


default search action
Computers & Security, Volume 160
Volume 160, 2026
- Danish Vasan

, Mohammad Hammoudeh, Adel Fadhl Ahmed, Hamad Naeem
:
Cyber-attacks: Securing ship navigation systems using multi-layer cross-validation defense. 104706 - Srinidhi Vasudevan, Anna Piazza, Lavanya Rajendran, Samuel Duraivel:

Mapping the metaverse minefield: A TIPS framework for security-conscious business adoption. 104710 - Anne Hennig

, Maxime Veit, Leoni Schmidt-Enke, Fabian Neusser, Dominik Herrmann
, Peter Mayer
:
"I believe it's incredibly difficult to fight against this flood of spam": Towards enhancing strategies for creating effective vulnerability notifications. 104682 - Xiuyan Shao

, Wei Gu, Hemin Jiang:
Turn conflict into contribution: Understanding employees' information security extra-role behavior under conflicts. 104703 - Chen Wang

, Hongbo Tang, Yu Zhao, Wei You, Jie Yang, Hang Qiu:
Losing control: Exposing security weaknesses of Kubernetes control plane interfaces. 104704 - Andrew Phipps, Jason R. C. Nurse:

Inside ransomware groups: An analysis of their origins, structures, and dynamics. 104705 - Iván Abellán Álvarez

, Pol Hölzmer
, Johannes Sedlmeir:
Privacy evaluation of the European Digital Identity Wallet's Architecture and Reference Framework. 104707 - Yan Xu, Deqiang Li

, Qianmu Li
:
SMAttack: Subgraph mimicry for black-box adversarial Android malware generation. 104708 - A. S. M. Asadujjaman

, Eduardo De Lucena Falcão, Andrey Brito
, Elisa Rojas
:
Surviving zero-day attacks using spatial specialization. 104709 - Sai Gautam Mandapati, Chathurika Ranaweera, Robin Doss:

Early detection and mitigation of cache-based attacks in IoT-NDN. 104712 - Mingkun He, Jike Ge, Zuqin Chen, Jin Ling, Weiquan Kong:

MCGDroid: An android malware classification method based on multi-feature class-call graph characterization. 104713 - Anuvarshini Mk, Kommuri Sai Suhitha Bala, Sri Sai Tanvi Sonti, Jevitha Kp:

An empirical study on the evaluation and enhancement of OWASP CRS (Core Rule Set) in ModSecurity. 104714 - Yongxin Lu, Zhao Zhang, Senlin Luo, Limin Pan:

Android app suspicious hidden sensitive operation detection with high coverage of program execution path. 104723 - Ali Muzaffar

, Hani Ragab Hassen, Hind Zantout, Michael A. Lones
:
ActDroid: An active learning framework for android malware detection. 104724 - Yooshin Kim

, Namhyeok Kwon, Donghoon Shin
:
KDPrint: Passive authentication using keystroke dynamics-to-image encoding via standardization. 104725 - Kamal Benzekki, Mohamed-Lamine Messai

:
Empowering cybersecurity analysis: Unifying CVE, CWE, and CPE through knowledge graphs. 104726 - Amber Sarfraz, Adnan Ahmad, Furkh Zeshan

, Muhammad Hamid, Fahima Hajjej, Tagrid Abdullah N. Alshalali:
Hybrid harmony: The role of socio-technical system for cross-cultural behavioral variations to profile adversarial resistance. 104727 - Sideeq Bello, Lamine Noureddine, Babangida Bappah, Aisha I. Ali-Gombe:

The privacy cost of fun: A measurement study of user data exposure in tiktok mini-games. 104728 - Don Nalin Dharshana Jayaratne

, Qian Lu
, Abdur Rakib
, Muhamad Azfar Ramli, Rakhi Manohar Mepparambath
, Siraj Ahmed Shaikh
, Hoang Nga Nguyen
:
A quantitative methodology for systemic impact assessment of cyber threats in connected vehicles. 104729 - Aditya Subash

, Insu Song, Ickjai Lee, Kyungmi Lee:
Adaptability of current keystroke and mouse behavioral biometric systems: A survey. 104731 - Yuchen Niu, Siew-Kei Lam

:
Securing automated insulin delivery systems: A review of security threats and protective strategies. 104733 - Usman Khan, Leila Jamel, Muhammad Hashir Zubair, Hamiden Abd El-Wahed Khalifa, Soliman Aljarboa:

Mathematical analysis of computer viruses through deterministic and stochastic models. 104734 - Jian Zhang

, Ping Chen
:
FirmUpdate: Automated multi-phase static analysis for detecting firmware update vulnerabilities in IoT Linux-based firmware. 104735 - Federico Loi, Lorenzo Pisu

, Leonardo Regano
, Davide Maiorca, Giorgio Giacinto
:
Race against time: investigating the factors that influence web race condition exploits. 104740 - Pan Du

, Chang Su, Xinping Wang, Tiezhi Li, Taiwen Kong, Zhaoyu He:
Risk assessment and defense resource allocation optimization for mining cyber-physical systems under coordinated attacks. 104741 - Pawel Smaga

:
Evaluating cyber attacks on central banks - identification of trends in cyber threat landscape. 104742 - Wei Zhou

, Zimin Mao, Shuijun Yin, Hanwen Zhang, Zhicheng Huang, Heng Li
, Tiejun Wu, Wei Yuan
:
Improving the transferability of targeted adversarial examples by style-agnostic attack. 104744 - Shi Hu, Shan Wang, Jian Wang

, Quan Peng, Jingyu Tang, Jingni Chen:
SigOverlay: A security evaluation model based on reference signals. 104750

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














