Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             29 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A fast network intrusion detection system using adaptive synthetic oversampling and LightGBM Liu, Jingmei

106 C p.
artikel
2 A new WAF architecture with machine learning for resource-efficient use Domingues Junior, Manoel

106 C p.
artikel
3 A novel few-shot malware classification approach for unknown family recognition with multi-prototype modeling Wang, Peng

106 C p.
artikel
4 A novel workload scheduling framework for intrusion detection system in NFV scenario Li, Chenxi

106 C p.
artikel
5 A tripartite game model of trust cooperation in cloud service Sun, Pan Jun

106 C p.
artikel
6 AutoVAS: An automated vulnerability analysis system with a deep learning approach Jeon, Sanghoon

106 C p.
artikel
7 Challenges and pitfalls in malware research Botacin, Marcus

106 C p.
artikel
8 Decision tree pairwise metric learning against adversarial attacks Appiah, Benjamin

106 C p.
artikel
9 DeepStream: Autoencoder-based stream temporal clustering and anomaly detection Harush, Shimon

106 C p.
artikel
10 Differentially private graph publishing with degree distribution preservation Zhang, Sen

106 C p.
artikel
11 Editorial Board
106 C p.
artikel
12 Enhancing employees information security awareness in private and public organisations: A systematic literature review Khando, Khando

106 C p.
artikel
13 GDroid: Android malware detection and classification with graph convolutional network Gao, Han

106 C p.
artikel
14 “Get a red-hot poker and open up my eyes, it's so boring”1: Employee perceptions of cybersecurity training Reeves, A

106 C p.
artikel
15 Maladaptive behaviour in response to email phishing threats: The roles of rewards and response costs Bax, Samantha

106 C p.
artikel
16 Mediating effects of information security awareness van der Schyff, Karl

106 C p.
artikel
17 Neural network laundering: Removing black-box backdoor watermarks from deep neural networks Aiken, William

106 C p.
artikel
18 n -HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks Mohanty, Susil Kumar

106 C p.
artikel
19 Preserving indomitable DDoS vitality through resurrection social hybrid botnet Chew, Chit-Jie

106 C p.
artikel
20 Redefining threat appraisals of organizational insiders and exploring the moderating role of fear in cyberattack protection motivation Vrhovec, Simon

106 C p.
artikel
21 Remote attestation and integrity measurements with Intel SGX for virtual machines Kucab, Michał

106 C p.
artikel
22 Reverse engineering imperceptible backdoor attacks on deep neural networks for detection and training set cleansing Xiang, Zhen

106 C p.
artikel
23 Spam review detection using self-organizing maps and convolutional neural networks Neisari, Ashraf

106 C p.
artikel
24 Threat detection and investigation with system-level provenance graphs: A survey Li, Zhenyuan

106 C p.
artikel
25 Three decades of deception techniques in active cyber defense - Retrospect and outlook Zhang, Li

106 C p.
artikel
26 Timing covert channel analysis of the VxWorks MILS embedded hypervisor under the common criteria security certification Cotroneo, Domenico

106 C p.
artikel
27 Tor forensics: Proposed workflow for client memory artefacts Alfosail, Malak

106 C p.
artikel
28 Towards a framework for trustworthy data security level agreement in cloud procurement Nugraha, Yudhistira

106 C p.
artikel
29 Weighted distributed differential privacy ERM: Convex and non-convex Kang, Yilin

106 C p.
artikel
                             29 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland