The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications at "Comput. Secur."( http://dblp.L3S.de/Venues/Comput._Secur. )

URL (DBLP): http://dblp.uni-trier.de/db/journals/compsec

Publication years (Num. hits)
1982 (38) 1983 (36) 1984 (33) 1985 (35) 1986 (55) 1987 (72) 1988 (102) 1989 (76) 1990 (69) 1991 (63) 1992 (59) 1993 (60) 1994 (57) 1995 (52) 1996 (68) 1997 (56) 1998 (72) 1999 (60) 2000 (192) 2001 (73) 2002 (75) 2003 (91) 2004 (74) 2005 (79) 2006 (68) 2007 (57) 2008 (34) 2009 (74) 2010 (68) 2011 (61) 2012 (93) 2013 (98) 2014 (92) 2015 (105) 2016 (96) 2017 (148) 2018 (203) 2019 (207) 2020 (324) 2021 (307) 2022 (334) 2023 (445) 2024 (122)
Publication types (Num. hits)
article(4583)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
No Growbag Graphs found.

Results
Found 4583 publication records. Showing 4583 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Nilufer Tuptuk, Stephen Hailes Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner Withdrawal notice to 'Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures' [Computers & Security, 97 (2020) 101931]. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ziming Zhao 0008, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang 0010, Rui Zhang 0016 DDoS family: A novel perspective for massive types of DDoS attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun Learning a deep-feature clustering model for gait-based individual identification. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jahongir Azimjonov, Taehong Kim Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Antonio Giovanni Schiavone Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Hongyu Yang, Youwei Wang, Liang Zhang 0018, Xiang Cheng, Ze Hu A novel Android malware detection method with API semantics extraction. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ben Pi, Chun Guo 0004, Yunhe Cui, Guowei Shen, Jialong Yang, Yuan Ping Remote access trojan traffic early detection method based on Markov matrices and deep learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xingsheng Qin, Frank Jiang 0001, Chengzu Dong, Robin Doss A hybrid cyber defense framework for reconnaissance attack in industrial control systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Wonwoo Choi, Minjae Seo, Seongman Lee, Brent ByungHoon Kang SuM: Efficient shadow stack protection on ARM Cortex-M. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Huang Li, Yiqin Sang, Hongjuan Ge, Jie Yan, Shijia Li Anomaly detection of aviation data bus based on SAE and IMD. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Snofy D. Dunston, V. Mary Anita Rajam AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis Hello me, meet the real me: Voice synthesis attacks on voice assistants. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Rui Zhao 0005 Toward the flow-centric detection of browser fingerprinting. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Benyuan Yang, Lili Luo, Zhimeng Wang Ensuring secure interoperation of access control in a multidomain environment. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Meng Wang, Yahao Zhang, WeiPing Wen Improved capsule networks based on Nash equilibrium for malicious code classification. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xiaojuan Zhao, Rong Jiang 0001, Yue Han, Aiping Li, Zhichao Peng A survey on cybersecurity knowledge graph construction. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez Single-board device individual authentication based on hardware performance and autoencoder transformer models. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Vittorio Orbinato Secure software development and testing: A model-based methodology. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela Personal CAPTCHA-based authentication protocol. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Syed Rizvi 0001, Iyonna Williams Analyzing transparency and malicious insiders prevention for cloud computing environment. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Henry R. K. Skeoch Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers & Security Volume 112 (2022) 102533]. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jiaxuan Geng, Junfeng Wang 0003, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Cheng-kun Jia, Min Long, Yong-chao Liu Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Joakim Kävrestad, Jana Rambusch, Marcus Nohlberg Design principles for cognitively accessible cybersecurity training. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li 0016 SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Haoxiang Huang, Jianbiao Zhang, Lei Zhang, Jun Hu, Yihao Cao SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Austin Brown, Maanak Gupta, Mahmoud Abdelsalam Automated machine learning for deep learning based malware detection. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Alejandro Guerra-Manzanares Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shouzheng Tao, Yezheng Liu 0001, Chunhua Sun Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu 0002, Bin Zhang, Qixu Liu, Xiapu Luo A comprehensive analysis of website fingerprinting defenses on Tor. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang AdvCheck: Characterizing adversarial examples via local gradient checking. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Man Zhou, Xin Che Stealthy attack detection based on controlled invariant subspace for autonomous vehicles. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Hongsong Chen, Xingyu Li, Wenmao Liu Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou 0001 A two-stage model extraction attack on GANs with a small collected dataset. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Saihua Cai, Han Xu, Mingjie Liu, Zhilin Chen, Guofeng Zhang 0015 A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tanguy Gernot, Christophe Rosenberger Robust biometric scheme against replay attacks using one-time biometric templates. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ming Liu, Xiao Song, Yong Li, Wenxin Li Correlated differential privacy based logistic regression for supplier data protection. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Erzhou Zhu, Kang Cheng, Zhizheng Zhang 0010, Huabin Wang PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig To pass or not to pass: Privacy-preserving physical access control. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Anil V. Turukmane, Ramkumar Devendiran M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Wenjie Wang, Yuanhai Shao, Yiju Wang Optimization-based adversarial perturbations against twin support vector machines. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni Survey: Automatic generation of attack trees and attack graphs. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Tarmo Korõtko Threat modeling of industrial control systems: A systematic literature review. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Juanjuan Weng, Zhiming Luo, Dazhen Lin, Shaozi Li Learning transferable targeted universal adversarial perturbations by sequential meta-learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Soumia Zohra El Mestari, Gabriele Lenzini, Hüseyin Demirci Preserving data privacy in machine learning systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Sibi Chakkaravarthy Sethuraman, Devi Priya V. S, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan A comprehensive examination of email spoofing: Issues and prospects for email security. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jeff Mitchell, Niall McLaughlin, Jesús Martínez del Rincón Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Peng Chen, Xin Du, Zhihui Lu 0002, Hongfeng Chai Universal adversarial backdoor attacks to fool vertical federated learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay Analysis of machine learning approaches to packing detection. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Samanta Mikuletic, Simon Vrhovec, Brigita Skela-Savic, Bostjan Zvanut Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Fatima Mavra Khalil, Adnan Fazil, Muhammad Jawad Hussain, Ammar Masood Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xiang Li, Jiang Xie 0004, Qige Song, Yafei Sang, Yongzheng Zhang 0002, Shuhao Li, Tianning Zang Let model keep evolving: Incremental learning for encrypted traffic classification. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri 0002, Michal Choras When explainability turns into a threat - using xAI to fool a fake news detection method. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ran Dubin Content Disarm and Reconstruction of Microsoft Office OLE files. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xiaoyu Wang, Xiaobo Yang, Xueping Liang, Xiu Zhang, Wei Zhang, Xiaorui Gong Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Minghu Wu, Wei Xiong 0004, Mingwu Zhang APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xintong Wang, Zixuan Wang, Enliang Wang, Zhixin Sun Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Hoang V. Vo, Hanh Phuong Du, Hoa Ngoc Nguyen APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Deepa D. Shankar, Adresya Suresh Azhakath, Nesma Khalil, Sajeev J, Mahalakshmi T, Sheeba K Data mining for cyber biosecurity risk management - A comprehensive review. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Longwen Zhang, Qiao Yan Detect malicious websites by building a neural network to capture global and local features of websites. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Furqan Rustam, Anca Delia Jurcut Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Susanne Durst, Christoph Hinteregger, Malgorzata Zieba The effect of environmental turbulence on cyber security risk management and organizational resilience. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jiacheng Xu, Chengxiang Tan Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart Distance-based linkage of personal microbiome records for identification and its privacy implications. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Waheed G. Gadallah, Hosny M. Ibrahim, Nagwa M. Omar A deep learning technique to detect distributed denial of service attacks in software-defined networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Zhimao Gong, Junyi Li, Yaping Lin, Lening Yuan, Wen Gao A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Wenbo Wang, Peng Yi, Junfang Jiang, Peng Zhang, Xiang Chen Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Chuang Liang, Jie Huang 0016, Zeping Zhang, Shuaishuai Zhang Defending against model extraction attacks with OOD feature learning and decision boundary confusion. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jiahao Huang, Mi Wen, Minjie Wei, Yanbing Bi Enhancing the transferability of adversarial samples with random noise techniques. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso Which factors predict susceptibility to phishing? An empirical study. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xirong Ma, Chuan Ma, Yali Jiang, Chunpeng Ge Improved privacy-preserving PCA using optimized homomorphic matrix multiplication. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong 0002 SGBA: A stealthy scapegoat backdoor attack against deep neural networks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Shi Chen, Wennan Wang, Yubin Zhong, Zuobin Ying, Weixuan Tang, Zijie Pan HP-MIA: A novel membership inference attack scheme for high membership prediction precision. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kok Onn Chee, Mengmeng Ge, Guangdong Bai, Dan Dongseong Kim IoTSecSim: A framework for modelling and simulation of security in Internet of things. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Antonio Paya, Sergio Arroni, Vicente García-Díaz, Alberto Gómez 0001 Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina CyberEntRel: Joint extraction of cyber entities and relations using deep learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Yu Cao, Ang Yang, Hanning Li, Qingcheng Zeng, Jing Gao 0001 A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xuan Zhao, Jia Yu 0003, Xinrui Ge, Rong Hao Towards efficient Secure Boolean Range Query over encrypted spatial data. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Benjamin Maximilian Berens, Mark Bohlender, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer Cookie disclaimers: Dark patterns and lack of transparency. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong Nhung-Nguyen, Jamal Hussain, Manohar Naik Sugali DDoS attack detection and mitigation using deep neural network in SDN environment. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao Integrity coded databases - protecting data integrity for outsourced databases. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xinwei Yuan, Shu Han, Wei Huang 0035, Hongliang Ye, Xianglong Kong, Fan Zhang A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Zhengwei Zhu, Miaojie Chen, Chenyang Zhu 0001, Yanping Zhu Effective defense strategies in network security using improved double dueling deep Q-network. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta Deception in double extortion ransomware attacks: An analysis of profitability and credibility. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Damien Warren Fernando, Nikos Komninos FeSAD ransomware detection framework with machine learning using adaption to concept drift. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Naomi Woods, Mikko T. Siponen How memory anxiety can influence password security behavior. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao Protocol clustering of unknown traffic based on embedding of protocol specification. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jiayi Chen, Urs Hengartner, Hassan Khan SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Jason A. Williams, Humayun Zafar, Saurabh Gupta 0003 Fortifying healthcare: An action research approach to developing an effective SETA program. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Xiyuan Zhang, Gang Xiong 0001, Zhen Li 0011, Chen Yang, Xinjie Lin, Gaopeng Gou, Binxing Fang Traffic spills the beans: A robust video identification attack against YouTube. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Yuxian Huang, Geng Yang, Hao Zhou, Hua Dai 0003, Dong Yuan, Shui Yu VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Arvind Prasad, Shalini Chandra PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
1Danilo Avola, Luigi Cinque, Maria De Marsico, Alessio Fagioli 0001, Gian Luca Foresti, Maurizio Mancini, Alessio Mecca Signal enhancement and efficient DTW-based comparison for wearable gait recognition. Search on Bibsonomy Comput. Secur. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 4583 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license