![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 36 matches
- 2024
- Akshay Aggarwal
, Shashi Kant Srivastava:
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector. Comput. Secur. 142: 103857 (2024) - Yaser Baseri, Vikas Chouhan, Abdelhakim Hafid:
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols. Comput. Secur. 142: 103883 (2024) - Mingcan Cen, Xizhen Deng, Frank Jiang
, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. Comput. Secur. 142: 103849 (2024) - Sunil Chaudhary
:
Driving behaviour change with cybersecurity awareness. Comput. Secur. 142: 103858 (2024) - Lalitha Chavali
, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula
:
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems. Comput. Secur. 142: 103854 (2024) - Xi Chen
, Wei Huang
, Ziwen Peng, Wei Guo, Fan Zhang:
Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions. Comput. Secur. 142: 103861 (2024) - Xiuzhen Chen, Weicheng Qiu, Lixing Chen
, Yinghua Ma
, Jin Ma
:
Fast and practical intrusion detection system based on federated learning for VANET. Comput. Secur. 142: 103881 (2024) - Frank Cremer, Barry Sheehan
, Martin Mullins, Michael Fortmann, Barry J. Ryan, Stefan Materne:
On the insurability of cyber warfare: An investigation into the German cyber insurance market. Comput. Secur. 142: 103886 (2024) - Joshua M. Davis
, Deepti Agrawal, Rebekah Austin:
Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment. Comput. Secur. 142: 103896 (2024) - M. S. Gowtham, M. Ramkumar
, S. Syed Jamaesha, M. Vigenesh:
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks. Comput. Secur. 142: 103889 (2024) - Andrew William Green
, Dejarvis Oliver
, Amy B. Woszczynski:
To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure. Comput. Secur. 142: 103880 (2024) - Siwei Guan
, Zhiwei He
, Shenhui Ma
, Mingyu Gao:
Multivariate time series anomaly detection with variational autoencoder and spatial-temporal graph network. Comput. Secur. 142: 103877 (2024) - Longtao Guo
, Huakun Huang
, Lingjun Zhao, Peiliang Wang
, Shan Jiang
, Chunhua Su
:
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping. Comput. Secur. 142: 103894 (2024) - Kholekile L. Gwebu
, Jing Wang:
The defining features of a robust information security climate. Comput. Secur. 142: 103891 (2024) - Amber Hayat
, Syed Sadaf Ali, Ashok Kumar Bhateja
, Naoufel Werghi
:
FinTem: A secure and non-invertible technique for fingerprint template protection. Comput. Secur. 142: 103876 (2024) - Yang Hoong, Davar Rezania
:
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. Comput. Secur. 142: 103852 (2024) - Jayashre K
, Amsaprabhaa M
:
Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos. Comput. Secur. 142: 103860 (2024) - Md Sabuj Khan, Hengjian Li
, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. Comput. Secur. 142: 103863 (2024) - Yufeng Li, Chengjian Huang, Qi Liu, Xiangyu Zheng, Ke Sun
:
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. Comput. Secur. 142: 103890 (2024) - Xuefeng Li, Chensu Zhao, Yi Hu, Honglin Xie, Yuhang Wang, Jingyang Zhao:
Precursor of privacy leakage detection for individual user. Comput. Secur. 142: 103879 (2024) - Peihong Lin, Pengfei Wang
, Xu Zhou, Wei Xie
, Kai Lu, Gen Zhang
:
HyperGo: Probability-based directed hybrid fuzzing. Comput. Secur. 142: 103851 (2024) - Ying-Dar Lin, Shin-Yi Yang, Didik Sudyana
, Fietyata Yudha
, Yuan-Cheng Lai
, Ren-Hung Hwang
:
Two-stage multi-datasource machine learning for attack technique and lifecycle detection. Comput. Secur. 142: 103859 (2024) - Wanping Liu, Baojuan Wang
, Dong Huang, Haolan Luo
, Ling Lu:
CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance. Comput. Secur. 142: 103882 (2024) - Pascal Maniriho
, Abdun Naser Mahmood
, Mohammad Jabed Morshed Chowdhury
:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. Comput. Secur. 142: 103864 (2024) - Yunfei Meng
, Changbo Ke, Zhiqiu Huang:
A model transformation based security policy automatic management framework for software-defined networking. Comput. Secur. 142: 103850 (2024) - Jesús Fernando Cevallos Moreno
, Alessandra Rizzardi
, Sabrina Sicari
, Alberto Coen-Porisini:
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach. Comput. Secur. 142: 103898 (2024) - Jose Antonio Onieva
, Pablo Pérez Jiménez, Javier López:
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash). Comput. Secur. 142: 103856 (2024) - Saeid Sheikhi
, Panos Kostakos
:
Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection. Comput. Secur. 142: 103885 (2024) - Gil Shenderovitz
, Nir Nissim
:
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls. Comput. Secur. 142: 103862 (2024) - Ze Shi
, Hongyi Li, Di Zhao, Chengwei Pan
:
Research on quality assessment methods for cybersecurity knowledge graphs. Comput. Secur. 142: 103848 (2024)
skipping 6 more matches
loading more results
failed to load more results, please try again later
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2025-02-05 12:26 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint