Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             29 results found
no title author magazine year volume issue page(s) type
1 Achieve efficient position-heap-based privacy-preserving substring-of-keyword query over cloud Yin, Fan

110 C p.
article
2 A comprehensive survey of DDoS defense solutions in SDN: Taxonomy, research challenges, and future directions Kaur, Sukhveer

110 C p.
article
3 A methodology for selecting hardware performance counters for supporting non-intrusive diagnostic of flood DDoS attacks on web servers Nascimento, Pablo Pessoa do

110 C p.
article
4 A Multi-Perspective malware detection approach through behavioral fusion of API call sequence Amer, Eslam

110 C p.
article
5 An effective genetic algorithm-based feature selection method for intrusion detection systems Halim, Zahid

110 C p.
article
6 An efficient multistage phishing website detection model based on the CASE feature framework: Aiming at the real web environment Liu, Dong-Jie

110 C p.
article
7 An optimized differential privacy scheme with reinforcement learning in VANET Chen, Xin

110 C p.
article
8 Applying machine learning and natural language processing to detect phishing email Alhogail, Areej

110 C p.
article
9 A PUF-based secure wake-up scheme for Internet of Things Lin, Hui-Tang

110 C p.
article
10 BDDR: An Effective Defense Against Textual Backdoor Attacks Shao, Kun

110 C p.
article
11 Cyber-enabled burglary of smart homes Hodges, Duncan

110 C p.
article
12 Detector + : An approach for detecting, isolating, and preventing timing attacks Javeed, Arsalan

110 C p.
article
13 Editorial Board
110 C p.
article
14 Image-based malware classification using section distribution information Xiao, Mao

110 C p.
article
15 Information security vulnerability prediction based on business process model using machine learning approach Hariyanti, Eva

110 C p.
article
16 KronoDroid: Time-based Hybrid-featured Dataset for Effective Android Malware Detection and Characterization Guerra-Manzanares, Alejandro

110 C p.
article
17 NetObfu : A lightweight and efficient network topology obfuscation defense scheme Liu, Yaqun

110 C p.
article
18 Never trust, always verify: A multivocal literature review on current knowledge and research gaps of zero-trust Buck, Christoph

110 C p.
article
19 Non-Interactive and secure outsourcing of PCA-Based face recognition Ren, Yanli

110 C p.
article
20 PASSVM: A highly accurate fast flux detection system Al-Duwairi, Basheer

110 C p.
article
21 PCaaD: Towards automated determination and exploitation of industrial systems Green, Benjamin

110 C p.
article
22 Privacy preservation in federated learning: An insightful survey from the GDPR perspective Truong, Nguyen

110 C p.
article
23 Serious games as a tool to model attack and defense scenarios for cyber-security exercises Yamin, Muhammad Mudassar

110 C p.
article
24 STL-HDL: A new hybrid network intrusion detection system for imbalanced dataset on big data environment Al, Samed

110 C p.
article
25 Stock market reactions to favorable and unfavorable information security events: A systematic literature review Ali, Syed Emad Azhar

110 C p.
article
26 Study on the latent state of Kaminsky-style DNS cache poisoning: Modeling and empirical analysis Zhang, Haikuo

110 C p.
article
27 Survivable zero trust for cloud computing environments Ferretti, Luca

110 C p.
article
28 The effects of different personal data categories on information privacy concern and disclosure Chua, Hui Na

110 C p.
article
29 VDSimilar: Vulnerability detection based on code similarity of vulnerabilities and patches Sun, Hao

110 C p.
article
                             29 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands