default search action
Computers & Security, Volume 142
Volume 142, 2024
- Chengyi Yang, Kun Jia, Deli Kong, Jiayin Qi, Aimin Zhou:
DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning. 103839 - Jiaru Song, Guihe Qin, Yanhua Liang, Jie Yan, Minghui Sun:
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN. 103847 - Ze Shi, Hongyi Li, Di Zhao, Chengwei Pan:
Research on quality assessment methods for cybersecurity knowledge graphs. 103848 - Mingcan Cen, Xizhen Deng, Frank Jiang, Robin Doss:
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning. 103849 - Yunfei Meng, Changbo Ke, Zhiqiu Huang:
A model transformation based security policy automatic management framework for software-defined networking. 103850 - Peihong Lin, Pengfei Wang, Xu Zhou, Wei Xie, Kai Lu, Gen Zhang:
HyperGo: Probability-based directed hybrid fuzzing. 103851 - Yang Hoong, Davar Rezania:
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises. 103852 - Lalitha Chavali, Abhinav Krishnan, Paresh Saxena, Barsha Mitra, Aneesh Sreevallabh Chivukula:
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems. 103854 - Qiannan Wang, Changchun Yin, Liming Fang, Zhe Liu, Run Wang, Chenhao Lin:
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning. 103855 - Jose Antonio Onieva, Pablo Pérez Jiménez, Javier López:
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash). 103856 - Akshay Aggarwal, Shashi Kant Srivastava:
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector. 103857 - Sunil Chaudhary:
Driving behaviour change with cybersecurity awareness. 103858 - Ying-Dar Lin, Shin-Yi Yang, Didik Sudyana, Fietyata Yudha, Yuan-Cheng Lai, Ren-Hung Hwang:
Two-stage multi-datasource machine learning for attack technique and lifecycle detection. 103859 - Jayashre K, Amsaprabhaa M:
Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos. 103860 - Xi Chen, Wei Huang, Ziwen Peng, Wei Guo, Fan Zhang:
Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions. 103861 - Gil Shenderovitz, Nir Nissim:
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls. 103862 - Md Sabuj Khan, Hengjian Li, Chuan Zhao:
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism. 103863 - Pascal Maniriho, Abdun Naser Mahmood, Mohammad Jabed Morshed Chowdhury:
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations. 103864 - Yunlong Tang, Jing Sun, Huan Wang, Junyi Deng, Liang Tong, Wenhong Xu:
A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning. 103871 - Zhiying Wang, Guiyun Li, Yajing Diao, Nianxin Wang:
Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity. 103875 - Amber Hayat, Syed Sadaf Ali, Ashok Kumar Bhateja, Naoufel Werghi:
FinTem: A secure and non-invertible technique for fingerprint template protection. 103876 - Siwei Guan, Zhiwei He, Shenhui Ma, Mingyu Gao:
Multivariate time series anomaly detection with variational autoencoder and spatial-temporal graph network. 103877 - Fadhila Tlili, Samiha Ayed, Lamia Chaari Fourati:
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS). 103878 - Xuefeng Li, Chensu Zhao, Yi Hu, Honglin Xie, Yuhang Wang, Jingyang Zhao:
Precursor of privacy leakage detection for individual user. 103879 - Andrew William Green, Dejarvis Oliver, Amy B. Woszczynski:
To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure. 103880 - Xiuzhen Chen, Weicheng Qiu, Lixing Chen, Yinghua Ma, Jin Ma:
Fast and practical intrusion detection system based on federated learning for VANET. 103881 - Wanping Liu, Baojuan Wang, Dong Huang, Haolan Luo, Ling Lu:
CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance. 103882 - Yaser Baseri, Vikas Chouhan, Abdelhakim Hafid:
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols. 103883 - Saeid Sheikhi, Panos Kostakos:
Safeguarding cyberspace: Enhancing malicious website detection with PSO optimized XGBoost and firefly-based feature selection. 103885 - Frank Cremer, Barry Sheehan, Martin Mullins, Michael Fortmann, Barry J. Ryan, Stefan Materne:
On the insurability of cyber warfare: An investigation into the German cyber insurance market. 103886 - M. S. Gowtham, M. Ramkumar, S. Syed Jamaesha, M. Vigenesh:
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks. 103889 - Yufeng Li, Chengjian Huang, Qi Liu, Xiangyu Zheng, Ke Sun:
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system. 103890 - Kholekile L. Gwebu, Jing Wang:
The defining features of a robust information security climate. 103891 - Longtao Guo, Huakun Huang, Lingjun Zhao, Peiliang Wang, Shan Jiang, Chunhua Su:
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping. 103894 - Joshua M. Davis, Deepti Agrawal, Rebekah Austin:
Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment. 103896 - Jesús Fernando Cevallos Moreno, Alessandra Rizzardi, Sabrina Sicari, Alberto Coen-Porisini:
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach. 103898
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.