nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Android security assessment: A review, taxonomy and research gap study
|
Garg, Shivi |
|
|
100 |
C |
p. |
artikel |
2 |
A novel architecture for web-based attack detection using convolutional neural network
|
Tekerek, Adem |
|
|
100 |
C |
p. |
artikel |
3 |
Applying social marketing to evaluate current security education training and awareness programs in organisations
|
Alshaikh, Moneer |
|
|
100 |
C |
p. |
artikel |
4 |
A security policy model transformation and verification approach for software defined networking
|
Meng, Yunfei |
|
|
100 |
C |
p. |
artikel |
5 |
A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities
|
Dabbagh, Mohammad |
|
|
100 |
C |
p. |
artikel |
6 |
A survey of machine learning techniques in adversarial image forensics
|
Nowroozi, Ehsan |
|
|
100 |
C |
p. |
artikel |
7 |
A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes
|
Subba, Basant |
|
|
100 |
C |
p. |
artikel |
8 |
Authenticity verification on social data outsourcing
|
Chen, Haowen |
|
|
100 |
C |
p. |
artikel |
9 |
Automating post-exploitation with deep reinforcement learning
|
Maeda, Ryusei |
|
|
100 |
C |
p. |
artikel |
10 |
Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage
|
Harsha, Benjamin |
|
|
100 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
100 |
C |
p. |
artikel |
12 |
Empirical analysis of transaction malleability within blockchain-based e-Voting
|
Khan, Kashif Mehboob |
|
|
100 |
C |
p. |
artikel |
13 |
EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds
|
Zulfiqar, Maryam |
|
|
100 |
C |
p. |
artikel |
14 |
Exploiting the MIL-STD-1553 avionic data bus with an active cyber device
|
De Santo, D. |
|
|
100 |
C |
p. |
artikel |
15 |
Extending critical infrastructure element longevity using constellation-based ID verification
|
Rondeau, Christopher M. |
|
|
100 |
C |
p. |
artikel |
16 |
JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters
|
Cai, Lingru |
|
|
100 |
C |
p. |
artikel |
17 |
Lattice based access control for protecting user data in cloud environments with hybrid security
|
Saravanan, N. |
|
|
100 |
C |
p. |
artikel |
18 |
Low-rate DDoS attacks detection method using data compression and behavior divergence measurement
|
Liu, Xinqian |
|
|
100 |
C |
p. |
artikel |
19 |
Mask-guided noise restriction adversarial attacks for image classification
|
Duan, Yexin |
|
|
100 |
C |
p. |
artikel |
20 |
Mining frequent pyramid patterns from time series transaction data with custom constraints
|
Wang, Wei |
|
|
100 |
C |
p. |
artikel |
21 |
Onlooker effect and affective responses in information security violation mitigation
|
Farshadkhah, Sahar |
|
|
100 |
C |
p. |
artikel |
22 |
Optimized and robust implementation of mobile networks confidentiality and integrity functions
|
Madani, Mahdi |
|
|
100 |
C |
p. |
artikel |
23 |
Reviewer Acknowledgement 2020
|
|
|
|
100 |
C |
p. |
artikel |
24 |
Robust source camera identification against adversarial attacks
|
Lin, Hui |
|
|
100 |
C |
p. |
artikel |
25 |
Smartphone speech privacy concerns from side-channel attacks on facial biomechanics
|
Griswold-Steiner, Isaac |
|
|
100 |
C |
p. |
artikel |
26 |
Source camera identification for re-compressed images: A model perspective based on tri-transfer learning
|
Zhang, Guowen |
|
|
100 |
C |
p. |
artikel |
27 |
The cybersecurity workforce and skills
|
Furnell, Steven |
|
|
100 |
C |
p. |
artikel |
28 |
Towards multi-operation image anti-forensics with generative adversarial networks
|
Wu, Jianyuan |
|
|
100 |
C |
p. |
artikel |
29 |
Towards security-Aware 5G slice embedding
|
Jmila, Houda |
|
|
100 |
C |
p. |
artikel |
30 |
Using IRP and local alignment method to detect distributed malware
|
Dai, Yusheng |
|
|
100 |
C |
p. |
artikel |