nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Methodology For Large-Scale Identification of Related Accounts in Underground Forums
|
Cabrero-Holgueras, José |
|
|
111 |
C |
p. |
artikel |
2 |
A novel and universal GAN-based countermeasure to recover adversarial examples to benign examples
|
Yang, Rui |
|
|
111 |
C |
p. |
artikel |
3 |
A Secure Mutual authentication approach to fog computing environment
|
Kalaria, Rudri |
|
|
111 |
C |
p. |
artikel |
4 |
A Security Gateway for power distribution systems in open networks
|
Andrade, Eduardo |
|
|
111 |
C |
p. |
artikel |
5 |
A success model for cyber threat intelligence management platforms
|
Zibak, Adam |
|
|
111 |
C |
p. |
artikel |
6 |
A Survey Of differential privacy-based techniques and their applicability to location-Based services
|
Kim, Jong Wook |
|
|
111 |
C |
p. |
artikel |
7 |
Authentication and Identity Management of IoHT Devices: Achievements, Challenges, and Future Directions
|
Mamdouh, Moustafa |
|
|
111 |
C |
p. |
artikel |
8 |
Constrained top-k nearest fuzzy keyword queries on encrypted graph in road network
|
Sun, Fangyuan |
|
|
111 |
C |
p. |
artikel |
9 |
CPMTD: Cyber-physical moving target defense for hardening the security of power system against false data injected attack
|
Hu, Yifan |
|
|
111 |
C |
p. |
artikel |
10 |
CTI-SOC2M2 – The quest for mature, intelligence-driven security operations and incident response capabilities
|
Schlette, Daniel |
|
|
111 |
C |
p. |
artikel |
11 |
DouBiGRU-A: Software defect detection algorithm based on attention mechanism and double BiGRU
|
Zhao, Jinxiong |
|
|
111 |
C |
p. |
artikel |
12 |
Dynamic user-centric access control for detection of ransomware attacks
|
McIntosh, Timothy |
|
|
111 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
111 |
C |
p. |
artikel |
14 |
Evaluating fallback authentication research: A systematic literature review
|
AlHusain, Reem |
|
|
111 |
C |
p. |
artikel |
15 |
Exploiting side-channel leaks in web traffic of incremental search
|
Li, Ding |
|
|
111 |
C |
p. |
artikel |
16 |
k -Anonymity in practice: How generalisation and suppression affect machine learning classifiers
|
Slijepčević, Djordje |
|
|
111 |
C |
p. |
artikel |
17 |
Malbert: A novel pre-training method for malware detection
|
Xu, Zhifeng |
|
|
111 |
C |
p. |
artikel |
18 |
MapperDroid: Verifying app capabilities from description to permissions and API calls
|
Solanki, Rajendra Kumar |
|
|
111 |
C |
p. |
artikel |
19 |
Measuring Web Session Security at Scale
|
Calzavara, Stefano |
|
|
111 |
C |
p. |
artikel |
20 |
Metadata based need-to-know view in large-scale video surveillance systems
|
Sultan, Shizra |
|
|
111 |
C |
p. |
artikel |
21 |
Network defense decision-making based on a stochastic game system and a deep recurrent Q-network
|
Liu, Xiaohu |
|
|
111 |
C |
p. |
artikel |
22 |
On Android’s activity hijacking prevention
|
Lyvas, Christos |
|
|
111 |
C |
p. |
artikel |
23 |
On the adoption of static analysis for software security assessment–A case study of an open-source e-government project
|
Nguyen-Duc, Anh |
|
|
111 |
C |
p. |
artikel |
24 |
On the Effectiveness of Ransomware Decryption Tools
|
Filiz, Burak |
|
|
111 |
C |
p. |
artikel |
25 |
Physical fault injection and side-channel attacks on mobile devices: A comprehensive analysis
|
Shepherd, Carlton |
|
|
111 |
C |
p. |
artikel |
26 |
Ransomware: Recent advances, analysis, challenges and future research directions
|
Beaman, Craig |
|
|
111 |
C |
p. |
artikel |
27 |
Research on lightweight anomaly detection of multimedia traffic in edge computing
|
Zhao, Xu |
|
|
111 |
C |
p. |
artikel |
28 |
SELF: A method of searching for library functions in stripped binary code
|
Liu, Xueqian |
|
|
111 |
C |
p. |
artikel |
29 |
Study on the intelligent honeynet model for containing the spread of industrial viruses
|
Sheng, Chuan |
|
|
111 |
C |
p. |
artikel |
30 |
The effectiveness of zoom touchscreen gestures for authentication and identification and its changes over time
|
Wang, Leran |
|
|
111 |
C |
p. |
artikel |
31 |
The moderating effect of abusive supervision on information security policy compliance: Evidence from the hospitality industry
|
Xu, Jian |
|
|
111 |
C |
p. |
artikel |