Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-based certificate revocation management and status verification system Elloh Adja, Yves Christian

104 C p.
artikel
2 Achieving flatness: Graph labeling can generate graphical honeywords Tian, Yanzhao

104 C p.
artikel
3 ADS-B anomaly data detection model based on VAE-SVDD Luo, Peng

104 C p.
artikel
4 An efficient approach for taint analysis of android applications Zhang, Jie

104 C p.
artikel
5 An improved ShapeShifter method of generating adversarial examples for physical attacks on stop signs against Faster R-CNNs Huang, Shize

104 C p.
artikel
6 An IRL-based malware adversarial generation method to evade anti-malware engines Li, Xintong

104 C p.
artikel
7 A novel cryptosystem based on DNA cryptography and randomly generated mealy machine Pavithran, Pramod

104 C p.
artikel
8 A novel model for anomaly detection in network traffic based on kernel support vector machine Ma, Qian

104 C p.
artikel
9 A survey on wireless body area networks: architecture, security challenges and research opportunities Hajar, Muhammad Shadi

104 C p.
artikel
10 Comprehensive analysis of MQTT 5.0 susceptibility to network covert channels Mileva, Aleksandra

104 C p.
artikel
11 Deep learning for insider threat detection: Review, challenges and opportunities Yuan, Shuhan

104 C p.
artikel
12 Discovering group-based transnational cyber fraud actives: A polymethodological view Chen, Siqi

104 C p.
artikel
13 DNS covert channel detection method using the LSTM model Chen, Shaojie

104 C p.
artikel
14 Editorial Board
104 C p.
artikel
15 Examining the privacy paradox through individuals’ neural disposition in e-commerce: An exploratory neuroimaging study Mohammed, Zareef A.

104 C p.
artikel
16 Examining the role of stress and information security policy design in information security compliance behaviour: An experimental study of in-task behaviour Trang, Simon

104 C p.
artikel
17 Feature analysis for data-driven APT-related malware discrimination MartĂ­n Liras, Luis Francisco

104 C p.
artikel
18 FineFool: A novel DNN object contour attack on image recognition based on the attention perturbation adversarial technique Chen, Jinyin

104 C p.
artikel
19 Intelligent cyber-phishing detection for online Barraclough, P.A.

104 C p.
artikel
20 Intrusion detection systems for RPL security: A comparative analysis Simoglou, George

104 C p.
artikel
21 JSContana: Malicious JavaScript detection using adaptable context analysis and key feature extraction Huang, Yunhua

104 C p.
artikel
22 Network anomaly detection in a controlled environment based on an enhanced PSOGSARFC Boahen, Edward Kwadwo

104 C p.
artikel
23 NLP-based digital forensic investigation platform for online communications Sun, Dongming

104 C p.
artikel
24 Secure and privacy-preserving structure in opportunistic networks Rashidibajgan, Samaneh

104 C p.
artikel
25 Structural features with nonnegative matrix factorization for metamorphic malware detection Tyng Ling, Yeong

104 C p.
artikel
26 Study of network time synchronisation security strategy based on polar coding He, Ting

104 C p.
artikel
27 Team performance in a series of regional and national US cybersecurity defense competitions: Generalizable effects of training and functional role specialization La Fleur, Claire

104 C p.
artikel
28 Towards bidirectional LUT-level detection of hardware Trojans Cho, Mingi

104 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland