


default search action
Computers & Security, Volume 89
Volume 89, February 2020
- Linan Huang

, Quanyan Zhu:
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems. - Peng Luo

, Deqing Zou
, Yajuan Du, Hai Jin
, Changming Liu
, Jinan Shen:
Static detection of real-world buffer overflow induced by loop. - Avleen Kaur Malhi, Shalini Batra, Husanbir Singh Pannu:

Security of vehicular ad-hoc networks: A comprehensive survey. - Jiali Wang, Martin Neil, Norman E. Fenton

:
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model. - Ehsan Mahdavi

, Ali Fanian, Fatima Amini:
A real-time alert correlation method based on code-books for intrusion detection systems. - Mohammed K. Alzaylaee

, Suleiman Y. Yerima, Sakir Sezer:
DL-Droid: Deep learning based android malware detection using real devices. - François Boutigny, Stéphane Betgé-Brezetz, Gregory Blanc, Antoine Lavignotte, Hervé Debar

, Houda Jmila:
Solving security constraints for 5G slice embedding: A proof-of-concept. - Humaira Arshad

, Aman Jantan, Gan Keng Hoon, Oludare Isaac Abiodun:
Formal knowledge model for online social network forensics. - Vitor Hugo Galhardo Moia

, Frank Breitinger
, Marco Aurélio Amaral Henriques
:
The impact of excluding common blocks for approximate matching. - Deval Bhamare, Maede Zolanvari, Aiman Erbad

, Raj Jain, Khaled M. Khan
, Nader Meskin
:
Cybersecurity for industrial control systems: A survey. - Ye Wang

, Qingbao Li, Zhifeng Chen, Ping Zhang, Guimin Zhang
:
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks. - Jianwu Zhang, Yu Ling, Xingbing Fu

, Xiongkun Yang, Gang Xiong, Rui Zhang:
Model of the intrusion detection system based on the integration of spatial-temporal features. - Darshana Upadhyay

, Srinivas Sampalli
:
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations. - Stefan Rass

, Quanyan Zhu:
Computer & security special issue editorial. - Amir Namavar Jahromi

, Sattar Hashemi, Ali Dehghantanha, Kim-Kwang Raymond Choo
, Hadis Karimipour, David Ellis Newton, Reza M. Parizi:
An improved two-hidden-layer extreme learning machine for malware hunting. - Omer Shwartz

, Amir Cohen, Asaf Shabtai
, Yossi Oren
:
Inner conflict: How smart device components can cause harm. - Joel Höglund

, Samuel Lindemer, Martin Furuhed, Shahid Raza
:
PKI4IoT: Towards public key infrastructure for the Internet of Things. - Mohsen Ali Alawami

, Hyoungshick Kim
:
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics. - Oluwafemi Olukoya

, Lewis Mackenzie, Inah Omoronyia:
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests. - Husam Al Jawaheri

, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
:
Deanonymizing Tor hidden service users through Bitcoin transactions analysis. - Xinbo Liu, Yaping Lin, He Li, Jiliang Zhang:

A novel method for malware detection on ML-based visualization technique.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














