nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ActID: An efficient framework for activity sensor based user identification
|
Sudhakar, Sai Ram Vallam |
|
|
108 |
C |
p. |
artikel |
2 |
Adopting automated whitelist approach for detecting phishing attacks
|
Azeez, Nureni Ayofe |
|
|
108 |
C |
p. |
artikel |
3 |
A Field-Sensitive Security Monitor for Object-Oriented Programs
|
Khakpour, Narges |
|
|
108 |
C |
p. |
artikel |
4 |
An approach to detect user behaviour anomalies within identity federations
|
Martín, Alejandro G. |
|
|
108 |
C |
p. |
artikel |
5 |
An empirical analysis of the information security culture key factors framework
|
Tolah, Alaa |
|
|
108 |
C |
p. |
artikel |
6 |
A network-independent tool-based usable authentication system for Internet of Things devices
|
Jung, Changhun |
|
|
108 |
C |
p. |
artikel |
7 |
A personalized trajectory privacy protection method
|
Li, Jiachun |
|
|
108 |
C |
p. |
artikel |
8 |
A secure Device-to-Device communication scheme for massive Machine Type Communication
|
Roychoudhury, Probidita |
|
|
108 |
C |
p. |
artikel |
9 |
A security type verifier for smart contracts
|
Hu, Xinwen |
|
|
108 |
C |
p. |
artikel |
10 |
A Tokenless Cancellable Scheme for Multimodal Biometric Systems
|
Lee, Ming Jie |
|
|
108 |
C |
p. |
artikel |
11 |
Beware suppliers bearing gifts!: Analysing coverage of supply chain cyber security in critical national infrastructure sectorial and cross-sectorial frameworks
|
Topping, Colin |
|
|
108 |
C |
p. |
artikel |
12 |
Compromise-resilient anonymous mutual authentication scheme for n by m-times ubiquitous mobile cloud computing services
|
Olakanmi, Oladayo Olufemi |
|
|
108 |
C |
p. |
artikel |
13 |
Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness
|
Ho, Shuyuan Mary |
|
|
108 |
C |
p. |
artikel |
14 |
Demystifying the role of public intrusion datasets: A replication study of DoS network traffic data
|
Catillo, Marta |
|
|
108 |
C |
p. |
artikel |
15 |
Differential area analysis for ransomware attack detection within mixed file datasets
|
Davies, Simon R. |
|
|
108 |
C |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
108 |
C |
p. |
artikel |
17 |
Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity
|
Ogbanufe, Obi |
|
|
108 |
C |
p. |
artikel |
18 |
FogHA: An efficient handover authentication for mobile devices in fog computing
|
Guo, Yimin |
|
|
108 |
C |
p. |
artikel |
19 |
FUZZOLIC: Mixing fuzzing and concolic execution
|
Borzacchiello, Luca |
|
|
108 |
C |
p. |
artikel |
20 |
HAN-BSVD: A hierarchical attention network for binary software vulnerability detection
|
Yan, Han |
|
|
108 |
C |
p. |
artikel |
21 |
Handling webshell attacks: A systematic mapping and survey
|
Hannousse, Abdelhakim |
|
|
108 |
C |
p. |
artikel |
22 |
Hardening cryptographic operations through the use of secure enclaves
|
Brandão, André |
|
|
108 |
C |
p. |
artikel |
23 |
Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
|
Anthi, Eirini |
|
|
108 |
C |
p. |
artikel |
24 |
I-MAD: Interpretable malware detector using Galaxy Transformer
|
Li, Miles Q. |
|
|
108 |
C |
p. |
artikel |
25 |
Integration of blockchain and federated learning for Internet of Things: Recent advances and future challenges
|
Ali, Mansoor |
|
|
108 |
C |
p. |
artikel |
26 |
LCDA: Lightweight Continuous Device-to-Device Authentication for a Zero Trust Architecture (ZTA)
|
Shah, Syed W. |
|
|
108 |
C |
p. |
artikel |
27 |
Mahalanobis distance-based robust approaches against false data injection attacks on dynamic power state estimation
|
Lin, Jing |
|
|
108 |
C |
p. |
artikel |
28 |
Maturity level assessments of information security controls: An empirical analysis of practitioners assessment capabilities
|
Schmitz, Christopher |
|
|
108 |
C |
p. |
artikel |
29 |
Microscopic printing analysis and application for classification of source printer
|
Nguyen, Quoc-Thông |
|
|
108 |
C |
p. |
artikel |
30 |
Modeling social worm propagation for advanced persistent threats
|
Zhou, Peng |
|
|
108 |
C |
p. |
artikel |
31 |
Nudging users towards online safety using gamified environments
|
Petrykina, Yelena |
|
|
108 |
C |
p. |
artikel |
32 |
Optimal temporospatial strategy selection approach to moving target defense: A FlipIt differential game model
|
Tan, Jinglei |
|
|
108 |
C |
p. |
artikel |
33 |
Phishing websites detection via CNN and multi-head self-attention on imbalanced datasets
|
Xiao, Xi |
|
|
108 |
C |
p. |
artikel |
34 |
Review of cybersecurity assessment methods: Applicability perspective
|
Leszczyna, Rafał |
|
|
108 |
C |
p. |
artikel |
35 |
SealFS: Storage-based tamper-evident logging
|
Soriano-Salvador, Enrique |
|
|
108 |
C |
p. |
artikel |
36 |
Securing smart healthcare system with edge computing
|
Singh, Ashish |
|
|
108 |
C |
p. |
artikel |
37 |
Security of the digital transformation
|
Shahim, Abbas |
|
|
108 |
C |
p. |
artikel |
38 |
Towards asynchronous federated learning based threat detection: A DC-Adam approach
|
Tian, Pu |
|
|
108 |
C |
p. |
artikel |
39 |
Waste not: Using diverse neural networks from hyperparameter search for improved malware detection
|
Marques, Pedro |
|
|
108 |
C |
p. |
artikel |