Computers & Security

Title Publication Date Language Citations
Part of the foundation for secure systems: separation of duties policy1997/01/01English
Net security scare for Microsoft1999/01/01English
From Stones in the Street to Cyberspace — Israeli and Palestinians Continue Their Virtual Battles 24×72000/12/01English
Canadian Credit Card Conundrum Caused by a Cracker2000/07/01English
Pressure builds on chip thieves1995/01/01English
Pssst, what's password again?1995/01/01English
Paring password pileup1997/01/01English
Refereed Papers2001/04/01English
Key Recovery Functional Model2000/01/01English
Global Interoperability for Key Recovery2000/01/01English
Encryption debate heats up in Washington1998/01/01English
Be a standard bearer1999/01/01English
MAlign: Explainable static raw-byte based malware family classification using sequence alignment2024/04/01English
A framework for designing vulnerability metrics2023/09/01English
Empirically evaluating the effect of security precautions on cyber incidents2023/10/01English
Barriers to a cybersecurity career: Analysis across career stage and gender2023/09/01English
Design, implementation, and automation of a risk management approach for man-at-the-End software protection2023/09/01English
Improving adversarial robustness through a curriculum-guided reliable distillation2023/10/01English
Evaluating organizational phishing awareness training on an enterprise scale2023/09/01English
Adaptive monitoring, detection, and response for agile digital service chains2023/09/01English
MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP2023/09/01English
Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior2023/10/01English
Explainable cyber threat behavior identification based on self-adversarial topic generation2023/09/01English
Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy2023/09/01English
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light2023/09/01English
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice2023/05/01English
Improving monolithic kernel security and robustness through intra-kernel sandboxing2023/04/01English
GhostEncoder: Stealthy Backdoor Attacks with Dynamic Triggers to Pre-trained Encoders in Self-supervised Learning2024/04/01English
HyperGo: Probability-based directed hybrid fuzzingEnglish
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learningEnglish