Journal of Computer Security

Titel Veröffentlichungsdatum Sprache Zitate
Using internal sensors and embedded detectors for intrusion detection12002/01/011
Using digital credentials on the World Wide Web1997/07/011
A formal model of rational exchange and its application to the analysis of Syverson's protocol2004/05/011
Using side channel TCP features for real-time detection of malware connections2019/09/171
SIA: Secure information aggregation in sensor networks2007/01/011
Probabilistic analysis of an anonymity system2004/05/011
Model-based analysis of configuration vulnerabilities12002/01/011
EsPRESSO: Efficient privacy-preserving evaluation of sample set similarity2014/03/201
Data privacy in the Internet of Things based on anonymization: A review2023/05/29
Prioritization and exchange chains in privacy-preserving kidney exchange2024/02/05
Ensuring cybersecurity for industrial networks: A solution for ARP-based MITM attacks2024/02/01
Machine-checked proofs of privacy against malicious boards for Selene & Co12023/10/13
Secure authentication protocols to resist off-line attacks on authentication data table2024/02/02
A review on cloud security issues and solutions2023/08/14
Online User Authentication System Using Keystroke Dynamics2023/05/29
Log2Graph: A graph convolution neural network based method for insider threat detection2024/04/24
Evaluating the stealth of reinforcement learning-based cyber attacks against unknown scenarios using knowledge transfer techniques2024/04/23
DSLR–: A low-overhead data structure layout randomization for defending data-oriented programming2023/11/24
A multiview clustering framework for detecting deceptive reviews2024/02/02
A mutation-based approach for the formal and automated analysis of security ceremonies2023/08/14
StegEdge: Privacy protection of unknown sensitive attributes in edge intelligence via deception2023/08/14
MVDet: Encrypted malware traffic detection via multi-view analysis2024/02/12
Special issue: 35th IEEE Computer Security Symposium – CSF 20222023/10/13
A certificateless signcryption with proxy-encryption for securing agricultural data in the cloud2024/04/09
Automatic generation of sources lemmas in Tamarin: Towards automatic proofs of security protocols12022/08/25
Deploying ABAC policies using RBAC systems2019/07/18
Tracking APTs in industrial ecosystems: A proof of concept2019/09/17
Verifying constant-time implementations by abstract interpretation2019/01/11
Abstractions for security protocol verification2018/07/10
Invalid certificates in modern browsers: A socio-technical analysis2018/07/10