Search dblp for Publications

export results for "toc:db/journals/compsec/compsec111.bht:"

 download as .bib file

@article{DBLP:journals/compsec/AlHusainA21,
  author       = {Reem AlHusain and
                  Ali Alkhalifah},
  title        = {Evaluating fallback authentication research: {A} systematic literature
                  review},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102487},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102487},
  doi          = {10.1016/J.COSE.2021.102487},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AlHusainA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/AndradeGVA21,
  author       = {Eduardo Andrade and
                  Jorge Granjal and
                  Jo{\~{a}}o P. Vilela and
                  Carlos Arantes},
  title        = {A Security Gateway for power distribution systems in open networks},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102492},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102492},
  doi          = {10.1016/J.COSE.2021.102492},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/AndradeGVA21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BeamanBAHK21,
  author       = {Craig Beaman and
                  Ashley Barkworth and
                  Toluwalope David Akande and
                  Saqib Hakak and
                  Muhammad Khurram Khan},
  title        = {Ransomware: Recent advances, analysis, challenges and future research
                  directions},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102490},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102490},
  doi          = {10.1016/J.COSE.2021.102490},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/BeamanBAHK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Cabrero-Holgueras21,
  author       = {Jos{\'{e}} Cabrero{-}Holgueras and
                  Sergio Pastrana},
  title        = {A Methodology For Large-Scale Identification of Related Accounts in
                  Underground Forums},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102489},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102489},
  doi          = {10.1016/J.COSE.2021.102489},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Cabrero-Holgueras21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CalzavaraJKR21,
  author       = {Stefano Calzavara and
                  Hugo Jonker and
                  Benjamin Krumnow and
                  Alvise Rabitti},
  title        = {Measuring Web Session Security at Scale},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102472},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102472},
  doi          = {10.1016/J.COSE.2021.102472},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/CalzavaraJKR21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FilizACH21,
  author       = {Burak Filiz and
                  Budi Arief and
                  Or{\c{c}}un {\c{C}}etin and
                  Julio C. Hernandez{-}Castro},
  title        = {On the Effectiveness of Ransomware Decryption Tools},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102469},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102469},
  doi          = {10.1016/J.COSE.2021.102469},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FilizACH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/HuZXLKXS21,
  author       = {Yifan Hu and
                  Peidong Zhu and
                  Peng Xun and
                  Bo Liu and
                  Wenjie Kang and
                  Yinqiao Xiong and
                  Weiheng Shi},
  title        = {{CPMTD:} Cyber-physical moving target defense for hardening the security
                  of power system against false data injected attack},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102465},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102465},
  doi          = {10.1016/J.COSE.2021.102465},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HuZXLKXS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KalariaKRP21,
  author       = {Rudri Kalaria and
                  A. S. M. Kayes and
                  Wenny Rahayu and
                  Eric Pardede},
  title        = {A Secure Mutual authentication approach to fog computing environment},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102483},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102483},
  doi          = {10.1016/J.COSE.2021.102483},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KalariaKRP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/KimEKCJ21,
  author       = {Jong Wook Kim and
                  Kennedy Edemacu and
                  Jong Seon Kim and
                  Yon Dohn Chung and
                  Beakcheol Jang},
  title        = {A Survey Of differential privacy-based techniques and their applicability
                  to location-Based services},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102464},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102464},
  doi          = {10.1016/J.COSE.2021.102464},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/KimEKCJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiLLZ21,
  author       = {Ding Li and
                  Wei Lin and
                  Bin Lu and
                  Yuefei Zhu},
  title        = {Exploiting side-channel leaks in web traffic of incremental search},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102481},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102481},
  doi          = {10.1016/J.COSE.2021.102481},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiLLZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuCCGWW21,
  author       = {Xueqian Liu and
                  Shoufeng Cao and
                  Zhenzhong Cao and
                  Qu Gao and
                  Lin Wan and
                  Fengyu Wang},
  title        = {{SELF:} {A} method of searching for library functions in stripped
                  binary code},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102473},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102473},
  doi          = {10.1016/J.COSE.2021.102473},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuCCGWW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LiuZDZ21,
  author       = {Xiaohu Liu and
                  Hengwei Zhang and
                  Shuqin Dong and
                  Yuchen Zhang},
  title        = {Network defense decision-making based on a stochastic game system
                  and a deep recurrent Q-network},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102480},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102480},
  doi          = {10.1016/J.COSE.2021.102480},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LiuZDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/LyvasLG21,
  author       = {Christos Lyvas and
                  Costas Lambrinoudakis and
                  Dimitris Geneiatakis},
  title        = {On Android's activity hijacking prevention},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102468},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102468},
  doi          = {10.1016/J.COSE.2021.102468},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/LyvasLG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MamdouhAKH21,
  author       = {Moustafa Mamdouh and
                  Ali Ismail Awad and
                  Ashraf A. M. Khalaf and
                  Hesham F. A. Hamed},
  title        = {Authentication and Identity Management of IoHT Devices: Achievements,
                  Challenges, and Future Directions},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102491},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102491},
  doi          = {10.1016/J.COSE.2021.102491},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MamdouhAKH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/McIntoshKCNW21,
  author       = {Timothy R. McIntosh and
                  A. S. M. Kayes and
                  Yi{-}Ping Phoebe Chen and
                  Alex Ng and
                  Paul A. Watters},
  title        = {Dynamic user-centric access control for detection of ransomware attacks},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102461},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102461},
  doi          = {10.1016/J.COSE.2021.102461},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/McIntoshKCNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/Nguyen-DucDHKN21,
  author       = {Anh Nguyen{-}Duc and
                  Manh Viet Do and
                  Quan Luong Hong and
                  Kiem Nguyen Khac and
                  Anh Nguyen Quang},
  title        = {On the adoption of static analysis for software security assessment-A
                  case study of an open-source e-government project},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102470},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102470},
  doi          = {10.1016/J.COSE.2021.102470},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/Nguyen-DucDHKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SchletteVP21,
  author       = {Daniel Schlette and
                  Manfred Vielberth and
                  G{\"{u}}nther Pernul},
  title        = {{CTI-SOC2M2} - The quest for mature, intelligence-driven security
                  operations and incident response capabilities},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102482},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102482},
  doi          = {10.1016/J.COSE.2021.102482},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SchletteVP21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShengYFYL21,
  author       = {Chuan Sheng and
                  Yu Yao and
                  Qiang Fu and
                  Wei Yang and
                  Ying Liu},
  title        = {Study on the intelligent honeynet model for containing the spread
                  of industrial viruses},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102460},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102460},
  doi          = {10.1016/J.COSE.2021.102460},
  timestamp    = {Wed, 05 Feb 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ShengYFYL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShepherdMHAGHN21,
  author       = {Carlton Shepherd and
                  Konstantinos Markantonakis and
                  Nico van Heijningen and
                  Driss Aboulkassimi and
                  Cl{\'{e}}ment Gaine and
                  Thibaut Heckmann and
                  David Naccache},
  title        = {Physical fault injection and side-channel attacks on mobile devices:
                  {A} comprehensive analysis},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102471},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102471},
  doi          = {10.1016/J.COSE.2021.102471},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ShepherdMHAGHN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SlijepcevicHKDK21,
  author       = {Djordje Slijepcevic and
                  Maximilian Henzl and
                  Lukas Daniel Klausner and
                  Tobias Dam and
                  Peter Kieseberg and
                  Matthias Zeppelzauer},
  title        = {k-Anonymity in practice: How generalisation and suppression affect
                  machine learning classifiers},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102488},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102488},
  doi          = {10.1016/J.COSE.2021.102488},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SlijepcevicHKDK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SolankiLBG21,
  author       = {Rajendra Kumar Solanki and
                  Vijay Laxmi and
                  Bruhadeshwar Bezawada and
                  Manoj Singh Gaur},
  title        = {MapperDroid: Verifying app capabilities from description to permissions
                  and {API} calls},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102493},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102493},
  doi          = {10.1016/J.COSE.2021.102493},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SolankiLBG21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SultanJ21,
  author       = {Shizra Sultan and
                  Christian Damsgaard Jensen},
  title        = {Metadata based need-to-know view in large-scale video surveillance
                  systems},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102452},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102452},
  doi          = {10.1016/J.COSE.2021.102452},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SultanJ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/SunYGYK21,
  author       = {Fangyuan Sun and
                  Jia Yu and
                  Xinrui Ge and
                  Ming Yang and
                  Fanyu Kong},
  title        = {Constrained top-k nearest fuzzy keyword queries on encrypted graph
                  in road network},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102456},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102456},
  doi          = {10.1016/J.COSE.2021.102456},
  timestamp    = {Sat, 31 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/SunYGYK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangHPL21,
  author       = {Leran Wang and
                  Md. Shafaeat Hossain and
                  Joshua Pulfrey and
                  Lisa Lancor},
  title        = {The effectiveness of zoom touchscreen gestures for authentication
                  and identification and its changes over time},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102462},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102462},
  doi          = {10.1016/J.COSE.2021.102462},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangHPL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuFY21,
  author       = {Zhifeng Xu and
                  Xianjin Fang and
                  Gaoming Yang},
  title        = {Malbert: {A} novel pre-training method for malware detection},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102458},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102458},
  doi          = {10.1016/J.COSE.2021.102458},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuFY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuWY21,
  author       = {Jian Xu and
                  Xuequn Wang and
                  Lvxin Yan},
  title        = {The moderating effect of abusive supervision on information security
                  policy compliance: Evidence from the hospitality industry},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102455},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102455},
  doi          = {10.1016/J.COSE.2021.102455},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XuWY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/YangCCZ21,
  author       = {Rui Yang and
                  Tian{-}Jie Cao and
                  Xiu{-}Qing Chen and
                  Feng{-}Rong Zhang},
  title        = {A novel and universal GAN-based countermeasure to recover adversarial
                  examples to benign examples},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102457},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102457},
  doi          = {10.1016/J.COSE.2021.102457},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/YangCCZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoGM21,
  author       = {Jinxiong Zhao and
                  Sensen Guo and
                  Dejun Mu},
  title        = {DouBiGRU-A: Software defect detection algorithm based on attention
                  mechanism and double BiGRU},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102459},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102459},
  doi          = {10.1016/J.COSE.2021.102459},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoGM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZhaoHJGL21,
  author       = {Xu Zhao and
                  Guangqiu Huang and
                  Jin Jiang and
                  Ling Gao and
                  Maozhen Li},
  title        = {Research on lightweight anomaly detection of multimedia traffic in
                  edge computing},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102463},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102463},
  doi          = {10.1016/J.COSE.2021.102463},
  timestamp    = {Wed, 29 Jan 2025 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/ZhaoHJGL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ZibakSS21,
  author       = {Adam Zibak and
                  Clemens Sauerwein and
                  Andrew Simpson},
  title        = {A success model for cyber threat intelligence management platforms},
  journal      = {Comput. Secur.},
  volume       = {111},
  pages        = {102466},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.cose.2021.102466},
  doi          = {10.1016/J.COSE.2021.102466},
  timestamp    = {Thu, 20 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/ZibakSS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}