Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             83 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 About long period sequences Fomichev, V. M.

3 p. 205-213
artikel
2 ACER: detecting Shadowsocks server based on active probe technology Cheng, Jiaxing

3 p. 217-227
artikel
3 A completely covert audio channel in Android Thakur, Sukanya
2016
3 p. 141-152
artikel
4 A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks Bernardeschi, Cinzia

3 p. 249-263
artikel
5 A framework for supporting ransomware detection and prevention based on hybrid analysis Mercaldo, Francesco

3 p. 221-227
artikel
6 An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis Pereberina, Anastasia

3 p. 459-468
artikel
7 An analysis of Android adware Suresh, Supraja
2018
3 p. 147-160
artikel
8 An analysis on secure coding using symbolic execution engine Kim, Joon-Ho
2016
3 p. 177-184
artikel
9 An approach to dynamic malware analysis based on system and application code split Pereberina, Anastasia

3 p. 231-241
artikel
10 An efficient IDS in cloud environment using feature selection based on DM algorithm Ghosh, Partha

3 p. 243-258
artikel
11 An efficient thread partition policy for secure functional language Jo, SunMoon
2014
3 p. 165-171
artikel
12 An instrumentation based algorithm for stack overflow detection Carrillo-Mondéjar, J.

3 p. 245-256
artikel
13 A practical approach to learning Linux vulnerabilities Karapetyants, Nikolay

3 p. 409-418
artikel
14 A secure analysis of vehicular authentication security scheme of RSUs in VANET Kim, Yongchan
2016
3 p. 145-150
artikel
15 Association analysis of technology convergence based on information system utilization Shin, Sumi
2015
3 p. 173-179
artikel
16 A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis Kim, Do Yeon
2016
3 p. 151-161
artikel
17 A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography Jeong, Yoon-Su
2015
3 p. 137-142
artikel
18 Attacking TrustZone on devices lacking memory protection Stajnrod, Ron

3 p. 259-269
artikel
19 Authentication scheme for smart learning system in the cloud computing environment Lee, Aeri
2015
3 p. 149-155
artikel
20 Automatic code features extraction using bio-inspired algorithms Oprişa, Ciprian
2013
3 p. 165-176
artikel
21 Banking behavior in security and multi-channel environment Lee, Sang-Chul
2015
3 p. 157-164
artikel
22 Blackhole attack: user identity and password seize attack using honeypot Mun, Hyung-Jin
2016
3 p. 185-190
artikel
23 2-Channel authentication technique using cardiac impulse based OTP Kang, Bo-Seon
2016
3 p. 163-167
artikel
24 Combinatorial detection of malware by IAT discrimination Ferrand, Olivier
2015
3 p. 131-136
artikel
25 Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis Kozachok, A. V.
2017
3 p. 225-231
artikel
26 Convergence security systems Oh, Sang-Yeob
2015
3 p. 119-121
artikel
27 Convolutional neural networks and extreme learning machines for malware classification Jain, Mugdha

3 p. 229-244
artikel
28 Counteraction the cybersecurity threats of the in-vehicle local network Pavlenko, E. Y.

3 p. 399-408
artikel
29 Covert channel limitation via special dummy traffic generating Epishkina, Anna

3 p. 341-349
artikel
30 Data protection in heterogeneous big data systems Poltavtseva, M. A.

3 p. 451-458
artikel
31 Deciphering malware’s use of TLS (without decryption) Anderson, Blake
2017
3 p. 195-211
artikel
32 Detecting machine-morphed malware variants via engine attribution Chouchane, Radhouane
2013
3 p. 137-157
artikel
33 Detecting stealth DHCP starvation attack using machine learning approach Tripathi, Nikhil
2017
3 p. 233-244
artikel
34 Detection and robustness evaluation of android malware classifiers Anupama, M. L.

3 p. 147-170
artikel
35 Detection of crawler traps: formalization and implementation—defeating protection on internet and on the TOR network David, Baptiste

3 p. 185-198
artikel
36 Detection of shellcodes in drive-by attacks using kernel machines Cherukuri, Manoj
2013
3 p. 189-203
artikel
37 Development of a method for targeted monitoring and processing of information security incidents of economic entities Kirov, Aleksei

3 p. 381-386
artikel
38 Editorial Santone, Antonella

3 p. 165-166
artikel
39 Editorial special issue: Russian research in cybersecurity Fomichev, Vladimir

3 p. 339-340
artikel
40 Efficient and secure DNS cyber shelter on DDoS attacks Hong, Sunghyuck
2014
3 p. 129-136
artikel
41 Encryption performance and security of certain wide block ciphers Fomichev, Vladimir

3 p. 197-216
artikel
42 ERES: an extended regular expression signature for polymorphic worm detection Eskandari, Razieh
2019
3 p. 177-194
artikel
43 Evolution and characterization of point-of-sale RAM scraping malware Rodríguez, Ricardo J.
2016
3 p. 179-192
artikel
44 Experimental analysis of Android malware detection based on combinations of permissions and API-calls Singh, Abhishek Kumar
2019
3 p. 209-218
artikel
45 Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection Cha, Kyung-Hwan
2017
3 p. 233-238
artikel
46 2Faces: a new model of malware based on dynamic compiling and reflection Casolare, Rosangela

3 p. 215-230
artikel
47 Graph embedding as a new approach for unknown malware detection Hashemi, Hashem
2016
3 p. 153-166
artikel
48 Impeding behavior-based malware analysis via replacement attacks to malware specifications Ming, Jiang
2016
3 p. 193-207
artikel
49 Intelligent OS X malware threat detection with code inspection Pajouh, Hamed Haddad
2017
3 p. 213-223
artikel
50 Knowledge-based System and Security Jeong, Yu-Keum
2016
3 p. 121-123
artikel
51 Learning metamorphic malware signatures from samples Campion, Marco

3 p. 167-183
artikel
52 MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization Ming, Jiang
2016
3 p. 167-178
artikel
53 Metamorphic code generation from LLVM bytecode Tamboli, Teja
2013
3 p. 177-187
artikel
54 Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model Ling, Yeong Tyng

3 p. 183-203
artikel
55 Modeling advanced persistent threats using risk matrix methods Ivanova, Nina D.

3 p. 367-372
artikel
56 Nonnegative matrix factorization and metamorphic malware detection Ling, Yeong Tyng
2019
3 p. 195-208
artikel
57 On improvements of robustness of obfuscated JavaScript code detection Ponomarenko, G. S.

3 p. 387-398
artikel
58 OTT user authentication system by age classification Kim, Ki-young
2016
3 p. 169-175
artikel
59 Partially identified Babassu cipher and attack on it Babash, A. V.

3 p. 271-274
artikel
60 Post-quantum security of messengers: secure group chats and continuous key distribution protocols Bobrysheva, Julia

3 p. 373-380
artikel
61 Proactive defense against malicious documents: formalization, implementation and case studies Dechaux, Jonathan
2015
3 p. 191-202
artikel
62 Reconfigurable real number field elliptic curve cryptography to improve the security Goo, Eun-Hee
2014
3 p. 123-128
artikel
63 Risky model of mobile application presentation Izergin, Dmitriy

3 p. 419-441
artikel
64 Role based access control using identity and broadcast based encryption for securing cloud data Saxena, Urvashi Rahul

3 p. 171-182
artikel
65 RV-TEE: secure cryptographic protocol execution based on runtime verification Vella, Mark

3 p. 229-248
artikel
66 Secrets from the GPU Mahé, Eric
2014
3 p. 205-210
artikel
67 Secure game development for IoT environment MyounJae, Lee
2015
3 p. 125-130
artikel
68 Security of controlled manufacturing systems in the connected factory: the case of industrial robots Pogliani, Marcello
2019
3 p. 161-175
artikel
69 Simple substitution distance and metamorphic detection Shanmugam, Gayathri
2013
3 p. 159-170
artikel
70 Statically detecting use after free on binary code Feist, Josselin
2014
3 p. 211-217
artikel
71 Study on model fostering for cloud service brokerage Choi, Sung
2015
3 p. 181-192
artikel
72 Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology Preda, Mila Dalla
2016
3 p. 209-232
artikel
73 Text marking approach for data leakage prevention Kozachok, A. V.
2019
3 p. 219-232
artikel
74 The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes Moubarak, Joanna

3 p. 199-220
artikel
75 The duplication issue within the Drebin dataset Irolla, Paul
2018
3 p. 245-249
artikel
76 The Office Demon: Minos Dechaux, Jonathan
2013
3 p. 125-135
artikel
77 The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support Botacin, Marcus

3 p. 185-196
artikel
78 Two-channel user authentication by using USB on Cloud Hong, Sunghyuck
2015
3 p. 137-143
artikel
79 Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors Ermolov, Mark

3 p. 351-365
artikel
80 VILO: a rapid learning nearest-neighbor classifier for malware triage Lakhotia, Arun
2013
3 p. 109-123
artikel
81 Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures Kim, Jung-Hoon
2015
3 p. 143-148
artikel
82 XOR ciphers model and the attack to it Babash, A. V.

3 p. 275-283
artikel
83 Zero knowledge proof and ZK-SNARK for private blockchains Konkin, Anatoly

3 p. 443-449
artikel
                             83 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland