nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Differentially private hybrid decomposition algorithm based on quad-tree
|
Li, Shuyu |
|
|
109 |
C |
p. |
artikel |
2 |
A framework for ID fraud prevention policies in E-tailing sector
|
Soomro, Zahoor Ahmed |
|
|
109 |
C |
p. |
artikel |
3 |
Android malware detection via an app similarity graph
|
Frenklach, Tatiana |
|
|
109 |
C |
p. |
artikel |
4 |
An enhanced handover authentication solution for 6LoWPAN networks
|
Zhang, Lyuye |
|
|
109 |
C |
p. |
artikel |
5 |
A novel framework for image-based malware detection with a deep neural network
|
Jian, Yifei |
|
|
109 |
C |
p. |
artikel |
6 |
A principlist framework for cybersecurity ethics
|
Formosa, Paul |
|
|
109 |
C |
p. |
artikel |
7 |
A review of amplification-based distributed denial of service attacks and their mitigation
|
Ismail, Salih |
|
|
109 |
C |
p. |
artikel |
8 |
A survey on security attacks and defense techniques for connected and autonomous vehicles
|
Pham, Minh |
|
|
109 |
C |
p. |
artikel |
9 |
Avaddon ransomware: An in-depth analysis and decryption of infected systems
|
Yuste, Javier |
|
|
109 |
C |
p. |
artikel |
10 |
Developing a cyber security culture: Current practices and future needs
|
Uchendu, Betsy |
|
|
109 |
C |
p. |
artikel |
11 |
Digestive neural networks: A novel defense strategy against inference attacks in federated learning
|
Lee, Hongkyu |
|
|
109 |
C |
p. |
artikel |
12 |
DIGFuPAS: Deceive IDS with GAN and function-preserving on adversarial samples in SDN-enabled networks
|
Duy, Phan The |
|
|
109 |
C |
p. |
artikel |
13 |
Discovering features for detecting malicious websites: An empirical study
|
McGahagan IV, John |
|
|
109 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
109 |
C |
p. |
artikel |
15 |
Exploring stewardship: A precursor to voluntary security behaviors
|
Ogbanufe, Obi |
|
|
109 |
C |
p. |
artikel |
16 |
Facing airborne attacks on ADS-B data with autoencoders
|
Fried, Asaf |
|
|
109 |
C |
p. |
artikel |
17 |
Impact of comprehensive information security awareness and cognitive characteristics on security incident management – an empirical study
|
Thangavelu, Manisekaran |
|
|
109 |
C |
p. |
artikel |
18 |
Information security management in ICT and non-ICT sector companies: A preventive innovation perspective
|
Mirtsch, Mona |
|
|
109 |
C |
p. |
artikel |
19 |
Integration of federated machine learning and blockchain for the provision of secure big data analytics for Internet of Things
|
Unal, Devrim |
|
|
109 |
C |
p. |
artikel |
20 |
Machine learning based deep job exploration and secure transactions in virtual private cloud systems
|
Rajasoundaran, S. |
|
|
109 |
C |
p. |
artikel |
21 |
Malware detection on windows audit logs using LSTMs
|
Ring, Markus |
|
|
109 |
C |
p. |
artikel |
22 |
Quantitative Security Risk Modeling and Analysis with RisQFLan
|
ter Beek, Maurice H. |
|
|
109 |
C |
p. |
artikel |
23 |
Rationality constraints in cyber defense: Incident handling, attribution and cyber threat intelligence
|
Hettema, Hinne |
|
|
109 |
C |
p. |
artikel |
24 |
Riemannian manifold on stream data: Fourier transform and entropy-based DDoS attacks detection method
|
Liu, Zhen |
|
|
109 |
C |
p. |
artikel |
25 |
Security analysis of SDN controller-based DHCP services and attack mitigation with DHCPguard
|
Tok, Mevlut Serkan |
|
|
109 |
C |
p. |
artikel |
26 |
Semi-supervised recommendation attack detection based on Co-Forest
|
Zhou, Quanqiang |
|
|
109 |
C |
p. |
artikel |
27 |
The Agile Incident Response for Industrial Control Systems (AIR4ICS) framework
|
Smith, Richard |
|
|
109 |
C |
p. |
artikel |
28 |
The good, the bad and the missing: A Narrative review of cyber-security implications for australian small businesses
|
Tam, Tracy |
|
|
109 |
C |
p. |
artikel |
29 |
The impact of SETA event attributes on employees’ security-related Intentions: An event system theory perspective
|
Hu, Siqi |
|
|
109 |
C |
p. |
artikel |
30 |
TZMon: Improving mobile game security with ARM trustzone
|
Jeon, Sanghoon |
|
|
109 |
C |
p. |
artikel |
31 |
Vulnerabilities in Android webview objects: Still not the end!
|
El-Zawawy, Mohamed A. |
|
|
109 |
C |
p. |
artikel |