nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A privacy-preserving sharing method of electricity usage using self-organizing map
|
Nakamura, Yuichi |
|
2018 |
4 |
1 |
p. 24-29 |
artikel |
2 |
Automatically proving the correctness of vehicle coordination
|
Asplund, Mikael |
|
2018 |
4 |
1 |
p. 51-54 |
artikel |
3 |
Comparative study of game theoretic approaches to mitigate network layer attacks in VANETs
|
Ilavendhan, A. |
|
2018 |
4 |
1 |
p. 46-50 |
artikel |
4 |
Cyber security of critical infrastructures
|
Maglaras, Leandros A. |
|
2018 |
4 |
1 |
p. 42-45 |
artikel |
5 |
FPGA-based network intrusion detection for IEC 61850-based industrial network
|
Kim, Junsik |
|
2018 |
4 |
1 |
p. 1-5 |
artikel |
6 |
Impact of optimal false data injection attacks on local energy trading in a residential microgrid
|
Islam, Shama N. |
|
2018 |
4 |
1 |
p. 30-34 |
artikel |
7 |
Improved chaos-based video steganography using DNA alphabets
|
Kar, Nirmalya |
|
2018 |
4 |
1 |
p. 6-13 |
artikel |
8 |
Multi-stage crypto ransomware attacks: A new emerging cyber threat to critical infrastructure and industrial control systems
|
Zimba, Aaron |
|
2018 |
4 |
1 |
p. 14-18 |
artikel |
9 |
Performance evaluation of Grain family and Espresso ciphers for applications on resource constrained devices
|
Deb, Subhrajyoti |
|
2018 |
4 |
1 |
p. 19-23 |
artikel |
10 |
Towards quantitative evaluation of privacy protection schemes for electricity usage data sharing
|
Mashima, Daisuke |
|
2018 |
4 |
1 |
p. 35-41 |
artikel |