|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
No Growbag Graphs found.
|
|
|
Results
Found 4583 publication records. Showing 4583 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
1 | Nilufer Tuptuk, Stephen Hailes |
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Maoli Wang, Xiaodong Zang, Jianbo Cao, Bowen Zhang, Shengbao Li |
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Noman H. Chowdhury, Marc T. P. Adam, Timm Teubner |
Withdrawal notice to 'Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures' [Computers & Security, 97 (2020) 101931]. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ziming Zhao 0008, Zhaoxuan Li, Zhihao Zhou, Jiongchi Yu, Zhuoxue Song, Xiaofei Xie, Fan Zhang 0010, Rui Zhang 0016 |
DDoS family: A novel perspective for massive types of DDoS attacks. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Kamal Taha, Paul D. Yoo, Yousof Al-Hammadi, Sami Muhaidat, Chan Yeob Yeun |
Learning a deep-feature clustering model for gait-based individual identification. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jahongir Azimjonov, Taehong Kim |
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni |
Corrigendum to "Survey: Automatic generation of attack trees and attack graphs" [Computers & Security Volume 137, February 2024, 103602]. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Giovanni Schiavone |
Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities' websites. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Hongyu Yang, Youwei Wang, Liang Zhang 0018, Xiang Cheng, Ze Hu |
A novel Android malware detection method with API semantics extraction. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ben Pi, Chun Guo 0004, Yunhe Cui, Guowei Shen, Jialong Yang, Yuan Ping |
Remote access trojan traffic early detection method based on Markov matrices and deep learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xingsheng Qin, Frank Jiang 0001, Chengzu Dong, Robin Doss |
A hybrid cyber defense framework for reconnaissance attack in industrial control systems. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Wonwoo Choi, Minjae Seo, Seongman Lee, Brent ByungHoon Kang |
SuM: Efficient shadow stack protection on ARM Cortex-M. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Huang Li, Yiqin Sang, Hongjuan Ge, Jie Yan, Shijia Li |
Anomaly detection of aviation data bus based on SAE and IMD. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Snofy D. Dunston, V. Mary Anita Rajam |
AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Domna Bilika, Nikoletta Michopoulou, Efthimios Alepis, Constantinos Patsakis |
Hello me, meet the real me: Voice synthesis attacks on voice assistants. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Rui Zhao 0005 |
Toward the flow-centric detection of browser fingerprinting. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Benyuan Yang, Lili Luo, Zhimeng Wang |
Ensuring secure interoperation of access control in a multidomain environment. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Meng Wang, Yahao Zhang, WeiPing Wen |
Improved capsule networks based on Nash equilibrium for malicious code classification. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xiaojuan Zhao, Rong Jiang 0001, Yue Han, Aiping Li, Zhichao Peng |
A survey on cybersecurity knowledge graph construction. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez |
Single-board device individual authentication based on hardware performance and autoencoder transformer models. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Valentina Casola, Alessandra De Benedictis, Carlo Mazzocca, Vittorio Orbinato |
Secure software development and testing: A model-based methodology. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Natalia Krzyworzeka, Lidia Ogiela, Marek R. Ogiela |
Personal CAPTCHA-based authentication protocol. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Syed Rizvi 0001, Iyonna Williams |
Analyzing transparency and malicious insiders prevention for cloud computing environment. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Henry R. K. Skeoch |
Corrigendum to "Expanding the Gordon-Loeb model to cyber-insurance" [Computers & Security Volume 112 (2022) 102533]. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jiaxuan Geng, Junfeng Wang 0003, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Cheng-kun Jia, Min Long, Yong-chao Liu |
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Joakim Kävrestad, Jana Rambusch, Marcus Nohlberg |
Design principles for cognitively accessible cybersecurity training. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Junhao Li, Junjiang He, Wenshan Li, Wenbo Fang, Geying Yang, Tao Li 0016 |
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Haoxiang Huang, Jianbiao Zhang, Lei Zhang, Jun Hu, Yihao Cao |
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Austin Brown, Maanak Gupta, Mahmoud Abdelsalam |
Automated machine learning for deep learning based malware detection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Alejandro Guerra-Manzanares |
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Shouzheng Tao, Yezheng Liu 0001, Chunhua Sun |
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xi Xiao, Xiang Zhou, Zhenyu Yang, Le Yu 0002, Bin Zhang, Qixu Liu, Xiapu Luo |
A comprehensive analysis of website fingerprinting defenses on Tor. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ruoxi Chen, Haibo Jin, Jinyin Chen, Haibin Zheng, Shilian Zheng, Xiaoniu Yang, Xing Yang |
AdvCheck: Characterizing adversarial examples via local gradient checking. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Man Zhou, Xin Che |
Stealthy attack detection based on controlled invariant subspace for autonomous vehicles. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Hongsong Chen, Xingyu Li, Wenmao Liu |
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou 0001 |
A two-stage model extraction attack on GANs with a small collected dataset. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Binghui Zou, Chunjie Cao, Longjuan Wang, Sizheng Fu, Tonghua Qiao, Jingzhang Sun |
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Saihua Cai, Han Xu, Mingjie Liu, Zhilin Chen, Guofeng Zhang 0015 |
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Tanguy Gernot, Christophe Rosenberger |
Robust biometric scheme against replay attacks using one-time biometric templates. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ming Liu, Xiao Song, Yong Li, Wenxin Li |
Correlated differential privacy based logistic regression for supplier data protection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Erzhou Zhu, Kang Cheng, Zhizheng Zhang 0010, Huabin Wang |
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jesús García Rodríguez, Stephan Krenn, Daniel Slamanig |
To pass or not to pass: Privacy-preserving physical access control. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Anil V. Turukmane, Ramkumar Devendiran |
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Wenjie Wang, Yuanhai Shao, Yiju Wang |
Optimization-based adversarial perturbations against twin support vector machines. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Alyzia Maria Konsta, Alberto Lluch-Lafuente, Beatrice Spiga, Nicola Dragoni |
Survey: Automatic generation of attack trees and attack graphs. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Shaymaa Mamdouh Khalil, Hayretdin Bahsi, Tarmo Korõtko |
Threat modeling of industrial control systems: A systematic literature review. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Juanjuan Weng, Zhiming Luo, Dazhen Lin, Shaozi Li |
Learning transferable targeted universal adversarial perturbations by sequential meta-learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Soumia Zohra El Mestari, Gabriele Lenzini, Hüseyin Demirci |
Preserving data privacy in machine learning systems. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Sibi Chakkaravarthy Sethuraman, Devi Priya V. S, Tarun Reddi, Mulka Sai Tharun Reddy, Muhammad Khurram Khan |
A comprehensive examination of email spoofing: Issues and prospects for email security. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jeff Mitchell, Niall McLaughlin, Jesús Martínez del Rincón |
Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Peng Chen, Xin Du, Zhihui Lu 0002, Hongfeng Chai |
Universal adversarial backdoor attacks to fool vertical federated learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Charles-Henry Bertrand Van Ouytsel, Khanh-Huu-The Dam, Axel Legay |
Analysis of machine learning approaches to packing detection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Samanta Mikuletic, Simon Vrhovec, Brigita Skela-Savic, Bostjan Zvanut |
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Fatima Mavra Khalil, Adnan Fazil, Muhammad Jawad Hussain, Ammar Masood |
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xiang Li, Jiang Xie 0004, Qige Song, Yafei Sang, Yongzheng Zhang 0002, Shuhao Li, Tianning Zang |
Let model keep evolving: Incremental learning for encrypted traffic classification. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Rafal Kozik, Massimo Ficco, Aleksandra Pawlicka, Marek Pawlicki, Francesco Palmieri 0002, Michal Choras |
When explainability turns into a threat - using xAI to fool a fake news detection method. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ran Dubin |
Content Disarm and Reconstruction of Microsoft Office OLE files. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xiaoyu Wang, Xiaobo Yang, Xueping Liang, Xiu Zhang, Wei Zhang, Xiaorui Gong |
Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Haina Song, Hua Shen, Nan Zhao, Zhangqing He, Minghu Wu, Wei Xiong 0004, Mingwu Zhang |
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xintong Wang, Zixuan Wang, Enliang Wang, Zhixin Sun |
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Hoang V. Vo, Hanh Phuong Du, Hoa Ngoc Nguyen |
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Deepa D. Shankar, Adresya Suresh Azhakath, Nesma Khalil, Sajeev J, Mahalakshmi T, Sheeba K |
Data mining for cyber biosecurity risk management - A comprehensive review. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Longwen Zhang, Qiao Yan |
Detect malicious websites by building a neural network to capture global and local features of websites. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Furqan Rustam, Anca Delia Jurcut |
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xixing Li, Lei Zhao, Qiang Wei, Zehui Wu, Weiming Shi, Yunchao Wang |
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Susanne Durst, Christoph Hinteregger, Malgorzata Zieba |
The effect of environmental turbulence on cyber security risk management and organizational resilience. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jiacheng Xu, Chengxiang Tan |
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Rudolf Mayer, Markus Hittmeir, Andreas Ekelhart |
Distance-based linkage of personal microbiome records for identification and its privacy implications. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Waheed G. Gadallah, Hosny M. Ibrahim, Nagwa M. Omar |
A deep learning technique to detect distributed denial of service attacks in software-defined networks. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Zhimao Gong, Junyi Li, Yaping Lin, Lening Yuan, Wen Gao |
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Wenbo Wang, Peng Yi, Junfang Jiang, Peng Zhang, Xiang Chen |
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Chuang Liang, Jie Huang 0016, Zeping Zhang, Shuaishuai Zhang |
Defending against model extraction attacks with OOD feature learning and decision boundary confusion. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Maximilian Berens, Mattia Mossano, Melanie Volkamer |
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jiahao Huang, Mi Wen, Minjie Wei, Yanbing Bi |
Enhancing the transferability of adversarial samples with random noise techniques. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Liliana Ribeiro, Inês Sousa Guedes, Carla Sofia Cardoso |
Which factors predict susceptibility to phishing? An empirical study. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xirong Ma, Chuan Ma, Yali Jiang, Chunpeng Ge |
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong 0002 |
SGBA: A stealthy scapegoat backdoor attack against deep neural networks. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Shi Chen, Wennan Wang, Yubin Zhong, Zuobin Ying, Weixuan Tang, Zijie Pan |
HP-MIA: A novel membership inference attack scheme for high membership prediction precision. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Kok Onn Chee, Mengmeng Ge, Guangdong Bai, Dan Dongseong Kim |
IoTSecSim: A framework for modelling and simulation of security in Internet of things. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Antonio Paya, Sergio Arroni, Vicente García-Díaz, Alberto Gómez 0001 |
Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Tieming Chen, Huan Zeng, Mingqi Lv, Tiantian Zhu |
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Kashan Ahmed, Syed Khaldoon Khurshid, Sadaf Hina |
CyberEntRel: Joint extraction of cyber entities and relations using deep learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Yu Cao, Ang Yang, Hanning Li, Qingcheng Zeng, Jing Gao 0001 |
A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xuan Zhao, Jia Yu 0003, Xinrui Ge, Rong Hao |
Towards efficient Secure Boolean Range Query over encrypted spatial data. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Benjamin Maximilian Berens, Mark Bohlender, Heike Dietmann, Chiara Krisam, Oksana Kulyk, Melanie Volkamer |
Cookie disclaimers: Dark patterns and lack of transparency. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Vanlalruata Hnamte, Ashfaq Ahmad Najar, Hong Nhung-Nguyen, Jamal Hussain, Manohar Naik Sugali |
DDoS attack detection and mitigation using deep neural network in SDN environment. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jyh-haw Yeh, Md Mashrur Arifin, Ning Shen, Ujwal Karki, Yi Xie, Archana Nanjundarao |
Integrity coded databases - protecting data integrity for outsourced databases. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xinwei Yuan, Shu Han, Wei Huang 0035, Hongliang Ye, Xianglong Kong, Fan Zhang |
A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Zhengwei Zhu, Miaojie Chen, Chenyang Zhu 0001, Yanping Zhu |
Effective defense strategies in network security using improved double dueling deep Q-network. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Tom Meurs, Edward J. Cartwright, Anna Cartwright 0001, Marianne Junger, Abhishta Abhishta |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Damien Warren Fernando, Nikos Komninos |
FeSAD ransomware detection framework with machine learning using adaption to concept drift. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Naomi Woods, Mikko T. Siponen |
How memory anxiety can influence password security behavior. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Junchen Li, Guang Cheng, Zongyao Chen, Peng Zhao |
Protocol clustering of unknown traffic based on embedding of protocol specification. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jiayi Chen, Urs Hengartner, Hassan Khan |
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Jason A. Williams, Humayun Zafar, Saurabh Gupta 0003 |
Fortifying healthcare: An action research approach to developing an effective SETA program. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Xiyuan Zhang, Gang Xiong 0001, Zhen Li 0011, Chen Yang, Xinjie Lin, Gaopeng Gou, Binxing Fang |
Traffic spills the beans: A robust video identification attack against YouTube. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Yuxian Huang, Geng Yang, Hao Zhou, Hua Dai 0003, Dong Yuan, Shui Yu |
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Arvind Prasad, Shalini Chandra |
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
1 | Danilo Avola, Luigi Cinque, Maria De Marsico, Alessio Fagioli 0001, Gian Luca Foresti, Maurizio Mancini, Alessio Mecca |
Signal enhancement and efficient DTW-based comparison for wearable gait recognition. |
Comput. Secur. |
2024 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 4583 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|