nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud
|
Yin, Fan |
|
|
110 |
C |
p. |
artikel |
2 |
A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions
|
Kaur, Sukhveer |
|
|
110 |
C |
p. |
artikel |
3 |
A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers
|
Nascimento, Pablo Pessoa do |
|
|
110 |
C |
p. |
artikel |
4 |
A Multi-Perspective malware detection approach through behavioral fusion of API call sequence
|
Amer, Eslam |
|
|
110 |
C |
p. |
artikel |
5 |
An effective genetic algorithm-based feature selection method for intrusion detection systems
|
Halim, Zahid |
|
|
110 |
C |
p. |
artikel |
6 |
An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment
|
Liu, Dong-Jie |
|
|
110 |
C |
p. |
artikel |
7 |
An optimized differential privacy scheme with reinforcement learning in VANET
|
Chen, Xin |
|
|
110 |
C |
p. |
artikel |
8 |
Applying machine learning and natural language processing to detect phishing email
|
Alhogail, Areej |
|
|
110 |
C |
p. |
artikel |
9 |
A PUF-based secure wake-up scheme for Internet of Things
|
Lin, Hui-Tang |
|
|
110 |
C |
p. |
artikel |
10 |
BDDR: An Effective Defense Against Textual Backdoor Attacks
|
Shao, Kun |
|
|
110 |
C |
p. |
artikel |
11 |
Cyber-enabled burglary of smart homes
|
Hodges, Duncan |
|
|
110 |
C |
p. |
artikel |
12 |
Detector + : An approach for detecting, isolating, and preventing timing attacks
|
Javeed, Arsalan |
|
|
110 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
110 |
C |
p. |
artikel |
14 |
Image-based malware classification using section distribution information
|
Xiao, Mao |
|
|
110 |
C |
p. |
artikel |
15 |
Information security vulnerability prediction based on business process model using machine learning approach
|
Hariyanti, Eva |
|
|
110 |
C |
p. |
artikel |
16 |
KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization
|
Guerra-Manzanares, Alejandro |
|
|
110 |
C |
p. |
artikel |
17 |
NetObfu : A lightweight and efficient network topology obfuscation defense scheme
|
Liu, Yaqun |
|
|
110 |
C |
p. |
artikel |
18 |
Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust
|
Buck, Christoph |
|
|
110 |
C |
p. |
artikel |
19 |
Non-Interactive and secure outsourcing of PCA-Based face recognition
|
Ren, Yanli |
|
|
110 |
C |
p. |
artikel |
20 |
PASSVM: A highly accurate fast flux detection system
|
Al-Duwairi, Basheer |
|
|
110 |
C |
p. |
artikel |
21 |
PCaaD: Towards automated determination and exploitation of industrial systems
|
Green, Benjamin |
|
|
110 |
C |
p. |
artikel |
22 |
Privacy preservation in federated learning: An insightful survey from the GDPR perspective
|
Truong, Nguyen |
|
|
110 |
C |
p. |
artikel |
23 |
Serious games as a tool to model attack and defense scenarios for cyber-security exercises
|
Yamin, Muhammad Mudassar |
|
|
110 |
C |
p. |
artikel |
24 |
STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment
|
Al, Samed |
|
|
110 |
C |
p. |
artikel |
25 |
Stock market reactions to favorable and unfavorable information security events: A systematic literature review
|
Ali, Syed Emad Azhar |
|
|
110 |
C |
p. |
artikel |
26 |
Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis
|
Zhang, Haikuo |
|
|
110 |
C |
p. |
artikel |
27 |
Survivable zero trust for cloud computing environments
|
Ferretti, Luca |
|
|
110 |
C |
p. |
artikel |
28 |
The effects of different personal data categories on information privacy concern and disclosure
|
Chua, Hui Na |
|
|
110 |
C |
p. |
artikel |
29 |
VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches
|
Sun, Hao |
|
|
110 |
C |
p. |
artikel |