Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             35 results found
no title author magazine year volume issue page(s) type
1 An adversarial learning framework with cross-domain loss for median filtered image restoration and anti-forensics Wu, Jianyuan

112 C p.
article
2 A Novel Approach for distributed denial of service defense using continuous wavelet transform and convolutional neural network for software-Defined network Fouladi, Ramin Fadaei

112 C p.
article
3 A novel malware classification and augmentation model based on convolutional neural network Tekerek, Adem

112 C p.
article
4 AntiViruses under the microscope: A hands-on perspective Botacin, Marcus

112 C p.
article
5 Apologize or justify? Examining the impact of data breach response actions on stock value of affected companies? Masuch, Kristin

112 C p.
article
6 A survey of remote attestation in Internet of Things: Attacks, countermeasures, and prospects Kuang, Boyu

112 C p.
article
7 A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network Liu, Tao

112 C p.
article
8 Badaslr: Exceptional cases of ASLR aiding exploitation Jang, Daehee

112 C p.
article
9 CSE-IDS: Using cost-sensitive deep learning and ensemble algorithms to handle class imbalance in network-based intrusion detection systems Gupta, Neha

112 C p.
article
10 Cyber-resilience of Critical Cyber Infrastructures: Integrating digital twins in the electric power ecosystem Salvi, Andrea

112 C p.
article
11 Cyber security challenges in aviation communication, navigation, and surveillance Dave, Gaurav

112 C p.
article
12 Detection time of data breaches Roumani, Yaman

112 C p.
article
13 Domain adaptation for Windows advanced persistent threat detection Coulter, Rory

112 C p.
article
14 Editorial Ahmad, Atif

112 C p.
article
15 Editorial Board
112 C p.
article
16 Expanding the Gordon-Loeb model to cyber-insurance Skeoch, Henry R.K.

112 C p.
article
17 FCSCNN: Feature centralized Siamese CNN-based android malware identification Kong, Ke

112 C p.
article
18 Identifying information security opinion leaders in organizations: Insights from the theory of social power bases and social network analysis Dang-Pham, Duy

112 C p.
article
19 Information security policy non-compliance: Can capitulation theory explain user behaviors? McLeod, Alexander

112 C p.
article
20 Modelling smart grid IT-OT dependencies for DDoS impact propagation Acarali, Dilara

112 C p.
article
21 MPDS-RCA: Multi-level privacy-preserving data sharing for resisting collusion attacks based on an integration of CP-ABE and LDP Song, Haina

112 C p.
article
22 Neuronal Jamming cyberattack over invasive BCIs affecting the resolution of tasks requiring visual capabilities Bernal, Sergio López

112 C p.
article
23 Obfuscated Malware Detection Using Deep Generative Model based on Global/Local Features Kim, Jin-Young

112 C p.
article
24 On the human evaluation of universal audio adversarial perturbations Vadillo, Jon

112 C p.
article
25 Power jacking your station: In-depth security analysis of electric vehicle charging station management systems Nasr, Tony

112 C p.
article
26 Practical differentially private online advertising Sun, Jie

112 C p.
article
27 Privacy-Preserving cloud-Aided broad learning system Liu, Haiyang

112 C p.
article
28 Rcryptect: Real-time detection of cryptographic function in the user-space filesystem Lee, Seungkwang

112 C p.
article
29 Representation learning-based network intrusion detection system by capturing explicit and implicit feature interactions Wang, Wei

112 C p.
article
30 Security of Building Automation and Control Systems: Survey and future research directions Graveto, Vitor

112 C p.
article
31 S3Feature: A static sensitive subgraph-based feature for android malware detection Ou, Fan

112 C p.
article
32 Supervised Machine Learning with Plausible Deniability Rass, Stefan

112 C p.
article
33 The internet of things security: A survey encompassing unexplored areas and new insights Omolara, Abiodun Esther

112 C p.
article
34 To Disclose or Not to Disclose: An Evaluation of the Effects of Information Control and Social Network Transparency Pu, Wenxi

112 C p.
article
35 Traceability in supply chains: A Cyber security analysis Syed, Naeem Firdous

112 C p.
article
                             35 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands