


default search action
Computers & Security, Volume 125
Volume 125, February 2023
- Yogendra Kumar
, Basant Subba:
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding. 102961 - Xu Zhao, Guangqiu Huang, Jin Jiang, Ling Gao, Maozhen Li:
Corrigendum to 'Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing' Computer & Security, 111(2021) 102463. 103004 - Nandita Pattnaik
, Shujun Li
, Jason R. C. Nurse
:
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter. 103008 - Sung-Kyung Kim, Eun-Tae Jang, Hanjin Park, Ki-Woong Park
:
Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges. 103009 - Mazen Azzam
, Liliana Pasquale, Gregory M. Provan
, Bashar Nuseibeh
:
Forensic readiness of industrial control systems under stealthy attacks. 103010 - Rubayyi Alghamdi
, Martine Bellaïche
:
A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks. 103014 - Xin Li
, Yang Xin, Hongliang Zhu, Yixian Yang, Yuling Chen:
Cross-domain vulnerability detection using graph embedding and domain adaptation. 103017 - Zhong Guan, Chang Liu
, Gang Xiong
, Zhen Li, Gaopeng Gou:
FlowTracker: Improved flow correlation attacks with denoising and contrastive learning. 103018 - Wenfang Zhang, Heng Jiao
, Zhuoqun Yan, Xiaomin Wang
, Muhammad Khurram Khan
:
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing. 103019 - Allen C. Johnston
, Paul Michael Di Gangi, France Bélanger
, Robert E. Crossler
, Mikko T. Siponen, Merrill Warkentin, Tripti Singh
:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. 103020 - Yanan Sun, Hengjian Li
, Nianqiang Li:
A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter. 103021 - Jaafer Al-Saraireh
, Mohammad Rasool AlJa'afreh:
Keystroke and swipe biometrics fusion to enhance smartphones authentication. 103022 - Yan Wang, Peng Jia
, Xi Peng
, Cheng Huang, Jiayong Liu:
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention. 103023 - Yungui Cao, Jiazhen Chen, Liqing Huang, Tianqian Huang, Feng Ye:
Three-classification face manipulation detection using attention-based feature decomposition. 103024 - Jie Zhang, Min-Yen Tsai, Kotcharat Kitchat
, Min-Te Sun
, Kazuya Sakai, Wei-Shinn Ku
, Thattapon Surasak
, Tipajin Thaipisutikul
:
A secure annuli CAPTCHA system. 103025 - Xingbo Dong
, Zhihui Miao
, Lan Ma, Jiajun Shen, Zhe Jin
, Zhenhua Guo
, Andrew Beng Jin Teoh
:
Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint. 103026 - Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury:
SCADA vulnerabilities and attacks: A review of the state-of-the-art and open issues. 103028 - Lihe Hou
, Weiwei Ni, Sen Zhang, Nan Fu
, Dongyue Zhang
:
Wdt-SCAN: Clustering decentralized social graphs with local differential privacy. 103036 - Simon Vrhovec
, Igor Bernik
, Blaz Markelj:
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign. 103038 - Zhiqiu Zhang
, Tianqing Zhu
, Wei Ren
, Ping Xiong
, Kim-Kwang Raymond Choo:
Preserving data privacy in federated learning through large gradient pruning. 103039 - Sunwoo Lee
, Wonsuk Choi, Dong Hoon Lee:
The vibration knows who you are! A further analysis on usable authentication for smartwatch users. 103040 - Muriel Frank
, Lennart Jaeger
, Lukas Manuel Ranft:
Using contextual factors to predict information security overconfidence: A machine learning approach. 103046 - Siddharth Prakash Rao
, Hsin Yi Chen, Tuomas Aura
:
Threat modeling framework for mobile communication systems. 103047 - Guangquan Xu, Wenqing Lei
, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu:
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management. 103048 - Naurin Farooq Khan
, Naveed Ikram, Hajra Murtaza
, Mehwish Javed:
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model. 103049 - Michael Bitzer
, Björn Häckel, Daniel Leuthe, Joshua Ott, Bastian Stahl, Jacqueline Strobel
:
Managing the Inevitable - A Maturity Model to Establish Incident Response Management Capabilities. 103050 - Efstratios Chatzoglou
, Vasileios Kouliaridis
, Georgios Kambourakis
, Georgios Karopoulos, Stefanos Gritzalis
:
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset. 103051 - Zhaocheng Ge
, Hanping Hu, Tengfei Zhao, Dingmeng Shi:
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model. 103052 - Manasha Saqib
, Ayaz Hassan Moon:
A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication. 103053 - Vikash Kumar
, Ditipriya Sinha:
Synthetic attack data generation model applying generative adversarial network for intrusion detection. 103054 - Hegui Zhu
, Ying Zhu, Haoran Zheng, Yuchen Ren, Wuming Jiang:
LIGAA: Generative adversarial attack method based on low-frequency information. 103057 - Muhammad Atif Butt
, Adnan Qayyum
, Hassan Ali
, Ala I. Al-Fuqaha
, Junaid Qadir
:
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study. 103058 - Qing Wang
, Cong Dong, Shijie Jian, Dan Du, Zhigang Lu, Yinhao Qi, Dongxu Han, Xiaobo Ma, Fei Wang, Yuling Liu:
HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection. 103059 - Chia-Yi Wu, Tao Ban
, Shin-Ming Cheng
, Takeshi Takahashi
, Daisuke Inoue:
IoT malware classification based on reinterpreted function-call graphs. 103060 - Ruiling Wang, Yakui Xue:
Stability analysis and optimal control of worm propagation model with saturated incidence rate. 103063

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.