default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 29 matches
- 2024
- Sarath Babu, Virendra Singh:
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier. Comput. Secur. 146: 104031 (2024) - Ivano Bongiovanni, David M. Herold, Simon J. Wilde:
Protecting the play: An integrative review of cybersecurity in and for sports events. Comput. Secur. 146: 104064 (2024) - Jinyin Chen, Zhiqi Cao, Ruoxi Chen, Haibin Zheng, Xiao Li, Qi Xuan, Xing Yang:
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation. Comput. Secur. 146: 104041 (2024) - Akanksha Dixit, Bruno Bogaz Zarpelão, Max Smith-Creasey, Muttukrishnan Rajarajan:
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace. Comput. Secur. 146: 104050 (2024) - Otman Driouch, Slimane Bah, Zouhair Guennoun:
CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic. Comput. Secur. 146: 104033 (2024) - Ruizhong Du, Zhuang Liang, Xiaoyan Liang:
Privacy-preserving quadratic truth discovery based on Precision partitioning. Comput. Secur. 146: 104039 (2024) - Haibin Hu, Renxin Liu, Rilong Liu:
An intelligent diagnostic model for industrial equipment with privacy protection. Comput. Secur. 146: 104036 (2024) - Rudri Kalaria, A. S. M. Kayes, Wenny Rahayu, Eric Pardede, Ahmad Salehi S.:
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks. Comput. Secur. 146: 104037 (2024) - Sotirios Katsikeas, Andrei Buhaiu, Mathias Ekstedt, Zeeshan Afzal, Simon Hacks, Preetam Mukherjee:
Development and validation of coreLang: A threat modeling language for the ICT domain. Comput. Secur. 146: 104057 (2024) - Anja Klauzer, Markus Maier, Lore Abart-Heriszt, Johanna Ullrich:
Fostering security research in the energy sector: A validation of open source intelligence for power grid model data. Comput. Secur. 146: 104042 (2024) - Qiao Li, Jing Chen, Kun He, Zijun Zhang, Ruiying Du, Jisi She, Xinxin Wang:
Corrigendum to "Model-agnostic Adversarial Example Detection via High-Frequency Amplification" [Computers & Security, Volume 141, June 2024, 103791]. Comput. Secur. 146: 104006 (2024) - Zimin Mao, Shuiyan Chen, Zhuang Miao, Heng Li, Beihao Xia, Junzhe Cai, Wei Yuan, Xinge You:
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks. Comput. Secur. 146: 104066 (2024) - Pejman Najafi, Feng Cheng, Christoph Meinel:
HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity. Comput. Secur. 146: 104040 (2024) - Muhammed Maruf Öztürk:
A cosine similarity-based labeling technique for vulnerability type detection using source codes. Comput. Secur. 146: 104059 (2024) - Alessandro Palma, Giacomo Acitelli, Andrea Marrella, Silvia Bonomi, Marco Angelini:
A compliance assessment system for Incident Management process. Comput. Secur. 146: 104070 (2024) - Nilin Prabhaker, Ghanshyam S. Bopche, Michael Arock:
Generation and deployment of honeytokens in relational databases for cyber deception. Comput. Secur. 146: 104032 (2024) - Karl van der Schyff, Suzanne Prior, Karen Renaud:
Privacy policy analysis: A scoping review and research agenda. Comput. Secur. 146: 104065 (2024) - Rahim Taheri, Mohammad Shojafar, Farzad Arabikhan, Alexander E. Gegov:
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks. Comput. Secur. 146: 104035 (2024) - Bailin Xie, Qi Li, Yu Wang:
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks. Comput. Secur. 146: 104049 (2024) - Shujiang Xie, Lian Li, Yian Zhu:
Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks. Comput. Secur. 146: 104075 (2024) - Hanlin Yang, Yajun Guo, Yimin Guo:
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming. Comput. Secur. 146: 104052 (2024) - Zhenhua Yang, Jun Kong:
Cue-based two factor authentication. Comput. Secur. 146: 104068 (2024) - Jiyun Yang, Hanwei Li, Lijun He, Tao Xiang, Yujie Jin:
MDADroid: A novel malware detection method by constructing functionality-API mapping. Comput. Secur. 146: 104061 (2024) - Chao Zha, Zhiyu Wang, Yifei Fan, Xingming Zhang, Bing Bai, Yinjie Zhang, Sainan Shi, Ruyun Zhang:
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder-decoder architecture. Comput. Secur. 146: 104056 (2024) - Zheng Zhang, Jingfeng Xue, Thar Baker, Tian Chen, Yu-an Tan, Yuanzhang Li:
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module. Comput. Secur. 146: 104038 (2024) - Bo Zhang, Yu-Jie Xiong, Chunming Xia, Yongbin Gao:
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention. Comput. Secur. 146: 104058 (2024) - Quanqiang Zhou, Cheng Huang:
A recommendation attack detection approach integrating CNN with Bagging. Comput. Secur. 146: 104030 (2024) - Fan Zhou, Dongxia Wang, Yanhai Xiong, Kun Sun, Wenhai Wang:
FAMCF: A few-shot Android malware family classification framework. Comput. Secur. 146: 104027 (2024) - Alireza Zohourian, Sajjad Dadkhah, Heather Molyneaux, Euclides Carlos Pinto Neto, Ali A. Ghorbani:
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks. Comput. Secur. 146: 104034 (2024)
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 09:38 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint