


default search action
Computers & Security, Volume 148
Volume 148, 2025
- Konstantinos Mersinas
, Maria Bada
, Steven Furnell
:
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions. 104025 - Zeynep Sahin, Anthony Vance
:
What do we need to know about the Chief Information Security Officer? A literature review and research agenda. 104063 - Anuj Rai
, Somnath Dey, Pradeep Patidar, Prakhar Rai
:
MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection. 104069 - Yaman Roumani, Mais Alraee
:
Examining the factors that impact the severity of cyberattacks on critical infrastructures. 104074 - Anthony J. Rose
, Christine M. Schubert-Kabban
, Scott R. Graham
, Wayne C. Henry
, Christopher M. Rondeau
:
Malware classification through Abstract Syntax Trees and L-moments. 104082 - A. Punitha, P. Ramani, Ezhilarasi P, Sridhar S:
Dynamically stabilized recurrent neural network optimized with intensified sand cat swarm optimization for intrusion detection in wireless sensor network. 104094 - Sita Rani
, Aman Kataria, Sachin Kumar, Vinod Karar:
A new generation cyber-physical system: A comprehensive review from security perspective. 104095 - Hao Zhou, Wenting Shen
, Jinlu Liu
:
Certificate-based multi-copy cloud storage auditing supporting data dynamics. 104096 - Pan Jun Sun
, Yi Wan, Zongda Wu, Zhaoxi Fang, Qi Li:
A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions. 104097 - Chen Liang, Qiang Wei, Jiang Du, Yisen Wang
, Zirui Jiang:
Survey of source code vulnerability analysis based on deep learning. 104098 - Chiheng Wang
, Jianshan Peng, Junhu Zhu, Qingxian Wang:
AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software. 104099 - Shunliang Zhang
, Weiqing Huang, Yinlong Liu:
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G. 104100 - Qingyun Li, Wei Chen
, Xiaotang Xu, Yiting Zhang, Lifa Wu:
Precision strike: Precise backdoor attack with dynamic trigger. 104101 - Heqing Li
, Xinde Li, Fir Dunkin, Zhentong Zhang, Xiaoyan Lu:
Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks. 104108 - Prabhat Kumar
, Alireza Jolfaei, A. K. M. Najmul Islam:
An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things. 104109 - Anna Sutton
, Lisa Tompson
:
Towards a cybersecurity culture-behaviour framework: A rapid evidence review. 104110 - Wei Chen, Zhiyuan Bai, Gaoyuan Pan, Jian Wang:
A fast modularity hardware Trojan detection technique for large scale gate-level netlists. 104111 - Asimina Vasalou
, Laura Benton, Ana Luisa Serta, Andrea Gauthier
, Ceylan Besevli
, Sarah Turner, Rea Gill
, Rachael Payler, Etienne B. Roesch
, Kevin McAreavey, Kim Bauters, Weiru Liu, Hsueh-Ju Chen, Dennis Ivory
, Manos Panaousis, Georgios Loukas:
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices. 104112 - Xiaoqing Wang, Yuanjing Tian, Keman Huang
, Bin Liang:
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach. 104113 - Nathalie Wehbe, Hyame Assem Alameddine, Makan Pourzandi, Chadi Assi
:
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection. 104114 - Yu Cheng
, Xiaofang Qi
, Yanhui Li, Yumeng Wang:
ReckDroid: Detecting red packet fraud in Android apps. 104117 - Jiacheng Li
, Yang Xiao
, Shuhui Li, Tieshan Li:
Designing accountable IoT systems to overcome IoT storage limitation. 104118 - A. K. M. Mubashwir Alam, Keke Chen
:
TEE-MR: Developer-friendly data oblivious programming for trusted execution environments. 104119 - Inoussa Mouiche
, Sherif Saad:
Entity and relation extractions for threat intelligence knowledge graphs. 104120 - Saihua Cai
, Han Tang, Jinfu Chen
, Yikai Hu, Wuhao Guo:
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique. 104121 - Marcus Botacin, Heitor Murilo Gomes
:
Towards more realistic evaluations: The impact of label delays in malware detection pipelines. 104122 - Y. Bhanu Prasad
, Venkatesulu Dondeti:
PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction. 104123 - Matta Krishna Kumari
, Nikhil Tripathi
:
Detecting interest flooding attacks in NDN: A probability-based event-driven approach. 104124 - Khang Mai
, Jongmin Lee, Razvan Beuran
, Ryosuke Hotchi
, Ooi Sian En
, Takayuki Kuroda, Yasuo Tan:
RAF-AG: Report analysis framework for attack path generation. 104125 - Kexiong Fei, Jiang Zhou
, Yucan Zhou, Xiaoyan Gu
, Haihui Fan, Bo Li, Weiping Wang, Yong Chen:
LaAeb: A comprehensive log-text analysis based approach for insider threat detection. 104126 - Luchen Zhou, Wei-Chuen Yau
, Yee Siang Gan
, Sze-Teng Liong
:
E-WebGuard: Enhanced neural architectures for precision web attack detection. 104127 - Malka N. Halgamuge
, Dusit Niyato
:
Adaptive edge security framework for dynamic IoT security policies in diverse environments. 104128 - Daniel Sturman
, Jaime C. Auton
, Ben W. Morrison
:
Security awareness, decision style, knowledge, and phishing email detection: Moderated mediation analyses. 104129 - Libin Yang, Menghan Wang, Wei Lou:
An automated dynamic quality assessment method for cyber threat intelligence. 104079 - Yilixiati Abudurexiti
, Guangjie Han
, Fan Zhang
, Li Liu:
An explainable unsupervised anomaly detection framework for Industrial Internet of Things. 104130 - Mónica P. Arenas
, Georgios Fotiadis
, Gabriele Lenzini
, Mohammadamin Rakeei:
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols. 104131 - Ping Deng
, Yong Huang:
Edge-featured multi-hop attention graph neural network for intrusion detection system. 104132 - Vimitha R. Vidhya Lakshmi
, Gireesh Kumar T:
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks. 104133 - Zulu Okonkwo
, Ernest Foo, Zhe Hou, Qinyi Li, Zahra Jadidi:
A graph representation framework for encrypted network traffic classification. 104134 - Dalin He
, Huanyu Wang, Tuo Deng, Jishi Liu, Junnian Wang:
Improving IIoT security: Unveiling threats through advanced side-channel analysis. 104135 - Fenhua Bai, Zikang Wang
, Kai Zeng, Chi Zhang, Tao Shen, Xiaohui Zhang, Bei Gong:
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices. 104136 - Sandro Waelchli
, Yoshija Walter:
Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study. 104137 - Sidra Kalam, Ajit Kumar Keshri
:
Advancing IoMT security: A two-factor authentication model employing PUF and Fuzzy logic techniques. 104138 - Haitao He, Sheng Wang, Yanmin Wang, Ke Liu, Lu Yu:
VulTR: Software vulnerability detection model based on multi-layer key feature enhancement. 104139 - Huynh Phuong Thanh Nguyen
, Kento Hasegawa, Kazuhide Fukushima, Razvan Beuran
:
PenGym: Realistic training environment for reinforcement learning pentesting agents. 104140 - Renan C. A. Alves
, Otávio F. Freitas, Bruno C. Albertini
, Marcos A. Simplício Jr.
:
Testing the limits of SPDM: Authentication of intermittently connected devices. 104142 - Manar Alanazi, Abdun Mahmood, Mohammad Jabed Morshed Chowdhury
:
ICS-LTU2022: A dataset for ICS vulnerabilities. 104143 - Marco Zambianco
, Claudio Facchinetti, Domenico Siracusa
:
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK. 104144 - Xiaorui Dang
, Guiqi Zhang
, Ke Sun
, Yufeng Li:
A trust model for VANETs using malicious-aware multiple routing. 104145 - Sukhvinder Singh Bamber
, Aditya Vardhan Reddy Katkuri
, Shubham Sharma
, Mohit Angurala
:
A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system. 104146 - Wendy Burke
, Andrew Stranieri, Taiwo Oseni:
From Dis-empowerment to empowerment: Crafting a healthcare cybersecurity self-assessment. 104148 - Zujia Miao, Cuiping Shao
, Huiyun Li, Yunduan Cui, Zhimin Tang:
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density. 104149 - Gianpietro Castiglione
, Giampaolo Bella
, Daniele Francesco Santamaria:
SecOnto: Ontological Representation of Security Directives. 104150 - Abdechakour Mechri
, Mohamed Amine Ferrag
, Mérouane Debbah:
SecureQwen: Leveraging LLMs for vulnerability detection in python codebases. 104151 - Fei Lv, Hangyu Wang
, Rongkang Sun
, Zhiwen Pan, Shuaizong Si
, Meng Zhang, Weidong Zhang, Shichao Lv
, Limin Sun:
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning. 104152 - Yunxiao Zhang
, Pasquale Malacaria:
Dealing with uncertainty in cybersecurity decision support. 104153 - Kieran Rendall
, Alexios Mylonas
, Stilianos Vidalis, Dimitris Gritzalis:
MIDAS: Multi-layered attack detection architecture with decision optimisation. 104154 - Yufei Han, Chao Li, Jianbiao Zhang, Yifan Wang, Lehao Yu, Yihao Cao, Hong Shen, Weixing Hou, Hailin Luo:
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem. 104158 - Jiafeng Ren, Rong Geng
:
Provenance-based APT campaigns detection via masked graph representation learning. 104159 - MohammadMoein Shafi
, Arash Habibi Lashkari
, Arousha Haghighian Roudsari
:
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction. 104160 - Yan-zi Li, Li Xu, Jing Zhang, Liao-ru-xing Zhang:
WF-LDPSR: A local differential privacy mechanism based on water-filling for secure release of trajectory statistics data. 104165 - Ying Yuan, Giovanni Apruzzese, Mauro Conti:
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection. 104115 - Chunyan Ma
, Zhengwei Jiang, Kai Zhang, Zhiting Ling, Jun Jiang, Yizhe You, Peian Yang, Huamin Feng:
TIMFuser: A multi-granular fusion framework for cyber threat intelligence. 104141 - Liuying Lv, Peng Zhou:
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests. 104147 - Weidong Zhou, Chunhe Xia, Tianbo Wang, Xiaopeng Liang, Wanshuang Lin, Xiaojian Li, Song Zhang:
HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance. 104155 - Vikas Kumar Malviya, Wei Minn, Lwin Khin Shar, Lingxiao Jiang:
Fuzzing drones for anomaly detection: A systematic literature review. 104157 - Yong Li, Tongtong Liu, Haichao Ling, Wei Du, Xianglin Ren:
A robust federated learning algorithm for partially trusted environments. 104161 - Dongming Xiang, Shuai Lin, Ke Huang, Zuohua Ding, Guanjun Liu, Xiaofeng Li:
A fine-grained approach for Android taint analysis based on labeled taint value graphs. 104162 - Raviha Khan, Hossien B. Eldeeb, Brahim Mefgouda, Omar Alhussein, Hani H. Saleh, Sami Muhaidat:
Encoder decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learning. 104164 - Sunitha D, Latha Ph:
A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET. 104166 - Matthew G. Gaber, Mohiuddin Ahmed, Helge Janicke:
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language. 104167 - P. A. Mathina, K. Valarmathi:
Advancing IoT security: A novel intrusion detection system for evolving threats in industry 4.0 using optimized convolutional sparse Ficks law graph point trans-Net. 104169 - Abiodun Esther Omolara, Moatsum Alawida:
DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security. 104170 - Jingwen Zhao, Yan Fu, Yanxia Wu, Jibin Dong, Ruize Hong:
Thread-sensitive fuzzing for concurrency bug detection. 104171 - Zhijun Wu, Yun Bai, Yuan Zhang, Liang Liu, Meng Yue:
TrustCNAV: Certificateless aggregate authentication of civil navigation messages in GNSS. 104172 - Taotao Liu, Yu Fu, Kun Wang, Xueyuan Duan, Qiuhan Wu:
A multiscale approach for network intrusion detection based on variance-covariance subspace distance and EQL v2. 104173 - Xuefeng Jiang, Liuquan Xu, Li Yu, Xianjin Fang:
MFT: A novel memory flow transformer efficient intrusion detection method. 104174 - Hongyu Lu, Jiajia Liu, Jimin Peng, Jiazhong Lu:
Adversarial attacks based on time-series features for traffic detection. 104175 - Jie Zhang, Lei Xie, Lang He, Zhongmin Wang, Jing Chen:
Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication. 104176 - Peng Wu, Mohan Gao, Fuhui Sun, Xiaoyan Wang, Li Pan:
Multi-perspective API call sequence behavior analysis and fusion for malware classification. 104177 - César Gil, Javier Parra-Arnau, Jordi Forné:
Privacy protection against user profiling through optimal data generalization. 104178 - Fengrui Xiao, Shuangwu Chen, Jian Yang, Huasen He, Xiaofeng Jiang, Xiaobin Tan, Dong Jin:
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction. 104180 - Seunghoon Woo, Eunjin Choi, Heejo Lee:
A large-scale analysis of the effectiveness of publicly reported security patches. 104181 - Mousa Tayseer Jafar, Lu-Xing Yang, Gang Li:
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC. 104186 - P. Vidyasri, S. Suresh:
FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering. 104188

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.