- 2024
- Akshay Aggarwal, Shashi Kant Srivastava:
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector. Comput. Secur. 142: 103857 (2024) - Yaser Baseri, Vikas Chouhan, Abdelhakim Hafid:
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols. Comput. Secur. 142: 103883 (2024) - Mingcan Cen, Xizhen Deng, Frank Jiang, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. Comput. Secur. 142: 103849 (2024) - Sunil Chaudhary:
Driving behaviour change with cybersecurity awareness. Comput. Secur. 142: 103858 (2024) - Lalitha Chavali, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula:
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems. Comput. Secur. 142: 103854 (2024) - Xi Chen, Wei Huang, Ziwen Peng, Wei Guo, Fan Zhang:
Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions. Comput. Secur. 142: 103861 (2024) - Xiuzhen Chen, Weicheng Qiu, Lixing Chen, Yinghua Ma, Jin Ma:
Fast and practical intrusion detection system based on federated learning for VANET. Comput. Secur. 142: 103881 (2024) - Frank Cremer, Barry Sheehan, Martin Mullins, Michael Fortmann, Barry J. Ryan, Stefan Materne:
On the insurability of cyber warfare: An investigation into the German cyber insurance market. Comput. Secur. 142: 103886 (2024) - Joshua M. Davis, Deepti Agrawal, Rebekah Austin:
Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment. Comput. Secur. 142: 103896 (2024) - M. S. Gowtham, M. Ramkumar, S. Syed Jamaesha, M. Vigenesh:
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks. Comput. Secur. 142: 103889 (2024) - Andrew William Green, Dejarvis Oliver, Amy B. Woszczynski:
To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure. Comput. Secur. 142: 103880 (2024) - Siwei Guan, Zhiwei He, Shenhui Ma, Mingyu Gao:
Multivariate time series anomaly detection with variational autoencoder and spatial-temporal graph network. Comput. Secur. 142: 103877 (2024) - Longtao Guo, Huakun Huang, Lingjun Zhao, Peiliang Wang, Shan Jiang, Chunhua Su:
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping. Comput. Secur. 142: 103894 (2024) - Kholekile L. Gwebu, Jing Wang:
The defining features of a robust information security climate. Comput. Secur. 142: 103891 (2024) - Amber Hayat, Syed Sadaf Ali, Ashok Kumar Bhateja, Naoufel Werghi:
FinTem: A secure and non-invertible technique for fingerprint template protection. Comput. Secur. 142: 103876 (2024) - Yang Hoong, Davar Rezania:
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. Comput. Secur. 142: 103852 (2024) - Jayashre K, Amsaprabhaa M:
Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos. Comput. Secur. 142: 103860 (2024) - Md Sabuj Khan, Hengjian Li, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. Comput. Secur. 142: 103863 (2024) - Yufeng Li, Chengjian Huang, Qi Liu, Xiangyu Zheng, Ke Sun:
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. Comput. Secur. 142: 103890 (2024) - Xuefeng Li, Chensu Zhao, Yi Hu, Honglin Xie, Yuhang Wang, Jingyang Zhao:
Precursor of privacy leakage detection for individual user. Comput. Secur. 142: 103879 (2024) - Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang:
HyperGo: Probability-based directed hybrid fuzzing. Comput. Secur. 142: 103851 (2024) - Ying-Dar Lin, Shin-Yi Yang, Didik Sudyana, Fietyata Yudha, Yuan-Cheng Lai, Ren-Hung Hwang:
Two-stage multi-datasource machine learning for attack technique and lifecycle detection. Comput. Secur. 142: 103859 (2024) - Wanping Liu, Baojuan Wang, Dong Huang, Haolan Luo, Ling Lu:
CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance. Comput. Secur. 142: 103882 (2024) - Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. Comput. Secur. 142: 103864 (2024) - Yunfei Meng, Changbo Ke, Zhiqiu Huang:
A model transformation based security policy automatic management framework for software-defined networking. Comput. Secur. 142: 103850 (2024) - Jesús Fernando Cevallos Moreno, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach. Comput. Secur. 142: 103898 (2024) - Jose Antonio Onieva, Pablo Pérez Jiménez, Javier López:
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash). Comput. Secur. 142: 103856 (2024) - Saeid Sheikhi, Panos Kostakos:
Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection. Comput. Secur. 142: 103885 (2024) - Gil Shenderovitz, Nir Nissim:
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls. Comput. Secur. 142: 103862 (2024) - Ze Shi, Hongyi Li, Di Zhao, Chengwei Pan:
Research on quality assessment methods for cybersecurity knowledge graphs. Comput. Secur. 142: 103848 (2024)