期刊: COMPUTERS & SECURITY, 2021; 105 ()
The BeiDou navigation satellite system (BDS) lacks a security authentication mechanism for BeiDou civil navigation message (BD-CNAV), which faces the ......
期刊: COMPUTERS & SECURITY, 2021; 105 ()
Hybrid fuzzing which combines classical fuzzing with concolic execution to produce effective test suites is an advanced software vulnerability detecti......
期刊: COMPUTERS & SECURITY, 2021; 104 ()
Network anomalies detection is a complementary technology for systems that detect security threats in networks based on package signatures. Controlled......
期刊: COMPUTERS & SECURITY, 2021; 106 ()
Cloud computing is a very popular information technology, to obtain mutual trust and win-win cooperation between the users and the cloud service provi......
期刊: COMPUTERS & SECURITY, 2021; 106 ()
Network intrusion detection systems play an important role in protecting the network from attacks. However, Existing network intrusion data is imbalan......
期刊: COMPUTERS & SECURITY, 2021; 108 ()
Phishing websites belong to a social engineering attack where perpetrators fake legitimate websites to lure people to access so as to illegally acquir......
期刊: COMPUTERS & SECURITY, 2021; 106 ()
New malware variants appear rapidly and continuously increase the difficulty to classify malware into correct families. This brings two challenges for......
期刊: COMPUTERS & SECURITY, 2021; 109 ()
The rapid growth in the number of malware and its variants has seriously affected the secu-rity of the Internet. In recent years, deep leaming combine......
期刊: COMPUTERS & SECURITY, 2021; 104 ()
Vehicles have increasingly deployed object detectors to perceive running conditions, and deep learning networks have been widely adopted by those dete......
期刊: COMPUTERS & SECURITY, 2021; 109 ()
The means to achieve DDoS (distributed denial of service) attacks are becoming increasingly automated and diverse. A problem that automated attack too......
期刊: COMPUTERS & SECURITY, 2021; 104 ()
Deep neural networks (DNNs) have various applications owing to their feature learning ability. However, recent studies have shown that DNNs are vulner......
期刊: COMPUTERS & SECURITY, 2021; 107 ()
Attackers against power grids need to usually collect sufficient information regarding cyberphysical about the target system (CPS) resources from acce......
期刊: COMPUTERS & SECURITY, 2021; 104 ()
DNS is a kind of basic network protocol that is rarely blocked by firewalls; therefore, it is used to build covert channels. Malicious DNS covert chan......
期刊: COMPUTERS & SECURITY, 2021; 105 ()
Multi-stage attack is a kind of sophisticated intrusion strategy that has been widely used for penetrating the well protected network infrastructures.......
期刊: COMPUTERS & SECURITY, 2021; 109 ()
Nowadays, spatial data provides users with more convenient services because of its wide application scenarios and rich content. At the same time, the ......