nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics
|
Wu, Jianyuan |
|
|
112 |
C |
p. |
artikel |
2 |
A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network
|
Fouladi, Ramin Fadaei |
|
|
112 |
C |
p. |
artikel |
3 |
A novel malware classification and augmentation model based on convolutional neural network
|
Tekerek, Adem |
|
|
112 |
C |
p. |
artikel |
4 |
AntiViruses under the microscope: A hands-on perspective
|
Botacin, Marcus |
|
|
112 |
C |
p. |
artikel |
5 |
Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies?
|
Masuch, Kristin |
|
|
112 |
C |
p. |
artikel |
6 |
A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects
|
Kuang, Boyu |
|
|
112 |
C |
p. |
artikel |
7 |
A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network
|
Liu, Tao |
|
|
112 |
C |
p. |
artikel |
8 |
Badaslr: Exceptional cases of ASLR aiding exploitation
|
Jang, Daehee |
|
|
112 |
C |
p. |
artikel |
9 |
CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems
|
Gupta, Neha |
|
|
112 |
C |
p. |
artikel |
10 |
Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem
|
Salvi, Andrea |
|
|
112 |
C |
p. |
artikel |
11 |
Cyber security challenges in aviation communication, navigation, and surveillance
|
Dave, Gaurav |
|
|
112 |
C |
p. |
artikel |
12 |
Detection time of data breaches
|
Roumani, Yaman |
|
|
112 |
C |
p. |
artikel |
13 |
Domain adaptation for Windows advanced persistent threat detection
|
Coulter, Rory |
|
|
112 |
C |
p. |
artikel |
14 |
Editorial
|
Ahmad, Atif |
|
|
112 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
112 |
C |
p. |
artikel |
16 |
Expanding the Gordon-Loeb model to cyber-insurance
|
Skeoch, Henry R.K. |
|
|
112 |
C |
p. |
artikel |
17 |
FCSCNN: Feature centralized Siamese CNN-based android malware identification
|
Kong, Ke |
|
|
112 |
C |
p. |
artikel |
18 |
Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis
|
Dang-Pham, Duy |
|
|
112 |
C |
p. |
artikel |
19 |
Information security policy non-compliance: Can capitulation theory explain user behaviors?
|
McLeod, Alexander |
|
|
112 |
C |
p. |
artikel |
20 |
Modelling smart grid IT-OT dependencies for DDoS impact propagation
|
Acarali, Dilara |
|
|
112 |
C |
p. |
artikel |
21 |
MPDS-RCA: Multi-level privacy-preserving data sharing for resisting collusion attacks based on an integration of CP-ABE and LDP
|
Song, Haina |
|
|
112 |
C |
p. |
artikel |
22 |
Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities
|
Bernal, Sergio López |
|
|
112 |
C |
p. |
artikel |
23 |
Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features
|
Kim, Jin-Young |
|
|
112 |
C |
p. |
artikel |
24 |
On the human evaluation of universal audio adversarial perturbations
|
Vadillo, Jon |
|
|
112 |
C |
p. |
artikel |
25 |
Power jacking your station: In-depth security analysis of electric vehicle charging station management systems
|
Nasr, Tony |
|
|
112 |
C |
p. |
artikel |
26 |
Practical differentially private online advertising
|
Sun, Jie |
|
|
112 |
C |
p. |
artikel |
27 |
Privacy-Preserving cloud-Aided broad learning system
|
Liu, Haiyang |
|
|
112 |
C |
p. |
artikel |
28 |
Rcryptect: Real-time detection of cryptographic function in the user-space filesystem
|
Lee, Seungkwang |
|
|
112 |
C |
p. |
artikel |
29 |
Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions
|
Wang, Wei |
|
|
112 |
C |
p. |
artikel |
30 |
Security of Building Automation and Control Systems: Survey and future research directions
|
Graveto, Vitor |
|
|
112 |
C |
p. |
artikel |
31 |
S3Feature: A static sensitive subgraph-based feature for android malware detection
|
Ou, Fan |
|
|
112 |
C |
p. |
artikel |
32 |
Supervised Machine Learning with Plausible Deniability
|
Rass, Stefan |
|
|
112 |
C |
p. |
artikel |
33 |
The internet of things security: A survey encompassing unexplored areas and new insights
|
Omolara, Abiodun Esther |
|
|
112 |
C |
p. |
artikel |
34 |
To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency
|
Pu, Wenxi |
|
|
112 |
C |
p. |
artikel |
35 |
Traceability in supply chains: A Cyber security analysis
|
Syed, Naeem Firdous |
|
|
112 |
C |
p. |
artikel |