default search action
Search dblp for Publications
export results for "toc:db/journals/jcs/jcs31.bht:"
@article{DBLP:journals/jcs/AfzaliTCC23, author = {Hammad Afzali and Santiago Torres{-}Arias and Reza Curtmola and Justin Cappos}, title = {Towards verifiable web-based code review systems}, journal = {J. Comput. Secur.}, volume = {31}, number = {2}, pages = {153--184}, year = {2023}, url = {https://doi.org/10.3233/JCS-210098}, doi = {10.3233/JCS-210098}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/AfzaliTCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Bkakria23, author = {Anis Bkakria}, title = {Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {727--760}, year = {2023}, url = {https://doi.org/10.3233/JCS-220129}, doi = {10.3233/JCS-220129}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/Bkakria23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CalzavaraFL23, author = {Stefano Calzavara and Pietro Ferrara and Claudio Lucchese}, title = {Certifying machine learning models against evasion attacks by program analysis}, journal = {J. Comput. Secur.}, volume = {31}, number = {1}, pages = {57--84}, year = {2023}, url = {https://doi.org/10.3233/JCS-210133}, doi = {10.3233/JCS-210133}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/CalzavaraFL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CalzavaraN23, author = {Stefano Calzavara and David A. Naumann}, title = {Special issue: 35th {IEEE} Computer Security Symposium - {CSF} 2022}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {419--420}, year = {2023}, url = {https://doi.org/10.3233/JCS-230950}, doi = {10.3233/JCS-230950}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/CalzavaraN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChaudhariGR23, author = {Ashish R. Chaudhari and Bhavesh N. Gohil and Udai Pratap Rao}, title = {A review on cloud security issues and solutions}, journal = {J. Comput. Secur.}, volume = {31}, number = {4}, pages = {365--391}, year = {2023}, url = {https://doi.org/10.3233/JCS-210140}, doi = {10.3233/JCS-210140}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChaudhariGR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ChevalCK23, author = {Vincent Cheval and Rapha{\"{e}}lle Crubill{\'{e}} and Steve Kremer}, title = {Symbolic protocol verification with dice}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {501--538}, year = {2023}, url = {https://doi.org/10.3233/JCS-230037}, doi = {10.3233/JCS-230037}, timestamp = {Sun, 06 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ChevalCK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/CiucanuLLS23, author = {Radu Ciucanu and Pascal Lafourcade and Marius Lombard{-}Platet and Marta Soare}, title = {Secure protocols for cumulative reward maximization in stochastic multi-armed bandits}, journal = {J. Comput. Secur.}, volume = {31}, number = {1}, pages = {1--27}, year = {2023}, url = {https://doi.org/10.3233/JCS-210051}, doi = {10.3233/JCS-210051}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/CiucanuLLS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/DraganDEGHRRS23, author = {Constantin Catalin Dragan and Fran{\c{c}}ois Dupressoir and Ehsan Estaji and Kristian Gj{\o}steen and Thomas Haines and Peter Y. A. Ryan and Peter B. R{\o}nne and Morten Rotvold Solberg}, title = {Machine-checked proofs of privacy against malicious boards for Selene {\&} Co}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {469--499}, year = {2023}, url = {https://doi.org/10.3233/JCS-230045}, doi = {10.3233/JCS-230045}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/DraganDEGHRRS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/FernandesMPD23, author = {Natasha Fernandes and Annabelle McIver and Catuscia Palamidessi and Ming Ding}, title = {Universal optimality and robust utility bounds for metric differential privacy}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {539--580}, year = {2023}, url = {https://doi.org/10.3233/JCS-230036}, doi = {10.3233/JCS-230036}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/FernandesMPD23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/GorbettSSR23, author = {Matt Gorbett and Caspian Siebert and Hossein Shirazi and Indrakshi Ray}, title = {The intrinsic dimensionality of network datasets and its applications}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {679--704}, year = {2023}, url = {https://doi.org/10.3233/JCS-220131}, doi = {10.3233/JCS-220131}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/GorbettSSR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HanYH23, author = {Ziyang Han and Qingqing Ye and Haibo Hu}, title = {{OTKI-F:} An efficient memory-secure multi-keyword fuzzy search protocol}, journal = {J. Comput. Secur.}, volume = {31}, number = {2}, pages = {129--152}, year = {2023}, url = {https://doi.org/10.3233/JCS-210145}, doi = {10.3233/JCS-210145}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HanYH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/HassaouiHK23, author = {Mohamed Hassaoui and Mohamed Hanini and Said El Kafhali}, title = {Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models}, journal = {J. Comput. Secur.}, volume = {31}, number = {1}, pages = {85--105}, year = {2023}, url = {https://doi.org/10.3233/JCS-210139}, doi = {10.3233/JCS-210139}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/HassaouiHK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/KlenzeSB23, author = {Tobias Klenze and Christoph Sprenger and David A. Basin}, title = {IsaNet: {A} framework for verifying secure data plane protocols}, journal = {J. Comput. Secur.}, volume = {31}, number = {3}, pages = {217--259}, year = {2023}, url = {https://doi.org/10.3233/JCS-220021}, doi = {10.3233/JCS-220021}, timestamp = {Sun, 04 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/KlenzeSB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiKZWHT23, author = {Xiaodi Li and Latifur Khan and Mahmoud Zamani and Shamila Wickramasuriya and Kevin W. Hamlen and Bhavani Thuraisingham}, title = {Con2Mix: {A} semi-supervised method for imbalanced tabular security data}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {705--726}, year = {2023}, url = {https://doi.org/10.3233/JCS-220130}, doi = {10.3233/JCS-220130}, timestamp = {Thu, 14 Nov 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/LiKZWHT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/LiLPLHH23, author = {Liyi Li and Yiyun Liu and Deena L. Postol and Leonidas Lampropoulos and David Van Horn and Michael Hicks}, title = {A formal model of Checked {C}}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {581--614}, year = {2023}, url = {https://doi.org/10.3233/JCS-230040}, doi = {10.3233/JCS-230040}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/LiLPLHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MestelMR23, author = {David Mestel and Johannes M{\"{u}}ller and Pascal Reisert}, title = {How efficient are replay attacks against vote privacy? {A} formal quantitative analysis}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {421--467}, year = {2023}, url = {https://doi.org/10.3233/JCS-230047}, doi = {10.3233/JCS-230047}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/MestelMR23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MondalAA23, author = {Priyanka Mondal and Maximilian Algehed and Owen Arden}, title = {Flow-limited authorization for consensus, replication, and secret sharing}, journal = {J. Comput. Secur.}, volume = {31}, number = {5}, pages = {615--645}, year = {2023}, url = {https://doi.org/10.3233/JCS-230048}, doi = {10.3233/JCS-230048}, timestamp = {Fri, 03 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/MondalAA23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/MpantiNP23, author = {Anna Mpanti and Stavros D. Nikolopoulos and Leonidas Palios}, title = {Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks}, journal = {J. Comput. Secur.}, volume = {31}, number = {2}, pages = {107--128}, year = {2023}, url = {https://doi.org/10.3233/JCS-210048}, doi = {10.3233/JCS-210048}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/MpantiNP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/NevesSSBG23, author = {Fl{\'{a}}vio Neves and Rafael Roque de Souza and Juliana Sousa and Michel S. Bonfim and Vinicius C. Garcia}, title = {Data privacy in the Internet of Things based on anonymization: {A} review}, journal = {J. Comput. Secur.}, volume = {31}, number = {3}, pages = {261--291}, year = {2023}, url = {https://doi.org/10.3233/JCS-210089}, doi = {10.3233/JCS-210089}, timestamp = {Sun, 24 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/NevesSSBG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SalemSJ23, author = {Asma Salem and Ahmad Abdel{-}Aziz Sharieh and Riad Jabri}, title = {Online User Authentication System Using Keystroke Dynamics}, journal = {J. Comput. Secur.}, volume = {31}, number = {3}, pages = {185--215}, year = {2023}, url = {https://doi.org/10.3233/JCS-210081}, doi = {10.3233/JCS-210081}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SalemSJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SempreboniV23, author = {Diego Sempreboni and Luca Vigan{\`{o}}}, title = {A mutation-based approach for the formal and automated analysis of security ceremonies}, journal = {J. Comput. Secur.}, volume = {31}, number = {4}, pages = {293--364}, year = {2023}, url = {https://doi.org/10.3233/JCS-210075}, doi = {10.3233/JCS-210075}, timestamp = {Wed, 30 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/SempreboniV23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/SuralL23, author = {Shamik Sural and Haibing Lu}, title = {Guest editors' introduction}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {647}, year = {2023}, url = {https://doi.org/10.3233/JCS-230960}, doi = {10.3233/JCS-230960}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/SuralL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/WangP23, author = {Jingzhe Wang and Balaji Palanisamy}, title = {Securing blockchain-based timed data release against adversarial attacks}, journal = {J. Comput. Secur.}, volume = {31}, number = {6}, pages = {649--677}, year = {2023}, url = {https://doi.org/10.3233/JCS-230001}, doi = {10.3233/JCS-230001}, timestamp = {Thu, 21 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcs/WangP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/Zenitani23, author = {Kengo Zenitani}, title = {A scalable algorithm for network reachability analysis with cyclic attack graphs}, journal = {J. Comput. Secur.}, volume = {31}, number = {1}, pages = {29--55}, year = {2023}, url = {https://doi.org/10.3233/JCS-210103}, doi = {10.3233/JCS-210103}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/Zenitani23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcs/ZhangZX23, author = {Jianfeng Zhang and Wensheng Zhang and Jingdong Xu}, title = {StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception}, journal = {J. Comput. Secur.}, volume = {31}, number = {4}, pages = {393--417}, year = {2023}, url = {https://doi.org/10.3233/JCS-220042}, doi = {10.3233/JCS-220042}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcs/ZhangZX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.