Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             30 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Android security assessment: A review, taxonomy and research gap study Garg, Shivi

100 C p.
artikel
2 A novel architecture for web-based attack detection using convolutional neural network Tekerek, Adem

100 C p.
artikel
3 Applying social marketing to evaluate current security education training and awareness programs in organisations Alshaikh, Moneer

100 C p.
artikel
4 A security policy model transformation and verification approach for software defined networking Meng, Yunfei

100 C p.
artikel
5 A survey of empirical performance evaluation of permissioned blockchain platforms: Challenges and opportunities Dabbagh, Mohammad

100 C p.
artikel
6 A survey of machine learning techniques in adversarial image forensics Nowroozi, Ehsan

100 C p.
artikel
7 A tfidfvectorizer and singular value decomposition based host intrusion detection system framework for detecting anomalous system processes Subba, Basant

100 C p.
artikel
8 Authenticity verification on social data outsourcing Chen, Haowen

100 C p.
artikel
9 Automating post-exploitation with deep reinforcement learning Maeda, Ryusei

100 C p.
artikel
10 Bicycle attacks considered harmful: Quantifying the damage of widespread password length leakage Harsha, Benjamin

100 C p.
artikel
11 Editorial Board
100 C p.
artikel
12 Empirical analysis of transaction malleability within blockchain-based e-Voting Khan, Kashif Mehboob

100 C p.
artikel
13 EthReview: An Ethereum-based Product Review System for Mitigating Rating Frauds Zulfiqar, Maryam

100 C p.
artikel
14 Exploiting the MIL-STD-1553 avionic data bus with an active cyber device De Santo, D.

100 C p.
artikel
15 Extending critical infrastructure element longevity using constellation-based ID verification Rondeau, Christopher M.

100 C p.
artikel
16 JOWMDroid: Android malware detection based on feature weighting with joint optimization of weight-mapping and classifier parameters Cai, Lingru

100 C p.
artikel
17 Lattice based access control for protecting user data in cloud environments with hybrid security Saravanan, N.

100 C p.
artikel
18 Low-rate DDoS attacks detection method using data compression and behavior divergence measurement Liu, Xinqian

100 C p.
artikel
19 Mask-guided noise restriction adversarial attacks for image classification Duan, Yexin

100 C p.
artikel
20 Mining frequent pyramid patterns from time series transaction data with custom constraints Wang, Wei

100 C p.
artikel
21 Onlooker effect and affective responses in information security violation mitigation Farshadkhah, Sahar

100 C p.
artikel
22 Optimized and robust implementation of mobile networks confidentiality and integrity functions Madani, Mahdi

100 C p.
artikel
23 Reviewer Acknowledgement 2020
100 C p.
artikel
24 Robust source camera identification against adversarial attacks Lin, Hui

100 C p.
artikel
25 Smartphone speech privacy concerns from side-channel attacks on facial biomechanics Griswold-Steiner, Isaac

100 C p.
artikel
26 Source camera identification for re-compressed images: A model perspective based on tri-transfer learning Zhang, Guowen

100 C p.
artikel
27 The cybersecurity workforce and skills Furnell, Steven

100 C p.
artikel
28 Towards multi-operation image anti-forensics with generative adversarial networks Wu, Jianyuan

100 C p.
artikel
29 Towards security-Aware 5G slice embedding Jmila, Houda

100 C p.
artikel
30 Using IRP and local alignment method to detect distributed malware Dai, Yusheng

100 C p.
artikel
                             30 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland