no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
AGLFuzz: Automata-Guided Fuzzing for detecting logic errors in security protocol implementations
|
Zhao, Dongliang |
|
|
149 |
C |
p. |
article |
2 |
A novel user centric privacy mechanism in cyber physical system
|
Yogi, Manas Kumar |
|
|
149 |
C |
p. |
article |
3 |
Assessing cybersecurity awareness among bank employees: A multi-stage analytical approach using PLS-SEM, ANN, and fsQCA in a developing country context
|
Chanda, Razib Chandra |
|
|
149 |
C |
p. |
article |
4 |
Assessing the detection of lateral movement through unsupervised learning techniques
|
Smiliotopoulos, Christos |
|
|
149 |
C |
p. |
article |
5 |
Beyond the sandbox: Leveraging symbolic execution for evasive malware classification
|
Vouvoutsis, Vasilis |
|
|
149 |
C |
p. |
article |
6 |
Dynamic trigger-based attacks against next-generation IoT malware family classifiers
|
Zhang, Yefei |
|
|
149 |
C |
p. |
article |
7 |
Editorial Board
|
|
|
|
149 |
C |
p. |
article |
8 |
Explanatory and predictive modeling of cybersecurity behaviors using protection motivation theory
|
Kiran, Uzma |
|
|
149 |
C |
p. |
article |
9 |
Genetic programming for enhanced detection of Advanced Persistent Threats through feature construction
|
Mamun, Abdullah Al |
|
|
149 |
C |
p. |
article |
10 |
Hierarchical Perception for Encrypted Traffic Classification via Class Incremental Learning
|
Li, Zhiyuan |
|
|
149 |
C |
p. |
article |
11 |
Hyper attack graph: Constructing a hypergraph for cyber threat intelligence analysis
|
Jia, Junbo |
|
|
149 |
C |
p. |
article |
12 |
ML-based intrusion detection system for precise APT cyber-clustering
|
Lee, Jung-San |
|
|
149 |
C |
p. |
article |
13 |
PdGAT-ID: An intrusion detection method for industrial control systems based on periodic extraction and spatiotemporal graph attention
|
Zhang, Dongping |
|
|
149 |
C |
p. |
article |
14 |
Role of cybersecurity for a secure global communication eco-system: A comprehensive cyber risk assessment for satellite communications
|
Ansong, Samuel |
|
|
149 |
C |
p. |
article |
15 |
SecKG2vec: A novel security knowledge graph relational reasoning method based on semantic and structural fusion embedding
|
Liu, Xiaojian |
|
|
149 |
C |
p. |
article |
16 |
Trust my IDS: An explainable AI integrated deep learning-based transparent threat detection system for industrial networks
|
Shoukat, Shifa |
|
|
149 |
C |
p. |
article |
17 |
Web of shadows: Investigating malware abuse of internet services
|
Allegretta, Mauro |
|
|
149 |
C |
p. |
article |