nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A design science approach to developing an integrated mobile app forensic framework
|
Zhang, Xiaolu |
|
|
105 |
C |
p. |
artikel |
2 |
A fine-grained classification and security analysis of web-based virtual machine vulnerabilities
|
Yilmaz, Fadi |
|
|
105 |
C |
p. |
artikel |
3 |
A first look into users’ perceptions of facial recognition in the physical world
|
Seng, Sovantharith |
|
|
105 |
C |
p. |
artikel |
4 |
A priority based path searching method for improving hybrid fuzzing
|
Lin, Pei-hong |
|
|
105 |
C |
p. |
artikel |
5 |
A robust privacy preserving approach for electronic health records using multiple dataset with multiple sensitive attributes
|
Kanwal, Tehsin |
|
|
105 |
C |
p. |
artikel |
6 |
BD-D1Sec: Protocol of security authentication for BeiDou D1 civil navigation message based on certificateless signature
|
Zhijun, Wu |
|
|
105 |
C |
p. |
artikel |
7 |
Comments on biometric-based non-transferable credentials and their application in blockchain-based identity management
|
Sarier, Neyire Deniz |
|
|
105 |
C |
p. |
artikel |
8 |
Cybercrime threat intelligence: A systematic multi-vocal literature review
|
Cascavilla, Giuseppe |
|
|
105 |
C |
p. |
artikel |
9 |
Cyber security in the age of COVID-19: A timeline and analysis of cyber-crime and cyber-attacks during the pandemic
|
Lallie, Harjinder Singh |
|
|
105 |
C |
p. |
artikel |
10 |
Cyber-threat perception and risk management in the Swedish financial sector
|
Varga, Stefan |
|
|
105 |
C |
p. |
artikel |
11 |
Data integrity auditing for secure cloud storage using user behavior prediction
|
Tian, Junfeng |
|
|
105 |
C |
p. |
artikel |
12 |
Design and Evaluation of COFELET-based Approaches for Cyber Security Learning and Training
|
KATSANTONIS, Menelaos N. |
|
|
105 |
C |
p. |
artikel |
13 |
Detecting multi-stage attacks using sequence-to-sequence model
|
Zhou, Peng |
|
|
105 |
C |
p. |
artikel |
14 |
Dropping malware through sound injection: A comparative analysis on Android operating systems
|
Stergiopoulos, George |
|
|
105 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
105 |
C |
p. |
artikel |
16 |
Evaluating privacy - determining user privacy expectations on the web
|
Pilton, Callum |
|
|
105 |
C |
p. |
artikel |
17 |
Indicators for maturity and readiness for digital forensic investigation in era of industrial revolution 4.0
|
Ariffin, Khairul Akram Zainol |
|
|
105 |
C |
p. |
artikel |
18 |
Knapsack graph-based privacy checking for smart environments
|
Alom, Zulfikar |
|
|
105 |
C |
p. |
artikel |
19 |
Malware detection employed by visualization and deep neural network
|
Pinhero, Anson |
|
|
105 |
C |
p. |
artikel |
20 |
On accuracy and anonymity of privacy-preserving negative survey (NS) algorithms
|
Yu, Lu |
|
|
105 |
C |
p. |
artikel |
21 |
On the security of ANN-based AC state estimation in smart grid
|
Liu, Tian |
|
|
105 |
C |
p. |
artikel |
22 |
Optimal feature configuration for dynamic malware detection
|
Escudero García, David |
|
|
105 |
C |
p. |
artikel |
23 |
Optimized extreme learning machine for detecting DDoS attacks in cloud computing
|
Kushwah, Gopal Singh |
|
|
105 |
C |
p. |
artikel |
24 |
Resource allocation and trust computing for blockchain-enabled edge computing system
|
Zhang, Lejun |
|
|
105 |
C |
p. |
artikel |
25 |
SFE-GACN: A novel unknown attack detection under insufficient data via intra categories generation in embedding space
|
Liu, Ao |
|
|
105 |
C |
p. |
artikel |
26 |
Towards a conceptual definition for IT assets through interrogating their nature and epistemic uncertainty
|
Adesemowo, A. Kayode |
|
|
105 |
C |
p. |
artikel |
27 |
Towards an interpretable deep learning model for mobile malware detection and family identification
|
Iadarola, Giacomo |
|
|
105 |
C |
p. |
artikel |
28 |
2 Years in the anti-phishing group of a large company
|
Gallo, Luigi |
|
|
105 |
C |
p. |
artikel |