Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             71 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review of the security flaws of hashing algorithms Sadeghi-Nasab, Alireza

2 p. 287-302
artikel
2 Adjusting context-aware RFID in health screening center Choi, Young Jin
2014
2 p. 115-118
artikel
3 A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics Soleimany, Hadi

2 p. 141-146
artikel
4 A loop splitting method for single loops with non-uniform dependences Jeong, Sam Jin
2014
2 p. 137-143
artikel
5 A low complexity image stitching using advanced feature matching in mobile environments Ahn, Hyochang
2014
2 p. 129-136
artikel
6 An indoor location tracking based on mobile RFID for smart exhibition service Kim, So Hyeon
2014
2 p. 89-96
artikel
7 Anomaly detection in business processes logs using social network analysis Ebrahim, Mina

2 p. 127-139
artikel
8 Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers Liţă, Cătălin Valeriu
2017
2 p. 107-126
artikel
9 Application of the SAMA methodology to Ryuk malware Masid, Ander Granado

2 p. 165-198
artikel
10 A study on scalable information matching system based on web service information Sim, Sung-Ho
2014
2 p. 81-88
artikel
11 A study on the factors that affect the adoption of Smart Water Grid Kim, Dong-hwan
2014
2 p. 119-128
artikel
12 A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments Choi, Myoung-Kyu
2014
2 p. 145-156
artikel
13 Audio signal processing for Android malware detection and family identification Mercaldo, Francesco

2 p. 139-152
artikel
14 Automated generation of colluding apps for experimental research Blasco, Jorge
2017
2 p. 127-138
artikel
15 Behavior-based features model for malware detection Galal, Hisham Shehata
2015
2 p. 59-67
artikel
16 Buffer overflow vulnerabilities in CUDA: a preliminary analysis Miele, Andrea
2015
2 p. 113-120
artikel
17 Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies Kwon, Il-Kyoung
2014
2 p. 71-80
artikel
18 Chronicle of a Java Card death Farhadi, Mozhdeh
2016
2 p. 109-123
artikel
19 Clustering for malware classification Pai, Swathi
2016
2 p. 95-107
artikel
20 Covert timing channels: analyzing WEB traffic Nasseralfoghara, Mehrdad

2 p. 117-126
artikel
21 Cross-VM cache attacks on Camellia Seddigh, Milad

2 p. 91-99
artikel
22 DBI, debuggers, VM: gotta catch them all Plumerault, François

2 p. 105-117
artikel
23 Deep learning for image-based mobile malware detection Mercaldo, Francesco

2 p. 157-171
artikel
24 Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware Yonamine, Shun

2 p. 149-163
artikel
25 DHCP attacking tools: an analysis Aldaoud, Manar

2 p. 119-129
artikel
26 Dueling hidden Markov models for virus analysis Kalbhor, Ashwin
2014
2 p. 103-118
artikel
27 Editorial Sadeghiyan, Babak

2 p. 69-70
artikel
28 Enhanced DNNs for malware classification with GAN-based adversarial training Zhang, Yunchun

2 p. 153-163
artikel
29 Erratum to: Evolution and characterization of point-of-sale RAM scraping malware Rodríguez, Ricardo J.
2016
2 p. 139
artikel
30 Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws Plumerault, François

2 p. 173-183
artikel
31 Extremely scalable storage and clustering of malware metadata Asquith, Matthew
2015
2 p. 49-58
artikel
32 HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection Eskandari, Mojtaba
2013
2 p. 77-93
artikel
33 Heuristic estimation of network capacity and spectrum requirement Kim, Taehan
2014
2 p. 97-100
artikel
34 Hidden Markov models for malware classification Annachhatre, Chinmayee
2014
2 p. 59-73
artikel
35 Hidden Markov models with random restarts versus boosting for malware detection Raghavan, Aditya
2018
2 p. 97-107
artikel
36 Hiding a fault enabled virus through code construction Hamadouche, Samiya

2 p. 103-124
artikel
37 Hunting for metamorphic JavaScript malware Musale, Mangesh
2014
2 p. 89-102
artikel
38 Identification of malicious android app using manifest and opcode features Varsha, M. V.
2016
2 p. 125-138
artikel
39 IFMD: image fusion for malware detection Hashemi, Hashem

2 p. 271-286
artikel
40 Implementation of a web-based smart electronic needle system Kim, Man Ki
2014
2 p. 101-108
artikel
41 Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study Karamitas, Chariton

2 p. 319-337
artikel
42 Legal limits of search and seizure for digital forensic in Korea Kim, Sang Gyun
2014
2 p. 157-163
artikel
43 Leveraging branch traces to understand kernel internals from within Botacin, Marcus

2 p. 141-155
artikel
44 Lightweight versus obfuscation-resilient malware detection in android applications Aghamohammadi, Ali

2 p. 125-139
artikel
45 Malicious URI resolving in PDF documents Hamon, Valentin
2013
2 p. 65-76
artikel
46 Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types Eder-Neuhauser, Peter
2018
2 p. 109-125
artikel
47 Markhor: malware detection using fuzzy similarity of system call dependency sequences Lajevardi, Amir Mohammadzade

2 p. 81-90
artikel
48 Metamorphic worm that carries its own morphing engine Madenur Sridhara, Sudarshan
2012
2 p. 49-58
artikel
49 Modeling discovery and removal of security vulnerabilities in software system using priority queueing models Lim, Dae-Eun
2014
2 p. 109-114
artikel
50 Multi-context features for detecting malicious programs Saleh, Moustafa
2017
2 p. 181-193
artikel
51 Music classification as a new approach for malware detection Farrokhmanesh, Mehrdad
2018
2 p. 77-96
artikel
52 Network malware classification comparison using DPI and flow packet headers Boukhtouta, Amine
2015
2 p. 69-100
artikel
53 On delegatability of MDVS schemes Rastegari, Parvin

2 p. 71-80
artikel
54 Packer identification using Byte plot and Markov plot Kancherla, Kesav
2015
2 p. 101-111
artikel
55 Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions Sadeghi, AliAkbar
2017
2 p. 139-156
artikel
56 Recent trends in Mobile Communication Systems Oh, Sang-Yeob
2014
2 p. 67-70
artikel
57 RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry Zhang, Liqin

2 p. 199-215
artikel
58 RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation Hang, Feilu

2 p. 257-269
artikel
59 RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM Venkata Rao, Mundlamuri

2 p. 241-255
artikel
60 Sliding window and control flow weight for metamorphic malware detection Alam, Shahid
2014
2 p. 75-88
artikel
61 Structural analysis of binary executable headers for malware detection optimization David, Baptiste
2016
2 p. 87-93
artikel
62 Study on a security intelligence trading platform based on blockchain and IPFS Xu, Hejun

2 p. 131-137
artikel
63 Superfetch: the famous unknown spy Venault, Mathilde

2 p. 91-104
artikel
64 Testing closed source software: computer forensic tool case study Talib, Manar Abu
2017
2 p. 167-179
artikel
65 The security of databases: the Access case David, Baptiste
2013
2 p. 95-107
artikel
66 Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks Ghahramani, Meysam

2 p. 303-317
artikel
67 Uforia: Universal forensic indexer and analyzer Eijkhoudt, Arnim
2013
2 p. 59-63
artikel
68 Vigenère scores for malware detection Deshmukh, Suchita
2017
2 p. 157-165
artikel
69 Windows malware detection system based on LSVC recommended hybrid features Shiva Darshan, S. L.
2018
2 p. 127-146
artikel
70 XAI for intrusion detection system: comparing explanations based on global and local scope Hariharan, Swetha

2 p. 217-239
artikel
71 Zipf’s law analysis on the leaked Iranian users’ passwords Alebouyeh, Zeinab

2 p. 101-116
artikel
                             71 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland