Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             29 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud Yin, Fan

110 C p.
artikel
2 A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions Kaur, Sukhveer

110 C p.
artikel
3 A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers Nascimento, Pablo Pessoa do

110 C p.
artikel
4 A Multi-Perspective malware detection approach through behavioral fusion of API call sequence Amer, Eslam

110 C p.
artikel
5 An effective genetic algorithm-based feature selection method for intrusion detection systems Halim, Zahid

110 C p.
artikel
6 An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment Liu, Dong-Jie

110 C p.
artikel
7 An optimized differential privacy scheme with reinforcement learning in VANET Chen, Xin

110 C p.
artikel
8 Applying machine learning and natural language processing to detect phishing email Alhogail, Areej

110 C p.
artikel
9 A PUF-based secure wake-up scheme for Internet of Things Lin, Hui-Tang

110 C p.
artikel
10 BDDR: An Effective Defense Against Textual Backdoor Attacks Shao, Kun

110 C p.
artikel
11 Cyber-enabled burglary of smart homes Hodges, Duncan

110 C p.
artikel
12 Detector + : An approach for detecting, isolating, and preventing timing attacks Javeed, Arsalan

110 C p.
artikel
13 Editorial Board
110 C p.
artikel
14 Image-based malware classification using section distribution information Xiao, Mao

110 C p.
artikel
15 Information security vulnerability prediction based on business process model using machine learning approach Hariyanti, Eva

110 C p.
artikel
16 KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization Guerra-Manzanares, Alejandro

110 C p.
artikel
17 NetObfu : A lightweight and efficient network topology obfuscation defense scheme Liu, Yaqun

110 C p.
artikel
18 Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust Buck, Christoph

110 C p.
artikel
19 Non-Interactive and secure outsourcing of PCA-Based face recognition Ren, Yanli

110 C p.
artikel
20 PASSVM: A highly accurate fast flux detection system Al-Duwairi, Basheer

110 C p.
artikel
21 PCaaD: Towards automated determination and exploitation of industrial systems Green, Benjamin

110 C p.
artikel
22 Privacy preservation in federated learning: An insightful survey from the GDPR perspective Truong, Nguyen

110 C p.
artikel
23 Serious games as a tool to model attack and defense scenarios for cyber-security exercises Yamin, Muhammad Mudassar

110 C p.
artikel
24 STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment Al, Samed

110 C p.
artikel
25 Stock market reactions to favorable and unfavorable information security events: A systematic literature review Ali, Syed Emad Azhar

110 C p.
artikel
26 Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis Zhang, Haikuo

110 C p.
artikel
27 Survivable zero trust for cloud computing environments Ferretti, Luca

110 C p.
artikel
28 The effects of different personal data categories on information privacy concern and disclosure Chua, Hui Na

110 C p.
artikel
29 VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches Sun, Hao

110 C p.
artikel
                             29 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland