default search action
Journal of Computer Security, Volume 31
Volume 31, Number 1, 2023
- Radu Ciucanu, Pascal Lafourcade, Marius Lombard-Platet, Marta Soare:
Secure protocols for cumulative reward maximization in stochastic multi-armed bandits. 1-27 - Kengo Zenitani:
A scalable algorithm for network reachability analysis with cyclic attack graphs. 29-55 - Stefano Calzavara, Pietro Ferrara, Claudio Lucchese:
Certifying machine learning models against evasion attacks by program analysis. 57-84 - Mohamed Hassaoui, Mohamed Hanini, Said El Kafhali:
Domain generated algorithms detection applying a combination of a deep feature selection and traditional machine learning models. 85-105
Volume 31, Number 2, 2023
- Anna Mpanti, Stavros D. Nikolopoulos, Leonidas Palios:
Strong watermark numbers encoded as reducible permutation graphs against edge modification attacks. 107-128 - Ziyang Han, Qingqing Ye, Haibo Hu:
OTKI-F: An efficient memory-secure multi-keyword fuzzy search protocol. 129-152 - Hammad Afzali, Santiago Torres-Arias, Reza Curtmola, Justin Cappos:
Towards verifiable web-based code review systems. 153-184
Volume 31, Number 3, 2023
- Asma Salem, Ahmad Abdel-Aziz Sharieh, Riad Jabri:
Online User Authentication System Using Keystroke Dynamics. 185-215 - Tobias Klenze, Christoph Sprenger, David A. Basin:
IsaNet: A framework for verifying secure data plane protocols. 217-259 - Flávio Neves, Rafael Roque de Souza, Juliana Sousa, Michel S. Bonfim, Vinicius C. Garcia:
Data privacy in the Internet of Things based on anonymization: A review. 261-291
Volume 31, Number 4, 2023
- Diego Sempreboni, Luca Viganò:
A mutation-based approach for the formal and automated analysis of security ceremonies. 293-364 - Ashish R. Chaudhari, Bhavesh N. Gohil, Udai Pratap Rao:
A review on cloud security issues and solutions. 365-391 - Jianfeng Zhang, Wensheng Zhang, Jingdong Xu:
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception. 393-417
Volume 31, Number 5, 2023
- Stefano Calzavara, David A. Naumann:
Special issue: 35th IEEE Computer Security Symposium - CSF 2022. 419-420 - David Mestel, Johannes Müller, Pascal Reisert:
How efficient are replay attacks against vote privacy? A formal quantitative analysis. 421-467 - Constantin Catalin Dragan, François Dupressoir, Ehsan Estaji, Kristian Gjøsteen, Thomas Haines, Peter Y. A. Ryan, Peter B. Rønne, Morten Rotvold Solberg:
Machine-checked proofs of privacy against malicious boards for Selene & Co. 469-499 - Vincent Cheval, Raphaëlle Crubillé, Steve Kremer:
Symbolic protocol verification with dice. 501-538 - Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding:
Universal optimality and robust utility bounds for metric differential privacy. 539-580 - Liyi Li, Yiyun Liu, Deena L. Postol, Leonidas Lampropoulos, David Van Horn, Michael Hicks:
A formal model of Checked C. 581-614 - Priyanka Mondal, Maximilian Algehed, Owen Arden:
Flow-limited authorization for consensus, replication, and secret sharing. 615-645
Volume 31, Number 6, 2023
- Shamik Sural, Haibing Lu:
Guest editors' introduction. 647 - Jingzhe Wang, Balaji Palanisamy:
Securing blockchain-based timed data release against adversarial attacks. 649-677 - Matt Gorbett, Caspian Siebert, Hossein Shirazi, Indrakshi Ray:
The intrinsic dimensionality of network datasets and its applications. 679-704 - Xiaodi Li, Latifur Khan, Mahmoud Zamani, Shamila Wickramasuriya, Kevin W. Hamlen, Bhavani Thuraisingham:
Con2Mix: A semi-supervised method for imbalanced tabular security data. 705-726 - Anis Bkakria:
Robust, revocable, forward and backward adaptively secure attribute-based encryption with outsourced decryption. 727-760
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.