scale video surveillance systems}, journal = {Comput. Secur.}, volume = {111}, pages = {102452}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102452}, doi = {10.1016/J.COSE.2021.102452}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SultanJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/SunYGYK21, author = {Fangyuan Sun and Jia Yu and Xinrui Ge and Ming Yang and Fanyu Kong}, title = {Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network}, journal = {Comput. Secur.}, volume = {111}, pages = {102456}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102456}, doi = {10.1016/J.COSE.2021.102456}, timestamp = {Sat, 31 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/SunYGYK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangHPL21, author = {Leran Wang and Md. Shafaeat Hossain and Joshua Pulfrey and Lisa Lancor}, title = {The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time}, journal = {Comput. Secur.}, volume = {111}, pages = {102462}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102462}, doi = {10.1016/J.COSE.2021.102462}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangHPL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuFY21, author = {Zhifeng Xu and Xianjin Fang and Gaoming Yang}, title = {Malbert: {A} novel pre-training method for malware detection}, journal = {Comput. Secur.}, volume = {111}, pages = {102458}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102458}, doi = {10.1016/J.COSE.2021.102458}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XuFY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuWY21, author = {Jian Xu and Xuequn Wang and Lvxin Yan}, title = {The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry}, journal = {Comput. Secur.}, volume = {111}, pages = {102455}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102455}, doi = {10.1016/J.COSE.2021.102455}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XuWY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/YangCCZ21, author = {Rui Yang and Tian{-}Jie Cao and Xiu{-}Qing Chen and Feng{-}Rong Zhang}, title = {A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples}, journal = {Comput. Secur.}, volume = {111}, pages = {102457}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102457}, doi = {10.1016/J.COSE.2021.102457}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/YangCCZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoGM21, author = {Jinxiong Zhao and Sensen Guo and Dejun Mu}, title = {DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU}, journal = {Comput. Secur.}, volume = {111}, pages = {102459}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102459}, doi = {10.1016/J.COSE.2021.102459}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoGM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZhaoHJGL21, author = {Xu Zhao and Guangqiu Huang and Jin Jiang and Ling Gao and Maozhen Li}, title = {Research on lightweight anomaly detection of multimedia traffic in edge computing}, journal = {Comput. Secur.}, volume = {111}, pages = {102463}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102463}, doi = {10.1016/J.COSE.2021.102463}, timestamp = {Wed, 29 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/ZhaoHJGL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/ZibakSS21, author = {Adam Zibak and Clemens Sauerwein and Andrew Simpson}, title = {A success model for cyber threat intelligence management platforms}, journal = {Comput. Secur.}, volume = {111}, pages = {102466}, year = {2021}, url = {https://doi.org/10.1016/j.cose.2021.102466}, doi = {10.1016/J.COSE.2021.102466}, timestamp = {Thu, 20 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/ZibakSS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.