nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review of the security flaws of hashing algorithms
|
Sadeghi-Nasab, Alireza |
|
|
|
2 |
p. 287-302 |
artikel |
2 |
Adjusting context-aware RFID in health screening center
|
Choi, Young Jin |
|
2014 |
|
2 |
p. 115-118 |
artikel |
3 |
A generalized framework for accelerating exhaustive search utilizing deterministic related-key differential characteristics
|
Soleimany, Hadi |
|
|
|
2 |
p. 141-146 |
artikel |
4 |
A loop splitting method for single loops with non-uniform dependences
|
Jeong, Sam Jin |
|
2014 |
|
2 |
p. 137-143 |
artikel |
5 |
A low complexity image stitching using advanced feature matching in mobile environments
|
Ahn, Hyochang |
|
2014 |
|
2 |
p. 129-136 |
artikel |
6 |
An indoor location tracking based on mobile RFID for smart exhibition service
|
Kim, So Hyeon |
|
2014 |
|
2 |
p. 89-96 |
artikel |
7 |
Anomaly detection in business processes logs using social network analysis
|
Ebrahim, Mina |
|
|
|
2 |
p. 127-139 |
artikel |
8 |
Anti-emulation trends in modern packers: a survey on the evolution of anti-emulation techniques in UPA packers
|
Liţă, Cătălin Valeriu |
|
2017 |
|
2 |
p. 107-126 |
artikel |
9 |
Application of the SAMA methodology to Ryuk malware
|
Masid, Ander Granado |
|
|
|
2 |
p. 165-198 |
artikel |
10 |
A study on scalable information matching system based on web service information
|
Sim, Sung-Ho |
|
2014 |
|
2 |
p. 81-88 |
artikel |
11 |
A study on the factors that affect the adoption of Smart Water Grid
|
Kim, Dong-hwan |
|
2014 |
|
2 |
p. 119-128 |
artikel |
12 |
A study on the service quality of SMEs management consulting affecting the perceived management performance in mobile communication environments
|
Choi, Myoung-Kyu |
|
2014 |
|
2 |
p. 145-156 |
artikel |
13 |
Audio signal processing for Android malware detection and family identification
|
Mercaldo, Francesco |
|
|
|
2 |
p. 139-152 |
artikel |
14 |
Automated generation of colluding apps for experimental research
|
Blasco, Jorge |
|
2017 |
|
2 |
p. 127-138 |
artikel |
15 |
Behavior-based features model for malware detection
|
Galal, Hisham Shehata |
|
2015 |
|
2 |
p. 59-67 |
artikel |
16 |
Buffer overflow vulnerabilities in CUDA: a preliminary analysis
|
Miele, Andrea |
|
2015 |
|
2 |
p. 113-120 |
artikel |
17 |
Choquet integral-based product satisfaction inference in consideration of subjective decision-making tendencies
|
Kwon, Il-Kyoung |
|
2014 |
|
2 |
p. 71-80 |
artikel |
18 |
Chronicle of a Java Card death
|
Farhadi, Mozhdeh |
|
2016 |
|
2 |
p. 109-123 |
artikel |
19 |
Clustering for malware classification
|
Pai, Swathi |
|
2016 |
|
2 |
p. 95-107 |
artikel |
20 |
Covert timing channels: analyzing WEB traffic
|
Nasseralfoghara, Mehrdad |
|
|
|
2 |
p. 117-126 |
artikel |
21 |
Cross-VM cache attacks on Camellia
|
Seddigh, Milad |
|
|
|
2 |
p. 91-99 |
artikel |
22 |
DBI, debuggers, VM: gotta catch them all
|
Plumerault, François |
|
|
|
2 |
p. 105-117 |
artikel |
23 |
Deep learning for image-based mobile malware detection
|
Mercaldo, Francesco |
|
|
|
2 |
p. 157-171 |
artikel |
24 |
Design and implementation of a sandbox for facilitating and automating IoT malware analysis with techniques to elicit malicious behavior: case studies of functionalities for dissecting IoT malware
|
Yonamine, Shun |
|
|
|
2 |
p. 149-163 |
artikel |
25 |
DHCP attacking tools: an analysis
|
Aldaoud, Manar |
|
|
|
2 |
p. 119-129 |
artikel |
26 |
Dueling hidden Markov models for virus analysis
|
Kalbhor, Ashwin |
|
2014 |
|
2 |
p. 103-118 |
artikel |
27 |
Editorial
|
Sadeghiyan, Babak |
|
|
|
2 |
p. 69-70 |
artikel |
28 |
Enhanced DNNs for malware classification with GAN-based adversarial training
|
Zhang, Yunchun |
|
|
|
2 |
p. 153-163 |
artikel |
29 |
Erratum to: Evolution and characterization of point-of-sale RAM scraping malware
|
Rodríguez, Ricardo J. |
|
2016 |
|
2 |
p. 139 |
artikel |
30 |
Exploiting flaws in Windbg: how to escape or fool debuggers from existing flaws
|
Plumerault, François |
|
|
|
2 |
p. 173-183 |
artikel |
31 |
Extremely scalable storage and clustering of malware metadata
|
Asquith, Matthew |
|
2015 |
|
2 |
p. 49-58 |
artikel |
32 |
HDM-Analyser: a hybrid analysis approach based on data mining techniques for malware detection
|
Eskandari, Mojtaba |
|
2013 |
|
2 |
p. 77-93 |
artikel |
33 |
Heuristic estimation of network capacity and spectrum requirement
|
Kim, Taehan |
|
2014 |
|
2 |
p. 97-100 |
artikel |
34 |
Hidden Markov models for malware classification
|
Annachhatre, Chinmayee |
|
2014 |
|
2 |
p. 59-73 |
artikel |
35 |
Hidden Markov models with random restarts versus boosting for malware detection
|
Raghavan, Aditya |
|
2018 |
|
2 |
p. 97-107 |
artikel |
36 |
Hiding a fault enabled virus through code construction
|
Hamadouche, Samiya |
|
|
|
2 |
p. 103-124 |
artikel |
37 |
Hunting for metamorphic JavaScript malware
|
Musale, Mangesh |
|
2014 |
|
2 |
p. 89-102 |
artikel |
38 |
Identification of malicious android app using manifest and opcode features
|
Varsha, M. V. |
|
2016 |
|
2 |
p. 125-138 |
artikel |
39 |
IFMD: image fusion for malware detection
|
Hashemi, Hashem |
|
|
|
2 |
p. 271-286 |
artikel |
40 |
Implementation of a web-based smart electronic needle system
|
Kim, Man Ki |
|
2014 |
|
2 |
p. 101-108 |
artikel |
41 |
Improving binary diffing speed and accuracy using community detection and locality-sensitive hashing: an empirical study
|
Karamitas, Chariton |
|
|
|
2 |
p. 319-337 |
artikel |
42 |
Legal limits of search and seizure for digital forensic in Korea
|
Kim, Sang Gyun |
|
2014 |
|
2 |
p. 157-163 |
artikel |
43 |
Leveraging branch traces to understand kernel internals from within
|
Botacin, Marcus |
|
|
|
2 |
p. 141-155 |
artikel |
44 |
Lightweight versus obfuscation-resilient malware detection in android applications
|
Aghamohammadi, Ali |
|
|
|
2 |
p. 125-139 |
artikel |
45 |
Malicious URI resolving in PDF documents
|
Hamon, Valentin |
|
2013 |
|
2 |
p. 65-76 |
artikel |
46 |
Malware propagation in smart grid networks: metrics, simulation and comparison of three malware types
|
Eder-Neuhauser, Peter |
|
2018 |
|
2 |
p. 109-125 |
artikel |
47 |
Markhor: malware detection using fuzzy similarity of system call dependency sequences
|
Lajevardi, Amir Mohammadzade |
|
|
|
2 |
p. 81-90 |
artikel |
48 |
Metamorphic worm that carries its own morphing engine
|
Madenur Sridhara, Sudarshan |
|
2012 |
|
2 |
p. 49-58 |
artikel |
49 |
Modeling discovery and removal of security vulnerabilities in software system using priority queueing models
|
Lim, Dae-Eun |
|
2014 |
|
2 |
p. 109-114 |
artikel |
50 |
Multi-context features for detecting malicious programs
|
Saleh, Moustafa |
|
2017 |
|
2 |
p. 181-193 |
artikel |
51 |
Music classification as a new approach for malware detection
|
Farrokhmanesh, Mehrdad |
|
2018 |
|
2 |
p. 77-96 |
artikel |
52 |
Network malware classification comparison using DPI and flow packet headers
|
Boukhtouta, Amine |
|
2015 |
|
2 |
p. 69-100 |
artikel |
53 |
On delegatability of MDVS schemes
|
Rastegari, Parvin |
|
|
|
2 |
p. 71-80 |
artikel |
54 |
Packer identification using Byte plot and Markov plot
|
Kancherla, Kesav |
|
2015 |
|
2 |
p. 101-111 |
artikel |
55 |
Pure-Call Oriented Programming (PCOP): chaining the gadgets using call instructions
|
Sadeghi, AliAkbar |
|
2017 |
|
2 |
p. 139-156 |
artikel |
56 |
Recent trends in Mobile Communication Systems
|
Oh, Sang-Yeob |
|
2014 |
|
2 |
p. 67-70 |
artikel |
57 |
RETRACTED ARTICLE: Artificial intelligence assisted cyber threat assessment and applications for the tourism industry
|
Zhang, Liqin |
|
|
|
2 |
p. 199-215 |
artikel |
58 |
RETRACTED ARTICLE: Artificial intelligence enabled fuzzy multimode decision support system for cyber threat security defense automation
|
Hang, Feilu |
|
|
|
2 |
p. 257-269 |
artikel |
59 |
RETRACTED ARTICLE: Joint detection and classification of signature and NetFlow based internet worms using MBGWO-based hybrid LSTM
|
Venkata Rao, Mundlamuri |
|
|
|
2 |
p. 241-255 |
artikel |
60 |
Sliding window and control flow weight for metamorphic malware detection
|
Alam, Shahid |
|
2014 |
|
2 |
p. 75-88 |
artikel |
61 |
Structural analysis of binary executable headers for malware detection optimization
|
David, Baptiste |
|
2016 |
|
2 |
p. 87-93 |
artikel |
62 |
Study on a security intelligence trading platform based on blockchain and IPFS
|
Xu, Hejun |
|
|
|
2 |
p. 131-137 |
artikel |
63 |
Superfetch: the famous unknown spy
|
Venault, Mathilde |
|
|
|
2 |
p. 91-104 |
artikel |
64 |
Testing closed source software: computer forensic tool case study
|
Talib, Manar Abu |
|
2017 |
|
2 |
p. 167-179 |
artikel |
65 |
The security of databases: the Access case
|
David, Baptiste |
|
2013 |
|
2 |
p. 95-107 |
artikel |
66 |
Time dependency: an efficient biometric-based authentication for secure communication in wireless healthcare sensor networks
|
Ghahramani, Meysam |
|
|
|
2 |
p. 303-317 |
artikel |
67 |
Uforia: Universal forensic indexer and analyzer
|
Eijkhoudt, Arnim |
|
2013 |
|
2 |
p. 59-63 |
artikel |
68 |
Vigenère scores for malware detection
|
Deshmukh, Suchita |
|
2017 |
|
2 |
p. 157-165 |
artikel |
69 |
Windows malware detection system based on LSVC recommended hybrid features
|
Shiva Darshan, S. L. |
|
2018 |
|
2 |
p. 127-146 |
artikel |
70 |
XAI for intrusion detection system: comparing explanations based on global and local scope
|
Hariharan, Swetha |
|
|
|
2 |
p. 217-239 |
artikel |
71 |
Zipf’s law analysis on the leaked Iranian users’ passwords
|
Alebouyeh, Zeinab |
|
|
|
2 |
p. 101-116 |
artikel |