default search action
Computers & Security, Volume 150
Volume 150, 2025
- Dengbo Liu, Zhi Li, Daoyun Xu:
Generate universal adversarial perturbations by shortest-distance soft maximum direction attack. 104168 - Jiacheng Xue, Xiang Chen, Jiyu Wang, Zhanqi Cui:
Towards prompt tuning-based software vulnerability assessment with continual learning. 104184 - Danjun Liu, Xuan Meng, Pengfei Wang, Xu Zhou, Wei Xie, Baosheng Wang:
Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel. 104189 - Grzegorz J. Blinowski, Michal Szaknis:
Fuzzing trusted execution environments with Rust. 104196 - Louis Nolan, Denise L. Tennant, Deanna House:
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms. 104198 - Nimisha Pandey, Pramod Kumar Mishra:
Conditional entropy-based hybrid DDoS detection model for IoT networks. 104199 - Yuwei Lin, Yonghong Chen, Hui Tian, Xiaolong Zhuang:
Covert timing channel detection based on isolated binary trees. 104200 - Ali A. Allami, Tyler Nicewarner, Ken Goss, Ashish Kundu, Wei Jiang, Dan Lin:
Oblivious and distributed firewall policies for securing firewalls from malicious attacks. 104201 - Manabu Hirano, Ryotaro Kobayashi:
RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors. 104202 - Nicola d'Ambrosio, Gaetano Perrone, Simon Pietro Romano, Alberto Urraro:
A cyber-resilient open architecture for drone control. 104205 - M. V. Hari Vinayak, T. Jarin:
A hybrid model for detecting intrusions using stacked autoencoders and extreme gradient boosting. 104212 - Minghao Chen, Kaijie Zhu, Bin Lu, Ding Li, Qingjun Yuan, Yuefei Zhu:
AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model. 104213 - Yanan Chen, Botao Hou, Bin Wu, Hao Hu:
CD-Net: Robust mobile traffic classification against apps updating. 104214 - Yingqing Wang, Guihe Qin, Yanhua Liang:
A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services. 104217 - Jiaxing Li, Yu-An Tan, Xinyu Liu, Weizhi Meng, Yuanzhang Li:
Interpretable adversarial example detection via high-level concept activation vector. 104218 - Ahmad AlZu'bi, Omar Darwish, Amjad Albashayreh, Yahya M. Tashtoush:
Cyberattack event logs classification using deep learning with semantic feature analysis. 104222 - Xiaosheng Liu, Wenqi Jiang, Zhongwei Li, Xianji Jin, Zihan Ma, Qingyang Li:
FuzzAGG: A fuzzing-driven attack graph generation framework for industrial robot systems. 104223 - Yunpeng Li, Wei Wu, Yuan Zhang, Chuanyang Li:
Palm vein template protection scheme for resisting similarity attack. 104227 - Andrew Reeves, Dragana Calic, Paul H. Delfabbro:
How to De-CyFa the actor-observer bias in cybersecurity fatigue: Building the CyFa measure of attribution styles and mitigation strategies. 104179 - Maxime Veit, Oliver Wiese, Fabian Lucas Ballreich, Melanie Volkamer, Douglas Engels, Peter Mayer:
SoK: The past decade of user deception in emails and today's email clients' susceptibility to phishing techniques. 104197 - Tieming Chen, Qijie Song, Tiantian Zhu, Xuebo Qiu, Zhiling Zhu, Mingqi Lv:
Kellect: A Kernel-based efficient and lossless event log collector for windows security. 104203 - Julia Prümmer, Tommy van Steen, Bibi van den Berg:
Assessing the effect of cybersecurity training on End-users: A Meta-analysis. 104206 - Yunchuan Guo, Xiao Wang, Mingjie Yu, Fenghua Li, Zhen Pang, Liang Fang:
An on-the-fly framework for usable access control policy mining. 104211 - Ahmad Burhan Mohammed, Lamia Chaari Fourati:
Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems. 104215 - Ali Hameed Yassir Mohammed, Rudzidatul Akmam Dziyauddin, Norshaliza Kamaruddin, Fiza Abdul Rahim:
A hybrid ranking algorithm for secure and efficient iris template protection. 104216 - Siyu Wang, Haiyong Wu, Ning Lu, Wenbo Shi, Zhiquan Liu:
ATSDetector: An Android Trojan spyware detection approach with multi-features. 104219 - Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang:
AttacKG+: Boosting attack graph construction with Large Language Models. 104220 - Tamminina Ammannamma, A. S. N. Chakravarthy:
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection. 104221 - Reza Mirzaei, Nasser Yazdani, Mohammad Sayad Haghighi:
Enhancing network tunnels anonymity through increasing combined traffic in a clustered structure. 104224 - Yaguan Qian, Zejie Lian, Yiming Li, Wei Wang, Zhaoquan Gu, Bin Wang, Yanchun Zhang:
Evading backdoor defenses: Concealing genuine backdoors through scapegoat strategy. 104225 - Gaoli Mu, Hanlin Zhang, Jie Lin, Fanyu Kong:
SMCD: Privacy-preserving deep learning based malicious code detection. 104226 - Xiaomin Wei, Yizhen Xu, Haibin Zhang, Cong Sun, Xinghua Li, Fenghua Huang, Jianfeng Ma:
Sensor attack online classification for UAVs using machine learning. 104228 - Nhung H. Nguyen, Mengmeng Ge, Jin-Hee Cho, Terrence J. Moore, Seunghyun Yoon, Hyuk Lim, Frederica Nelson, Guangdong Bai, Dan Dongseong Kim:
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation. 104229 - Mohammad Ali, Ahsan Ullah, Md. Rashedul Islam, Rifat Hossain:
Assessing of software security reliability: Dimensional security assurance techniques. 104230 - Narendra Singh, Somanath Tripathy:
Unveiling the veiled: An early stage detection of fileless malware. 104231 - Jiann-Liang Chen, Jian-Fu Qiu, Yu-Hung Chen:
A hybrid DGA DefenseNet for detecting DGA domain names based on FastText and deep learning techniques. 104232 - Pham Thuy Sy Nguyen, Tran Nhat Huy, Tong Anh Tuan, Pham Duy Trung, Hoang Viet Long:
Hybrid feature extraction and integrated deep learning for cloud-based malware detection. 104233 - M. Rajkumar, J. Karthika, S. S. Abinayaa:
Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks. 104242 - Jeong Do Yoo, Gang Min Kim, Min Geun Song, Huy Kang Kim:
MeNU: Memorizing normality for UAV anomaly detection with a few sensor values. 104248 - Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj:
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection. 104249 - Hui Tian, Mengcheng Wang, Hanyu Quan, Chin-Chen Chang, Athanasios V. Vasilakos:
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage. 104250 - Yiting Hou, Xianglin Wei, Jianhua Fan, Chao Wang:
Interpretable CAA classification based on incorporating feature channel attention into LSTM. 104252 - Sushree Padhan, Ashok Kumar Turuk:
A technique to detect and mitigate false data injection attacks in Cyber-Physical Systems. 104253 - Zhanyu Sha, Carlton Shepherd, Amir Rafi, Konstantinos Markantonakis:
Control-flow attestation: Concepts, solutions, and open challenges. 104254 - Lavi Ben-Shimol, Danielle Lavi, Eitan Klevansky, Oleg Brodt, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
Detection of compromised functions in a serverless cloud environment. 104261 - Sanfeng Zhang, Heng Su, Hongxian Liu, Wang Yang:
MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features. 104262 - Lijuan Xu, Zicheng Zhao, Dawei Zhao, Xin Li, Xiyu Lu, Dingyu Yan:
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE. 104263 - Andrea Ponte, Dmitrijs Trizna, Luca Demetrio, Battista Biggio, Ivan Tesfai Ogbu, Fabio Roli:
SLIFER: Investigating performance and robustness of malware detection pipelines. 104264 - Rouhollah Ahmadian, Mehdi Ghatee, Johan Wahlström:
Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data. 104265 - Abhik Chaudhuri, Rajat Kumar Behera, Pradip Kumar Bala:
Factors impacting cybersecurity transformation: An Industry 5.0 perspective. 104267 - Victormills Iyieke, Hesamaldin Jadidbonab, Abdur Rakib, Jeremy Bryans, Don Dhaliwal, Odysseas Kosmas:
An adaptable security-by-design approach for ensuring a secure Over the Air (OTA) update in modern vehicles. 104268 - Mingsheng Tang, Binbin Ge:
Social-Hunter: A social heuristics-based approach to early unveiling unknown malicious logins using valid accounts. 104269 - Piotr Krawiec, Robert Janowski, Jordi Mongay Batalla, Elzbieta Andrukiewicz, Waldemar Latoszek, Constandinos X. Mavromoustakis:
On providing multi-level security assurance based on Common Criteria for O-RAN mobile network equipment. A test case: O-RAN Distributed Unit. 104271 - Yunfei Li, Xiaodong Fu, Li Liu, Jiaman Ding, Wei Peng, Lianyin Jia:
Multi-domains personalized local differential privacy frequency estimation mechanism for utility optimization. 104273 - Pawel Smaga:
Profiling the victim - cyber risk in commercial banks. 104274 - Chinedu Okonkwo, Ibukun Awolusi, Chukwuma A. Nnaji, Oluwafemi Akanfe:
Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction. 104275 - Chrispus Zacharia Oroni, Xianping Fu, Daniela Daniel Ndunguru, Arsenyan Ani:
Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis. 104276 - Obi Ogbanufe, Mary C. Jones, Julie I. Hancock:
Job demands, identity, and outcomes: The mediating role of cynicism among Cybersecurity-focused employees. 104277 - Tian Jiang, Yunqi Liu, Xiaohui Cui:
Textual adversarial attacks in cybersecurity named entity recognition. 104278 - Ruowei Gui, Xiaolin Gui, Xingjun Zhang:
A trajectory privacy protection method based on the replacement of points of interest in hotspot regions. 104279 - Dazhi Zhan, Kun Xu, Xin Liu, Tong Han, Zhisong Pan, Shize Guo:
Practical clean-label backdoor attack against static malware detection. 104280 - Yufeng Zhang, Hongxin Zhang, Yijun Wang, Xiaorong Gao, Chen Yang:
Enhancing information security through brainprint: A longitudinal study on ERP identity authentication. 104281 - Andrea Cimmino, Juan Cano-Benito, Raúl García-Castro:
Open Digital Rights Enforcement framework (ODRE): From descriptive to enforceable policies. 104282 - Shi-Jie Xu, Kai-Chuan Kong, Xiao-Bo Jin, Guang-Gang Geng:
Unveiling traffic paths: Explainable path signature feature-based encrypted traffic classification. 104283 - Milton Campoverde-Molina, Sergio Luján-Mora:
Cybersecurity in smart agriculture: A systematic literature review. 104284 - Dutliff Boshoff, Gerhard P. Hancke:
A classifications framework for continuous biometric authentication (2018-2024). 104285 - Ahmad Nasayreh, Haris M. Khalid, Hamza K. Alkhateeb, Jalal Al-Manaseer, Abdulla Ismail, Hasan Gharaibeh:
Automated detection of cyber attacks in healthcare systems: A novel scheme with advanced feature extraction and classification. 104288 - P. S. Pavithra, P. Durgadevi:
Optimizing network security: Weighted average ensemble of BPNN and RELM in EPRN-WPS intrusion detection. 104289 - Albert Calvo, Santiago Escuder, Nil Ortiz, Josep Escrig, Maxime Compastié:
RBD24 : A labelled dataset with risk activities using log application data. 104290 - Jinfeng Chen, Hua Wu, Xiaohui Wang, Suyue Wang, Guang Cheng, Xiaoyan Hu:
IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks. 104291 - Yuntian Xie, Ting Lei, Zimo Li, Yujing Yang, Chunyin Chen, Yuanyuan Long:
How do mental models affect cybersecurity awareness? The roles of questioning styles, need for cognition, and graphical representations. 104292 - Mingcan Cen, Frank Jiang, Robin Doss:
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection. 104293 - Zhen Liu, Ruoyu Wang, Bitao Peng, Lingyu Qiu, Qingqing Gan, Changji Wang, Wenbin Zhang:
LDCDroid: Learning data drift characteristics for handling the model aging problem in Android malware detection. 104294 - Nourhan Halawi-Ghoson, Vincent Meyrueis, Khaled Benfriha, Thomas Guiltat, Stéphane Loubère:
A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0. 104295 - David Tayouri, Omri Sgan Cohen, Inbar Maimon, Dudu Mimran, Yuval Elovici, Asaf Shabtai:
CORAL: Container Online Risk Assessment with Logical attack graphs. 104296 - Renhai Dong, Baojiang Cui, Yi Sun, Jun Yang:
A combined side-channel and transient execution attack scheme on RISC-V processors. 104297 - Efstratios Chatzoglou, Vyron Kampourakis, Zisis Tsiatsikas, Georgios Karopoulos, Georgios Kambourakis:
Unmasking the hidden credential leaks in password managers and VPN clients. 104298 - C. Karpagavalli, M. Kaliappan:
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network. 104299 - Yuancheng Xie, Zhaoxin Zhang, Ning Li, Haoyang Gao:
LeakFocus: Catching the perpetrator in routing leak event. 104300
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.