Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             39 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ActID: An efficient framework for activity sensor based user identification Sudhakar, Sai Ram Vallam

108 C p.
artikel
2 Adopting automated whitelist approach for detecting phishing attacks Azeez, Nureni Ayofe

108 C p.
artikel
3 A Field-Sensitive Security Monitor for Object-Oriented Programs Khakpour, Narges

108 C p.
artikel
4 An approach to detect user behaviour anomalies within identity federations Martín, Alejandro G.

108 C p.
artikel
5 An empirical analysis of the information security culture key factors framework Tolah, Alaa

108 C p.
artikel
6 A network-independent tool-based usable authentication system for Internet of Things devices Jung, Changhun

108 C p.
artikel
7 A personalized trajectory privacy protection method Li, Jiachun

108 C p.
artikel
8 A secure Device-to-Device communication scheme for massive Machine Type Communication Roychoudhury, Probidita

108 C p.
artikel
9 A security type verifier for smart contracts Hu, Xinwen

108 C p.
artikel
10 A Tokenless Cancellable Scheme for Multimodal Biometric Systems Lee, Ming Jie

108 C p.
artikel
11 Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks Topping, Colin

108 C p.
artikel
12 Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services Olakanmi, Oladayo Olufemi

108 C p.
artikel
13 Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness Ho, Shuyuan Mary

108 C p.
artikel
14 Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data Catillo, Marta

108 C p.
artikel
15 Differential area analysis for ransomware attack detection within mixed file datasets Davies, Simon R.

108 C p.
artikel
16 Editorial Board
108 C p.
artikel
17 Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity Ogbanufe, Obi

108 C p.
artikel
18 FogHA: An efficient handover authentication for mobile devices in fog computing Guo, Yimin

108 C p.
artikel
19 FUZZOLIC: Mixing fuzzing and concolic execution Borzacchiello, Luca

108 C p.
artikel
20 HAN-BSVD: A hierarchical attention network for binary software vulnerability detection Yan, Han

108 C p.
artikel
21 Handling webshell attacks: A systematic mapping and survey Hannousse, Abdelhakim

108 C p.
artikel
22 Hardening cryptographic operations through the use of secure enclaves Brandão, André

108 C p.
artikel
23 Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks Anthi, Eirini

108 C p.
artikel
24 I-MAD: Interpretable malware detector using Galaxy Transformer Li, Miles Q.

108 C p.
artikel
25 Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges Ali, Mansoor

108 C p.
artikel
26 LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA) Shah, Syed W.

108 C p.
artikel
27 Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation Lin, Jing

108 C p.
artikel
28 Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities Schmitz, Christopher

108 C p.
artikel
29 Microscopic printing analysis and application for classification of source printer Nguyen, Quoc-Thông

108 C p.
artikel
30 Modeling social worm propagation for advanced persistent threats Zhou, Peng

108 C p.
artikel
31 Nudging users towards online safety using gamified environments Petrykina, Yelena

108 C p.
artikel
32 Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model Tan, Jinglei

108 C p.
artikel
33 Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets Xiao, Xi

108 C p.
artikel
34 Review of cybersecurity assessment methods: Applicability perspective Leszczyna, Rafał

108 C p.
artikel
35 SealFS: Storage-based tamper-evident logging Soriano-Salvador, Enrique

108 C p.
artikel
36 Securing smart healthcare system with edge computing Singh, Ashish

108 C p.
artikel
37 Security of the digital transformation Shahim, Abbas

108 C p.
artikel
38 Towards asynchronous federated learning based threat detection: A DC-Adam approach Tian, Pu

108 C p.
artikel
39 Waste not: Using diverse neural networks from hyperparameter search for improved malware detection Marques, Pedro

108 C p.
artikel
                             39 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland