nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An application specific dynamic behaviour model using function-call sequence and memory access-graph for execution integrity verification
|
Dileesh, E.D. |
|
|
107 |
C |
p. |
artikel |
2 |
Assessing IoT enabled cyber-physical attack paths against critical systems
|
Stellios, Ioannis |
|
|
107 |
C |
p. |
artikel |
3 |
Differentially private GANs by adding noise to Discriminator’s loss
|
Han, Chunling |
|
|
107 |
C |
p. |
artikel |
4 |
Editorial Board
|
|
|
|
107 |
C |
p. |
artikel |
5 |
EnsembleFool: A method to generate adversarial examples based on model fusion strategy
|
Peng, Wenyu |
|
|
107 |
C |
p. |
artikel |
6 |
Formal modelling and security analysis of Bitcoin’s payment protocol
|
Modesti, Paolo |
|
|
107 |
C |
p. |
artikel |
7 |
How to implement secure cloud file sharing using optimized attribute-based access control with small policy matrix and minimized cumulative errors
|
Chen, E |
|
|
107 |
C |
p. |
artikel |
8 |
Joint obfuscation of location and its semantic information for privacy protection
|
Bostanipour, Behnaz |
|
|
107 |
C |
p. |
artikel |
9 |
Multifractal detrended fluctuation analysis based detection for SYN flooding attack
|
Nashat, Dalia |
|
|
107 |
C |
p. |
artikel |
10 |
Network-based multidimensional moving target defense against false data injection attack in power system
|
Hu, Yifan |
|
|
107 |
C |
p. |
artikel |
11 |
Spider bird swarm algorithm with deep belief network for malicious JavaScript detection
|
Alex, Scaria |
|
|
107 |
C |
p. |
artikel |
12 |
Using alternate reality games to find a needle in a haystack: An approach for testing insider threat detection methods
|
Wasko, Shannon |
|
|
107 |
C |
p. |
artikel |
13 |
Website categorization via design attribute learning
|
Cohen, Doron |
|
|
107 |
C |
p. |
artikel |