nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management
|
Choo, Kim-Kwang Raymond |
|
|
102 |
C |
p. |
artikel |
2 |
An immune-based risk assessment method for digital virtual assets
|
He, Junjiang |
|
|
102 |
C |
p. |
artikel |
3 |
A novel combinatorial optimization based feature selection method for network intrusion detection
|
Nazir, Anjum |
|
|
102 |
C |
p. |
artikel |
4 |
A tree structure-based improved blockchain framework for a secure online bidding system
|
Sarfaraz, Aaliya |
|
|
102 |
C |
p. |
artikel |
5 |
Auditing static machine learning anti-Malware tools against metamorphic attacks
|
Gibert, Daniel |
|
|
102 |
C |
p. |
artikel |
6 |
Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning
|
Zhao, Jun |
|
|
102 |
C |
p. |
artikel |
7 |
Availability analysis of a permissioned blockchain with a lightweight consensus protocol
|
Altarawneh, Amani |
|
|
102 |
C |
p. |
artikel |
8 |
Continuous auditing and threat detection in multi-cloud infrastructure
|
Torkura, K.A. |
|
|
102 |
C |
p. |
artikel |
9 |
Cost-based recommendation of parameters for local differentially private data aggregation
|
Shahani, Snehkumar |
|
|
102 |
C |
p. |
artikel |
10 |
Cybersecurity knowledge and skills taught in capture the flag challenges
|
Švábenský, Valdemar |
|
|
102 |
C |
p. |
artikel |
11 |
Cyber terrorism: A homogenized taxonomy and definition
|
Plotnek, Jordan J. |
|
|
102 |
C |
p. |
artikel |
12 |
Detecting firmware modification on solid state drives via current draw analysis
|
Brown, Dane |
|
|
102 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
102 |
C |
p. |
artikel |
14 |
Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud
|
Alavizadeh, Hooman |
|
|
102 |
C |
p. |
artikel |
15 |
Exsense: Extract sensitive information from unstructured data
|
Guo, Yongyan |
|
|
102 |
C |
p. |
artikel |
16 |
Investigating the effect of security and privacy on IoT device purchase behaviour
|
Ho-Sam-Sooi, Nick |
|
|
102 |
C |
p. |
artikel |
17 |
MARISMA-BiDa pattern: Integrated risk analysis for big data
|
Rosado, David G. |
|
|
102 |
C |
p. |
artikel |
18 |
MASA: An efficient framework for anomaly detection in multi-attributed networks
|
Shao, Minglai |
|
|
102 |
C |
p. |
artikel |
19 |
Mind control attack: Undermining deep learning with GPU memory exploitation
|
Park, Sang-Ok |
|
|
102 |
C |
p. |
artikel |
20 |
Preventing time synchronization in NTP broadcast mode
|
Tripathi, Nikhil |
|
|
102 |
C |
p. |
artikel |
21 |
Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game
|
Liu, Xiaoxue |
|
|
102 |
C |
p. |
artikel |
22 |
Random CapsNet forest model for imbalanced malware type classification task
|
Çayır, Aykut |
|
|
102 |
C |
p. |
artikel |
23 |
Resilient real-time network anomaly detection using novel non-parametric statistical tests
|
Bollmann, Chad A. |
|
|
102 |
C |
p. |
artikel |
24 |
RNNIDS: Enhancing network intrusion detection systems through deep learning
|
Sohi, Soroush M. |
|
|
102 |
C |
p. |
artikel |
25 |
Security and privacy of the Internet of Things
|
Strous, Leon |
|
|
102 |
C |
p. |
artikel |
26 |
SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks
|
Wu, Yu |
|
|
102 |
C |
p. |
artikel |
27 |
Temporal pattern-based malicious activity detection in SCADA systems
|
Shlomo, Amit |
|
|
102 |
C |
p. |
artikel |
28 |
Universal location referencing and homomorphic evaluation of geospatial query
|
Aloufi, Asma |
|
|
102 |
C |
p. |
artikel |