Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             35 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics Wu, Jianyuan

112 C p.
artikel
2 A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network Fouladi, Ramin Fadaei

112 C p.
artikel
3 A novel malware classification and augmentation model based on convolutional neural network Tekerek, Adem

112 C p.
artikel
4 AntiViruses under the microscope: A hands-on perspective Botacin, Marcus

112 C p.
artikel
5 Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? Masuch, Kristin

112 C p.
artikel
6 A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects Kuang, Boyu

112 C p.
artikel
7 A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network Liu, Tao

112 C p.
artikel
8 Badaslr: Exceptional cases of ASLR aiding exploitation Jang, Daehee

112 C p.
artikel
9 CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems Gupta, Neha

112 C p.
artikel
10 Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem Salvi, Andrea

112 C p.
artikel
11 Cyber security challenges in aviation communication, navigation, and surveillance Dave, Gaurav

112 C p.
artikel
12 Detection time of data breaches Roumani, Yaman

112 C p.
artikel
13 Domain adaptation for Windows advanced persistent threat detection Coulter, Rory

112 C p.
artikel
14 Editorial Ahmad, Atif

112 C p.
artikel
15 Editorial Board
112 C p.
artikel
16 Expanding the Gordon-Loeb model to cyber-insurance Skeoch, Henry R.K.

112 C p.
artikel
17 FCSCNN: Feature centralized Siamese CNN-based android malware identification Kong, Ke

112 C p.
artikel
18 Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis Dang-Pham, Duy

112 C p.
artikel
19 Information security policy non-compliance: Can capitulation theory explain user behaviors? McLeod, Alexander

112 C p.
artikel
20 Modelling smart grid IT-OT dependencies for DDoS impact propagation Acarali, Dilara

112 C p.
artikel
21 MPDS-RCA: Multi-level privacy-preserving data sharing for resisting collusion attacks based on an integration of CP-ABE and LDP Song, Haina

112 C p.
artikel
22 Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities Bernal, Sergio López

112 C p.
artikel
23 Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features Kim, Jin-Young

112 C p.
artikel
24 On the human evaluation of universal audio adversarial perturbations Vadillo, Jon

112 C p.
artikel
25 Power jacking your station: In-depth security analysis of electric vehicle charging station management systems Nasr, Tony

112 C p.
artikel
26 Practical differentially private online advertising Sun, Jie

112 C p.
artikel
27 Privacy-Preserving cloud-Aided broad learning system Liu, Haiyang

112 C p.
artikel
28 Rcryptect: Real-time detection of cryptographic function in the user-space filesystem Lee, Seungkwang

112 C p.
artikel
29 Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions Wang, Wei

112 C p.
artikel
30 Security of Building Automation and Control Systems: Survey and future research directions Graveto, Vitor

112 C p.
artikel
31 S3Feature: A static sensitive subgraph-based feature for android malware detection Ou, Fan

112 C p.
artikel
32 Supervised Machine Learning with Plausible Deniability Rass, Stefan

112 C p.
artikel
33 The internet of things security: A survey encompassing unexplored areas and new insights Omolara, Abiodun Esther

112 C p.
artikel
34 To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency Pu, Wenxi

112 C p.
artikel
35 Traceability in supply chains: A Cyber security analysis Syed, Naeem Firdous

112 C p.
artikel
                             35 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland