default search action
Computers & Security, Volume 116
Volume 116, May 2022
- Padmavathi Iyer, Amirreza Masoumzadeh, Paliath Narendran:
On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models. 102586 - Xiaobei Yan, Maode Ma:
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks. 102601 - Fatima Khalid, Ammar Masood:
Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE). 102628 - Olakunle Ibitoye, M. Omair Shafiq, Ashraf Matrawy:
Differentially private self-normalizing neural networks for adversarial robustness in federated learning. 102631 - Tobias Mages, Magnus Almgren, Christian Rohner:
Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses. 102633 - Youjin Shin, Simon S. Woo:
PasswordTensor: Analyzing and explaining password strength using tensor decomposition. 102634 - Muhammad Mudassar Yamin, Basel Katt:
Modeling and executing cyber security exercise scenarios in cyber ranges. 102635 - Jens Van den Broeck, Bart Coppens, Bjorn De Sutter:
Flexible software protection. 102636 - J. Dharani, K. Sundarakantham, Kunwar Singh, S. Mercy Shalinie:
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric. 102637 - Antonio Paya, Alba Cotarelo, Jose Manuel Redondo:
Egida: Automated security configuration deployment systems with early error detection. 102638 - Bill Jung, Yan Li, Tamir Bechor:
CAVP: A context-aware vulnerability prioritization model. 102639 - Mohammed Hassanin, Nour Moustafa, Murat Tahtali, Kim-Kwang Raymond Choo:
Rethinking maximum-margin softmax for adversarial robustness. 102640 - France Bélanger, Jürgen Maier, Michaela Maier:
A longitudinal study on improving employee information protective knowledge and behaviors. 102641 - Tanguy Gernot, Patrick Lacharme:
Biometric masterkeys. 102642 - Javier Yuste, Eduardo G. Pardo, Juan Tapiador:
Optimization of code caves in malware binaries to evade machine learning detectors. 102643 - Zhen Li, Qi Liao:
Preventive portfolio against data-selling ransomware - A game theory of encryption and deception. 102644 - Antoine Chevrot, Alexandre Vernotte, Bruno Legeard:
CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation. 102652 - Louise Thomas, Iqbal Gondal, Taiwo Oseni, Selena (Sally) Firmin:
A framework for data privacy and security accountability in data breach communications. 102657 - Amal Alahmadi, Norah Alkhraan, Wojdan Binsaeedan:
MPSAutodetect: A Malicious Powershell Script Detection Model Based on Stacked Denoising Auto-Encoder. 102658 - Damien Warren Fernando, Nikos Komninos:
FeSA: Feature selection architecture for ransomware detection under concept drift. 102659 - Stephen O'Shaughnessy, Stephen Sheridan:
Image-based malware classification hybrid framework based on space-filling curves. 102660 - Sultan S. Alqahtani:
A study on the use of vulnerabilities databases in software engineering domain. 102661 - Kyung Ho Park, Hyun Min Song, Jeong Do Yoo, Su-Youn Hong, Byoungmo Cho, Kwangsoo Kim, Huy Kang Kim:
Unsupervised malicious domain detection with less labeling effort. 102662 - Jinghong Lan, Xudong Liu, Bo Li, Yanan Li, Tongtong Geng:
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification. 102663 - Fei Chen, Jiahao Wang, Jianqiang Li, Yang Xu, Cheng Zhang, Tao Xiang:
TrustBuilder: A non-repudiation scheme for IoT cloud applications. 102664 - Anmin Fu, Weijia Ding, Boyu Kuang, Qianmu Li, Willy Susilo, Yuqing Zhang:
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices. 102666 - Bin Li, Qinglei Zhou, Yan Cao, Xueming Si:
Cognitively reconfigurable mimic-based heterogeneous password recovery system. 102667 - Ramkumar M. P., P. V. Bhaskar Reddy, J. T. Thirukrishna, Ch. Vidyadhari:
Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture. 102668 - André Cirne, Patrícia R. Sousa, João S. Resende, Luis Antunes:
IoT security certifications: Challenges and potential approaches. 102669 - Eslam Amer, Shaker H. Ali El-Sappagh:
Robust deep learning early alarm prediction model based on the behavioural smell for android malware. 102670 - Junwon Lee, Heejo Lee:
Improving SSH detection model using IPA time and WGAN-GP. 102672 - Joseph Da Silva:
Cyber security and the Leviathan. 102674 - Zhen Yang, Xiaodong Liu, Tong Li, Di Wu, Jinjiang Wang, Yunwei Zhao, Han Han:
A systematic literature review of methods and datasets for anomaly-based network intrusion detection. 102675 - Viktor Engström, Robert Lagerström:
Two decades of cyberattack simulations: A systematic literature review. 102681 - Zhaoxin Zhang, Shize Huang, Xiaowen Liu, Bingjie Zhang, Decun Dong:
Adversarial attacks on YOLACT instance segmentation. 102682 - Rui Fang, Maochao Xu, Peng Zhao:
Determination of ransomware payment based on Bayesian game models. 102685 - Ce Li, Qiujian Lv, Ning Li, Yan Wang, Degang Sun, Yuanyuan Qiao:
A novel deep framework for dynamic malware detection based on API sequence intrinsic features. 102686 - Asaf Nadler, Ron Bitton, Oleg Brodt, Asaf Shabtai:
On the vulnerability of anti-malware solutions to DNS attacks. 102687
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.