Valid HTML 4.0! Valid CSS!
%%% -*-BibTeX-*-
%%% ====================================================================
%%%  BibTeX-file{
%%%     author          = "Nelson H. F. Beebe",
%%%     version         = "1.03",
%%%     date            = "04 May 2021",
%%%     time            = "08:02:48 MDT",
%%%     filename        = "computsecur2020.bib",
%%%     address         = "University of Utah
%%%                        Department of Mathematics, 110 LCB
%%%                        155 S 1400 E RM 233
%%%                        Salt Lake City, UT 84112-0090
%%%                        USA",
%%%     telephone       = "+1 801 581 5254",
%%%     FAX             = "+1 801 581 4148",
%%%     URL             = "http://www.math.utah.edu/~beebe",
%%%     checksum        = "51020 11398 42962 471672",
%%%     email           = "beebe at math.utah.edu, beebe at acm.org,
%%%                        beebe at computer.org (Internet)",
%%%     codetable       = "ISO/ASCII",
%%%     keywords        = "bibliography; BibTeX; Computers and
%%%                        Security",
%%%     license         = "public domain",
%%%     supported       = "yes",
%%%     docstring       = "This is a COMPLETE bibliography of the
%%%                        journal Computers and Security (CODEN CPSEDU,
%%%                        ISSN 0167-4048 (print), 1872-6208
%%%                        (electronic)) for the decade 2020--2029.
%%%
%%%                        The journal is published by Elsevier, and
%%%                        publication began with volume 1, number 1, in
%%%                        January 1982.  The issue count per annual
%%%                        volume rose from 3 (volumes 1--2) to 4
%%%                        (volumes 3--5) to 6 (volumes 6--7) to 8
%%%                        (volumes 9--31).  From volume 32 in 2013,
%%%                        issues are no longer assigned, and there are
%%%                        multiple volumes per year.
%%%
%%%                        The journal has Web sites at
%%%
%%%                            https://www.sciencedirect.com/journal/computers-and-security
%%%                            http://www.sciencedirect.com/science/journal/01674048
%%%
%%%                        At version 1.03, the COMPLETE year coverage
%%%                        looked like this:
%%%
%%%                             2020 ( 346)    2021 ( 154)
%%%
%%%                             Article:        500
%%%
%%%                             Total entries:  500
%%%
%%%                        Entries for this bibliography have been
%%%                        derived primarily from data at the publisher
%%%                        Web site, but have been augmented by data
%%%                        from the BibNet Project and TeX User Group
%%%                        bibliography archives.
%%%
%%%                        Spelling has been verified with the UNIX
%%%                        spell and GNU ispell programs using the
%%%                        exception dictionary stored in the companion
%%%                        file with extension .sok.  BibTeX citation
%%%                        tags are uniformly chosen as
%%%                        name:year:abbrev, where name is the family
%%%                        name of the first author or editor, year is a
%%%                        4-digit number, and abbrev is a 3-letter
%%%                        condensation of important title
%%%                        words. Citation tags were automatically
%%%                        generated by software developed for the
%%%                        BibNet Project.  In this bibliography,
%%%                        entries are sorted in publication order using
%%%                        bibsort -byvolume.
%%%
%%%                        The checksum field above contains a CRC-16
%%%                        checksum as the first value, followed by the
%%%                        equivalent of the standard UNIX wc (word
%%%                        count) utility output of lines, words, and
%%%                        characters.  This is produced by Robert
%%%                        Solovay's checksum utility.",
%%%  }
%%% ====================================================================
@Preamble{
    "\ifx \undefined \booktitle \def \booktitle #1{{{\em #1}}} \fi" #
    "\ifx \undefined \circled   \def \circled   #1{(#1)}\fi" #
    "\ifx \undefined \reg       \def \reg         {\circled{R}}\fi"
}

%%% ====================================================================
%%% Acknowledgement abbreviations:
@String{ack-nhfb = "Nelson H. F. Beebe,
                    University of Utah,
                    Department of Mathematics, 110 LCB,
                    155 S 1400 E RM 233,
                    Salt Lake City, UT 84112-0090, USA,
                    Tel: +1 801 581 5254,
                    FAX: +1 801 581 4148,
                    e-mail: \path|beebe@math.utah.edu|,
                            \path|beebe@acm.org|,
                            \path|beebe@computer.org| (Internet),
                    URL: \path|http://www.math.utah.edu/~beebe/|"}

%%% ====================================================================
%%% Journal abbreviations:
@String{j-COMPUT-SECUR          = "Computers \& Security"}

%%% ====================================================================
%%% Bibliography entries, sorted in publication order with ``bibsort
%%% --byvolume'':
@Article{Aldribi:2020:HBC,
  author =       "Abdulaziz Aldribi and Issa Traor{\'e} and Belaid Moa
                 and Onyekachi Nwamuo",
  title =        "Hypervisor-based cloud intrusion detection through
                 online multivariate statistical change tracking",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101646",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301907",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alqahtani:2020:IBC,
  author =       "Fatmah H. Alqahtani and Fawaz A. Alsulaiman",
  title =        "Is image-based {CAPTCHA} secure against attacks based
                 on machine learning? {An} experimental study",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101635",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818312185",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anglano:2020:AFA,
  author =       "Cosimo Anglano and Massimo Canonico and Marco
                 Guazzone",
  title =        "The {Android Forensics Automator (AnForA)}: a tool for
                 the Automated Forensic Analysis of {Android}
                 Applications",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101650",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301944",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:PJ,
  author =       "Anonymous",
  title =        "In progress ({January 2020})",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "??--??",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{benOthmane:2020:ESI,
  author =       "Lotfi ben Othmane and Doug Jacobson and Edgar Weippl",
  title =        "Editorial: Special issue on security and privacy in
                 smart cyber-physical systems",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101612",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301610",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Breitinger:2020:SSU,
  author =       "Frank Breitinger and Ryan Tully-Doyle and Courtney
                 Hassenfeldt",
  title =        "A survey on smartphone user's security choices,
                 awareness and education",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101647",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301919",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brilingaite:2020:FCD,
  author =       "Agne Brilingaite and Linas Bukauskas and Ausrius
                 Juozapavicius",
  title =        "A framework for competence development and assessment
                 in hybrid cybersecurity exercises",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101607",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301580",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Buldas:2020:AEA,
  author =       "Ahto Buldas and Olga Gadyatskaya and Aleksandr Lenin
                 and Sjouke Mauw and Rolando Trujillo-Rasua",
  title =        "Attribute evaluation on attack trees with incomplete
                 information",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101630",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301774",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{daSilva:2020:HBS,
  author =       "Carlo Marcelo Revoredo da Silva and Eduardo Luzeiro
                 Feitosa and Vinicius Cardoso Garcia",
  title =        "Heuristic-based strategy for Phishing prediction: a
                 survey of {URL}-based approach",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101613",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301622",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Desouza:2020:WIS,
  author =       "Kevin C. Desouza and Atif Ahmad and Humza Naseer and
                 Munish Sharma",
  title =        "Weaponizing information systems for political
                 disruption: the {Actor, Lever, Effects, and Response
                 Taxonomy (ALERT)}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101606",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301579",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Djelouat:2020:SCS,
  author =       "Hamza Djelouat and Abbes Amira and Faycal Bensaali and
                 Issam Boukhennoufa",
  title =        "Secure compressive sensing for {ECG} monitoring",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101649",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301932",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Figueira:2020:IIS,
  author =       "Pedro Tub{\'\i}o Figueira and Cristina L{\'o}pez Bravo
                 and Jos{\'e} Luis Rivas L{\'o}pez",
  title =        "Improving information security risk analysis by
                 including threat-occurrence predictive models",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101609",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301592",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2020:SMV,
  author =       "Xinwen Hu and Yi Zhuang and Fuyuan Zhang",
  title =        "A security modeling and verification method of
                 embedded software based on {$Z$} and {MARTE}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101615",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818304358",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:BCS,
  author =       "Qian Lu and Ruobing Jiang and Yuzhan Ouyang and
                 Haipeng Qu and Jiahui Zhang",
  title =        "{BiRe}: a client-side Bi-directional {SYN} Reflection
                 mechanism against multi-model evil twin attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101618",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301658",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Obert:2020:DRE,
  author =       "James Obert and Adrian Chavez and Jay Johnson",
  title =        "Distributed renewable energy resource trust metrics
                 and secure routing",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101620",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301671",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paananen:2020:SAI,
  author =       "Hanna Paananen and Michael Lapke and Mikko Siponen",
  title =        "State of the art in information security policy
                 development",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101608",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818313002",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Patsakis:2020:ECD,
  author =       "Constantinos Patsakis and Fran Casino and Vasilios
                 Katos",
  title =        "Encrypted and covert {DNS} queries for botnets:
                 Challenges and countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101614",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481831321X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Siponen:2020:CIN,
  author =       "Mikko Siponen and Petri Puhakainen and Anthony Vance",
  title =        "Can individuals' neutralization techniques be
                 overcome? {A} field experiment on password policy",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101617",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301646",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:DMB,
  author =       "Meng Wang and Yiqin Lu and Jiancheng Qin",
  title =        "A dynamic {MLP}-based {DDoS} attack detection method
                 using feature selection and feedback",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101645",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301890",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:USF,
  author =       "Ding Wang and Xizhe Zhang and Zijian Zhang and Ping
                 Wang",
  title =        "Understanding security failures of multi-factor
                 authentication schemes for multi-server environments",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101619",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481930166X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2020:ESD,
  author =       "Guangquan Xu and Bingjiang Guo and Chunhua Su and Xi
                 Zheng and Kaitai Liang and Duncan S. Wong and Hao
                 Wang",
  title =        "Am {I} eclipsed? {A} smart detector of eclipse attacks
                 for {Ethereum}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101604",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404818313798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yamin:2020:CRS,
  author =       "Muhammad Mudassar Yamin and Basel Katt and Vasileios
                 Gkioulos",
  title =        "Cyber ranges and security testbeds: Scenarios,
                 functions, tools and architecture",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101636",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301804",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yasasin:2020:FIS,
  author =       "Emrah Yasasin and Julian Prester and Gerit Wagner and
                 Guido Schryen",
  title =        "Forecasting {IT} security vulnerabilities --- An
                 empirical analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101610",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S016740481830854X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yazdinejad:2020:PBS,
  author =       "Abbas Yazdinejad and Reza M. Parizi and Ali
                 Dehghantanha and Kim-Kwang Raymond Choo",
  title =        "{P4}-to-blockchain: a secure blockchain-enabled packet
                 parser for software defined networking",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101629",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301762",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2020:PPP,
  author =       "Jun Zhou and Meng Zheng and Zhenfu Cao and Xiaolei
                 Dong",
  title =        "{PVIDM}: Privacy-preserving verifiable shape context
                 based image denoising and matching with efficient
                 outsourcing in the malicious setting",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101631",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue Oct 22 14:36:57 MDT 2019",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "https://www.sciencedirect.com/science/article/pii/S0167404819301786",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lovyagin:2020:FFG,
  author =       "Nikita Yu. Lovyagin and George A. Chernishev and
                 Kirill K. Smirnov and Roman Yu. Dayneko",
  title =        "{FGACFS}: a fine-grained access control for *nix
                 userspace file system",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101632",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101632",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301798",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Makhdoom:2020:PBB,
  author =       "Imran Makhdoom and Ian Zhou and Mehran Abolhasan and
                 Justin Lipman and Wei Ni",
  title =        "{PrivySharing}: a blockchain-based framework for
                 privacy-preserving and secure data sharing in smart
                 cities",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101653",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740481930197X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2020:FEA,
  author =       "Lyuye Zhang and Maode Ma",
  title =        "{FKR}: an efficient authentication scheme for {IEEE
                 802.11ah} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101633",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818313373",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Philippou:2020:CAS,
  author =       "Eleni Philippou and Sylvain Frey and Awais Rashid",
  title =        "Contextualising and aligning security metrics and
                 business objectives: a {GQM}-based methodology",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101634",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818305170",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Conti:2020:CBC,
  author =       "Mauro Conti and Chhagan Lal",
  title =        "Context-based {Co}-presence detection techniques: a
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101652",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301968",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wiley:2020:MTI,
  author =       "Ashleigh Wiley and Agata McCormac and Dragana Calic",
  title =        "More than the individual: Examining the relationship
                 between culture and Information Security Awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101640",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301841",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Waraga:2020:DIA,
  author =       "Omnia Abu Waraga and Meriem Bettayeb and Qassim Nasir
                 and Manar Abu Talib",
  title =        "Design and implementation of automated {IoT} security
                 testbed",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101648",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301920",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Singh:2020:BSC,
  author =       "Amritraj Singh and Reza M. Parizi and Qi Zhang and
                 Kim-Kwang Raymond Choo and Ali Dehghantanha",
  title =        "Blockchain smart contracts formalization: Approaches
                 and challenges to address vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101654",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818310927",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ruan:2020:GMF,
  author =       "Na Ruan and Ruoyu Deng and Chunhua Su",
  title =        "{GADM}: Manual fake review detection for {O2O}
                 commercial platforms",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101657",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302007",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arfaoui:2020:CAA,
  author =       "Amel Arfaoui and Omar Rafik Merad Boudia and Ali
                 Kribeche and Sidi-Mohammed Senouci and Mohamed Hamdi",
  title =        "Context-aware access control and anonymous
                 authentication in {WBAN}",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101496",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818304802",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alvarez:2020:CSP,
  author =       "Ramiro Alvarez and Mehrdad Nojoumian",
  title =        "Comprehensive survey on privacy-preserving protocols
                 for sealed-bid auctions",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101502",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818306631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2020:ENU,
  author =       "Yang Hu and Mingshen Sun and John C. S. Lui",
  title =        "Exploiting non-uniform program execution time to evade
                 record\slash replay forensic analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101516",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819300938",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhu:2020:DBA,
  author =       "Xiaodong Zhu and Yi Zhang and Liehui Jiang and Rui
                 Chang",
  title =        "Determining the base address of {MIPS} firmware based
                 on absolute address statistics and string reference
                 matching",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101504",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819300860",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menet:2020:SNS,
  author =       "Fran{\c{c}}ois Menet and Paul Berthier and Michel
                 Gagnon and Jos{\'e} M. Fernandez",
  title =        "{Spartan Networks}: Self-feature-squeezing neural
                 networks for increased robustness in adversarial
                 settings",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101537",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819300069",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xin:2020:RAS,
  author =       "Ruishan Xin and Yidong Yuan and Jiaji He and Shuai
                 Zhen and Yiqiang Zhao",
  title =        "Random active shield generation based on modified
                 artificial fish-swarm algorithm",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101552",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818312926",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zheng:2020:OFB,
  author =       "Haibin Zheng and Qianhong Wu and Jan Xie and Zhenyu
                 Guan and Bo Qin and Zhiqiang Gu",
  title =        "An organization-friendly blockchain system",
  journal =      j-COMPUT-SECUR,
  volume =       "88",
  number =       "??",
  pages =        "Article 101598",
  month =        jan,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101598",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:56 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818314111",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:F,
  author =       "Anonymous",
  title =        "{February 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "??--??",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101695",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302329",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2020:DGA,
  author =       "Linan Huang and Quanyan Zhu",
  title =        "A dynamic games approach to proactive defense
                 strategies against {Advanced Persistent Threats} in
                 cyber-physical systems",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101660",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302020",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Luo:2020:SDR,
  author =       "Peng Luo and Deqing Zou and Yajuan Du and Hai Jin and
                 Changming Liu and Jinan Shen",
  title =        "Static detection of real-world buffer overflow induced
                 by loop",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101616",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101616",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301634",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Malhi:2020:SVA,
  author =       "Avleen Kaur Malhi and Shalini Batra and Husanbir Singh
                 Pannu",
  title =        "Security of vehicular ad-hoc networks: a comprehensive
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101664",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818312872",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:BNA,
  author =       "Jiali Wang and Martin Neil and Norman Fenton",
  title =        "A {Bayesian} network approach for cybersecurity risk
                 assessment implementing and extending the {FAIR}
                 model",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101659",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819300604",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mahdavi:2020:RTA,
  author =       "Ehsan Mahdavi and Ali Fanian and Fatima Amini",
  title =        "A real-time alert correlation method based on
                 code-books for intrusion detection systems",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101661",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302032",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alzaylaee:2020:DDD,
  author =       "Mohammed K. Alzaylaee and Suleiman Y. Yerima and Sakir
                 Sezer",
  title =        "{DL-Droid}: Deep learning based {Android} malware
                 detection using real devices",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101663",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819300161",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boutigny:2020:SSC,
  author =       "Fran{\c{c}}ois Boutigny and St{\'e}phane
                 Betg{\'e}-Brezetz and Gregory Blanc and Antoine
                 Lavignotte and Herv{\'e} Debar and Houda Jmila",
  title =        "Solving security constraints for {$5$G} slice
                 embedding: a proof-of-concept",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101662",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101662",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302044",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arshad:2020:FKM,
  author =       "Humaira Arshad and Aman Jantan and Gan Keng Hoon and
                 Isaac Oludare Abiodun",
  title =        "Formal knowledge model for online social network
                 forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101675",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302160",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Moia:2020:IEC,
  author =       "Vitor Hugo Galhardo Moia and Frank Breitinger and
                 Marco Aur{\'e}lio Amaral Henriques",
  title =        "The impact of excluding common blocks for approximate
                 matching",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101676",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/string-matching.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302159",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhamare:2020:CIC,
  author =       "Deval Bhamare and Maede Zolanvari and Aiman Erbad and
                 Raj Jain and Khaled Khan and Nader Meskin",
  title =        "Cybersecurity for industrial control systems: a
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101677",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101677",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302172",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:SID,
  author =       "Ye Wang and Qingbao Li and Zhifeng Chen and Ping Zhang
                 and Guimin Zhang",
  title =        "{Shapeshifter}: Intelligence-driven data plane
                 randomization resilient to data-oriented programming
                 attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101679",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302196",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2020:MID,
  author =       "Jianwu Zhang and Yu Ling and Xingbing Fu and Xiongkun
                 Yang and and Gang Xiong and Rui Zhang",
  title =        "Model of the intrusion detection system based on the
                 integration of spatial-temporal features",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101681",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101681",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302214",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Upadhyay:2020:SSC,
  author =       "Darshana Upadhyay and Srinivas Sampalli",
  title =        "{SCADA} (Supervisory Control and Data Acquisition)
                 systems: Vulnerability assessment and security
                 recommendations",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101666",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302068",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rass:2020:CSS,
  author =       "Stefan Rass and Quanyan Zhu",
  title =        "Computer and security special issue editorial",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101678",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302184",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jahromi:2020:ITH,
  author =       "Amir Namavar Jahromi and Sattar Hashemi and Ali
                 Dehghantanha and Kim-Kwang Raymond Choo and Hadis
                 Karimipour and David Ellis Newton and Reza M. Parizi",
  title =        "An improved two-hidden-layer extreme learning machine
                 for malware hunting",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101655",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101655",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301981",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shwartz:2020:ICH,
  author =       "Omer Shwartz and Amir Cohen and Asaf Shabtai and Yossi
                 Oren",
  title =        "Inner conflict: How smart device components can cause
                 harm",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101665",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302056",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hoglund:2020:PTP,
  author =       "Joel H{\"o}glund and Samuel Lindemer and Martin
                 Furuhed and Shahid Raza",
  title =        "{PKI4IoT}: Towards public key infrastructure for the
                 {Internet of Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101658",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302019",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alawami:2020:LFG,
  author =       "Mohsen A. Alawami and Hyoungshick Kim",
  title =        "{LocAuth}: a fine-grained indoor location-based
                 authentication system using wireless networks
                 characteristics",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101683",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302226",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olukoya:2020:SOV,
  author =       "Oluwafemi Olukoya and Lewis Mackenzie and Inah
                 Omoronyia",
  title =        "Security-oriented view of app behaviour using textual
                 descriptions and user-granted permission requests",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101685",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302238",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{AlJawaheri:2020:DTH,
  author =       "Husam {Al Jawaheri} and Mashael {Al Sabah} and Yazan
                 Boshmaf and Aiman Erbad",
  title =        "Deanonymizing {Tor} hidden service users through
                 {Bitcoin} transactions analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101684",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818309908",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2020:NMM,
  author =       "Xinbo Liu and Yaping Lin and He Li and Jiliang Zhang",
  title =        "A novel method for malware detection on {ML}-based
                 visualization technique",
  journal =      j-COMPUT-SECUR,
  volume =       "89",
  number =       "??",
  pages =        "Article 101682",
  month =        feb,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818314627",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Ma,
  author =       "Anonymous",
  title =        "{March 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "??--??",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101727",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300146",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cimino:2020:MCM,
  author =       "Mario G. C. A. Cimino and Nicoletta {De Francesco} and
                 Francesco Mercaldo and Antonella Santone and Gigliola
                 Vaglini",
  title =        "Model checking for malicious family detection and
                 phylogenetic analysis in mobile environment",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101691",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302287",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Westland:2020:ICS,
  author =       "J. Christopher Westland",
  title =        "The information content of {Sarbanes--Oxley} in
                 predicting security breaches",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101687",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818302128",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gajrani:2020:EPR,
  author =       "Jyoti Gajrani and Umang Agarwal and Vijay Laxmi and
                 Bruhadeshwar Bezawada and Manoj Singh Gaur and
                 Meenakshi Tripathi and Akka Zemmari",
  title =        "{EspyDroid+}: Precise reflection analysis of {Android}
                 apps",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101688",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101688",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302251",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Schmitz:2020:LLS,
  author =       "Christopher Schmitz and Sebastian Pape",
  title =        "{LiSRA}: {Lightweight Security Risk Assessment} for
                 decision support in information security",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101656",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301993",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xia:2020:DMC,
  author =       "Chang Xia and Jingyu Hua and Wei Tong and Sheng
                 Zhong",
  title =        "Distributed {$K$}-Means clustering guaranteeing local
                 differential privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101699",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302366",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trivedi:2020:NIC,
  author =       "Amit Kumar Trivedi and Dalton Meitei Thounaojam and
                 Shyamosree Pal",
  title =        "Non-Invertible cancellable fingerprint template for
                 fingerprint biometric",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101690",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302275",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanSchaik:2020:RAA,
  author =       "Paul van Schaik and Karen Renaud and Christopher
                 Wilson and Jurjen Jansen and Joseph Onibokun",
  title =        "Risk as affect: the affect heuristic in
                 cybersecurity",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101651",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819301956",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2020:PPS,
  author =       "Dong Li and Xiaofeng Liao and Tao Xiang and Jiahui Wu
                 and Junqing Le",
  title =        "Privacy-preserving self-serviced medical diagnosis
                 scheme based on secure multi-party computation",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101701",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740481930238X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ren:2020:QEL,
  author =       "Yizhi Ren and Qi Zhou and Zhen Wang and Ting Wu and
                 Guohua Wu and Kim-Kwang Raymond Choo",
  title =        "Query-efficient label-only attacks against black-box
                 machine learning models",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101698",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101698",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302354",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gomez-Barrero:2020:RIS,
  author =       "Marta Gomez-Barrero and Javier Galbally",
  title =        "Reversing the irreversible: a survey on inverse
                 biometrics",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101700",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302378",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahvanooey:2020:ANI,
  author =       "Milad Taleby Ahvanooey and Qianmu Li and Xuefang Zhu
                 and Mamoun Alazab and Jing Zhang",
  title =        "{ANiTW}: a {Novel Intelligent Text Watermarking}
                 technique for forensic identification of spurious
                 information on social media",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101702",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302391",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Balakrishnan:2020:ICD,
  author =       "Vimala Balakrishnan and Shahzaib Khan and Hamid R.
                 Arabnia",
  title =        "Improving cyberbullying detection using {Twitter}
                 users' psychological features and machine learning",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101710",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302470",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dorsala:2020:FPV,
  author =       "Mallikarjun Reddy Dorsala and V. N. Sastry and
                 Sudhakar Chapram",
  title =        "Fair payments for verifiable cloud services using
                 smart contracts",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101712",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302494",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2020:CBR,
  author =       "Yurong Chen and Hongfa Xue and Tian Lan and Guru
                 Venkataramani",
  title =        "{CHOP}: Bypassing runtime bounds checking through
                 convex hull optimization",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101708",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302457",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Szczepaniuk:2020:ISA,
  author =       "Edyta Karolina Szczepaniuk and Hubert Szczepaniuk and
                 Tomasz Rokicki and Bogdan Klepacki",
  title =        "Information security assessment in public
                 administration",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101709",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302469",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{S:2020:SPE,
  author =       "Ajish S. and K. S. Anil Kumar",
  title =        "Security and performance enhancement of fingerprint
                 biometric template using symmetric hashing",
  journal =      j-COMPUT-SECUR,
  volume =       "90",
  number =       "??",
  pages =        "Article 101714",
  month =        mar,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:57 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/cryptography2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/hash.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030002X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Aa,
  author =       "Anonymous",
  title =        "{April 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "??--??",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101768",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300535",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rachid:2020:EBO,
  author =       "Maan Haj Rachid and Ryan Riley and Qutaibah Malluhi",
  title =        "Enclave-based oblivious {RAM} using {Intel}'s {SGX}",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101711",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302482",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pour:2020:DDC,
  author =       "Morteza Safaei Pour and Antonio Mangino and Kurt
                 Friday and Matthias Rathbun and Elias Bou-Harb and
                 Farkhund Iqbal and Sagar Samtani and Jorge Crichigno
                 and Nasir Ghani",
  title =        "On data-driven curation, learning, and analysis for
                 inferring evolving {Internet-of-Things (IoT)} botnets
                 in the wild",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101707",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101707",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302445",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rodriguez-Ruiz:2020:OCC,
  author =       "Jorge Rodr{\'\i}guez-Ruiz and Javier Israel
                 Mata-S{\'a}nchez and Ra{\'u}l Monroy and Octavio
                 Loyola-Gonz{\'a}lez and Armando L{\'o}pez-Cuevas",
  title =        "A one-class classification approach for bot detection
                 on {Twitter}",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101715",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300031",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2020:FSP,
  author =       "Yizhong Liu and Jianwei Liu and Zongyang Zhang and Hui
                 Yu",
  title =        "A fair selection protocol for committee-based
                 permissionless blockchains",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101718",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liang:2020:GTS,
  author =       "Xueqin Liang and Zheng Yan and Robert H. Deng",
  title =        "Game theoretical study on client-controlled cloud data
                 deduplication",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101730",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300171",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Spagnuelo:2020:QMT,
  author =       "Dayana Spagnuelo and Cesare Bartolini and Gabriele
                 Lenzini",
  title =        "Qualifying and measuring transparency: a medical data
                 system case study",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101717",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740481830823X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Challagidad:2020:MDD,
  author =       "Praveen S. Challagidad and Mahantesh N. Birje",
  title =        "Multi-dimensional dynamic trust evaluation scheme for
                 cloud environment",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101722",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300092",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guri:2020:FAD,
  author =       "Mordechai Guri and Yosef Solewicz and Yuval Elovici",
  title =        "{Fansmitter}: Acoustic data exfiltration from
                 air-gapped computers via fans noise",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101721",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300080",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2020:AKC,
  author =       "Qiang Zhang and Jianzhong Qiao and Qingyang Meng and
                 Yu Chen",
  title =        "Automatic kernel code synthesis and verification",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101733",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300201",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2020:CSA,
  author =       "Seungsoo Lee and Jinwoo Kim and Seungwon Woo and
                 Changhoon Yoon and Sandra Scott-Hayward and Vinod
                 Yegneswaran and Phillip Porras and Seungwon Shin",
  title =        "A comprehensive security assessment framework for
                 software-defined networks",
  journal =      j-COMPUT-SECUR,
  volume =       "91",
  number =       "??",
  pages =        "Article 101720",
  month =        apr,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101720",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Sat Mar 14 18:49:58 MDT 2020",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Mb,
  author =       "Anonymous",
  title =        "{May 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "??--??",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101797",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30082-1",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300821",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bland:2020:MLC,
  author =       "John A. Bland and Mikel D. Petty and Tymaine S.
                 Whitaker and Katia P. Maxwell and Walter Alan
                 Cantrell",
  title =        "Machine Learning Cyberattack and Defense Strategies",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101738",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101738",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818309799",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Torquato:2020:MTD,
  author =       "Matheus Torquato and Marco Vieira",
  title =        "Moving target defense in cloud computing: a systematic
                 mapping study",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101742",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101742",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ortega:2020:DFP,
  author =       "David Ortega and Alberto Fern{\'a}ndez-Isabel and
                 Isaac Mart{\'\i}n de Diego and Cristina Conde and
                 Enrique Cabello",
  title =        "Dynamic facial presentation attack detection for
                 automated border control systems",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101744",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101744",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300298",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yuan:2020:BLM,
  author =       "Baoguo Yuan and Junfeng Wang and Dong Liu and Wen Guo
                 and Peng Wu and Xuhua Bao",
  title =        "Byte-level malware classification based on {Markov}
                 images and deep learning",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101740",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101740",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300262",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:SSD,
  author =       "Ning Lu and Yongxin Zhang and Wenbo Shi and Saru
                 Kumari and Kim-Kwang Raymond Choo",
  title =        "A secure and scalable data integrity auditing scheme
                 based on hyperledger fabric",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101741",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101741",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300274",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Landauer:2020:SLC,
  author =       "Max Landauer and Florian Skopik and Markus
                 Wurzenberger and Andreas Rauber",
  title =        "System log clustering approaches for cyber security
                 applications: a survey",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101739",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101739",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300250",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Neigel:2020:HCH,
  author =       "Alexis R. Neigel and Victoria L. Claypoole and Grace
                 E. Waldfogle and Subrata Acharya and Gabriella M.
                 Hancock",
  title =        "Holistic cyber hygiene education: Accounting for the
                 human factors",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101731",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101731",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300183",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gill:2020:GCG,
  author =       "Komal Singh Gill and Sharad Saxena and Anju Sharma",
  title =        "{GTM-CSec}: Game theoretic model for cloud security
                 based on {IDS} and honeypot",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101732",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101732",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300195",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stojanovic:2020:ADA,
  author =       "Branka Stojanovi{\'c} and Katharina Hofer-Schmitz and
                 Ulrike Kleb",
  title =        "{APT} datasets and attack modeling for automated
                 detection methods: a review",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101734",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101734",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300213",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jerbi:2020:UAM,
  author =       "Manel Jerbi and Zaineb Chelly Dagdia and Slim Bechikh
                 and Lamjed {Ben Said}",
  title =        "On the use of artificial malicious patterns for
                 {Android} malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101743",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101743",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818309994",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maoneke:2020:ESM,
  author =       "Pardon Blessings Maoneke and Stephen Flowerday and
                 Naomi Isabirye",
  title =        "Evaluating the strength of a multilingual passphrase
                 policy",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101746",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101746",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300304",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Diesch:2020:CMI,
  author =       "Rainer Diesch and Matthias Pfaff and Helmut Krcmar",
  title =        "A comprehensive model of information security factors
                 for decision-makers",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101747",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101747",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300341",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2020:PSP,
  author =       "Lijuan Xu and Bailing Wang and Lianhai Wang and Dawei
                 Zhao and Xiaohui Han and Shumian Yang",
  title =        "{PLC-SEIFF}: a programmable logic controller security
                 incident forensics framework based on automatic
                 construction of security constraints",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101749",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101749",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300328",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kasongo:2020:DLM,
  author =       "Sydney Mambwe Kasongo and Yanxia Sun",
  title =        "A deep learning method with wrapper based feature
                 extraction for wireless intrusion detection system",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101752",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101752",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300365",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amer:2020:DWM,
  author =       "Eslam Amer and Ivan Zelinka",
  title =        "A dynamic {Windows} malware detection and prediction
                 method based on contextual understanding of {API} call
                 sequence",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101760",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101760",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300444",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2020:SES,
  author =       "Jianghua Liu and Jingyu Hou and Xinyi Huang and Yang
                 Xiang and Tianqing Zhu",
  title =        "Secure and efficient sharing of authenticated energy
                 usage data with privacy preservation",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101756",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101756",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300407",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liang:2020:PPM,
  author =       "Wenjuan Liang and Hong Chen and Ruixuan Liu and
                 Yuncheng Wu and Cuiping Li",
  title =        "A {Pufferfish} privacy mechanism for monitoring web
                 browsing behavior under temporal correlations",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101754",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101754",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300389",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hernandez-Castro:2020:AAU,
  author =       "Carlos Javier Hern{\'a}ndez-Castro and Shujun Li and
                 Mar{\'\i}a D. R-Moreno",
  title =        "All about uncertainties and traps: Statistical
                 oracle-based attacks on a new {CAPTCHA} protection
                 against oracle attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101758",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101758",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300420",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shin:2020:RTE,
  author =       "Bongsik Shin and Paul Benjamin Lowry",
  title =        "A review and theoretical explanation of the
                 `Cyberthreat-Intelligence {(CTI)} capability' that
                 needs to be fostered in information security
                 practitioners and how this can be accomplished",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101761",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101761",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300456",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brunner:2020:RMP,
  author =       "Michael Brunner and Clemens Sauerwein and Michael
                 Felderer and Ruth Breu",
  title =        "Risk management practices in information security:
                 Exploring the status quo in the {DACH} region",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101776",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101776",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300614",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{daVeiga:2020:DOI,
  author =       "Ad{\'e}le da Veiga and Liudmila V. Astakhova and
                 Ad{\'e}le Botha and Marlien Herselman",
  title =        "Defining organisational information security
                 culture-Perspectives from academia and industry",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101713",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101713",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zago:2020:UDP,
  author =       "Mattia Zago and Manuel Gil P{\'e}rez and Gregorio
                 Mart{\'\i}nez P{\'e}rez",
  title =        "{UMUDGA}: a dataset for profiling {DGA}-based botnet",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101719",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101719",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300067",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dahiya:2020:MAA,
  author =       "Amrita Dahiya and B. B. Gupta",
  title =        "Multi attribute auction based incentivized solution
                 against {DDoS} attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101763",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101763",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030047X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Williams:2020:VAP,
  author =       "Mark A. Williams and Roberto Camacho Barranco and
                 Sheikh Motahar Naim and Sumi Dey and M. Shahriar
                 Hossain and Monika Akbar",
  title =        "A vulnerability analysis and prediction framework",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101751",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101751",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300353",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tian:2020:PDF,
  author =       "Ke Tian and Gang Tan and Barbara G. Ryder and Danfeng
                 (Daphne) Yao",
  title =        "Prioritizing data flows and sinks for app security
                 transformation",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101750",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101750",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818306382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aghasian:2020:AMS,
  author =       "Erfan Aghasian and Saurabh Garg and James Montgomery",
  title =        "An automated model to score the privacy of
                 unstructured information --- Social media case",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101778",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101778",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300638",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Suaboot:2020:SCH,
  author =       "Jakapan Suaboot and Zahir Tari and Abdun Mahmood and
                 Albert Y. Zomaya and Wei Li",
  title =        "Sub-curve {HMM}: a malware detection approach based on
                 partial analysis of {API} call sequences",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101773",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101773",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300596",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oakley:2020:PPF,
  author =       "Jonathan Oakley and Lu Yu and Xingsi Zhong and Ganesh
                 Kumar Venayagamoorthy and Richard Brooks",
  title =        "Protocol Proxy: an {FTE}-based covert channel",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101777",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101777",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300626",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vasan:2020:IBM,
  author =       "Danish Vasan and Mamoun Alazab and Sobia Wassan and
                 Babak Safaei and Qin Zheng",
  title =        "Image-Based malware classification using ensemble of
                 {CNN} architectures {(IMCEC)}",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101748",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101748",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030033X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zuzcak:2020:ESA,
  author =       "Matej Zuzc{\'a}k and Milan Zenka",
  title =        "Expert system assessing threat level of attacks on a
                 hybrid {SSH} honeynet",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101784",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101784",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300699",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meland:2020:RSE,
  author =       "Per H{\aa}kon Meland and Yara Fareed Fahmy Bayoumy and
                 Guttorm Sindre",
  title =        "The Ransomware-as-a-Service economy within the
                 darknet",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101762",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101762",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300468",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:IVS,
  author =       "Xiuqing Lu and Zhenkuan Pan and Hequn Xian",
  title =        "An integrity verification scheme of cloud storage for
                 {Internet-of-Things} mobile terminal devices",
  journal =      j-COMPUT-SECUR,
  volume =       "92",
  number =       "??",
  pages =        "Article 101686",
  month =        may,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101686",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:02 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740481930224X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Ja,
  author =       "Anonymous",
  title =        "{June 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "??--??",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBf,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101842",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30115-2",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301152",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arce:2020:CPC,
  author =       "Daniel G. Arce",
  title =        "Cybersecurity and platform competition in the cloud",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101774",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101774",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300584",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liang:2020:OBA,
  author =       "Yuting Liang and Reza Samavi",
  title =        "Optimization-based $k$-anonymity algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101753",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101753",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300377",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aslam:2020:FAF,
  author =       "Mudassar Aslam and Bushra Mohsin and Abdul Nasir and
                 Shahid Raza",
  title =        "{FoNAC} --- An automated {Fog Node Audit and
                 Certification} scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101759",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101759",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300432",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fang:2020:DMJ,
  author =       "Yong Fang and Cheng Huang and Yu Su and Yaoyao Qiu",
  title =        "Detecting malicious {JavaScript} code based on
                 semantic analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101764",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101764",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300481",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sebastio:2020:OSE,
  author =       "Stefano Sebastio and Eduard Baranov and Fabrizio
                 Biondi and Olivier Decourbe and Thomas Given-Wilson and
                 Axel Legay and Cassius Puodzius and Jean Quilbeuf",
  title =        "Optimizing symbolic execution for malware behavior
                 classification",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101775",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101775",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300602",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Olukoya:2020:TUU,
  author =       "Oluwafemi Olukoya and Lewis Mackenzie and Inah
                 Omoronyia",
  title =        "Towards using unstructured user input request for
                 malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101783",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101783",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300687",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:PPH,
  author =       "Rong Wang and Yan Zhu and Chin-Chen Chang and Qiang
                 Peng",
  title =        "Privacy-preserving high-dimensional data publishing
                 for classification",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101785",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101785",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300705",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Imine:2020:APP,
  author =       "Youcef Imine and Ahmed Lounis and Abdelmadjid
                 Bouabdallah",
  title =        "An accountable privacy-preserving scheme for public
                 information sharing systems",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101786",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101786",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300717",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Almashhadani:2020:MSD,
  author =       "Ahmad O. Almashhadani and Mustafa Kaiiali and Domhnall
                 Carlin and Sakir Sezer",
  title =        "{MaldomDetector}: a system for detecting
                 algorithmically generated domain names with machine
                 learning",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101787",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101787",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300729",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bidgoly:2020:SMC,
  author =       "Amir Jalaly Bidgoly and Hamed Jalaly Bidgoly and
                 Zeynab Arezoumand",
  title =        "A survey on methods and challenges in {EEG} based
                 authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101788",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101788",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300730",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2020:DTA,
  author =       "Tengyao Li and Buhong Wang and Fute Shang and Jiwei
                 Tian and Kunrui Cao",
  title =        "Dynamic temporal {ADS-B} data attack detection based
                 on {sHDP-HMM}",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101789",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101789",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300742",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Berger:2020:AII,
  author =       "Stephan Berger and Olga B{\"u}rger and Maximilian
                 R{\"o}glinger",
  title =        "Attacks on the {Industrial Internet of Things} ---
                 Development of a multi-layer Taxonomy",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101790",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101790",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300754",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pei:2020:ADL,
  author =       "Xinjun Pei and Long Yu and Shengwei Tian",
  title =        "{AMalNet}: a deep learning framework based on graph
                 convolutional networks for malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101792",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101792",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300778",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Vakilinia:2020:VMP,
  author =       "Iman Vakilinia and Shamik Sengupta",
  title =        "Vulnerability market as a public-good auction with
                 privacy preservation",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101807",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101807",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300924",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karjalainen:2020:TST,
  author =       "Mari Karjalainen and Mikko Siponen and Suprateek
                 Sarker",
  title =        "Toward a stage theory of the development of employees'
                 information security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101782",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101782",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300675",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mitchell:2020:IQC,
  author =       "Chris J. Mitchell",
  title =        "The impact of quantum computing on real-world
                 security: a {5G} case study",
  journal =      j-COMPUT-SECUR,
  volume =       "93",
  number =       "??",
  pages =        "Article 101825",
  month =        jun,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101825",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:03 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300997",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Jb,
  author =       "Anonymous",
  title =        "{July 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "??--??",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBg,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101903",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101903",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301796",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trnecka:2020:IAR,
  author =       "Martin Trnecka and Marketa Trneckova",
  title =        "An incremental algorithm for the role mining problem",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101830",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101830",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301036",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2020:NPP,
  author =       "Yimin Guo and Zhenfeng Zhang and Yajun Guo and Xiaowei
                 Guo",
  title =        "Nudging personalized password policies by
                 understanding users' personality",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101801",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101801",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300870",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Radhika:2020:CAF,
  author =       "B. S. Radhika and N. V. Narendra Kumar and R. K.
                 Shyamasundar and Parjanya Vyas",
  title =        "Consistency analysis and flow secure enforcement of
                 {SELinux} policies",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101816",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101816",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300948",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dong:2020:EES,
  author =       "Ye Dong and Xiaojun Chen and Liyan Shen and Dakui
                 Wang",
  title =        "{EaSTFLy}: Efficient and secure ternary federated
                 learning",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101824",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101824",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300985",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Robles-Gonzalez:2020:LBF,
  author =       "Antonio Robles-Gonz{\'a}lez and Javier Parra-Arnau and
                 Jordi Forn{\'e}",
  title =        "A {LINDDUN}-based framework for privacy threat
                 analysis on identification and authentication
                 processes",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101755",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101755",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300390",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2020:PPB,
  author =       "Xinwen Hu and Yi Zhuang",
  title =        "{PHRiMA}: a permission-based hybrid risk management
                 framework for {Android} apps",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101791",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101791",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300766",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bryant:2020:ISA,
  author =       "Blake D. Bryant and Hossein Saiedian",
  title =        "Improving {SIEM} alert metadata aggregation with a
                 novel kill-chain based classification model",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101817",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101817",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030095X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2020:CTC,
  author =       "Yujie Zhao and Zhanyong Tang and Guixin Ye and Dongxu
                 Peng and Dingyi Fang and Xiaojiang Chen and Zheng
                 Wang",
  title =        "Compile-time code virtualization for {Android}
                 applications",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101821",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101821",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300936",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oishi:2020:SDP,
  author =       "Keiichiro Oishi and Yuichi Sei and Yasuyuki Tahara and
                 Akihiko Ohsuga",
  title =        "Semantic diversity: Privacy considering distance
                 between values of sensitive attribute",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101823",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101823",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300973",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Matthew:2020:AAO,
  author =       "Peter Matthew and Susan Canning",
  title =        "An algorithmic approach for optimising biometric
                 systems using liveness and coercion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101831",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101831",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030105X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jang:2020:ICE,
  author =       "Hyerean Jang and Moon Chan Park and Dong Hoon Lee",
  title =        "{IBV-CFI}: Efficient fine-grained control-flow
                 integrity preserving {CFG} precision",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101828",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101828",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301024",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chekole:2020:CCE,
  author =       "Eyasu Getahun Chekole and Sudipta Chattopadhyay and
                 Mart{\'\i}n Ochoa and Huaqun Guo and Unnikrishnan
                 Cheramangalath",
  title =        "{CIMA}: Compiler-Enforced Resilience Against Memory
                 Safety Attacks in Cyber-Physical Systems",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101832",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101832",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301061",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tariq:2020:CAC,
  author =       "Shahroz Tariq and Sangyup Lee and Huy Kang Kim and
                 Simon S. Woo",
  title =        "{CAN-ADF}: the controller area network attack
                 detection framework",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101857",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101857",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301292",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kaliyar:2020:LLE,
  author =       "Pallavi Kaliyar and Wafa Ben Jaballah and Mauro Conti
                 and Chhagan Lal",
  title =        "{LiDL}: Localization with early detection of sybil and
                 wormhole attacks in {IoT} Networks",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101849",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101849",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030122X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shafiq:2020:IMT,
  author =       "Muhammad Shafiq and Zhihong Tian and Ali Kashif Bashir
                 and Xiaojiang Du and Mohsen Guizani",
  title =        "{IoT} malicious traffic identification using
                 wrapper-based feature selection mechanisms",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101863",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101863",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301358",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Frauenstein:2020:SPS,
  author =       "Edwin Donald Frauenstein and Stephen Flowerday",
  title =        "Susceptibility to phishing on social network sites: a
                 personality information processing model",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101862",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101862",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301346",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Knox:2020:WRH,
  author =       "Shawn Knox and Steven Moghadam and Kenny Patrick and
                 Anh Phan and Kim-Kwang Raymond Choo",
  title =        "{What}'s really ` {{\em Happn}}ing'? {A} forensic
                 analysis of {Android} and {iOS} {{\em Happn}} dating
                 apps",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101833",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101833",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301073",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderSchyff:2020:DSM,
  author =       "Karl van der Schyff and Stephen Flowerday and Steven
                 Furnell",
  title =        "Duplicitous social media and data surveillance: an
                 evaluation of privacy risk",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101822",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101822",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300961",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Saidani:2020:SBC,
  author =       "Nadjate Saidani and Kamel Adi and Mohand Sa{\"\i}d
                 Allili",
  title =        "A semantic-based classification approach for an
                 enhanced spam detection",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101716",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101716",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hu:2020:CSB,
  author =       "Kexin Hu and Zhenfeng Zhang and Kaiwen Guo",
  title =        "Corrigendum to {``Breaking the binding: Attacks on the
                 Merkle approach to prove liabilities and its
                 applications'' [Computers and Security, Volume 87,
                 2019, 101585]}",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101878",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101878",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301516",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2020:CSL,
  author =       "Yimin Guo and Zhenfeng Zhang",
  title =        "Corrigendum to {``LPSE: Lightweight password-strength
                 estimation for password meters'' [Computers and
                 Security, Volume 73, 2018, Pages 507--518]}",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101879",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101879",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301528",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2020:CSO,
  author =       "Yimin Guo and Zhenfeng Zhang and Yajun Guo",
  title =        "Corrigendum to {``Optiwords: a new password policy for
                 creating memorable and strong password'' [Computers and
                 Security, Volume 85, 2019, Pages 423--435]}",
  journal =      j-COMPUT-SECUR,
  volume =       "94",
  number =       "??",
  pages =        "Article 101880",
  month =        jul,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101880",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030153X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:Ab,
  author =       "Anonymous",
  title =        "{August 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "??--??",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBh,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101912",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30188-7",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301887",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Qian:2020:SEA,
  author =       "Yaguan Qian and Danfeng Ma and Bin Wang and Jun Pan
                 and Jiamin Wang and Zhaoquan Gu and Jianhai Chen and
                 Wujie Zhou and Jingsheng Lei",
  title =        "Spot evasion attacks: Adversarial examples for license
                 plate recognition systems with convolutional neural
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101826",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101826",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301000",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hart:2020:RSG,
  author =       "Stephen Hart and Andrea Margheri and Federica Paci and
                 Vladimiro Sassone",
  title =        "{Riskio}: a Serious Game for Cyber Security Awareness
                 and Education",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101827",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101827",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301012",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Russo:2020:BNG,
  author =       "Enrico Russo and Gabriele Costa and Alessandro
                 Armando",
  title =        "Building next generation Cyber Ranges with {CRACK}",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101837",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101837",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301103",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Malatji:2020:VST,
  author =       "Masike Malatji and Annliz{\'e} Marnewick and Sun{\'e}
                 von Solms",
  title =        "Validation of a socio-technical management process for
                 optimising cybersecurity practices",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101846",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101846",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030119X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tian:2020:CDI,
  author =       "Junfeng Tian and Xuan Jing",
  title =        "Cloud data integrity verification scheme for
                 associated tags",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101847",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101847",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301206",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Niazi:2020:MMS,
  author =       "Mahmood Niazi and Ashraf Mohammed Saeed and Mohammad
                 Alshayeb and Sajjad Mahmood and Saad Zafar",
  title =        "A maturity model for secure requirements engineering",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101852",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101852",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301243",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menard:2020:AIU,
  author =       "Philip Menard and Gregory J. Bott",
  title =        "Analyzing {IOT} users' mobile device privacy concerns:
                 Extracting privacy permissions using a disclosure
                 experiment",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101856",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101856",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301280",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2020:PPS,
  author =       "Yi Zhao and Jianting Ning and Kaitai Liang and Yanqi
                 Zhao and Liqun Chen and Bo Yang",
  title =        "Privacy preserving search services against online
                 attack",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101836",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101836",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301097",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2020:CMN,
  author =       "Man Zhou and Lansheng Han and Hongwei Lu and Cai Fu
                 and Dezhi An",
  title =        "Cooperative malicious network behavior recognition
                 algorithm in E-commerce",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101868",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101868",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301401",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2020:BAE,
  author =       "XuKui Li and Wei Chen and Qianru Zhang and Lifa Wu",
  title =        "Building {Auto-Encoder Intrusion Detection System}
                 based on random forest feature selection",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101851",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101851",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301231",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bozkir:2020:LCH,
  author =       "Ahmet Selman Bozkir and Murat Aydos",
  title =        "{LogoSENSE}: a companion {HOG} based logo detection
                 scheme for phishing web page and E-mail brand
                 recognition",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101855",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101855",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301279",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:PXR,
  author =       "Eric Ke Wang and RuiPei Sun and Chien-Ming Chen and
                 Zuodong Liang and Saru Kumari and Muhammad Khurram
                 Khan",
  title =        "Proof of {X}-repute blockchain consensus protocol for
                 {IoT} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101871",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101871",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301449",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gibert:2020:HMD,
  author =       "Daniel Gibert and Carles Mateu and Jordi Planes",
  title =        "{HYDRA}: a multimodal deep learning framework for
                 malware classification",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101873",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101873",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301462",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sinigaglia:2020:SMF,
  author =       "Federico Sinigaglia and Roberto Carbone and Gabriele
                 Costa and Nicola Zannone",
  title =        "A survey on multi-factor authentication for online
                 banking in the wild",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101745",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101745",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300316",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doucek:2020:APS,
  author =       "Petr Doucek and Lubos Pavl{\'\i}cek and Jir{\'\i}
                 Sedl{\'a}cek and Lea Nedomov{\'a}",
  title =        "Adaptation of password strength estimators to a
                 non-{English} environment --- the {Czech} experience",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101757",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101757",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300419",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Esmaeilzadeh:2020:EPP,
  author =       "Pouyan Esmaeilzadeh",
  title =        "The effect of the privacy policy of {Health
                 Information Exchange (HIE)} on patients' information
                 disclosure intention",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101819",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101819",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818311763",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Parvez:2020:SVB,
  author =       "Mohammad Tanvir Parvez and Suliman A. Alsuhibany",
  title =        "Segmentation-validation based handwritten {Arabic
                 CAPTCHA} generation",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101829",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101829",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301048",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dileesh:2020:MPV,
  author =       "E. D. Dileesh and A. P. Shanthi",
  title =        "{M-PIVAD} --- Virtual memory based approach against
                 non-control data attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101834",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101834",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818311374",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Corcoran:2020:DLO,
  author =       "Padraig Corcoran and Peter Mooney and Andrei Gagarin",
  title =        "A distributed location obfuscation method for online
                 route planning",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101850",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101850",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740481831071X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Botacin:2020:WNT,
  author =       "Marcus Botacin and Fabricio Ceschin and Paulo de Geus
                 and Andr{\'e} Gr{\'e}gio",
  title =        "We need to talk about antiviruses: challenges and
                 pitfalls of {AV} evaluations",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101859",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101859",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301310",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2020:TAE,
  author =       "Jun Zhao and Qiben Yan and Jianxin Li and Minglai Shao
                 and Zuti He and Bo Li",
  title =        "{TIMiner}: Automatically extracting and analyzing
                 categorized cyber threat intelligence from social
                 data",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101867",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101867",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301395",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tan:2020:GTA,
  author =       "Choon Lin Tan and Kang Leng Chiew and Kelvin S. C.
                 Yong and San Nah Sze and Johari Abdullah and Yakub
                 Sebastian",
  title =        "A graph-theoretic approach for the detection of
                 phishing webpages",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101793",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101793",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030078X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Henry:2020:SPS,
  author =       "Wayne C. Henry and Gilbert L. Peterson",
  title =        "{SensorRE}: Provenance support for software reverse
                 engineers",
  journal =      j-COMPUT-SECUR,
  volume =       "95",
  number =       "??",
  pages =        "Article 101865",
  month =        aug,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101865",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:04 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301371",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:S,
  author =       "Anonymous",
  title =        "{September 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "??--??",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBi,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101980",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30253-4",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302534",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kam:2020:CCL,
  author =       "Hwee-Joo Kam and Philip Menard and Dustin Ormond and
                 Robert E. Crossler",
  title =        "Cultivating cybersecurity learning: an integration of
                 self-determination and flow",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101875",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101875",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301486",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ge:2020:PPB,
  author =       "Chunpeng Ge and Changchun Yin and Zhe Liu and Liming
                 Fang and Juncen Zhu and Huading Ling",
  title =        "A privacy preserve big data analysis system for
                 wearable wireless sensor network",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101887",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101887",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301607",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wajdi:2020:AED,
  author =       "Moussa Wajdi and Basty Nadia and Ghazouani Ines",
  title =        "Asymmetric effect and dynamic relationships over the
                 cryptocurrencies market",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101860",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101860",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301322",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yao:2020:PPE,
  author =       "Yuanfan Yao and Ziyu Wang and Pan Zhou",
  title =        "Privacy-preserving and energy efficient task
                 offloading for collaborative mobile computing in {IoT}:
                 an {ADMM} approach",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101886",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101886",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301590",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Korba:2020:ABF,
  author =       "Abdelaziz Amara Korba and Nouredine Tamani and Yacine
                 Ghamri-Doudane and Nour {El Islem Karabadji}",
  title =        "Anomaly-based framework for detecting power
                 overloading cyberattacks in smart grid {AMI}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101896",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101896",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301693",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderSchyff:2020:PRU,
  author =       "Karl van der Schyff and Stephen Flowerday and Steven
                 Furnell",
  title =        "Privacy risk and the use of {Facebook} apps: a
                 gender-focused vulnerability assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101866",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101866",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301383",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2020:HRH,
  author =       "Bo Yang",
  title =        "A highly-random hopping sequence for jamming-resilient
                 channel rendezvous in distributed cognitive radio
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101809",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101809",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404818309416",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stergiopoulos:2020:ANR,
  author =       "George Stergiopoulos and Panagiotis Dedousis and
                 Dimitris Gritzalis",
  title =        "Automatic network restructuring and risk mitigation
                 through business process asset dependency analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101869",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101869",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301413",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:CAF,
  author =       "Xiaofeng Lu and Shengfei Zhang and Pan Hui and Pietro
                 Lio",
  title =        "Continuous authentication by free-text keystroke based
                 on {CNN} and {RNN}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101861",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101861",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301334",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Akhuseyinoglu:2020:CRA,
  author =       "Nuray Baltaci Akhuseyinoglu and James Joshi",
  title =        "A constraint and risk-aware approach to
                 attribute-based access control for cyber-physical
                 systems",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101802",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101802",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820300869",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tantawy:2020:MBR,
  author =       "Ashraf Tantawy and Sherif Abdelwahed and Abdelkarim
                 Erradi and Khaled Shaban",
  title =        "Model-based risk assessment for cyber physical systems
                 security",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101864",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101864",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030136X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Elmrabit:2020:ITR,
  author =       "Nebrase Elmrabit and Shuang-Hua Yang and Lili Yang and
                 Huiyu Zhou",
  title =        "Insider Threat Risk Prediction based on {Bayesian}
                 Network",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101908",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101908",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030184X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guerreiro:2020:TSE,
  author =       "Jo{\~a}o Guerreiro and Rui Moura and Jo{\~a}o Nuno
                 Silva",
  title =        "{TEEnder}: {SGX} enclave migration using {HSMs}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101874",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101874",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301474",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dvir:2020:EVT,
  author =       "Amit Dvir and Angelos K. Marnerides and Ran Dubin and
                 Nehor Golan and Chen Hajaj",
  title =        "Encrypted video traffic clustering demystified",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101917",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101917",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301930",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Onwubiko:2020:FMM,
  author =       "Cyril Onwubiko",
  title =        "Fraud matrix: a morphological and analysis-based
                 classification and taxonomy of fraud",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101900",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101900",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301759",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sammoud:2020:NBB,
  author =       "Amal Sammoud and Mohamed Aymen Chalouf and Omessaad
                 Hamdi and Nicolas Montavont and Ammar Bouallegue",
  title =        "A new biometrics-based key establishment protocol in
                 {WBAN}: energy efficiency and security robustness
                 analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101838",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101838",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301115",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fang:2020:HEF,
  author =       "Chen Fang and Yuanbo Guo and Na Wang and Ankang Ju",
  title =        "Highly efficient federated learning with strong
                 privacy preservation in cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101889",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101889",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301620",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lian:2020:PPS,
  author =       "Huijuan Lian and Weidong Qiu and Di Yan and Jie Guo
                 and Zhe Li and Peng Tang",
  title =        "Privacy-preserving spatial query protocol based on the
                 {Moore} curve for location-based service",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101845",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101845",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301188",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aleisa:2020:PPA,
  author =       "Noura Aleisa and Karen Renaud and Ivano Bongiovanni",
  title =        "The privacy paradox applies to {IoT} devices too: a
                 {Saudi Arabian} study",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101897",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101897",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301711",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Konashevych:2020:RTB,
  author =       "Oleksii Konashevych and Oleg Khovayko",
  title =        "Randpay: the technology for blockchain micropayments
                 and transactions which require recipient's consent",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101892",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101892",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301656",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Galbally:2020:NFB,
  author =       "Javier Galbally",
  title =        "A new Foe in biometrics: a narrative review of
                 side-channel attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101902",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101902",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301784",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arcolezi:2020:FNF,
  author =       "H{\'e}ber H. Arcolezi and Jean-Fran{\c{c}}ois Couchot
                 and Selene Cerna and Christophe Guyeux and Guillaume
                 Royer and B{\'e}chara Al Bouna and Xiaokui Xiao",
  title =        "Forecasting the number of firefighter interventions
                 per region with local-differential-privacy-based data",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101888",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101888",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301619",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Case:2020:HAD,
  author =       "Andrew Case and Ryan D. Maggio and Md Firoz-Ul-Amin
                 and Mohammad M. Jalalzai and Aisha Ali-Gombe and
                 Mingxuan Sun and Golden G. Richard",
  title =        "{Hooktracer}: Automatic Detection and Analysis of
                 Keystroke Loggers Using Memory Forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101872",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101872",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301450",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xie:2020:HMH,
  author =       "Jiang Xie and Shuhao Li and Xiaochun Yun and Yongzheng
                 Zhang and Peng Chang",
  title =        "{HSTF-Model}: an {HTTP}-based {Trojan} detection model
                 via the {Hierarchical Spatio-temporal Features of
                 Traffics}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101923",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101923",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030198X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ma:2020:TMM,
  author =       "Zuchao Ma and Liang Liu and Weizhi Meng",
  title =        "Towards multiple-mix-attack detection via
                 consensus-based trust management in {IoT} networks",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101898",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101898",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030170X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Haider:2020:FHF,
  author =       "Waqas Haider and Nour Moustafa and Marwa Keshk and
                 Amanda Fernandez and Kim-Kwang Raymond Choo and Abdul
                 Wahab",
  title =        "{FGMC-HADS}: Fuzzy {Gaussian} mixture-based
                 correntropy models for detecting zero-day attacks from
                 {Linux} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101906",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101906",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/linux.bib;
                 http://www.math.utah.edu/pub/tex/bib/unix.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301826",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bhana:2020:PKD,
  author =       "Bhaveer Bhana and Stephen Flowerday",
  title =        "Passphrase and keystroke dynamics authentication:
                 Usable security",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101925",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101925",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302017",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maiorca:2020:ADF,
  author =       "Davide Maiorca and Ambra Demontis and Battista Biggio
                 and Fabio Roli and Giorgio Giacinto",
  title =        "Adversarial Detection of Flash Malware: Limitations
                 and Open Issues",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101901",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101901",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301760",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Miao:2020:ASE,
  author =       "Kelei Miao and Xiufang Shi and Wen-An Zhang",
  title =        "Attack signal estimation for intrusion detection in
                 industrial control system",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101926",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101926",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302029",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guan:2020:DPG,
  author =       "Zhitao Guan and Xianwen Sun and Lingyun Shi and
                 Longfei Wu and Xiaojiang Du",
  title =        "A differentially private greedy decision forest
                 classification algorithm with high utility",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101930",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101930",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302054",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karbab:2020:SRUa,
  author =       "ElMouatez Billah Karbab and Mourad Debbabi and
                 Abdelouahid Derhab and Djedjiga Mouheb",
  title =        "Scalable and robust unsupervised {Android} malware
                 fingerprinting using community-based network
                 partitioning",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101932",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101932",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030208X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Das:2020:ADI,
  author =       "Tanmoy Kanti Das and Sridhar Adepu and Jianying Zhou",
  title =        "Anomaly detection in Industrial Control Systems using
                 Logical Analysis of Data",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101935",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101935",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302121",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xiang:2020:DMA,
  author =       "Zongyuan Xiang and Dong Guo and Qiang Li",
  title =        "Detecting mobile advanced persistent threats based on
                 large-scale {DNS} logs",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101933",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101933",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302091",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tian:2020:FGA,
  author =       "Junfeng Tian and Zhidan Wang",
  title =        "Fine-grained assured data deletion scheme based on
                 attribute association",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101936",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101936",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030211X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arend:2020:PARa,
  author =       "Isabel Arend and Asaf Shabtai and Tali Idan and Ruty
                 Keinan and Yoella Bereby-Meyer",
  title =        "Passive- and not active-risk tendencies predict cyber
                 security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101929",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101929",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302066",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yu:2020:UAM,
  author =       "Guangsheng Yu and Xuan Zha and Xu Wang and Wei Ni and
                 Kan Yu and J. Andrew Zhang and Ren Ping Liu",
  title =        "A Unified Analytical model for proof-of-{X} schemes",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101934",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101934",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302108",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2020:DBL,
  author =       "Liqun Yang and Xiaoming Zhang and Zhi Li and Zhoujun
                 Li and Yueying He",
  title =        "Detecting bi-level false data injection attack based
                 on time series analysis method in smart grid",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101899",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101899",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301723",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kuo:2020:MAD,
  author =       "Kuang-Ming Kuo and Paul C. Talley and Chi-Hsien
                 Huang",
  title =        "A meta-analysis of the deterrence theory in
                 security-compliant and security-risk behaviors",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101928",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101928",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302042",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Iannacone:2020:QCE,
  author =       "Michael D. Iannacone and Robert A. Bridges",
  title =        "Quantifiable and comparable evaluations of cyber
                 defensive capabilities: a survey and novel, unified
                 approach",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101907",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101907",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301838",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lv:2020:ASB,
  author =       "Denglong Lv and Shibing Zhu",
  title =        "Achieving secure big data collection based on trust
                 evaluation and true data discovery",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101937",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101937",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302133",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Amiri-Zarandi:2020:SML,
  author =       "Mohammad Amiri-Zarandi and Rozita A. Dara and Evan
                 Fraser",
  title =        "A survey of machine learning-based solutions to
                 protect privacy in the {Internet of Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101921",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101921",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301978",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2020:RSN,
  author =       "Jinyin Chen and Haibin Zheng and Ruoxi Chen and Hui
                 Xiong",
  title =        "{RCA-SOC}: a novel adversarial defense by refocusing
                 on critical areas and strengthening object contours",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101916",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101916",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301929",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2020:QPT,
  author =       "Zhe Sun and Lihua Yin and Chao Li and Weizhe Zhang and
                 Ang Li and Zhihong Tian",
  title =        "The {QoS} and privacy trade-off of adversarial deep
                 learning: an evolutionary game approach",
  journal =      j-COMPUT-SECUR,
  volume =       "96",
  number =       "??",
  pages =        "Article 101876",
  month =        sep,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101876",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:05 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301498",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:O,
  author =       "Anonymous",
  title =        "{October 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "??--??",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBj,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 102015",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30288-1",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302881",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2020:PSP,
  author =       "Nana Wang and Mohan S. Kankanhalli",
  title =        "Protecting sensitive place visits in
                 privacy-preserving trajectory publishing",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101949",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101949",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030225X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kuang:2020:DRD,
  author =       "Boyu Kuang and Anmin Fu and Lu Zhou and Willy Susilo
                 and Yuqing Zhang",
  title =        "{DO-RA}: Data-oriented runtime attestation for {IoT}
                 devices",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101945",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101945",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302212",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fang:2020:CFT,
  author =       "Junbin Fang and Guikai Xi and Rong Li and Qian Chen
                 and Puxi Lin and Sijin Li and Zoe Lin Jiang and
                 Siu-Ming Yiu",
  title =        "Coarse-to-fine two-stage semantic video carving
                 approach in digital forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101942",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101942",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302182",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Doctor:2020:EDE,
  author =       "Jason N. Doctor and Jaideep Vaidya and Xiaoqian Jiang
                 and Shuang Wang and Lisa M. Schilling and Toan Ong and
                 Michael E. Matheny and Lucila Ohno-Machado and Daniella
                 Meeker",
  title =        "Efficient determination of equivalence for encrypted
                 data",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101939",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101939",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302157",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Larriba:2020:TAE,
  author =       "Antonio M. Larriba and Jos{\'e} M. Sempere and
                 Dami{\'a}n L{\'o}pez",
  title =        "A two authorities electronic vote scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101940",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101940",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302169",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Das:2020:UUC,
  author =       "Ayan Kumar Das and Sidra Kalam and Nausheen Sahar and
                 Ditipriya Sinha",
  title =        "{UCFL}: User Categorization using Fuzzy Logic towards
                 {PUF} based Two-Phase Authentication of Fog assisted
                 {IoT} devices",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101938",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101938",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302145",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meng:2020:SDH,
  author =       "Shunmei Meng and Zijian Gao and Qianmu Li and Hao Wang
                 and Hong-Ning Dai and Lianyong Qi",
  title =        "Security-Driven hybrid collaborative recommendation
                 method for cloud-based iot services",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101950",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101950",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302261",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arshad:2020:SAF,
  author =       "Humaira Arshad and Esther Omlara and Isaac Oludare
                 Abiodun and Abdulhai Aminu",
  title =        "A semi-automated forensic investigation model for
                 online social networks",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101946",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101946",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302224",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dionysiou:2020:SMV,
  author =       "Antreas Dionysiou and Elias Athanasopoulos",
  title =        "{SoK}: Machine vs. machine --- A systematic
                 classification of automated machine learning-based
                 {CAPTCHA} solvers",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101947",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101947",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302236",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boran:2020:AIL,
  author =       "Tudor Boran and Muhamet Martinaj and Md Shafaeat
                 Hossain",
  title =        "Authorship identification on limited samplings",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101943",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101943",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302194",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ren:2020:DGM,
  author =       "Jianguo Ren and Chunming Zhang",
  title =        "A differential game method against attacks in
                 heterogeneous honeynet",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101870",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101870",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301425",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tran:2020:LPP,
  author =       "Ngoc Hong Tran and Nhien-An Le-Khac and M-Tahar
                 Kechadi",
  title =        "Lightweight privacy-Preserving data classification",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101835",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101835",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301085",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Compastie:2020:VSI,
  author =       "Maxime Compasti{\'e} and R{\'e}mi Badonnel and Olivier
                 Festor and Ruan He",
  title =        "From virtualization security issues to cloud
                 protection opportunities: an in-depth analysis of
                 system virtualization models",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101905",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101905",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301814",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2020:DCS,
  author =       "Fenghua Li and Yongjun Li and Siyuan Leng and Yunchuan
                 Guo and Kui Geng and Zhen Wang and Liang Fang",
  title =        "Dynamic countermeasures selection for multi-path
                 attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101927",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101927",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302030",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chowdhury:2020:TPHa,
  author =       "Noman H. Chowdhury and Marc T. P. Adam and Timm
                 Teubner",
  title =        "Time pressure in human cybersecurity behavior:
                 Theoretical framework and countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101931",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101931",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302078",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Evangelou:2020:ADF,
  author =       "Marina Evangelou and Niall M. Adams",
  title =        "An anomaly detection framework for cyber-security
                 data",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101941",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101941",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302170",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meyer:2020:AAP,
  author =       "Joachim Meyer and Omer Dembinsky and Tal Raviv",
  title =        "Alerting about possible risks vs. blocking risky
                 choices: a quantitative model and its empirical
                 evaluation",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101944",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101944",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302200",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mansoori:2020:HDT,
  author =       "Masood Mansoori and Ian Welch",
  title =        "How do they find us? {A} study of geolocation tracking
                 techniques of malicious web sites",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101948",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101948",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302248",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chamikara:2020:PPF,
  author =       "M. A. P. Chamikara and P. Bertok and I. Khalil and D.
                 Liu and S. Camtepe",
  title =        "Privacy Preserving Face Recognition Utilizing
                 Differential Privacy",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101951",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101951",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302273",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Han:2020:CTC,
  author =       "Jiaxuan Han and Cheng Huang and Fan Shi and Jiayong
                 Liu",
  title =        "Covert timing channel detection method based on time
                 interval and payload length analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101952",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101952",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302285",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mi:2020:EPA,
  author =       "Tianyue Mi and Mengke Gou and Guangyu Zhou and Yiqun
                 Gan and Ralf Schwarzer",
  title =        "Effects of planning and action control on smartphone
                 security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101954",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101954",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302303",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gonen:2020:FDI,
  author =       "Serkan G{\"o}nen and H. H{\"u}seyin Sayan and Ercan
                 Nurcan Yilmaz and Furkan {\"U}st{\"u}nsoy and
                 G{\"o}k{\c{c}}e Karacayilmaz",
  title =        "False data injection attacks and the insider threat in
                 smart systems",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101955",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101955",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302315",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2020:ABS,
  author =       "Runkai Yang and Xiaolin Chang and Jelena Misi{\'c} and
                 Vojislav B. Misi{\'c}",
  title =        "Assessing blockchain selfish mining in an imperfect
                 network: Honest and selfish miner views",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101956",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101956",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302327",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mejri:2020:RSA,
  author =       "Mohamed Mejri and Hamdi Yahyaoui and Azzam Mourad and
                 Mohamad Chehab",
  title =        "A rewriting system for the assessment of {XACML}
                 policies relationship",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101957",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101957",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302339",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chang:2020:BCS,
  author =       "Lennon Y. C. Chang and Nicholas Coppel",
  title =        "Building cyber security awareness in a developing
                 country: Lessons from {Myanmar}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101959",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101959",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302352",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yin:2020:DSD,
  author =       "Chunyong Yin and Bo Li and Zhichao Yin",
  title =        "A distributed sensing data anomaly detection scheme",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101960",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101960",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302364",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Krishnan:2020:ECR,
  author =       "R. Santhana Krishnan and E. Golden Julie and Y. Harold
                 Robinson and Raghvendra Kumar and Pham Huy Thong and Le
                 Hoang Son",
  title =        "Enhanced certificate revocation scheme with
                 justification facility in mobile ad-hoc networks",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101962",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101962",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302388",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chowdhury:2020:TPHb,
  author =       "Noman H. Chowdhury and Marc T. P. Adam and Timm
                 Teubner",
  title =        "Time pressure in human cybersecurity behavior:
                 Theoretical framework and countermeasures",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101963",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101963",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301747",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Karbab:2020:SRUb,
  author =       "ElMouatez Billah Karbab and Mourad Debbabi and
                 Abdelouahid Derhab and Djedjiga Mouheb",
  title =        "Scalable and robust unsupervised {Android} malware
                 fingerprinting using community-based network
                 partitioning",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101965",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101965",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301437",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kumar:2020:MCS,
  author =       "Rakesh Kumar and Rinkaj Goyal",
  title =        "Modeling continuous security: a conceptual model for
                 automated {DevSecOps} using open-source software over
                 cloud {(ADOC)}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101967",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101967",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/gnu.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302406",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meidan:2020:NAD,
  author =       "Yair Meidan and Vinay Sachidananda and Hongyi Peng and
                 Racheli Sagron and Yuval Elovici and Asaf Shabtai",
  title =        "A novel approach for detecting vulnerable {IoT}
                 devices connected behind a home {NAT}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101968",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101968",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302418",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{vanderKleij:2020:AET,
  author =       "Rick van der Kleij and Remco Wijn and Tineke Hof",
  title =        "An application and empirical test of the Capability
                 Opportunity Motivation-Behaviour model to data leakage
                 prevention in financial organizations",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101970",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101970",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302431",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dhieb:2020:TNB,
  author =       "Thameur Dhieb and Sourour Njah and Houcine Boubaker
                 and Wael Ouarda and Mounir Ben Ayed and Adel M. Alimi",
  title =        "Towards a novel biometric system for forensic document
                 examination",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101973",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101973",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302467",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2020:MMC,
  author =       "Zhijun Wu and Wenzhi Feng and Meng Yue and Xinran Xu
                 and Liang Liu",
  title =        "Mitigation measures of collusive interest flooding
                 attacks in named data networking",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101971",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101971",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302443",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rocha:2020:FBM,
  author =       "Thiago Rocha and Eduardo Souto and Khalil El-Khatib",
  title =        "Functionality-based mobile application recommendation
                 system with security and privacy awareness",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101972",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101972",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302455",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shi:2020:ABE,
  author =       "Shuyun Shi and Debiao He and Li Li and Neeraj Kumar
                 and Muhammad Khurram Khan and Kim-Kwang Raymond Choo",
  title =        "Applications of blockchain in ensuring the security
                 and privacy of electronic health record systems: a
                 survey",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101966",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101966",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030239X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alashwali:2020:EHS,
  author =       "Eman Salem Alashwali and Pawel Szalachowski and Andrew
                 Martin",
  title =        "Exploring {HTTPS} security inconsistencies: a
                 cross-regional perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101975",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101975",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302480",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Paruchuri:2020:GRE,
  author =       "Shravya Paruchuri and Andrew Case and Golden G.
                 Richard",
  title =        "Gaslight revisited: Efficient and powerful fuzzing of
                 digital forensics tools",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101986",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101986",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302583",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{S:2020:ITP,
  author =       "Ajish S. and K. S. AnilKumar",
  title =        "{Iris} template protection using double bloom filter
                 based feature transformation",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101985",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101985",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302595",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Patil:2020:EPP,
  author =       "Akash Suresh Patil and Rafik Hamza and Alzubair Hassan
                 and Nan Jiang and Hongyang Yan and Jin Li",
  title =        "Efficient privacy-preserving authentication protocol
                 using {PUFs} with blockchain smart contracts",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101958",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101958",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302340",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Verma:2020:MMC,
  author =       "Vinita Verma and Sunil K. Muttoo and V. B. Singh",
  title =        "Multiclass malware classification via first- and
                 second-order texture statistics",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101895",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101895",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301681",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2020:EPP,
  author =       "Chuan Zhang and Chang Xu and Liehuang Zhu and Yanwei
                 Li and Can Zhang and Huishu Wu",
  title =        "An efficient and privacy-preserving truth discovery
                 scheme in crowdsensing applications",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101848",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101848",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301218",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2020:APR,
  author =       "Tun Li and Yutian Liu and Yanbing Liu and Yunpeng Xiao
                 and Nang An Nguyen",
  title =        "Attack plan recognition using hidden {Markov} and
                 probabilistic inference",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101974",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101974",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302479",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2020:ABL,
  author =       "Wenjing Zhang and Bo Jiang and Ming Li and Ravi Tandon
                 and Qiao Liu and Hui Li",
  title =        "Aggregation-based location privacy: an information
                 theoretic approach",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101953",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101953",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302297",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2020:UIB,
  author =       "Qizhang Sun and Martijn C. Willemsen and Bart P.
                 Knijnenburg",
  title =        "Unpacking the intention-behavior gap in privacy
                 decision making for the {Internet of Things (IoT)}
                 using aspect listing",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101924",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101924",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302005",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2020:CEM,
  author =       "Yuyang Zhou and Guang Cheng and Shanqing Jiang and
                 Yuyu Zhao and Zihan Chen",
  title =        "Cost-effective moving target defense against {DDoS}
                 attacks using trilateral game and multi-objective
                 {Markov} decision processes",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101976",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101976",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302492",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jin:2020:SRT,
  author =       "Dongzi Jin and Yiqin Lu and Jiancheng Qin and Zhe
                 Cheng and Zhongshu Mao",
  title =        "{SwiftIDS}: Real-time intrusion detection system based
                 on {LightGBM} and parallel intrusion detection
                 mechanism",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101984",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101984",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302571",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:2020:SWF,
  author =       "Xiuyan Shao and Mikko Siponen and Fufan Liu",
  title =        "Shall we follow? {Impact} of reputation concern on
                 information security managers' investment decisions",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101961",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101961",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302376",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lu:2020:STI,
  author =       "Di Lu and Ruidong Han and Yue Wang and Yongzhi Wang
                 and Xuewen Dong and Xindi Ma and Teng Li and Jianfeng
                 Ma",
  title =        "A secured {TPM} integration scheme towards smart
                 embedded system based collaboration network",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101922",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101922",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301991",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ashrafuzzaman:2020:DSF,
  author =       "Mohammad Ashrafuzzaman and Saikat Das and Yacine
                 Chakhchoukh and Sajjan Shiva and Frederick T. Sheldon",
  title =        "Detecting stealthy false data injection attacks in the
                 smart grid using ensemble-based machine learning",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101994",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101994",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302674",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lee:2020:LGC,
  author =       "Claire Seungeun Lee and Ji Hye Kim",
  title =        "Latent groups of cybersecurity preparedness in
                 {Europe}: Sociodemographic factors and country-level
                 contexts",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101995",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101995",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302686",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Estay:2020:SRC,
  author =       "Daniel A. Sep{\'u}lveda Estay and Rishikesh Sahay and
                 Michael B. Barfod and Christian D. Jensen",
  title =        "A systematic review of cyber-resilience assessment
                 frameworks",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101996",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101996",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302698",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mavroeidis:2020:NLC,
  author =       "Vasileios Mavroeidis and Joe Brule",
  title =        "A nonproprietary language for the command and control
                 of cyber defenses --- {OpenC2}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101999",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101999",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302728",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tang:2020:RIB,
  author =       "Fei Tang and Boyang Ma and Jinku Li and Fengwei Zhang
                 and Jipeng Su and Jianfeng Ma",
  title =        "{RansomSpector}: an introspection-based approach to
                 detect crypto ransomware",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101997",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101997",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302704",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Arend:2020:PARb,
  author =       "Isabel Arend and Asaf Shabtai and Tali Idan and Ruty
                 Keinan and Yoella Bereby-Meyer",
  title =        "Passive- and not active-risk tendencies predict cyber
                 security behavior",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 101964",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101964",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820301735",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rahman:2020:NBF,
  author =       "Rizwan Ur Rahman and Deepak Singh Tomar",
  title =        "New biostatistics features for detecting web bot
                 activity on web applications",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 102001",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102001",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302741",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2020:USA,
  author =       "Hui Liu and Juanru Li and Dawu Gu",
  title =        "Understanding the security of app-in-the-middle
                 {IoT}",
  journal =      j-COMPUT-SECUR,
  volume =       "97",
  number =       "??",
  pages =        "Article 102000",
  month =        oct,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102000",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:06 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030273X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:N,
  author =       "Anonymous",
  title =        "{November 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "??--??",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBk,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102052",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102052",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303254",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xia:2020:CCE,
  author =       "Pengcheng Xia and Haoyu Wang and Bowen Zhang and Ru Ji
                 and Bingyu Gao and Lei Wu and Xiapu Luo and Guoai Xu",
  title =        "Characterizing cryptocurrency exchange scams",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 101993",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101993",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302662",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Palanisamy:2020:CBY,
  author =       "Rathika Palanisamy and Azah Anir Norman and Miss Laiha
                 Mat Kiah",
  title =        "Compliance with bring your own device security
                 policies in organizations: a systematic literature
                 review",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 101998",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101998",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302716",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mikhail:2020:PGE,
  author =       "Joseph W. Mikhail and Jamie C. Williams and George R.
                 Roelke",
  title =        "{procmonML}: Generating evasion resilient host-based
                 behavioral analytics from tree ensembles",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102002",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102002",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302753",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xiong:2020:DRP,
  author =       "Wei Xiong and Li Xiong",
  title =        "Data resource protection based on smart contract",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102004",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102004",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302777",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rong:2020:TFT,
  author =       "Hong Rong and Jian Liu and Wei Wu and Jialu Hao and
                 Huimei Wang and Ming Xian",
  title =        "Toward fault-tolerant and secure frequent itemset
                 mining outsourcing in hybrid cloud environment",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 101969",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.101969",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030242X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alshaikh:2020:DCC,
  author =       "Moneer Alshaikh",
  title =        "Developing cybersecurity culture to influence employee
                 behavior: a practice perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102003",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102003",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302765",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mulahuwaish:2020:ECM,
  author =       "Aos Mulahuwaish and Kevin Gyorick and Kayhan Zrar
                 Ghafoor and Halgurd S. Maghdid and Danda B. Rawat",
  title =        "Efficient classification model of web news documents
                 using machine learning algorithms for accurate
                 information",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102006",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102006",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302790",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2020:IEL,
  author =       "Feng Xu and Merrill Warkentin",
  title =        "Integrating elaboration likelihood model and herd
                 theory in information security message persuasiveness",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102009",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102009",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302820",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hou:2020:IES,
  author =       "Tie Hou and Victoria Wang",
  title =        "Industrial espionage --- A systematic literature
                 review {(SLR)}",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102019",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102019",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302923",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Butavicius:2020:WBT,
  author =       "Marcus Butavicius and Kathryn Parsons and Meredith
                 Lillie and Agata McCormac and Malcolm Pattinson and
                 Dragana Calic",
  title =        "When believing in technology leads to poor cyber
                 security: Development of a trust in technical controls
                 scale",
  journal =      j-COMPUT-SECUR,
  volume =       "98",
  number =       "??",
  pages =        "Article 102020",
  month =        nov,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102020",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302935",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:D,
  author =       "Anonymous",
  title =        "{December 2020}",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "??--??",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2020:EBl,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102102",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30375-8",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303758",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2020:BBS,
  author =       "Haiping Huang and Peng Zhu and Fu Xiao and Xiang Sun
                 and Qinglong Huang",
  title =        "A blockchain-based scheme for privacy-preserving and
                 secure sharing of medical data",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102010",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102010",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302832",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bosnjak:2020:SSE,
  author =       "Leon Bosnjak and Bostjan Brumen",
  title =        "Shoulder surfing experiments: a systematic literature
                 review",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102023",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102023",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302960",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mohammad:2020:IRI,
  author =       "Rami Mustafa A. Mohammad and Mutasem K. Alsmadi and
                 Ibrahim Almarashdeh and Malek Alzaqebah",
  title =        "An improved rule induction based denial of service
                 attacks classification model",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102008",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102008",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302819",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhan:2020:NNS,
  author =       "Mengqi Zhan and Yang Li and Xinghua Yang and Wenjing
                 Cui and Yulin Fan",
  title =        "{NSAPs}: a novel scheme for network security state
                 assessment and attack prediction",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102031",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102031",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303047",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{AlGhamdi:2020:ISG,
  author =       "Sultan AlGhamdi and Khin Than Win and Elena
                 Vlahu-Gjorgievska",
  title =        "Information security governance challenges and
                 critical success factors: Systematic review",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102030",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102030",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303035",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{House:2020:PSD,
  author =       "Deanna House and Gabe Giordano",
  title =        "Politeness in security directives: Insights in browser
                 compliance for the human element",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102007",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102007",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302807",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xue:2020:LLO,
  author =       "Mingfu Xue and Can He and Jian Wang and Weiqiang Liu",
  title =        "{LOPA}: a linear offset based poisoning attack method
                 against adaptive fingerprint authentication system",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102046",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102046",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303199",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Knight:2020:FEC,
  author =       "Richard Knight and Jason R. C. Nurse",
  title =        "A framework for effective corporate communication
                 after cyber security incidents",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102036",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102036",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303096",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hei:2020:TFA,
  author =       "Xinhong Hei and Xinyue Yin and Yichuan Wang and Ju Ren
                 and Lei Zhu",
  title =        "A trusted feature aggregator federated learning for
                 distributed malicious attack detection",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102033",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102033",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303060",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jha:2020:RNN,
  author =       "Sudan Jha and Deepak Prashar and Hoang Viet Long and
                 David Taniar",
  title =        "Recurrent neural network for detecting malware",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102037",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102037",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303102",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liang:2020:FIV,
  author =       "Hongliang Liang and Zhuosi Xie and Yixiu Chen and Hua
                 Ning and Jianli Wang",
  title =        "{FIT}: Inspect vulnerabilities in cross-architecture
                 firmware by deep learning and bipartite matching",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102032",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102032",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303059",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Oh:2020:WDD,
  author =       "Dong Bin Oh and Kyung Ho Park and Huy Kang Kim",
  title =        "De-Wipimization: Detection of data wiping traces for
                 investigating {NTFS} file system",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102034",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102034",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303072",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yang:2020:ZKP,
  author =       "Xiaohui Yang and Wenjie Li",
  title =        "A zero-knowledge-proof-based digital identity
                 management scheme in blockchain",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102050",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102050",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303230",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kenyon:2020:PID,
  author =       "A. Kenyon and L. Deka and D. Elizondo",
  title =        "Are public intrusion datasets fit for purpose
                 characterising the state of the art in intrusion event
                 datasets",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102022",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102022",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302959",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tzvetanov:2020:FLF,
  author =       "Krassimir Tzvetanov and Umit Karabiyik",
  title =        "A first look at forensic analysis of sailfishos",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102054",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102054",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303278",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Raman:2020:DAA,
  author =       "M. R. Gauthama Raman and Wenjie Dong and Aditya
                 Mathur",
  title =        "Deep autoencoders as anomaly detectors: Method and
                 case study in a distributed water treatment plant",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102055",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102055",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030328X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Andersson:2020:CVW,
  author =       "Annika Andersson and Fredrik Karlsson and Karin
                 Hedstr{\"o}m",
  title =        "Consensus versus warfare --- unveiling discourses in
                 de jure information security standard development",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102035",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102035",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303084",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Posey:2020:EEO,
  author =       "Clay Posey and Robert Folger",
  title =        "An exploratory examination of organizational insiders'
                 descriptive and normative perceptions of cyber-relevant
                 rights and responsibilities",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102038",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102038",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303114",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wongwiwatchai:2020:DPI,
  author =       "Nattanon Wongwiwatchai and Phannawhat Pongkham and
                 Kunwadee Sripanidkulchai",
  title =        "Detecting personally identifiable information
                 transmission in {Android} applications using
                 light-weight static analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102011",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102011",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302844",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Prasad:2020:UFS,
  author =       "Mahendra Prasad and Sachin Tripathi and Keshav Dahal",
  title =        "Unsupervised feature selection and cluster center
                 initialization based arbitrary shaped clusters for
                 intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102062",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102062",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303357",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2020:DMD,
  author =       "Xiaoqing Sun and Zhiliang Wang and Jiahai Yang and
                 Xinran Liu",
  title =        "{Deepdom}: Malicious domain detection with scalable
                 and heterogeneous graph convolutional networks",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102057",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102057",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303308",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2020:DPP,
  author =       "Ying Lin and Ling-Yan Bao and Ze-Minghui Li and
                 Shu-Zheng Si and Chao-Hsien Chu",
  title =        "Differential privacy protection over deep learning: an
                 investigation of its impacted factors",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102061",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102061",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303345",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rostami:2020:RCT,
  author =       "Elham Rostami and Fredrik Karlsson and Shang Gao",
  title =        "Requirements for computerized tools to design
                 information security policies",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102063",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102063",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303369",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Al-Duwairi:2020:LNL,
  author =       "Basheer Al-Duwairi and {\"O}znur {\"O}zkasap and Ahmet
                 Uysal and Ceren Kocaogullar and Kaan Yildirim",
  title =        "{LogDoS}: a Novel logging-based {DDoS} prevention
                 mechanism in path identifier-based information centric
                 networks",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102071",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102071",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303448",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aleroud:2020:GPF,
  author =       "Ahmed Aleroud and Nisreen Abu-Alsheeh and Emad
                 Al-Shawakfa",
  title =        "A graph proximity feature augmentation approach for
                 identifying accounts of terrorists on {Twitter}",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102056",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102056",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303291",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2020:PPI,
  author =       "Cheng Guo and Jing Jia and Kim-Kwang Raymond Choo and
                 Yingmo Jie",
  title =        "Privacy-preserving image search {(PPIS)}: Secure
                 classification and searching using convolutional neural
                 network over large-scale encrypted medical images",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102021",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102021",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820302947",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{VanSlyke:2020:EIH,
  author =       "Craig {Van Slyke} and France Belanger",
  title =        "Explaining the interactions of humans and artifacts in
                 insider security behaviors: the mangle of practice
                 perspective",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102064",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102064",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303370",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Qin:2020:AUA,
  author =       "Zhi-Quan Qin and Xing-Kong Ma and Yong-Jun Wang",
  title =        "{ADSAD}: an unsupervised attention-based discrete
                 sequence anomaly detection framework for network
                 security analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102070",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102070",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303436",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Akanfe:2020:ACL,
  author =       "Oluwafemi Akanfe and Rohit Valecha and H. Raghav Rao",
  title =        "Assessing country-level privacy risk for digital
                 payment systems",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102065",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102065",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303382",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Canfora:2020:IVF,
  author =       "Gerardo Canfora and Andrea {Di Sorbo} and Sara
                 Forootani and Antonio Pirozzi and Corrado Aaron
                 Visaggio",
  title =        "Investigating the vulnerability fixing process in
                 {OSS} projects: Peculiarities and challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102067",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102067",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303400",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Giddens:2020:GBI,
  author =       "Laurie Giddens and Laura C. Amo and Dianna Cichocki",
  title =        "Gender bias and the impact on managerial evaluation of
                 insider security threats",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102066",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102066",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303394",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:2020:ADT,
  author =       "Wei Shao and Chunfu Jia and Yunkai Xu and Kefan Qiu
                 and Yan Gao and Yituo He",
  title =        "{AttriChain}: Decentralized traceable anonymous
                 identities in privacy-preserving permissioned
                 blockchain",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102069",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102069",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303424",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2020:SAO,
  author =       "Yujie Zhao and Zhanyong Tang and Guixin Ye and Dongxu
                 Peng and Dingyi Fang and Xiaojiang Chen and Zheng
                 Wang",
  title =        "Semantics-aware obfuscation scheme prediction for
                 binary",
  journal =      j-COMPUT-SECUR,
  volume =       "99",
  number =       "??",
  pages =        "Article 102072",
  month =        dec,
  year =         "2020",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102072",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:07 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030345X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:Ja,
  author =       "Anonymous",
  title =        "{January 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "??--??",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBa,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102128",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(20)30401-6",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304016",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:RA,
  author =       "Anonymous",
  title =        "Reviewer Acknowledgement 2020",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102139",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102139",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304120",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Harsha:2021:BAC,
  author =       "Benjamin Harsha and Robert Morton and Jeremiah Blocki
                 and John Springer and Melissa Dark",
  title =        "Bicycle attacks considered harmful: Quantifying the
                 damage of widespread password length leakage",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102068",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102068",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303412",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rondeau:2021:ECI,
  author =       "Christopher M. Rondeau and Michael A. Temple and J.
                 Addison Betances and Christine M. Schubert Kabban",
  title =        "Extending critical infrastructure element longevity
                 using constellation-based {ID} verification",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102073",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102073",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303461",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2021:AVS,
  author =       "Haowen Chen and Qiang Qu and Yexiong Lin and Xia Chen
                 and Keqin Li",
  title =        "Authenticity verification on social data outsourcing",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102077",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102077",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303503",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dabbagh:2021:SEP,
  author =       "Mohammad Dabbagh and Kim-Kwang Raymond Choo and Amin
                 Beheshti and Mohammad Tahir and Nader Sohrabi Safa",
  title =        "A survey of empirical performance evaluation of
                 permissioned blockchain platforms: Challenges and
                 opportunities",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102078",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102078",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303515",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2021:RSC,
  author =       "Hui Lin and Yan Wo and Yuanlu Wu and Ke Meng and
                 Guoqiang Han",
  title =        "Robust source camera identification against
                 adversarial attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102079",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102079",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303527",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2021:SCI,
  author =       "Guowen Zhang and Bo Wang and Fei Wei and Kaize Shi and
                 Yue Wang and Xue Sui and Meineng Zhu",
  title =        "Source camera identification for re-compressed images:
                 a model perspective based on tri-transfer learning",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102076",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102076",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303497",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Saravanan:2021:LBA,
  author =       "N. Saravanan and A. Umamakeswari",
  title =        "Lattice based access control for protecting user data
                 in cloud environments with hybrid security",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102074",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102074",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303473",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Jmila:2021:TSA,
  author =       "Houda Jmila and Gregory Blanc",
  title =        "Towards security-aware {5G} slice embedding",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102075",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102075",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303485",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Furnell:2021:CWS,
  author =       "Steven Furnell",
  title =        "The cybersecurity workforce and skills",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102080",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102080",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303539",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2021:TMO,
  author =       "Jianyuan Wu and Wei Sun",
  title =        "Towards multi-operation image anti-forensics with
                 generative adversarial networks",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102083",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102083",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303564",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Subba:2021:TSV,
  author =       "Basant Subba and Prakriti Gupta",
  title =        "A {\em tfidfvectorizer} and {\em singular value
                 decomposition} based host intrusion detection system
                 framework for detecting anomalous system processes",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102084",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102084",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303576",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cai:2021:JAM,
  author =       "Lingru Cai and Yao Li and Zhi Xiong",
  title =        "{JOWMDroid}: {Android} malware detection based on
                 feature weighting with joint optimization of
                 weight-mapping and classifier parameters",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102086",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102086",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030359X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Farshadkhah:2021:OEA,
  author =       "Sahar Farshadkhah and Craig {Van Slyke} and Bryan
                 Fuller",
  title =        "Onlooker effect and affective responses in information
                 security violation mitigation",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102082",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102082",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303552",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alshaikh:2021:ASM,
  author =       "Moneer Alshaikh and Sean B. Maynard and Atif Ahmad",
  title =        "Applying social marketing to evaluate current security
                 education training and awareness programs in
                 organisations",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102090",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102090",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303631",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nowroozi:2021:SML,
  author =       "Ehsan Nowroozi and Ali Dehghantanha and Reza M. Parizi
                 and Kim-Kwang Raymond Choo",
  title =        "A survey of machine learning techniques in adversarial
                 image forensics",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102092",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102092",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303655",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meng:2021:SPM,
  author =       "Yunfei Meng and Zhiqiu Huang and Guohua Shen and
                 Changbo Ke",
  title =        "A security policy model transformation and
                 verification approach for software defined networking",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102089",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102089",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030362X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Khan:2021:EAT,
  author =       "Kashif Mehboob Khan and Junaid Arshad and Muhammad
                 Mubashir Khan",
  title =        "Empirical analysis of transaction malleability within
                 blockchain-based e-Voting",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102081",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102081",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303540",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{DeSanto:2021:EMS,
  author =       "D. {De Santo} and C. S. Malavenda and S. P. Romano and
                 C. Vecchio",
  title =        "Exploiting the {MIL-STD-1553} avionic data bus with an
                 active cyber device",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102097",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102097",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303709",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tekerek:2021:NAW,
  author =       "Adem Tekerek",
  title =        "A novel architecture for web-based attack detection
                 using convolutional neural network",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102096",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102096",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303692",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Madani:2021:ORI,
  author =       "Mahdi Madani and Camel Tanougast",
  title =        "Optimized and robust implementation of mobile networks
                 confidentiality and integrity functions",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102093",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102093",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303667",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zulfiqar:2021:EEB,
  author =       "Maryam Zulfiqar and Filza Tariq and Muhammad Umar
                 Janjua and Adnan Noor Mian and Adnan Qayyum and Junaid
                 Qadir and Falak Sher and Muhammad Hassan",
  title =        "{EthReview}: an {Ethereum}-based Product Review System
                 for Mitigating Rating Frauds",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102094",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102094",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303679",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2021:MFP,
  author =       "Wei Wang and Jing Tian and Fang Lv and Guodong Xin and
                 Yingfan Ma and Bailing Wang",
  title =        "Mining frequent pyramid patterns from time series
                 transaction data with custom constraints",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102088",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102088",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303618",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garg:2021:ASA,
  author =       "Shivi Garg and Niyati Baliyan",
  title =        "{Android} security assessment: a review, taxonomy and
                 research gap study",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102087",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102087",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303606",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2021:LRD,
  author =       "Xinqian Liu and Jiadong Ren and Haitao He and Qian
                 Wang and Chen Song",
  title =        "Low-rate {DDoS} attacks detection method using data
                 compression and behavior divergence measurement",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102107",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102107",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303801",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Duan:2021:MGN,
  author =       "Yexin Duan and Xingyu Zhou and Junhua Zou and Junyang
                 Qiu and Jin Zhang and Zhisong Pan",
  title =        "Mask-guided noise restriction adversarial attacks for
                 image classification",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102111",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102111",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303849",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Dai:2021:UIL,
  author =       "Yusheng Dai and Hui Li and Yekui Qian and Yunling Guo
                 and Ruipeng Yang and Min Zheng",
  title =        "Using {IRP} and local alignment method to detect
                 distributed malware",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102109",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102109",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303825",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Maeda:2021:APE,
  author =       "Ryusei Maeda and Mamoru Mimura",
  title =        "Automating post-exploitation with deep reinforcement
                 learning",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102108",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102108",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303813",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Griswold-Steiner:2021:SSP,
  author =       "Isaac Griswold-Steiner and Zachary LeFevre and Abdul
                 Serwadda",
  title =        "Smartphone speech privacy concerns from side-channel
                 attacks on facial biomechanics",
  journal =      j-COMPUT-SECUR,
  volume =       "100",
  number =       "??",
  pages =        "Article 102110",
  month =        jan,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102110",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:08 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303837",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:F,
  author =       "Anonymous",
  title =        "{February 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "??--??",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBb,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102183",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102183",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000079",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xia:2021:BAR,
  author =       "Yusheng Xia and Rongmao Chen and Jinshu Su and
                 Hongcheng Zou",
  title =        "Balancing anonymity and resilience in anonymous
                 communication networks",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102106",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102106",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303795",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Samarasinghe:2021:CBM,
  author =       "Nayanamana Samarasinghe and Mohammad Mannan",
  title =        "On cloaking behaviors of malicious websites",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102114",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102114",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303874",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Binbeshr:2021:SRP,
  author =       "Farid Binbeshr and M. L. Mat Kiah and Lip Yee Por and
                 A. A. Zaidan",
  title =        "A systematic review of {PIN}-entry methods resistant
                 to shoulder-surfing attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102116",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102116",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303898",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Martin-Perez:2021:PPM,
  author =       "Miguel Mart{\'\i}n-P{\'e}rez and Ricardo J.
                 Rodr{\'\i}guez and Davide Balzarotti",
  title =        "Pre-processing memory dumps to improve similarity
                 score of {Windows} modules",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102119",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102119",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303928",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Uuganbayar:2021:OCI,
  author =       "Ganbayar Uuganbayar and Artsiom Yautsiukhin and Fabio
                 Martinelli and Fabio Massacci",
  title =        "Optimisation of cyber insurance coverage with
                 selection of cost effective security controls.",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102121",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102121",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303941",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ahmad:2021:HCO,
  author =       "Atif Ahmad and Sean B. Maynard and Kevin C. Desouza
                 and James Kotsias and Monica T. Whitty and Richard L.
                 Baskerville",
  title =        "How can organizations develop situation awareness for
                 incident response: a case study of management
                 practice",
  journal =      j-COMPUT-SECUR,
  volume =       "101",
  number =       "??",
  pages =        "Article 102122",
  month =        feb,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102122",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303953",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:Ma,
  author =       "Anonymous",
  title =        "{March 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "??--??",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBc,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102193",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(21)00017-1",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000171",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sarfaraz:2021:TSB,
  author =       "Aaliya Sarfaraz and Ripon K. Chakrabortty and Daryl L.
                 Essam",
  title =        "A tree structure-based improved blockchain framework
                 for a secure online bidding system",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102147",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102147",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030420X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Choo:2021:MAI,
  author =       "Kim-Kwang Raymond Choo and Keke Gai and Luca
                 Chiaraviglio and Qing Yang",
  title =        "A multidisciplinary approach to {Internet of Things
                 (IoT)} cybersecurity and risk management",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102136",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102136",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304090",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tripathi:2021:PTS,
  author =       "Nikhil Tripathi and Neminath Hubballi",
  title =        "Preventing time synchronization in {NTP} broadcast
                 mode",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102135",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102135",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304089",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2021:QCP,
  author =       "Xiaoxue Liu and Jiexin Zhang and Peidong Zhu and
                 Qingping Tan and Wei Yin",
  title =        "Quantitative cyber-physical security analysis
                 methodology for industrial control systems based on
                 incomplete information {Bayesian} game",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102138",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102138",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304119",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{He:2021:IBR,
  author =       "Junjiang He and Tao Li and Beibei Li and Xiaolong Lan
                 and Zhiyong Li and Yunpeng Wang",
  title =        "An immune-based risk assessment method for digital
                 virtual assets",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102134",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102134",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304077",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alavizadeh:2021:EES,
  author =       "Hooman Alavizadeh and Jin B. Hong and Dong Seong Kim
                 and Julian Jang-Jaccard",
  title =        "Evaluating the effectiveness of shuffle and redundancy
                 {MTD} techniques in the cloud",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102091",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102091",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303643",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shao:2021:MEF,
  author =       "Minglai Shao and Jianxin Li and Yue Chang and Jun Zhao
                 and Xunxun Chen",
  title =        "{MASA}: an efficient framework for anomaly detection
                 in multi-attributed networks",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102085",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102085",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303588",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bollmann:2021:RRT,
  author =       "Chad A. Bollmann and Murali Tummala and John C.
                 McEachen",
  title =        "Resilient real-time network anomaly detection using
                 novel non-parametric statistical tests",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102146",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102146",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304193",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ho-Sam-Sooi:2021:IES,
  author =       "Nick Ho-Sam-Sooi and Wolter Pieters and Maarten
                 Kroesen",
  title =        "Investigating the effect of security and privacy on
                 {IoT} device purchase behaviour",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102132",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102132",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304053",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cayir:2021:RCF,
  author =       "Aykut {\c{C}}ayir and Ugur {\"U}nal and Hasan Dag",
  title =        "Random {CapsNet} forest model for imbalanced malware
                 type classification task",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102133",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102133",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304065",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Aloufi:2021:ULR,
  author =       "Asma Aloufi and Peizhao Hu and Hang Liu and Sherman S.
                 M. Chow and Kim-Kwang Raymond Choo",
  title =        "Universal location referencing and homomorphic
                 evaluation of geospatial query",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102137",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102137",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304107",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Strous:2021:SPI,
  author =       "Leon Strous and Sun{\'e} von Solms and Andr{\'e}
                 Z{\'u}quete",
  title =        "Security and privacy of the {Internet of Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102148",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102148",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304211",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Park:2021:MCA,
  author =       "Sang-Ok Park and Ohmin Kwon and Yonggon Kim and Sang
                 Kil Cha and Hyunsoo Yoon",
  title =        "Mind control attack: Undermining deep learning with
                 {GPU} memory exploitation",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102115",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102115",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303886",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Torkura:2021:CAT,
  author =       "K. A. Torkura and Muhammad I. H. Sukmana and Feng
                 Cheng and Christoph Meinel",
  title =        "Continuous auditing and threat detection in
                 multi-cloud infrastructure",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102124",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102124",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303977",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shahani:2021:CBR,
  author =       "Snehkumar Shahani and R. Venkateswaran and Jibi
                 Abraham",
  title =        "Cost-based recommendation of parameters for local
                 differentially private data aggregation",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102144",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102144",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030417X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Plotnek:2021:CTH,
  author =       "Jordan J. Plotnek and Jill Slay",
  title =        "Cyber terrorism: a homogenized taxonomy and
                 definition",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102145",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102145",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304181",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Brown:2021:DFM,
  author =       "Dane Brown and T. Owens Walker and Justin A. Blanco
                 and Robert W. Ives and Hau T. Ngo and James Shey and
                 Ryan Rakvic",
  title =        "Detecting firmware modification on solid state drives
                 via current draw analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102149",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102149",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304223",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sohi:2021:REN,
  author =       "Soroush M. Sohi and Jean-Pierre Seifert and Fatemeh
                 Ganji",
  title =        "{RNNIDS}: Enhancing network intrusion detection
                 systems through deep learning",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102151",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102151",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304247",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shlomo:2021:TPB,
  author =       "Amit Shlomo and Meir Kalech and Robert Moskovitch",
  title =        "Temporal pattern-based malicious activity detection in
                 {SCADA} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102153",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102153",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304260",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rosado:2021:MBP,
  author =       "David G. Rosado and Julio Moreno and Luis E.
                 S{\'a}nchez and Antonio Santos-Olmo and Manuel A.
                 Serrano and Eduardo Fern{\'a}ndez-Medina",
  title =        "{MARISMA-BiDa} pattern: Integrated risk analysis for
                 big data",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102155",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102155",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304284",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wu:2021:SPS,
  author =       "Yu Wu and Li Pan",
  title =        "{SG-PAC}: a stochastic game approach to generate
                 personal privacy paradox access-control policies in
                 social networks",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102157",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102157",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304302",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhao:2021:APC,
  author =       "Jun Zhao and Xudong Liu and Qiben Yan and Bo Li and
                 Minglai Shao and Hao Peng and Lichao Sun",
  title =        "Automatically predicting cyber attack preference with
                 attributed heterogeneous attention networks and
                 transductive learning",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102152",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102152",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304259",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gibert:2021:ASM,
  author =       "Daniel Gibert and Carles Mateu and Jordi Planes and
                 Joao Marques-Silva",
  title =        "Auditing static machine learning anti-malware tools
                 against metamorphic attacks",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102159",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102159",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304326",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2021:EES,
  author =       "Yongyan Guo and Jiayong Liu and Wenwu Tang and Cheng
                 Huang",
  title =        "Exsense: Extract sensitive information from
                 unstructured data",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102156",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102156",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304296",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Altarawneh:2021:AAP,
  author =       "Amani Altarawneh and Fei Sun and Richard R. Brooks and
                 Owulakemi Hambolu and Lu Yu and Anthony Skjellum",
  title =        "Availability analysis of a permissioned blockchain
                 with a lightweight consensus protocol",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102098",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102098",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303710",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Svabensky:2021:CKS,
  author =       "Valdemar Sv{\'a}bensk{\'y} and Pavel Celeda and Jan
                 Vykopal and Silvia Bris{\'a}kov{\'a}",
  title =        "Cybersecurity knowledge and skills taught in capture
                 the flag challenges",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102154",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102154",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304272",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Nazir:2021:NCO,
  author =       "Anjum Nazir and Rizwan Ahmed Khan",
  title =        "A novel combinatorial optimization based feature
                 selection method for network intrusion detection",
  journal =      j-COMPUT-SECUR,
  volume =       "102",
  number =       "??",
  pages =        "Article 102164",
  month =        mar,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102164",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:09 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304375",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:A,
  author =       "Anonymous",
  title =        "{April 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "??--??",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBd,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102234",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(21)00058-4",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000584",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kim:2021:CAV,
  author =       "Kyounggon Kim and Jun Seok Kim and Seonghoon Jeong and
                 Jo-Hee Park and Huy Kang Kim",
  title =        "Cybersecurity for autonomous vehicles: Review of
                 attacks and defense",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102150",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102150",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304235",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gu:2021:EID,
  author =       "Jie Gu and Shan Lu",
  title =        "An effective intrusion detection approach using {SVM}
                 with na{\"\i}ve {Bayes} feature embedding",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102158",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102158",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304314",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Derbyshire:2021:STD,
  author =       "Richard Derbyshire and Benjamin Green and David
                 Hutchison",
  title =        "{``Talking a different Language''}: Anticipating
                 adversary attack cost for cyber risk assessment",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102163",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102163",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304363",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Menges:2021:TGC,
  author =       "Florian Menges and Tobias Latzo and Manfred Vielberth
                 and Sabine Sobola and Henrich C. P{\"o}hls and Benjamin
                 Taubmann and Johannes K{\"o}stler and Alexander Puchta
                 and Felix Freiling and Hans P. Reiser and G{\"u}nther
                 Pernul",
  title =        "Towards {GDPR}-compliant data processing in modern
                 {SIEM} systems",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102165",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102165",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304387",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Bozkir:2021:CTA,
  author =       "Ahmet Selman Bozkir and Ersan Tahillioglu and Murat
                 Aydos and Ilker Kara",
  title =        "Catch them alive: a malware detection approach through
                 memory forensics, manifold learning and computer
                 vision",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102166",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102166",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304399",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Shen:2021:AHS,
  author =       "Lixiang Shen and Dejun Mu and Guo Cao and Maoyuan Qin
                 and Jiacheng Zhu and Wei Hu",
  title =        "Accelerating hardware security verification and
                 vulnerability detection through state space reduction",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102167",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102167",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304405",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sanchez:2021:APP,
  author =       "Pedro Miguel S{\'a}nchez S{\'a}nchez and Lorenzo
                 Fern{\'a}ndez Maim{\'o} and Alberto Huertas Celdr{\'a}n
                 and Gregorio Mart{\'\i}nez P{\'e}rez",
  title =        "{AuthCODE}: a privacy-preserving and multi-device
                 continuous authentication architecture based on machine
                 and deep learning",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102168",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102168",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304417",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2021:DWC,
  author =       "Qinghua Wang",
  title =        "Defending wireless communication against eavesdropping
                 attacks using secret spreading codes and artificial
                 interference",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102175",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102175",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030448X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gudeme:2021:CMR,
  author =       "Jaya Rao Gudeme and Syam Kumar Pasupuleti and Ramesh
                 Kandukuri",
  title =        "Certificateless multi-replica public integrity
                 auditing scheme for dynamic shared data in cloud
                 storage",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102176",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102176",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304491",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Merlo:2021:YSR,
  author =       "Alessio Merlo and Antonio Ruggia and Luigi Sciolla and
                 Luca Verderame",
  title =        "You Shall not Repackage! Demystifying Anti-Repackaging
                 on {Android}",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102181",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102181",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000055",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Al-Maliki:2021:CRM,
  author =       "Ossama Al-Maliki and Hisham Al-Assam",
  title =        "Challenge-response mutual authentication protocol for
                 {EMV} contactless cards",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102186",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102186",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000109",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2021:SES,
  author =       "Li Li and Jiayong Liu and Peng Jia",
  title =        "{SecTEP}: Enabling secure tender evaluation with
                 sealed prices and quality evaluation in procurement
                 bidding systems over blockchain",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102188",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102188",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000122",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{R:2021:SRS,
  author =       "Isaac Sajan R. and Jasper J.",
  title =        "A secure routing scheme to mitigate attack in wireless
                 adhoc sensor network",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102197",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102197",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000213",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kumar:2021:DSS,
  author =       "V. Anil Kumar and Debabrata Das and Senior Member
                 IEEE",
  title =        "Data sequence signal manipulation in multipath {TCP
                 (MPTCP)}: the vulnerability, attack and its detection",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102180",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102180",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000043",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Fang:2021:PPC,
  author =       "Chen Fang and Yuanbo Guo and Yongjin Hu and Bowen Ma
                 and Li Feng and Anqi Yin",
  title =        "Privacy-preserving and communication-efficient
                 federated learning in {Internet of Things}",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102199",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102199",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000237",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pereira-Vale:2021:SMB,
  author =       "Anelis Pereira-Vale and Eduardo B. Fernandez and
                 Ra{\'u}l Monge and Hern{\'a}n Astudillo and Gast{\'o}n
                 M{\'a}rquez",
  title =        "Security in microservice-based systems: a Multivocal
                 literature review",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102200",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102200",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000249",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Demigha:2021:HBS,
  author =       "Oualid Demigha and Ramzi Larguet",
  title =        "Hardware-based solutions for trusted cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102117",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102117",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303904",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Wang:2021:IDM,
  author =       "Zhendong Wang and Yaodi Liu and Daojing He and Sammy
                 Chan",
  title =        "Intrusion detection methods based on integrated deep
                 learning model",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102177",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102177",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000018",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2021:LPP,
  author =       "Kunchang Li and Yifan Yang and Shuhao Wang and Runhua
                 Shi and Jianbin Li",
  title =        "A lightweight privacy-preserving and sharing scheme
                 with dual-blockchain for intelligent pricing system of
                 smart grid",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102189",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102189",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000134",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Meng:2021:UBC,
  author =       "Zhangyu Meng and Jun Kong and Juan Li",
  title =        "Utilizing binary code to improve usability of
                 pressure-based authentication",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102187",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102187",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000110",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Caturano:2021:DRC,
  author =       "Francesco Caturano and Gaetano Perrone and Simon
                 Pietro Romano",
  title =        "Discovering reflected cross-site scripting
                 vulnerabilities using a multiobjective reinforcement
                 learning environment",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102204",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102204",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000286",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gunes:2021:CSR,
  author =       "Bunyamin Gunes and Gizem Kayisoglu and Pelin Bolat",
  title =        "Cyber security risk assessment for seaports: a case
                 study of a container port",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102196",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102196",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000201",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Xu:2021:DTR,
  author =       "Guangwei Xu and Songhua Han and Yanke Bai and
                 Xiangyang Feng and Yanglan Gan",
  title =        "Data tag replacement algorithm for data integrity
                 verification in cloud storage",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102205",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102205",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000298",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Guo:2021:SHS,
  author =       "Yimin Guo and Zhenfeng Zhang and Yajun Guo",
  title =        "{Superword}: a honeyword system for achieving higher
                 security goals",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 101689",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2019.101689",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404819302263",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mhaskar:2021:FAN,
  author =       "Neerja Mhaskar and Mohammed Alabbad and Ridha Khedri",
  title =        "A Formal Approach to Network Segmentation",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102162",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102162",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304351",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ouyang:2021:CEC,
  author =       "Zhiyou Ouyang and Xu Zhai and Jinran Wu and Jian Yang
                 and Dong Yue and Chunxia Dou and Tengfei Zhang",
  title =        "A cloud endpoint coordinating {CAPTCHA} based on
                 multi-view stacking ensemble",
  journal =      j-COMPUT-SECUR,
  volume =       "103",
  number =       "??",
  pages =        "Article 102178",
  month =        apr,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102178",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100002X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:Mb,
  author =       "Anonymous",
  title =        "{May 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "??--??",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBe,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102255",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(21)00079-1",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000791",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pavithran:2021:NCB,
  author =       "Pramod Pavithran and Sheena Mathew and Suyel Namasudra
                 and Pascal Lorenz",
  title =        "A novel cryptosystem based on {DNA} cryptography and
                 randomly generated {Mealy} machine",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102160",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102160",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304338",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2021:EAT,
  author =       "Jie Zhang and Cong Tian and Zhenhua Duan",
  title =        "An efficient approach for taint analysis of {Android}
                 applications",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102161",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102161",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030434X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mohammed:2021:EPP,
  author =       "Zareef A. Mohammed and Gurvirender P. Tejay",
  title =        "Examining the privacy paradox through individuals'
                 neural disposition in e-commerce: an exploratory
                 neuroimaging study",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102201",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102201",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000250",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liras:2021:FAD,
  author =       "Luis Francisco Mart{\'\i}n Liras and Adolfo
                 Rodr{\'\i}guez de Soto and Miguel A. Prada",
  title =        "Feature analysis for data-driven {APT}-related malware
                 discrimination",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102202",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102202",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000262",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Mileva:2021:CAM,
  author =       "Aleksandra Mileva and Aleksandar Velinov and Laura
                 Hartmann and Steffen Wendzel and Wojciech Mazurczyk",
  title =        "Comprehensive analysis of {MQTT 5.0} susceptibility to
                 network covert channels",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102207",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102207",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000316",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Rashidibajgan:2021:SPP,
  author =       "Samaneh Rashidibajgan and Thomas Hupperich and Robin
                 Doss and Anna F{\"o}rster",
  title =        "Secure and privacy-preserving structure in
                 opportunistic networks",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102208",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102208",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000328",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tian:2021:AFG,
  author =       "Yanzhao Tian and Lixiang Li and Haipeng Peng and
                 Yixian Yang",
  title =        "Achieving flatness: Graph labeling can generate
                 graphical honeywords",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102212",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102212",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000365",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2021:ISM,
  author =       "Shize Huang and Xiaowen Liu and Xiaolu Yang and
                 Zhaoxin Zhang",
  title =        "An improved {ShapeShifter} method of generating
                 adversarial examples for physical attacks on stop signs
                 against Faster {R-CNNs}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102120",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102120",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482030393X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Barraclough:2021:ICP,
  author =       "P. A. Barraclough and G. Fehringer and J. Woodward",
  title =        "Intelligent cyber-phishing detection for online",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102123",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102123",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303965",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sun:2021:NBD,
  author =       "Dongming Sun and Xiaolu Zhang and Kim-Kwang Raymond
                 Choo and Liang Hu and Feng Wang",
  title =        "{NLP}-based digital forensic investigation platform
                 for online communications",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102210",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102210",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000341",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ma:2021:NMA,
  author =       "Qian Ma and Cong Sun and Baojiang Cui and Xiaohui
                 Jin",
  title =        "A novel model for anomaly detection in network traffic
                 based on kernel support vector machine",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102215",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102215",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000390",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2021:DCC,
  author =       "Shaojie Chen and Bo Lang and Hongyu Liu and Duokun Li
                 and Chuan Gao",
  title =        "{DNS} covert channel detection method using the {LSTM}
                 model",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102095",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102095",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303680",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Adja:2021:BBC,
  author =       "Yves Christian Elloh Adja and Badis Hammi and Ahmed
                 Serhrouchni and Sherali Zeadally",
  title =        "A blockchain-based certificate revocation management
                 and status verification system",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102209",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102209",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100033X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Hajar:2021:SWB,
  author =       "Muhammad Shadi Hajar and M. Omar Al-Kadri and Harsha
                 Kumara Kalutarage",
  title =        "A survey on wireless body area networks: architecture,
                 security challenges and research opportunities",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102211",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102211",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000353",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Li:2021:IBM,
  author =       "Xintong Li and Qi Li",
  title =        "An {IRL}-based malware adversarial generation method
                 to evade anti-malware engines",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102118",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102118",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820303916",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Luo:2021:ABA,
  author =       "Peng Luo and Buhong Wang and Tengyao Li and Jiwei
                 Tian",
  title =        "{ADS-B} anomaly data detection model based on
                 {VAE-SVDD}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102213",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102213",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000377",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2021:FND,
  author =       "Jinyin Chen and Haibin Zheng and Hui Xiong and Ruoxi
                 Chen and Tianyu Du and Zhen Hong and Shouling Ji",
  title =        "{FineFool}: a novel {DNN} object contour attack on
                 image recognition based on the attention perturbation
                 adversarial technique",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102220",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102220",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000444",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Simoglou:2021:IDS,
  author =       "George Simoglou and George Violettas and Sophia
                 Petridou and Lefteris Mamatas",
  title =        "Intrusion detection systems for {RPL} security: a
                 comparative analysis",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102219",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102219",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000432",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{He:2021:SNT,
  author =       "Ting He and Yong Zheng and Zherui Ma",
  title =        "Study of network time synchronisation security
                 strategy based on polar coding",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102214",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102214",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000389",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Trang:2021:ERS,
  author =       "Simon Trang and Ilja Nastjuk",
  title =        "Examining the role of stress and information security
                 policy design in information security compliance
                 behaviour: an experimental study of in-task behaviour",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102222",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102222",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000468",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ling:2021:SFN,
  author =       "Yeong Tyng Ling and Nor Fazlida Mohd Sani and Mohd.
                 Taufik Abdullah and Nor Asilah Wati Abdul Hamid",
  title =        "Structural features with nonnegative matrix
                 factorization for metamorphic malware detection",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102216",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102216",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000407",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Chen:2021:DGB,
  author =       "Siqi Chen and Yufei Yuan and Xin (Robert) Luo and Jie
                 Jian and Yan Wang",
  title =        "Discovering group-based transnational cyber fraud
                 actives: a polymethodological view",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102217",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102217",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000419",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Huang:2021:JMJ,
  author =       "Yunhua Huang and Tao Li and Lijia Zhang and Beibei Li
                 and Xiaojie Liu",
  title =        "{JSContana}: Malicious {JavaScript} detection using
                 adaptable context analysis and key feature extraction",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102218",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102218",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib;
                 http://www.math.utah.edu/pub/tex/bib/java2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000420",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yuan:2021:DLI,
  author =       "Shuhan Yuan and Xintao Wu",
  title =        "Deep learning for insider threat detection: Review,
                 challenges and opportunities",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102221",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102221",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000456",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cho:2021:TBL,
  author =       "Mingi Cho and Jaedong Jang and Yezee Seo and Seyeon
                 Jeong and Soochang Chung and Taekyoung Kwon",
  title =        "Towards bidirectional {LUT}-level detection of
                 hardware {Trojans}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102223",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102223",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100047X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Boahen:2021:NAD,
  author =       "Edward Kwadwo Boahen and Brunel Elvire Bouya-Moko and
                 Changda Wang",
  title =        "Network anomaly detection in a controlled environment
                 based on an enhanced {PSOGSARFC}",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102225",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102225",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000493",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{LaFleur:2021:TPS,
  author =       "Claire {La Fleur} and Blaine Hoffman and C. Benjamin
                 Gibson and Norbou Buchler",
  title =        "Team performance in a series of regional and national
                 {US} cybersecurity defense competitions: Generalizable
                 effects of training and functional role
                 specialization",
  journal =      j-COMPUT-SECUR,
  volume =       "104",
  number =       "??",
  pages =        "Article 102229",
  month =        may,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102229",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Wed Mar 10 08:25:10 MST 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000535",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:Jb,
  author =       "Anonymous",
  title =        "{June 2021}",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "??--??",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Anonymous:2021:EBf,
  author =       "Anonymous",
  title =        "{Editorial Board}",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102295",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/S0167-4048(21)00119-X",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100119X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Ariffin:2021:IMR,
  author =       "Khairul Akram Zainol Ariffin and Faris Hanif Ahmad",
  title =        "Indicators for maturity and readiness for digital
                 forensic investigation in era of industrial revolution
                 4.0",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102237",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102237",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000614",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Stergiopoulos:2021:DMT,
  author =       "George Stergiopoulos and Dimitris Gritzalis and
                 Efstratios Vasilellis and Argiro Anagnostopoulou",
  title =        "Dropping malware through sound injection: a
                 comparative analysis on {Android} operating systems",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102228",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102228",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000523",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yu:2021:AAP,
  author =       "Lu Yu and Yu Fu and Jonathan Oakley and Oluwakemi
                 Hambolu and Richard Brooks",
  title =        "On accuracy and anonymity of privacy-preserving
                 negative survey {(NS)} algorithms",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102206",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102206",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000304",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Iadarola:2021:TID,
  author =       "Giacomo Iadarola and Fabio Martinelli and Francesco
                 Mercaldo and Antonella Santone",
  title =        "Towards an interpretable deep learning model for
                 mobile malware detection and family identification",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102198",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102198",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000225",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2021:DSA,
  author =       "Xiaolu Zhang and Charles Zhechao Liu and Kim-Kwang
                 Raymond Choo and Jesus A. Alvarado",
  title =        "A design science approach to developing an integrated
                 mobile app forensic framework",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102226",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102226",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100050X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lin:2021:PBP,
  author =       "Pei-hong Lin and Zheng Hong and Yi-hao Li and Li-fa
                 Wu",
  title =        "A priority based path searching method for improving
                 hybrid fuzzing",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102242",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102242",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000663",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pilton:2021:EPD,
  author =       "Callum Pilton and Shamal Faily and Jane
                 Henriksen-Bulmer",
  title =        "Evaluating privacy --- determining user privacy
                 expectations on the web",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102241",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102241",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000651",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Sarier:2021:CBB,
  author =       "Neyire Deniz Sarier",
  title =        "Comments on biometric-based non-transferable
                 credentials and their application in blockchain-based
                 identity management",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102243",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102243",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000675",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Tian:2021:DIA,
  author =       "Junfeng Tian and Haoning Wang and Meng Wang",
  title =        "Data integrity auditing for secure cloud storage using
                 user behavior prediction",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102245",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102245",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000699",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhou:2021:DMS,
  author =       "Peng Zhou and Gongyan Zhou and Dakui Wu and Minrui
                 Fei",
  title =        "Detecting multi-stage attacks using
                 sequence-to-sequence model",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102203",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102203",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000274",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Pinhero:2021:MDE,
  author =       "Anson Pinhero and Anupama M. L. and Vinod P. and C. A.
                 Visaggio and Aneesh N. and Abhijith S. and
                 AnanthaKrishnan S.",
  title =        "Malware detection employed by visualization and deep
                 neural network",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102247",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102247",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000717",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kanwal:2021:RPP,
  author =       "Tehsin Kanwal and Adeel Anjum and Saif U. R. Malik and
                 Haider Sajjad and Abid Khan and Umar Manzoor and Alia
                 Asheralieva",
  title =        "A robust privacy preserving approach for electronic
                 health records using multiple dataset with multiple
                 sensitive attributes",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102224",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102224",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000481",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Seng:2021:FLU,
  author =       "Sovantharith Seng and Mahdi Nasrullah Al-Ameen and
                 Matthew Wright",
  title =        "A first look into users' perceptions of facial
                 recognition in the physical world",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102227",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102227",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000511",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Yilmaz:2021:FGC,
  author =       "Fadi Yilmaz and Meera Sridhar and Abhinav Mohanty and
                 Vasant Tendulkar and Kevin W. Hamlen",
  title =        "A fine-grained classification and security analysis of
                 web-based virtual machine vulnerabilities",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102246",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102246",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000705",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Garcia:2021:OFC,
  author =       "David Escudero Garc{\'\i}a and Noem{\'\i}
                 DeCastro-Garc{\'\i}a",
  title =        "Optimal feature configuration for dynamic malware
                 detection",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102250",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102250",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000742",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Cascavilla:2021:CTI,
  author =       "Giuseppe Cascavilla and Damian A. Tamburri and
                 Willem-Jan {Van Den Heuvel}",
  title =        "Cybercrime threat intelligence: a systematic
                 multi-vocal literature review",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102258",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102258",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000821",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhijun:2021:BDP,
  author =       "Wu Zhijun and Yang Yiming",
  title =        "{BD-D1Sec}: Protocol of security authentication for
                 {BeiDou D1} civil navigation message based on
                 certificateless signature",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102251",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102251",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000754",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Zhang:2021:RAT,
  author =       "Lejun Zhang and Yanfei Zou and Weizheng Wang and
                 Zilong Jin and Yansen Su and Huiling Chen",
  title =        "Resource allocation and trust computing for
                 blockchain-enabled edge computing system",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102249",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102249",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/bitcoin.bib;
                 http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000730",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Adesemowo:2021:TCD,
  author =       "A. Kayode Adesemowo",
  title =        "Towards a conceptual definition for {IT} assets
                 through interrogating their nature and epistemic
                 uncertainty",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102131",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2020.102131",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404820304041",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Kushwah:2021:OEL,
  author =       "Gopal Singh Kushwah and Virender Ranga",
  title =        "Optimized extreme learning machine for detecting
                 {DDoS} attacks in cloud computing",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102260",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102260",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000845",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Lallie:2021:CSA,
  author =       "Harjinder Singh Lallie and Lynsay A. Shepherd and
                 Jason R. C. Nurse and Arnau Erola and Gregory
                 Epiphaniou and Carsten Maple and Xavier Bellekens",
  title =        "Cyber security in the age of {COVID-19}: a timeline
                 and analysis of cyber-crime and cyber-attacks during
                 the pandemic",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102248",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102248",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000729",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Gallo:2021:YAP,
  author =       "Luigi Gallo and Alessandro Maiello and Alessio Botta
                 and Giorgio Ventre",
  title =        "2 Years in the anti-phishing group of a large
                 company",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102259",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102259",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000833",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Varga:2021:CTP,
  author =       "Stefan Varga and Joel Brynielsson and Ulrik Franke",
  title =        "Cyber-threat perception and risk management in the
                 {Swedish} financial sector",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102239",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102239",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000638",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Alom:2021:KGB,
  author =       "Zulfikar Alom and Bikash Chandra Singh and Zeyar Aung
                 and Mohammad Abdul Azim",
  title =        "Knapsack graph-based privacy checking for smart
                 environments",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102240",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102240",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S016740482100064X",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2021:SGN,
  author =       "Ao Liu and Yunpeng Wang and Tao Li",
  title =        "{SFE-GACN}: a novel unknown attack detection under
                 insufficient data via intra categories generation in
                 embedding space",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102262",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102262",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000869",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Katsantonis:2021:DEC,
  author =       "Menelaos N. Katsantonis and Ioannis Mavridis and
                 Dimitris Gritzalis",
  title =        "Design and Evaluation of {COFELET}-based Approaches
                 for Cyber Security Learning and Training",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102263",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102263",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000870",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}

@Article{Liu:2021:SAB,
  author =       "Tian Liu and Tao Shu",
  title =        "On the security of {ANN}-based {AC} state estimation
                 in smart grid",
  journal =      j-COMPUT-SECUR,
  volume =       "105",
  number =       "??",
  pages =        "Article 102265",
  month =        jun,
  year =         "2021",
  CODEN =        "CPSEDU",
  DOI =          "https://doi.org/10.1016/j.cose.2021.102265",
  ISSN =         "0167-4048 (print), 1872-6208 (electronic)",
  ISSN-L =       "0167-4048",
  bibdate =      "Tue May 4 07:59:03 MDT 2021",
  bibsource =    "http://www.math.utah.edu/pub/tex/bib/computsecur2020.bib",
  URL =          "http://www.sciencedirect.com/science/article/pii/S0167404821000894",
  acknowledgement = ack-nhfb,
  fjournal =     "Computers \& Security",
  journal-URL =  "http://www.sciencedirect.com/science/journal/01674048",
}