Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accelerating hardware security verification and vulnerability detection through state space reduction Shen, Lixiang

103 C p.
artikel
2 A cloud endpoint coordinating CAPTCHA based on multi-view stacking ensemble Ouyang, Zhiyou

103 C p.
artikel
3 A Formal Approach to Network Segmentation Mhaskar, Neerja

103 C p.
artikel
4 A lightweight privacy-preserving and sharing scheme with dual-blockchain for intelligent pricing system of smart grid Li, Kunchang

103 C p.
artikel
5 An effective intrusion detection approach using SVM with naïve Bayes feature embedding Gu, Jie

103 C p.
artikel
6 A secure routing scheme to mitigate attack in wireless adhoc sensor network R, Isaac Sajan

103 C p.
artikel
7 AuthCODE: A privacy-preserving and multi-device continuous authentication architecture based on machine and deep learning Sánchez Sánchez, Pedro Miguel

103 C p.
artikel
8 Catch them alive: A malware detection approach through memory forensics, manifold learning and computer vision Bozkir, Ahmet Selman

103 C p.
artikel
9 Certificateless multi-replica public integrity auditing scheme for dynamic shared data in cloud storage Gudeme, Jaya Rao

103 C p.
artikel
10 Challenge-response mutual authentication protocol for EMV contactless cards Al-Maliki, Ossama

103 C p.
artikel
11 Cybersecurity for autonomous vehicles: Review of attacks and defense Kim, Kyounggon

103 C p.
artikel
12 Cyber security risk assessment for seaports: A case study of a container port Gunes, Bunyamin

103 C p.
artikel
13 Data sequence signal manipulation in multipath TCP (MPTCP): The vulnerability, attack and its detection Kumar, V Anil

103 C p.
artikel
14 Data tag replacement algorithm for data integrity verification in cloud storage Xu, Guangwei

103 C p.
artikel
15 Defending wireless communication against eavesdropping attacks using secret spreading codes and artificial interference Wang, Qinghua

103 C p.
artikel
16 Discovering reflected cross-site scripting vulnerabilities using a multiobjective reinforcement learning environment Caturano, Francesco

103 C p.
artikel
17 Editorial Board
103 C p.
artikel
18 Hardware-based solutions for trusted cloud computing Demigha, Oualid

103 C p.
artikel
19 Intrusion detection methods based on integrated deep learning model Wang, Zhendong

103 C p.
artikel
20 Privacy-preserving and communication-efficient federated learning in Internet of Things Fang, Chen

103 C p.
artikel
21 SecTEP: Enabling secure tender evaluation with sealed prices and quality evaluation in procurement bidding systems over blockchain Li, Li

103 C p.
artikel
22 Security in microservice-based systems: A Multivocal literature review Pereira-Vale, Anelis

103 C p.
artikel
23 Superword: A honeyword system for achieving higher security goals Guo, Yimin

103 C p.
artikel
24 “Talking a different Language”: Anticipating adversary attack cost for cyber risk assessment Derbyshire, Richard

103 C p.
artikel
25 Towards GDPR-compliant data processing in modern SIEM systems Menges, Florian

103 C p.
artikel
26 Utilizing binary code to improve usability of pressure-based authentication Meng, Zhangyu

103 C p.
artikel
27 You Shall not Repackage! Demystifying Anti-Repackaging on Android Merlo, Alessio

103 C p.
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland