default search action
Computers & Security, Volume 104
Volume 104, May 2021
- Shaojie Chen, Bo Lang, Hongyu Liu, Duokun Li, Chuan Gao:
DNS covert channel detection method using the LSTM model. 102095 - Xintong Li, Qi Li:
An IRL-based malware adversarial generation method to evade anti-malware engines. 102118 - Shize Huang, Xiaowen Liu, Xiaolu Yang, Zhaoxin Zhang:
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs. 102120 - Phoebe A. Barraclough, Gerhard Fehringer, John Woodward:
Intelligent cyber-phishing detection for online. 102123 - Pramod Pavithran, Sheena Mathew, Suyel Namasudra, Pascal Lorenz:
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine. 102160 - Jie Zhang, Cong Tian, Zhenhua Duan:
An efficient approach for taint analysis of android applications. 102161 - Zareef A. Mohammed, Gurvirender P. Tejay:
Examining the privacy paradox through individuals' neural disposition in e-commerce: An exploratory neuroimaging study. 102201 - Luis Martín-Liras, Adolfo Rodriguez de Soto, Miguel A. Prada:
Feature analysis for data-driven APT-related malware discrimination. 102202 - Aleksandra Mileva, Aleksandar Velinov, Laura Hartmann, Steffen Wendzel, Wojciech Mazurczyk:
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels. 102207 - Samaneh Rashidibajgan, Thomas Hupperich, Robin Doss, Anna Förster:
Secure and privacy-preserving structure in opportunistic networks. 102208 - Yves-Christian Adja Elloh, Badis Hammi, Ahmed Serhrouchni, Sherali Zeadally:
A blockchain-based certificate revocation management and status verification system. 102209 - Dongming Sun, Xiaolu Zhang, Kim-Kwang Raymond Choo, Liang Hu, Feng Wang:
NLP-based digital forensic investigation platform for online communications. 102210 - Muhammad Shadi Hajar, M. Omar Al-Kadri, Harsha Kumara Kalutarage:
A survey on wireless body area networks: architecture, security challenges and research opportunities. 102211 - Yanzhao Tian, Lixiang Li, Haipeng Peng, Yixian Yang:
Achieving flatness: Graph labeling can generate graphical honeywords. 102212 - Peng Luo, Buhong Wang, Tengyao Li, Jiwei Tian:
ADS-B anomaly data detection model based on VAE-SVDD. 102213 - Ting He, Yong Zheng, Zherui Ma:
Study of network time synchronisation security strategy based on polar coding. 102214 - Qian Ma, Cong Sun, Baojiang Cui, Xiaohui Jin:
A novel model for anomaly detection in network traffic based on kernel support vector machine. 102215 - Yeong Tyng Ling, Nor Fazlida Mohd Sani, Mohd Taufik Abdullah, Nor Asilah Wati Abdul Hamid:
Structural features with nonnegative matrix factorization for metamorphic malware detection. 102216 - Siqi Chen, Yufei Yuan, Xin (Robert) Luo, Jie Jian, Yan Wang:
Discovering group-based transnational cyber fraud actives: A polymethodological view. 102217 - Yunhua Huang, Tao Li, Lijia Zhang, Beibei Li, Xiaojie Liu:
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction. 102218 - George Simoglou, George E. Violettas, Sophia G. Petridou, Lefteris Mamatas:
Intrusion detection systems for RPL security: A comparative analysis. 102219 - Jinyin Chen, Haibin Zheng, Hui Xiong, Ruoxi Chen, Tianyu Du, Zhen Hong, Shouling Ji:
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique. 102220 - Shuhan Yuan, Xintao Wu:
Deep learning for insider threat detection: Review, challenges and opportunities. 102221 - Simon Trang, Ilja Nastjuk:
Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour. 102222 - Mingi Cho, Jaedong Jang, Yezee Seo, Seyeon Jeong, Soochang Chung, Taekyoung Kwon:
Towards bidirectional LUT-level detection of hardware Trojans. 102223 - Edward Kwadwo Boahen, Brunel Elvire Bouya-Moko, Changda Wang:
Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC. 102225 - Claire La Fleur, Blaine Hoffman, C. Benjamin Gibson, Norbou Buchler:
Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization. 102229
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.