nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accelerating hardware security verification and vulnerability detection through state space reduction
|
Shen, Lixiang |
|
|
103 |
C |
p. |
artikel |
2 |
A cloud endpoint coordinating CAPTCHA based on multi-view stacking ensemble
|
Ouyang, Zhiyou |
|
|
103 |
C |
p. |
artikel |
3 |
A Formal Approach to Network Segmentation
|
Mhaskar, Neerja |
|
|
103 |
C |
p. |
artikel |
4 |
A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid
|
Li, Kunchang |
|
|
103 |
C |
p. |
artikel |
5 |
An effective intrusion detection approach using SVM with naïve Bayes feature embedding
|
Gu, Jie |
|
|
103 |
C |
p. |
artikel |
6 |
A secure routing scheme to mitigate attack in wireless adhoc sensor network
|
R, Isaac Sajan |
|
|
103 |
C |
p. |
artikel |
7 |
AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning
|
Sánchez Sánchez, Pedro Miguel |
|
|
103 |
C |
p. |
artikel |
8 |
Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision
|
Bozkir, Ahmet Selman |
|
|
103 |
C |
p. |
artikel |
9 |
Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage
|
Gudeme, Jaya Rao |
|
|
103 |
C |
p. |
artikel |
10 |
Challenge-response mutual authentication protocol for EMV contactless cards
|
Al-Maliki, Ossama |
|
|
103 |
C |
p. |
artikel |
11 |
Cybersecurity for autonomous vehicles: Review of attacks and defense
|
Kim, Kyounggon |
|
|
103 |
C |
p. |
artikel |
12 |
Cyber security risk assessment for seaports: A case study of a container port
|
Gunes, Bunyamin |
|
|
103 |
C |
p. |
artikel |
13 |
Data sequence signal manipulation in multipath TCP (MPTCP): The vulnerability, attack and its detection
|
Kumar, V Anil |
|
|
103 |
C |
p. |
artikel |
14 |
Data tag replacement algorithm for data integrity verification in cloud storage
|
Xu, Guangwei |
|
|
103 |
C |
p. |
artikel |
15 |
Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference
|
Wang, Qinghua |
|
|
103 |
C |
p. |
artikel |
16 |
Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment
|
Caturano, Francesco |
|
|
103 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
103 |
C |
p. |
artikel |
18 |
Hardware-based solutions for trusted cloud computing
|
Demigha, Oualid |
|
|
103 |
C |
p. |
artikel |
19 |
Intrusion detection methods based on integrated deep learning model
|
Wang, Zhendong |
|
|
103 |
C |
p. |
artikel |
20 |
Privacy-preserving and communication-efficient federated learning in Internet of Things
|
Fang, Chen |
|
|
103 |
C |
p. |
artikel |
21 |
SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain
|
Li, Li |
|
|
103 |
C |
p. |
artikel |
22 |
Security in microservice-based systems: A Multivocal literature review
|
Pereira-Vale, Anelis |
|
|
103 |
C |
p. |
artikel |
23 |
Superword: A honeyword system for achieving higher security goals
|
Guo, Yimin |
|
|
103 |
C |
p. |
artikel |
24 |
“Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment
|
Derbyshire, Richard |
|
|
103 |
C |
p. |
artikel |
25 |
Towards GDPR-compliant data processing in modern SIEM systems
|
Menges, Florian |
|
|
103 |
C |
p. |
artikel |
26 |
Utilizing binary code to improve usability of pressure-based authentication
|
Meng, Zhangyu |
|
|
103 |
C |
p. |
artikel |
27 |
You Shall not Repackage! Demystifying Anti-Repackaging on Android
|
Merlo, Alessio |
|
|
103 |
C |
p. |
artikel |