Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A multidisciplinary approach to Internet of Things (IoT) cybersecurity and risk management Choo, Kim-Kwang Raymond

102 C p.
artikel
2 An immune-based risk assessment method for digital virtual assets He, Junjiang

102 C p.
artikel
3 A novel combinatorial optimization based feature selection method for network intrusion detection Nazir, Anjum

102 C p.
artikel
4 A tree structure-based improved blockchain framework for a secure online bidding system Sarfaraz, Aaliya

102 C p.
artikel
5 Auditing static machine learning anti-Malware tools against metamorphic attacks Gibert, Daniel

102 C p.
artikel
6 Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning Zhao, Jun

102 C p.
artikel
7 Availability analysis of a permissioned blockchain with a lightweight consensus protocol Altarawneh, Amani

102 C p.
artikel
8 Continuous auditing and threat detection in multi-cloud infrastructure Torkura, K.A.

102 C p.
artikel
9 Cost-based recommendation of parameters for local differentially private data aggregation Shahani, Snehkumar

102 C p.
artikel
10 Cybersecurity knowledge and skills taught in capture the flag challenges Švábenský, Valdemar

102 C p.
artikel
11 Cyber terrorism: A homogenized taxonomy and definition Plotnek, Jordan J.

102 C p.
artikel
12 Detecting firmware modification on solid state drives via current draw analysis Brown, Dane

102 C p.
artikel
13 Editorial Board
102 C p.
artikel
14 Evaluating the effectiveness of shuffle and redundancy MTD techniques in the cloud Alavizadeh, Hooman

102 C p.
artikel
15 Exsense: Extract sensitive information from unstructured data Guo, Yongyan

102 C p.
artikel
16 Investigating the effect of security and privacy on IoT device purchase behaviour Ho-Sam-Sooi, Nick

102 C p.
artikel
17 MARISMA-BiDa pattern: Integrated risk analysis for big data Rosado, David G.

102 C p.
artikel
18 MASA: An efficient framework for anomaly detection in multi-attributed networks Shao, Minglai

102 C p.
artikel
19 Mind control attack: Undermining deep learning with GPU memory exploitation Park, Sang-Ok

102 C p.
artikel
20 Preventing time synchronization in NTP broadcast mode Tripathi, Nikhil

102 C p.
artikel
21 Quantitative cyber-physical security analysis methodology for industrial control systems based on incomplete information Bayesian game Liu, Xiaoxue

102 C p.
artikel
22 Random CapsNet forest model for imbalanced malware type classification task Çayır, Aykut

102 C p.
artikel
23 Resilient real-time network anomaly detection using novel non-parametric statistical tests Bollmann, Chad A.

102 C p.
artikel
24 RNNIDS: Enhancing network intrusion detection systems through deep learning Sohi, Soroush M.

102 C p.
artikel
25 Security and privacy of the Internet of Things Strous, Leon

102 C p.
artikel
26 SG-PAC: A stochastic game approach to generate personal privacy paradox access-control policies in social networks Wu, Yu

102 C p.
artikel
27 Temporal pattern-based malicious activity detection in SCADA systems Shlomo, Amit

102 C p.
artikel
28 Universal location referencing and homomorphic evaluation of geospatial query Aloufi, Asma

102 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland