nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
About long period sequences
|
Fomichev, V. M. |
|
|
|
3 |
p. 205-213 |
artikel |
2 |
ACER: detecting Shadowsocks server based on active probe technology
|
Cheng, Jiaxing |
|
|
|
3 |
p. 217-227 |
artikel |
3 |
A completely covert audio channel in Android
|
Thakur, Sukanya |
|
2016 |
|
3 |
p. 141-152 |
artikel |
4 |
A framework for formal analysis and simulative evaluation of security attacks in wireless sensor networks
|
Bernardeschi, Cinzia |
|
|
|
3 |
p. 249-263 |
artikel |
5 |
A framework for supporting ransomware detection and prevention based on hybrid analysis
|
Mercaldo, Francesco |
|
|
|
3 |
p. 221-227 |
artikel |
6 |
An algorithm for scheduling of threads for system and application code split approach in dynamic malware analysis
|
Pereberina, Anastasia |
|
|
|
3 |
p. 459-468 |
artikel |
7 |
An analysis of Android adware
|
Suresh, Supraja |
|
2018 |
|
3 |
p. 147-160 |
artikel |
8 |
An analysis on secure coding using symbolic execution engine
|
Kim, Joon-Ho |
|
2016 |
|
3 |
p. 177-184 |
artikel |
9 |
An approach to dynamic malware analysis based on system and application code split
|
Pereberina, Anastasia |
|
|
|
3 |
p. 231-241 |
artikel |
10 |
An efficient IDS in cloud environment using feature selection based on DM algorithm
|
Ghosh, Partha |
|
|
|
3 |
p. 243-258 |
artikel |
11 |
An efficient thread partition policy for secure functional language
|
Jo, SunMoon |
|
2014 |
|
3 |
p. 165-171 |
artikel |
12 |
An instrumentation based algorithm for stack overflow detection
|
Carrillo-Mondéjar, J. |
|
|
|
3 |
p. 245-256 |
artikel |
13 |
A practical approach to learning Linux vulnerabilities
|
Karapetyants, Nikolay |
|
|
|
3 |
p. 409-418 |
artikel |
14 |
A secure analysis of vehicular authentication security scheme of RSUs in VANET
|
Kim, Yongchan |
|
2016 |
|
3 |
p. 145-150 |
artikel |
15 |
Association analysis of technology convergence based on information system utilization
|
Shin, Sumi |
|
2015 |
|
3 |
p. 173-179 |
artikel |
16 |
A study on effects of security risks on acceptance of enterprise cloud service: moderating of employment and non-employment using PLS multiple group analysis
|
Kim, Do Yeon |
|
2016 |
|
3 |
p. 151-161 |
artikel |
17 |
A token-based authentication security scheme for Hadoop distributed file system using elliptic curve cryptography
|
Jeong, Yoon-Su |
|
2015 |
|
3 |
p. 137-142 |
artikel |
18 |
Attacking TrustZone on devices lacking memory protection
|
Stajnrod, Ron |
|
|
|
3 |
p. 259-269 |
artikel |
19 |
Authentication scheme for smart learning system in the cloud computing environment
|
Lee, Aeri |
|
2015 |
|
3 |
p. 149-155 |
artikel |
20 |
Automatic code features extraction using bio-inspired algorithms
|
Oprişa, Ciprian |
|
2013 |
|
3 |
p. 165-176 |
artikel |
21 |
Banking behavior in security and multi-channel environment
|
Lee, Sang-Chul |
|
2015 |
|
3 |
p. 157-164 |
artikel |
22 |
Blackhole attack: user identity and password seize attack using honeypot
|
Mun, Hyung-Jin |
|
2016 |
|
3 |
p. 185-190 |
artikel |
23 |
2-Channel authentication technique using cardiac impulse based OTP
|
Kang, Bo-Seon |
|
2016 |
|
3 |
p. 163-167 |
artikel |
24 |
Combinatorial detection of malware by IAT discrimination
|
Ferrand, Olivier |
|
2015 |
|
3 |
p. 131-136 |
artikel |
25 |
Construction and evaluation of the new heuristic malware detection mechanism based on executable files static analysis
|
Kozachok, A. V. |
|
2017 |
|
3 |
p. 225-231 |
artikel |
26 |
Convergence security systems
|
Oh, Sang-Yeob |
|
2015 |
|
3 |
p. 119-121 |
artikel |
27 |
Convolutional neural networks and extreme learning machines for malware classification
|
Jain, Mugdha |
|
|
|
3 |
p. 229-244 |
artikel |
28 |
Counteraction the cybersecurity threats of the in-vehicle local network
|
Pavlenko, E. Y. |
|
|
|
3 |
p. 399-408 |
artikel |
29 |
Covert channel limitation via special dummy traffic generating
|
Epishkina, Anna |
|
|
|
3 |
p. 341-349 |
artikel |
30 |
Data protection in heterogeneous big data systems
|
Poltavtseva, M. A. |
|
|
|
3 |
p. 451-458 |
artikel |
31 |
Deciphering malware’s use of TLS (without decryption)
|
Anderson, Blake |
|
2017 |
|
3 |
p. 195-211 |
artikel |
32 |
Detecting machine-morphed malware variants via engine attribution
|
Chouchane, Radhouane |
|
2013 |
|
3 |
p. 137-157 |
artikel |
33 |
Detecting stealth DHCP starvation attack using machine learning approach
|
Tripathi, Nikhil |
|
2017 |
|
3 |
p. 233-244 |
artikel |
34 |
Detection and robustness evaluation of android malware classifiers
|
Anupama, M. L. |
|
|
|
3 |
p. 147-170 |
artikel |
35 |
Detection of crawler traps: formalization and implementation—defeating protection on internet and on the TOR network
|
David, Baptiste |
|
|
|
3 |
p. 185-198 |
artikel |
36 |
Detection of shellcodes in drive-by attacks using kernel machines
|
Cherukuri, Manoj |
|
2013 |
|
3 |
p. 189-203 |
artikel |
37 |
Development of a method for targeted monitoring and processing of information security incidents of economic entities
|
Kirov, Aleksei |
|
|
|
3 |
p. 381-386 |
artikel |
38 |
Editorial
|
Santone, Antonella |
|
|
|
3 |
p. 165-166 |
artikel |
39 |
Editorial special issue: Russian research in cybersecurity
|
Fomichev, Vladimir |
|
|
|
3 |
p. 339-340 |
artikel |
40 |
Efficient and secure DNS cyber shelter on DDoS attacks
|
Hong, Sunghyuck |
|
2014 |
|
3 |
p. 129-136 |
artikel |
41 |
Encryption performance and security of certain wide block ciphers
|
Fomichev, Vladimir |
|
|
|
3 |
p. 197-216 |
artikel |
42 |
ERES: an extended regular expression signature for polymorphic worm detection
|
Eskandari, Razieh |
|
2019 |
|
3 |
p. 177-194 |
artikel |
43 |
Evolution and characterization of point-of-sale RAM scraping malware
|
Rodríguez, Ricardo J. |
|
2016 |
|
3 |
p. 179-192 |
artikel |
44 |
Experimental analysis of Android malware detection based on combinations of permissions and API-calls
|
Singh, Abhishek Kumar |
|
2019 |
|
3 |
p. 209-218 |
artikel |
45 |
Experimental analysis of hidden Markov model based secure misuse intrusion trace classification and hacking detection
|
Cha, Kyung-Hwan |
|
2017 |
|
3 |
p. 233-238 |
artikel |
46 |
2Faces: a new model of malware based on dynamic compiling and reflection
|
Casolare, Rosangela |
|
|
|
3 |
p. 215-230 |
artikel |
47 |
Graph embedding as a new approach for unknown malware detection
|
Hashemi, Hashem |
|
2016 |
|
3 |
p. 153-166 |
artikel |
48 |
Impeding behavior-based malware analysis via replacement attacks to malware specifications
|
Ming, Jiang |
|
2016 |
|
3 |
p. 193-207 |
artikel |
49 |
Intelligent OS X malware threat detection with code inspection
|
Pajouh, Hamed Haddad |
|
2017 |
|
3 |
p. 213-223 |
artikel |
50 |
Knowledge-based System and Security
|
Jeong, Yu-Keum |
|
2016 |
|
3 |
p. 121-123 |
artikel |
51 |
Learning metamorphic malware signatures from samples
|
Campion, Marco |
|
|
|
3 |
p. 167-183 |
artikel |
52 |
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization
|
Ming, Jiang |
|
2016 |
|
3 |
p. 167-178 |
artikel |
53 |
Metamorphic code generation from LLVM bytecode
|
Tamboli, Teja |
|
2013 |
|
3 |
p. 177-187 |
artikel |
54 |
Metamorphic malware detection using structural features and nonnegative matrix factorization with hidden markov model
|
Ling, Yeong Tyng |
|
|
|
3 |
p. 183-203 |
artikel |
55 |
Modeling advanced persistent threats using risk matrix methods
|
Ivanova, Nina D. |
|
|
|
3 |
p. 367-372 |
artikel |
56 |
Nonnegative matrix factorization and metamorphic malware detection
|
Ling, Yeong Tyng |
|
2019 |
|
3 |
p. 195-208 |
artikel |
57 |
On improvements of robustness of obfuscated JavaScript code detection
|
Ponomarenko, G. S. |
|
|
|
3 |
p. 387-398 |
artikel |
58 |
OTT user authentication system by age classification
|
Kim, Ki-young |
|
2016 |
|
3 |
p. 169-175 |
artikel |
59 |
Partially identified Babassu cipher and attack on it
|
Babash, A. V. |
|
|
|
3 |
p. 271-274 |
artikel |
60 |
Post-quantum security of messengers: secure group chats and continuous key distribution protocols
|
Bobrysheva, Julia |
|
|
|
3 |
p. 373-380 |
artikel |
61 |
Proactive defense against malicious documents: formalization, implementation and case studies
|
Dechaux, Jonathan |
|
2015 |
|
3 |
p. 191-202 |
artikel |
62 |
Reconfigurable real number field elliptic curve cryptography to improve the security
|
Goo, Eun-Hee |
|
2014 |
|
3 |
p. 123-128 |
artikel |
63 |
Risky model of mobile application presentation
|
Izergin, Dmitriy |
|
|
|
3 |
p. 419-441 |
artikel |
64 |
Role based access control using identity and broadcast based encryption for securing cloud data
|
Saxena, Urvashi Rahul |
|
|
|
3 |
p. 171-182 |
artikel |
65 |
RV-TEE: secure cryptographic protocol execution based on runtime verification
|
Vella, Mark |
|
|
|
3 |
p. 229-248 |
artikel |
66 |
Secrets from the GPU
|
Mahé, Eric |
|
2014 |
|
3 |
p. 205-210 |
artikel |
67 |
Secure game development for IoT environment
|
MyounJae, Lee |
|
2015 |
|
3 |
p. 125-130 |
artikel |
68 |
Security of controlled manufacturing systems in the connected factory: the case of industrial robots
|
Pogliani, Marcello |
|
2019 |
|
3 |
p. 161-175 |
artikel |
69 |
Simple substitution distance and metamorphic detection
|
Shanmugam, Gayathri |
|
2013 |
|
3 |
p. 159-170 |
artikel |
70 |
Statically detecting use after free on binary code
|
Feist, Josselin |
|
2014 |
|
3 |
p. 211-217 |
artikel |
71 |
Study on model fostering for cloud service brokerage
|
Choi, Sung |
|
2015 |
|
3 |
p. 181-192 |
artikel |
72 |
Testing android malware detectors against code obfuscation: a systematization of knowledge and unified methodology
|
Preda, Mila Dalla |
|
2016 |
|
3 |
p. 209-232 |
artikel |
73 |
Text marking approach for data leakage prevention
|
Kozachok, A. V. |
|
2019 |
|
3 |
p. 219-232 |
artikel |
74 |
The blockchain potential in computer virology: leveraging combinatorial techniques of k-ary codes
|
Moubarak, Joanna |
|
|
|
3 |
p. 199-220 |
artikel |
75 |
The duplication issue within the Drebin dataset
|
Irolla, Paul |
|
2018 |
|
3 |
p. 245-249 |
artikel |
76 |
The Office Demon: Minos
|
Dechaux, Jonathan |
|
2013 |
|
3 |
p. 125-135 |
artikel |
77 |
The self modifying code (SMC)-aware processor (SAP): a security look on architectural impact and support
|
Botacin, Marcus |
|
|
|
3 |
p. 185-196 |
artikel |
78 |
Two-channel user authentication by using USB on Cloud
|
Hong, Sunghyuck |
|
2015 |
|
3 |
p. 137-143 |
artikel |
79 |
Undocumented x86 instructions to control the CPU at the microarchitecture level in modern Intel processors
|
Ermolov, Mark |
|
|
|
3 |
p. 351-365 |
artikel |
80 |
VILO: a rapid learning nearest-neighbor classifier for malware triage
|
Lakhotia, Arun |
|
2013 |
|
3 |
p. 109-123 |
artikel |
81 |
Vulnerabilities of intelligent automobiles using TPEG update based on T-DMB and its countermeasures
|
Kim, Jung-Hoon |
|
2015 |
|
3 |
p. 143-148 |
artikel |
82 |
XOR ciphers model and the attack to it
|
Babash, A. V. |
|
|
|
3 |
p. 275-283 |
artikel |
83 |
Zero knowledge proof and ZK-SNARK for private blockchains
|
Konkin, Anatoly |
|
|
|
3 |
p. 443-449 |
artikel |