nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-based certificate revocation management and status verification system
|
Elloh Adja, Yves Christian |
|
|
104 |
C |
p. |
artikel |
2 |
Achieving flatness: Graph labeling can generate graphical honeywords
|
Tian, Yanzhao |
|
|
104 |
C |
p. |
artikel |
3 |
ADS-B anomaly data detection model based on VAE-SVDD
|
Luo, Peng |
|
|
104 |
C |
p. |
artikel |
4 |
An efficient approach for taint analysis of android applications
|
Zhang, Jie |
|
|
104 |
C |
p. |
artikel |
5 |
An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs
|
Huang, Shize |
|
|
104 |
C |
p. |
artikel |
6 |
An IRL-based malware adversarial generation method to evade anti-malware engines
|
Li, Xintong |
|
|
104 |
C |
p. |
artikel |
7 |
A novel cryptosystem based on DNA cryptography and randomly generated mealy machine
|
Pavithran, Pramod |
|
|
104 |
C |
p. |
artikel |
8 |
A novel model for anomaly detection in network traffic based on kernel support vector machine
|
Ma, Qian |
|
|
104 |
C |
p. |
artikel |
9 |
A survey on wireless body area networks: architecture, security challenges and research opportunities
|
Hajar, Muhammad Shadi |
|
|
104 |
C |
p. |
artikel |
10 |
Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels
|
Mileva, Aleksandra |
|
|
104 |
C |
p. |
artikel |
11 |
Deep learning for insider threat detection: Review, challenges and opportunities
|
Yuan, Shuhan |
|
|
104 |
C |
p. |
artikel |
12 |
Discovering group-based transnational cyber fraud actives: A polymethodological view
|
Chen, Siqi |
|
|
104 |
C |
p. |
artikel |
13 |
DNS covert channel detection method using the LSTM model
|
Chen, Shaojie |
|
|
104 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
104 |
C |
p. |
artikel |
15 |
Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study
|
Mohammed, Zareef A. |
|
|
104 |
C |
p. |
artikel |
16 |
Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour
|
Trang, Simon |
|
|
104 |
C |
p. |
artikel |
17 |
Feature analysis for data-driven APT-related malware discrimination
|
MartĂn Liras, Luis Francisco |
|
|
104 |
C |
p. |
artikel |
18 |
FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique
|
Chen, Jinyin |
|
|
104 |
C |
p. |
artikel |
19 |
Intelligent cyber-phishing detection for online
|
Barraclough, P.A. |
|
|
104 |
C |
p. |
artikel |
20 |
Intrusion detection systems for RPL security: A comparative analysis
|
Simoglou, George |
|
|
104 |
C |
p. |
artikel |
21 |
JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction
|
Huang, Yunhua |
|
|
104 |
C |
p. |
artikel |
22 |
Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC
|
Boahen, Edward Kwadwo |
|
|
104 |
C |
p. |
artikel |
23 |
NLP-based digital forensic investigation platform for online communications
|
Sun, Dongming |
|
|
104 |
C |
p. |
artikel |
24 |
Secure and privacy-preserving structure in opportunistic networks
|
Rashidibajgan, Samaneh |
|
|
104 |
C |
p. |
artikel |
25 |
Structural features with nonnegative matrix factorization for metamorphic malware detection
|
Tyng Ling, Yeong |
|
|
104 |
C |
p. |
artikel |
26 |
Study of network time synchronisation security strategy based on polar coding
|
He, Ting |
|
|
104 |
C |
p. |
artikel |
27 |
Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization
|
La Fleur, Claire |
|
|
104 |
C |
p. |
artikel |
28 |
Towards bidirectional LUT-level detection of hardware Trojans
|
Cho, Mingi |
|
|
104 |
C |
p. |
artikel |