nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A broker-based framework for standardization and management of Cloud Security-SLAs
|
Halabi, Talal |
|
2018 |
75 |
C |
p. 59-71 |
artikel |
2 |
A cost-sensitive move selection strategy for moving target defense
|
Zangeneh, Vahid |
|
2018 |
75 |
C |
p. 72-91 |
artikel |
3 |
A novel architecture combined with optimal parameters for back propagation neural networks applied to anomaly network intrusion detection
|
Chiba, Zouhair |
|
2018 |
75 |
C |
p. 36-58 |
artikel |
4 |
A security framework for mHealth apps on Android platform
|
Hussain, Muzammil |
|
2018 |
75 |
C |
p. 191-217 |
artikel |
5 |
A systematic review of fuzzing techniques
|
Chen, Chen |
|
2018 |
75 |
C |
p. 118-137 |
artikel |
6 |
Cybersecurity education: Evolution of the discipline and analysis of master programs
|
Cabaj, Krzysztof |
|
2018 |
75 |
C |
p. 24-35 |
artikel |
7 |
Editorial Board
|
|
|
2018 |
75 |
C |
p. ii |
artikel |
8 |
Enhancing security behaviour by supporting the user
|
Furnell, Steven |
|
2018 |
75 |
C |
p. 1-9 |
artikel |
9 |
FNF: Flow-net based fingerprinting and its applications
|
Fu, Bo |
|
2018 |
75 |
C |
p. 167-181 |
artikel |
10 |
Formally modeling deceptive patches using a game-based approach
|
Avery, Jeffrey |
|
2018 |
75 |
C |
p. 182-190 |
artikel |
11 |
Identifying 3D printer residual data via open-source documentation
|
Miller, Daniel Bradford |
|
2018 |
75 |
C |
p. 10-23 |
artikel |
12 |
If-transpiler: Inlining of hybrid flow-sensitive security monitor for JavaScript
|
Sayed, Bassam |
|
2018 |
75 |
C |
p. 92-117 |
artikel |
13 |
One-time password based on hash chain without shared secret and re-registration
|
Park, Chang-Seop |
|
2018 |
75 |
C |
p. 138-146 |
artikel |
14 |
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
|
Menard, Philip |
|
2018 |
75 |
C |
p. 147-166 |
artikel |