


default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 30 matches
- 2021
- Reem AlHusain
, Ali Alkhalifah
:
Evaluating fallback authentication research: A systematic literature review. Comput. Secur. 111: 102487 (2021) - Eduardo Andrade
, Jorge Granjal
, João P. Vilela
, Carlos Arantes:
A Security Gateway for power distribution systems in open networks. Comput. Secur. 111: 102492 (2021) - Craig Beaman
, Ashley Barkworth, Toluwalope David Akande, Saqib Hakak
, Muhammad Khurram Khan
:
Ransomware: Recent advances, analysis, challenges and future research directions. Comput. Secur. 111: 102490 (2021) - José Cabrero-Holgueras
, Sergio Pastrana
:
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums. Comput. Secur. 111: 102489 (2021) - Stefano Calzavara, Hugo Jonker
, Benjamin Krumnow, Alvise Rabitti
:
Measuring Web Session Security at Scale. Comput. Secur. 111: 102472 (2021) - Burak Filiz
, Budi Arief
, Orçun Çetin
, Julio C. Hernandez-Castro
:
On the Effectiveness of Ransomware Decryption Tools. Comput. Secur. 111: 102469 (2021) - Yifan Hu, Peidong Zhu, Peng Xun, Bo Liu, Wenjie Kang, Yinqiao Xiong
, Weiheng Shi
:
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack. Comput. Secur. 111: 102465 (2021) - Rudri Kalaria
, A. S. M. Kayes
, Wenny Rahayu, Eric Pardede:
A Secure Mutual authentication approach to fog computing environment. Comput. Secur. 111: 102483 (2021) - Jong Wook Kim
, Kennedy Edemacu
, Jong Seon Kim, Yon Dohn Chung, Beakcheol Jang
:
A Survey Of differential privacy-based techniques and their applicability to location-Based services. Comput. Secur. 111: 102464 (2021) - Ding Li
, Wei Lin, Bin Lu, Yuefei Zhu:
Exploiting side-channel leaks in web traffic of incremental search. Comput. Secur. 111: 102481 (2021) - Xueqian Liu
, Shoufeng Cao, Zhenzhong Cao, Qu Gao, Lin Wan, Fengyu Wang:
SELF: A method of searching for library functions in stripped binary code. Comput. Secur. 111: 102473 (2021) - Xiaohu Liu
, Hengwei Zhang
, Shuqin Dong
, Yuchen Zhang:
Network defense decision-making based on a stochastic game system and a deep recurrent Q-network. Comput. Secur. 111: 102480 (2021) - Christos Lyvas, Costas Lambrinoudakis
, Dimitris Geneiatakis:
On Android's activity hijacking prevention. Comput. Secur. 111: 102468 (2021) - Moustafa Mamdouh, Ali Ismail Awad
, Ashraf A. M. Khalaf
, Hesham F. A. Hamed:
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions. Comput. Secur. 111: 102491 (2021) - Timothy R. McIntosh
, A. S. M. Kayes
, Yi-Ping Phoebe Chen
, Alex Ng, Paul A. Watters:
Dynamic user-centric access control for detection of ransomware attacks. Comput. Secur. 111: 102461 (2021) - Anh Nguyen-Duc
, Manh Viet Do, Quan Luong Hong, Kiem Nguyen Khac, Anh Nguyen Quang:
On the adoption of static analysis for software security assessment-A case study of an open-source e-government project. Comput. Secur. 111: 102470 (2021) - Daniel Schlette
, Manfred Vielberth, Günther Pernul:
CTI-SOC2M2 - The quest for mature, intelligence-driven security operations and incident response capabilities. Comput. Secur. 111: 102482 (2021) - Chuan Sheng
, Yu Yao, Qiang Fu
, Wei Yang, Ying Liu:
Study on the intelligent honeynet model for containing the spread of industrial viruses. Comput. Secur. 111: 102460 (2021) - Carlton Shepherd
, Konstantinos Markantonakis, Nico van Heijningen, Driss Aboulkassimi, Clément Gaine
, Thibaut Heckmann, David Naccache:
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis. Comput. Secur. 111: 102471 (2021) - Djordje Slijepcevic
, Maximilian Henzl, Lukas Daniel Klausner
, Tobias Dam
, Peter Kieseberg
, Matthias Zeppelzauer:
k-Anonymity in practice: How generalisation and suppression affect machine learning classifiers. Comput. Secur. 111: 102488 (2021) - Rajendra Kumar Solanki
, Vijay Laxmi, Bruhadeshwar Bezawada, Manoj Singh Gaur:
MapperDroid: Verifying app capabilities from description to permissions and API calls. Comput. Secur. 111: 102493 (2021) - Shizra Sultan
, Christian Damsgaard Jensen:
Metadata based need-to-know view in large-scale video surveillance systems. Comput. Secur. 111: 102452 (2021) - Fangyuan Sun
, Jia Yu, Xinrui Ge
, Ming Yang
, Fanyu Kong:
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network. Comput. Secur. 111: 102456 (2021) - Leran Wang, Md. Shafaeat Hossain, Joshua Pulfrey, Lisa Lancor
:
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time. Comput. Secur. 111: 102462 (2021) - Zhifeng Xu, Xianjin Fang
, Gaoming Yang
:
Malbert: A novel pre-training method for malware detection. Comput. Secur. 111: 102458 (2021) - Jian Xu, Xuequn Wang
, Lvxin Yan:
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry. Comput. Secur. 111: 102455 (2021) - Rui Yang
, Tian-Jie Cao
, Xiu-Qing Chen, Feng-Rong Zhang:
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples. Comput. Secur. 111: 102457 (2021) - Jinxiong Zhao
, Sensen Guo, Dejun Mu:
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU. Comput. Secur. 111: 102459 (2021) - Xu Zhao
, Guangqiu Huang, Jin Jiang, Ling Gao, Maozhen Li:
Research on lightweight anomaly detection of multimedia traffic in edge computing. Comput. Secur. 111: 102463 (2021) - Adam Zibak, Clemens Sauerwein, Andrew Simpson
:
A success model for cyber threat intelligence management platforms. Comput. Secur. 111: 102466 (2021)
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-03-13 06:21 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint