Cybersecurity Insights Gleaned from World Religions (English)
- New search for: Renaud, Karen
- New search for: Dupuis, Marc
- New search for: Renaud, Karen
- New search for: Dupuis, Marc
In:
Computers and Security
;
132
;
2023
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Cybersecurity Insights Gleaned from World Religions
-
Contributors:Renaud, Karen ( author ) / Dupuis, Marc ( author )
-
Published in:Computers and Security ; 132
-
Publisher:
- New search for: The Author(s)
-
Publication date:2023-06-05
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 132
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
-
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning MechanismsAlex, Christin / Creado, Giselle / Almobaideen, Wesam / Alghanam, Orieb Abu / Saadeh, Maha et al. | 2023
-
Confine: Fine-grained system call filtering for container attack surface reductionRostamipoor, Maryam / Ghavamnia, Seyedhamed / Polychronakis, Michalis et al. | 2023
-
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot LightLI, Yufeng / YANG, Fengyu / LIU, Qi / LI, Jiangtao / CAO, Chenhong et al. | 2023
-
Anti-money laundering supervision by intelligent algorithmYang, Guangyi / Liu, Xiaoxing / Li, Beixin et al. | 2023
-
CPID: Insider threat detection using profiling and cyber-persona identificationRacherache, Badis / Shirani, Paria / Soeanu, Andrei / Debbabi, Mourad et al. | 2023
-
DNS tunnelling detection by fusing encoding feature and behavioral featureTu, Yu / Liu, Shuang / Sun, Qian et al. | 2023
-
The tensions of cyber-resilience: From sensemaking to practiceDupont, Benoît / Shearing, Clifford / Bernier, Marilyne / Leukfeldt, Rutger et al. | 2023
-
A framework for designing vulnerability metricsAlbanese, Massimiliano / Iganibo, Ibifubara / Adebiyi, Olutola et al. | 2023
-
Cybersecurity communities of practice: Strategies for creating gateways to participationFisk, Nathan / Kelly, Nicholas M. / Liebrock, Lori et al. | 2023
-
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systemsHuang, Jia-Cheng / Zeng, Guo-Qiang / Geng, Guang-Gang / Weng, Jian / Lu, Kang-Di / Zhang, Yu et al. | 2023
-
Adaptive monitoring, detection, and response for agile digital service chainsRepetto, Matteo et al. | 2023
-
MultiTLS: using multiple and diverse ciphers for stronger secure channelsMoura, Ricardo / Lopes, Ricardo / Matos, David R. / Pardal, Miguel L. / Correia, Miguel et al. | 2023
-
Edge-HetIoT defense against DDoS attack using learning techniquesMahadik, Shalaka S. / Pawar, Pranav M. / Muthalagu, Raja et al. | 2023
-
RHEMAT: Robust human ear based multimodal authentication techniqueGanapathi, Iyyakutti Iyappan / Ali, Syed Sadaf / Sharma, Uttam / Tomar, Pradeep / Owais, Muhammad / Werghi, Naoufel et al. | 2023
-
Explainable cyber threat behavior identification based on self-adversarial topic generationGe, Wenhan / Wang, Junfeng / Lin, Tongcan / Tang, Binhui / Li, Xiaohui et al. | 2023
-
What you can read is what you can't executeLi, YongGang / Cai, JiaZhen / Bao, Yu / Chung, Yeh-Ching et al. | 2023
-
Mitigation strategies against the phishing attacks: A systematic literature reviewNaqvi, Bilal / Perova, Kseniia / Farooq, Ali / Makhdoom, Imran / Oyedeji, Shola / Porras, Jari et al. | 2023
-
PIGNUS: A Deep Learning model for IDS in industrial internet-of-thingsJayalaxmi, P.L.S. / Saha, Rahul / Kumar, Gulshan / Alazab, Mamoun / Conti, Mauro / Cheng, Xiaochun et al. | 2023
-
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networksDeng, Liting / Wen, Hui / Xin, Mingfeng / Li, Hong / Pan, Zhiwen / Sun, Limin et al. | 2023
-
Cryptographic ransomware encryption detection: SurveyBegovic, Kenan / Al-Ali, Abdulaziz / Malluhi, Qutaibah et al. | 2023
-
MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCPRodríguez, Ricardo J. / Marrone, Stefano / Marcos, Ibai / Porzio, Giuseppe et al. | 2023
-
User-centric security analysis of MitID: The Danish passwordless digital identity solutionKingo, Thomas / Aranha, Diego F. et al. | 2023
-
Dependable federated learning for IoT intrusion detection against poisoning attacksYang, Run / He, Hui / Wang, Yulong / Qu, Yue / Zhang, Weizhe et al. | 2023
-
Detecting compromised IoT devices: Existing techniques, challenges, and a way forwardMakhdoom, Imran / Abolhasan, Mehran / Franklin, Daniel / Lipman, Justin / Zimmermann, Christian / Piccardi, Massimo / Shariati, Negin et al. | 2023
-
Understanding extra-role security behaviors: An integration of self-determination theory and construal level theoryFrank, Muriel / Kohn, Vanessa et al. | 2023
-
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the UnaddressedStudiawan, Hudan / Grispos, George / Choo, Kim-Kwang Raymond et al. | 2023
-
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easilyZhao, Xiaoyun / Yang, Chao / Jia, Zhizhuang / Wang, Yue / Ma, Jianfeng et al. | 2023
-
Evaluating organizational phishing awareness training on an enterprise scaleHillman, Doron / Harel, Yaniv / Toch, Eran et al. | 2023
-
A privacy threat model for identity verification based on facial recognitionBeltrán, Marta / Calvo, Miguel et al. | 2023
-
A modular framework for auditing IoT devices and networksRizvi, Syed / Zwerling, Tatiana / Thompson, Benjamin / Faiola, Shawn / Campbell, Shakir / Fisanick, Stephen / Hutnick, Codi et al. | 2023
-
A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testingLi, Qianyu / Zhang, Min / Shen, Yi / Wang, Ruipeng / Hu, Miao / Li, Yang / Hao, Hao et al. | 2023
-
SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devicesYu, Chuan / Chen, Shuhui / Wei, Ziling / Wang, Fei et al. | 2023
-
Virtual reality for improving cyber situational awareness in security operations centersMunsinger, Brita / Beebe, Nicole / Richardson, Turquoise et al. | 2023
-
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanismRendón-Segador, Fernando J. / Álvarez-García, Juan A. / Varela-Vaca, Angel Jesús et al. | 2023
-
Improve individual fairness in federated learning via adversarial trainingLi, Jie / Zhu, Tianqing / Ren, Wei / Raymond, Kim-Kwang et al. | 2023
-
Game-theoretic APT defense: An experimental study on roboticsRass, Stefan / König, Sandra / Wachter, Jasmin / Mayoral-Vilches, Víctor / Panaousis, Emmanouil et al. | 2023
-
DKaaS: DARK-KERNEL as a service for active cyber threat intelligenceCharan, P.V. Sai / Ratnakaram, Goutham / Chunduri, Hrushikesh / Anand, P. Mohan / Shukla, Sandeep Kumar et al. | 2023
-
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user studyHarborth, David / Pape, Sebastian et al. | 2023
-
Vulnerability detection through cross-modal feature enhancement and fusionTao, Wenxin / Su, Xiaohong / Wan, Jiayuan / Wei, Hongwei / Zheng, Weining et al. | 2023
-
ITC: Intrusion tolerant controller for multicontroller SDN architectureSanoussi, Nouhad / Chetioui, Kaouthar / Orhanou, Ghizlane / El Hajji, Said et al. | 2023
-
SCOUT: Security by computing OUTliers on activity logsIanni, Michele / Masciari, Elio et al. | 2023
-
Efficient privacy preserving algorithms for hiding sensitive high utility itemsetsAshraf, Mohamed / Rady, Sherine / Abdelkader, Tamer / Gharib, Tarek F. et al. | 2023
-
ADFL: Defending backdoor attacks in federated learning via adversarial distillationZhu, Chengcheng / Zhang, Jiale / Sun, Xiaobing / Chen, Bing / Meng, Weizhi et al. | 2023
-
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issuesStylios, Ioannis / Chatzis, Sotirios / Thanou, Olga / Kokolakis, Spyros et al. | 2023
-
Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacyKumar, Kiran / Liu, Dapeng / Carter, Lemuria et al. | 2023
-
Barriers to a cybersecurity career: Analysis across career stage and genderGiboney, Justin Scott / Anderson, Bonnie Brinton / Wright, Geoffrey A. / Oh, Shayna / Taylor, Quincy / Warren, Megan / Johnson, Kylie et al. | 2023
-
Design, implementation, and automation of a risk management approach for man-at-the-End software protectionBasile, Cataldo / De Sutter, Bjorn / Canavese, Daniele / Regano, Leonardo / Coppens, Bart et al. | 2023
-
A hybrid method for analysis and detection of malicious executables in IoT networkSubrahmanyam, Singam Sai Bala / Goutham, P. / Ambati, Vasanth Kumar Reddy / Bijitha, C.V. / Nath, Hiran V. et al. | 2023
-
A framework for threat intelligence extraction and fusionGuo, Yongyan / Liu, Zhengyu / Huang, Cheng / Wang, Nannan / Min, Hai / Guo, Wenbo / Liu, Jiayong et al. | 2023
-
Editorial Board| 2023
-
BINO: Automatic recognition of inline binary functions from template classesBinosi, Lorenzo / Polino, Mario / Carminati, Michele / Zanero, Stefano et al. | 2023
-
A low cost and effective multi-instance abnormal driving behavior detection system under edge computingWang, Zhihua / Li, Zhenyu / Li, Zeminghui / Xu, Yingheng / Qi, Fazhi / Kong, Jinsheng et al. | 2023
-
Object-free backdoor attack and defense on semantic segmentationMao, Jiaoze / Qian, Yaguan / Huang, Jianchang / Lian, Zejie / Tao, Renhui / Wang, Bin / Wang, Wei / Yao, Tengteng et al. | 2023
-
Learning from cyber security incidents: A systematic review and future research agendaPatterson, Clare M. / Nurse, Jason R.C. / Franqueira, Virginia N.L. et al. | 2023
-
Enhancing federated learning robustness in adversarial environment through clustering Non-IID featuresLi, Yanli / Yuan, Dong / Sani, Abubakar Sadiq / Bao, Wei et al. | 2023
-
Cybersecurity Insights Gleaned from World ReligionsRenaud, Karen / Dupuis, Marc et al. | 2023
-
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systemsBarrère, Martín / Hankin, Chris / O’Reilly, Dean et al. | 2023
-
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysisAli, Hassan / Khan, Muhammad Suleman / AlGhadhban, Amer / Alazmi, Meshari / Alzamil, Ahmed / Al-utaibi, Khaled / Qadir, Junaid et al. | 2023
-
Security and performance implications of BGP rerouting-resistant guard selection algorithms for TorMitseva, Asya / Aleksandrova, Marharyta / Panchenko, Andriy et al. | 2023
-
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devicesVijayakanthan, Ramyapandian / Ahmed, Irfan / Ali-Gombe, Aisha et al. | 2023
-
An extended view on measuring tor AS-level adversariesGegenhuber, Gabriel K. / Maier, Markus / Holzbauer, Florian / Mayer, Wilfried / Merzdovnik, Georg / Weippl, Edgar / Ullrich, Johanna et al. | 2023
-
Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networksShaji, Neena Susan / Jain, Tanushree / Muthalagu, Raja / Pawar, Pranav Mothabhau et al. | 2023
-
Improvements to code2vec: Generating path vectors using RNNSun, Xuekai / Liu, Chunling / Dong, Weiyu / Liu, Tieming et al. | 2023
-
CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacksGoel, Shefali / Verma, Abhishek / Jain, Vinod Kumar et al. | 2023
-
Cyber-threat intelligence for security decision-making: A review and research agenda for practiceAinslie, Scott / Thompson, Dean / Maynard, Sean / Ahmad, Atif et al. | 2023
-
Privacy-centered authentication: A new framework and analysisRobles-González, Antonio / Arias-Cabarcos, Patricia / Parra-Arnau, Javier et al. | 2023
-
GenDroid: A query-efficient black-box android adversarial attack frameworkXu, Guangquan / Shao, Hongfei / Cui, Jingyi / Bai, Hongpeng / Li, Jiliang / Bai, Guangdong / Liu, Shaoying / Meng, Weizhi / Zheng, Xi et al. | 2023
-
Low frequency sparse adversarial attackLiu, Jiyuan / Lu, Bingyi / Xiong, Mingkang / Zhang, Tao / Xiong, Huilin et al. | 2023