


default search action
Computers & Security, Volume 141
Volume 141, 2024
- Qiao Li
, Jing Chen, Kun He, Zijun Zhang
, Ruiying Du, Jisi She, Xinxin Wang
:
Model-agnostic adversarial example detection via high-frequency amplification. 103791 - Matteo Boffa, Idilio Drago
, Marco Mellia
, Luca Vassio
, Danilo Giordano, Rodolfo V. Valentim, Zied Ben-Houidi
:
LogPrécis: Unleashing language models for automated malicious log analysis. 103805 - Tao Yi, Xingshu Chen, Qindong Li
, Yi Zhu:
An anomaly behavior characterization method of network traffic based on Spatial Pyramid Pool (SPP). 103809 - Hanxiao Wanyan, Yingxu Lai
, Jing Liu, Hao Chen:
NCMFuzzer: Using non-critical field mutation and test case combination to improve the efficiency of ICS protocol fuzzing. 103811 - Jimoh Fatoki, Zixing Shen
, Carlo A. Mora Monge
:
Optimism amid risk: How non-IT employees' beliefs affect cybersecurity behavior. 103812 - Gaigai Tang, Lin Yang, Long Zhang, Hongyu Kuang
, Huiqiang Wang:
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension. 103816 - Xu Han
, Qiang Li, Hongbo Cao
, Lei Han, Bin Wang, Xuhua Bao, Yufei Han, Wei Wang
:
BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts. 103817 - P. Malini, Dr. K. R. Kavitha:
An efficient deep learning mechanisms for IoT/Non-IoT devices classification and attack detection in SDN-enabled smart environment. 103818 - Narendra Singh, Somanath Tripathy
:
It's too late if exfiltrate: Early stage Android ransomware detection. 103819 - Nitish A
, Hanumanthappa J
, S. P. Shiva Prakash
, Kirill Krinkin
:
Class imbalance and concept drift invariant online botnet threat detection framework for heterogeneous IoT edge. 103820 - Meihui Zhong
, Mingwei Lin
, Chao Zhang
, Zeshui Xu
:
A survey on graph neural networks for intrusion detection systems: Methods, trends and challenges. 103821 - Guangshang Jiang, Hanlin Zhang
, Jie Lin, Fanyu Kong, Leyun Yu:
Optimized verifiable delegated private set intersection on outsourced private datasets. 103822 - Hugo Pascual
, José M. del Álamo, David Rodríguez Torrado
, Juan C. Dueñas
:
Hunter: Tracing anycast communications to uncover cross-border personal data transfers. 103823 - Gaosheng Wang, Peipei Liu, Jintao Huang
, Haoyu Bin
, Xi Wang, Hongsong Zhu:
KnowCTI: Knowledge-based cyber threat intelligence entity and relation extraction. 103824 - Xue Yang
, Enda Howley, Michael Schukat
:
ADT: Time series anomaly detection for cyber-physical systems via deep reinforcement learning. 103825 - Marta F. Arroyabe
, Carlos F. A. Arranz
, Ignacio Fernandez De Arroyabe, Juan Carlos Fernandez de Arroyabe
:
Revealing the realities of cybercrime in small and medium enterprises: Understanding fear and taxonomic perspectives. 103826 - Cornelius Itodo
, Murat Ozer:
Multivocal literature review on zero-trust security implementation. 103827 - Oleksandr Kuznetsov
, Dmytro Zakharov
, Emanuele Frontoni, Andrea Maranesi:
AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection. 103828 - Peng Luo, Buhong Wang, Jiwei Tian
:
TTSAD: TCN-Transformer-SVDD Model for Anomaly Detection in air traffic ADS-B data. 103840 - Liang Liu, Xinyu Kuang
, Lin Liu, Lei Zhang
:
Defend against adversarial attacks in malware detection through attack space management. 103841 - Antonio Galli
, Valerio La Gatta
, Vincenzo Moscato, Marco Postiglione
, Giancarlo Sperlì
:
Explainability in AI-based behavioral malware detection systems. 103842 - Sultan Asiri
, Yang Xiao
, Saleh Alzahrani
, Tieshan Li:
PhishingRTDS: A real-time detection system for phishing attacks using a Deep Learning model. 103843 - Manuel Kern
, Max Landauer
, Florian Skopik
, Edgar R. Weippl:
A logging maturity and decision model for the selection of intrusion detection cyber security solutions. 103844 - Saleh H. Aldaajeh
, Saed Alrabaee
:
Strategic cybersecurity. 103845 - Lina Shen, Mengqi Fang, Jian Xu:
GHGDroid: Global heterogeneous graph-based android malware detection. 103846 - Khushnaseeb Roshan
, Aasim Zafar:
Black-box adversarial transferability: An empirical study in cybersecurity perspective. 103853

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.