nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM
|
Liu, Jingmei |
|
|
106 |
C |
p. |
artikel |
2 |
A new WAF architecture with machine learning for resource-efficient use
|
Domingues Junior, Manoel |
|
|
106 |
C |
p. |
artikel |
3 |
A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling
|
Wang, Peng |
|
|
106 |
C |
p. |
artikel |
4 |
A novel workload scheduling framework for intrusion detection system in NFV scenario
|
Li, Chenxi |
|
|
106 |
C |
p. |
artikel |
5 |
A tripartite game model of trust cooperation in cloud service
|
Sun, Pan Jun |
|
|
106 |
C |
p. |
artikel |
6 |
AutoVAS: An automated vulnerability analysis system with a deep learning approach
|
Jeon, Sanghoon |
|
|
106 |
C |
p. |
artikel |
7 |
Challenges and pitfalls in malware research
|
Botacin, Marcus |
|
|
106 |
C |
p. |
artikel |
8 |
Decision tree pairwise metric learning against adversarial attacks
|
Appiah, Benjamin |
|
|
106 |
C |
p. |
artikel |
9 |
DeepStream: Autoencoder-based stream temporal clustering and anomaly detection
|
Harush, Shimon |
|
|
106 |
C |
p. |
artikel |
10 |
Differentially private graph publishing with degree distribution preservation
|
Zhang, Sen |
|
|
106 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
106 |
C |
p. |
artikel |
12 |
Enhancing employees information security awareness in private and public organisations: A systematic literature review
|
Khando, Khando |
|
|
106 |
C |
p. |
artikel |
13 |
GDroid: Android malware detection and classification with graph convolutional network
|
Gao, Han |
|
|
106 |
C |
p. |
artikel |
14 |
“Get a red-hot poker and open up my eyes, it's so boring”1: Employee perceptions of cybersecurity training
|
Reeves, A |
|
|
106 |
C |
p. |
artikel |
15 |
Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs
|
Bax, Samantha |
|
|
106 |
C |
p. |
artikel |
16 |
Mediating effects of information security awareness
|
van der Schyff, Karl |
|
|
106 |
C |
p. |
artikel |
17 |
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks
|
Aiken, William |
|
|
106 |
C |
p. |
artikel |
18 |
n -HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks
|
Mohanty, Susil Kumar |
|
|
106 |
C |
p. |
artikel |
19 |
Preserving indomitable DDoS vitality through resurrection social hybrid botnet
|
Chew, Chit-Jie |
|
|
106 |
C |
p. |
artikel |
20 |
Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation
|
Vrhovec, Simon |
|
|
106 |
C |
p. |
artikel |
21 |
Remote attestation and integrity measurements with Intel SGX for virtual machines
|
Kucab, Michał |
|
|
106 |
C |
p. |
artikel |
22 |
Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing
|
Xiang, Zhen |
|
|
106 |
C |
p. |
artikel |
23 |
Spam review detection using self-organizing maps and convolutional neural networks
|
Neisari, Ashraf |
|
|
106 |
C |
p. |
artikel |
24 |
Threat detection and investigation with system-level provenance graphs: A survey
|
Li, Zhenyuan |
|
|
106 |
C |
p. |
artikel |
25 |
Three decades of deception techniques in active cyber defense - Retrospect and outlook
|
Zhang, Li |
|
|
106 |
C |
p. |
artikel |
26 |
Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification
|
Cotroneo, Domenico |
|
|
106 |
C |
p. |
artikel |
27 |
Tor forensics: Proposed workflow for client memory artefacts
|
Alfosail, Malak |
|
|
106 |
C |
p. |
artikel |
28 |
Towards a framework for trustworthy data security level agreement in cloud procurement
|
Nugraha, Yudhistira |
|
|
106 |
C |
p. |
artikel |
29 |
Weighted distributed differential privacy ERM: Convex and non-convex
|
Kang, Yilin |
|
|
106 |
C |
p. |
artikel |