Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A design science approach to developing an integrated mobile app forensic framework Zhang, Xiaolu

105 C p.
artikel
2 A fine-grained classification and security analysis of web-based virtual machine vulnerabilities Yilmaz, Fadi

105 C p.
artikel
3 A first look into users’ perceptions of facial recognition in the physical world Seng, Sovantharith

105 C p.
artikel
4 A priority based path searching method for improving hybrid fuzzing Lin, Pei-hong

105 C p.
artikel
5 A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes Kanwal, Tehsin

105 C p.
artikel
6 BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature Zhijun, Wu

105 C p.
artikel
7 Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management Sarier, Neyire Deniz

105 C p.
artikel
8 Cybercrime threat intelligence: A systematic multi-vocal literature review Cascavilla, Giuseppe

105 C p.
artikel
9 Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic Lallie, Harjinder Singh

105 C p.
artikel
10 Cyber-threat perception and risk management in the Swedish financial sector Varga, Stefan

105 C p.
artikel
11 Data integrity auditing for secure cloud storage using user behavior prediction Tian, Junfeng

105 C p.
artikel
12 Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training KATSANTONIS, Menelaos N.

105 C p.
artikel
13 Detecting multi-stage attacks using sequence-to-sequence model Zhou, Peng

105 C p.
artikel
14 Dropping malware through sound injection: A comparative analysis on Android operating systems Stergiopoulos, George

105 C p.
artikel
15 Editorial Board
105 C p.
artikel
16 Evaluating privacy - determining user privacy expectations on the web Pilton, Callum

105 C p.
artikel
17 Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0 Ariffin, Khairul Akram Zainol

105 C p.
artikel
18 Knapsack graph-based privacy checking for smart environments Alom, Zulfikar

105 C p.
artikel
19 Malware detection employed by visualization and deep neural network Pinhero, Anson

105 C p.
artikel
20 On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms Yu, Lu

105 C p.
artikel
21 On the security of ANN-based AC state estimation in smart grid Liu, Tian

105 C p.
artikel
22 Optimal feature configuration for dynamic malware detection Escudero García, David

105 C p.
artikel
23 Optimized extreme learning machine for detecting DDoS attacks in cloud computing Kushwah, Gopal Singh

105 C p.
artikel
24 Resource allocation and trust computing for blockchain-enabled edge computing system Zhang, Lejun

105 C p.
artikel
25 SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space Liu, Ao

105 C p.
artikel
26 Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainty Adesemowo, A. Kayode

105 C p.
artikel
27 Towards an interpretable deep learning model for mobile malware detection and family identification Iadarola, Giacomo

105 C p.
artikel
28 2 Years in the anti-phishing group of a large company Gallo, Luigi

105 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland