nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accessible authentication: Assessing the applicability for users with disabilities
|
Furnell, Steven |
|
|
113 |
C |
p. |
artikel |
2 |
A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources
|
Tundis, Andrea |
|
|
113 |
C |
p. |
artikel |
3 |
A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data
|
Güven, Ebu Yusuf |
|
|
113 |
C |
p. |
artikel |
4 |
AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference
|
Liu, Yaqun |
|
|
113 |
C |
p. |
artikel |
5 |
A privacy preservation method for multiple-source unstructured data in online social networks
|
Wang, Chenguang |
|
|
113 |
C |
p. |
artikel |
6 |
A Systematical and longitudinal study of evasive behaviors in windows malware
|
Galloro, Nicola |
|
|
113 |
C |
p. |
artikel |
7 |
A systematic literature review on online assessment security: Current challenges and integrity strategies
|
Garg, Manika |
|
|
113 |
C |
p. |
artikel |
8 |
A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives
|
Quamara, Sidharth |
|
|
113 |
C |
p. |
artikel |
9 |
A system to calculate Cyber Value-at-Risk
|
Erola, Arnau |
|
|
113 |
C |
p. |
artikel |
10 |
Black-box adversarial attacks on XSS attack detection model
|
Wang, Qiuhua |
|
|
113 |
C |
p. |
artikel |
11 |
Breaking real-world COTS USIM cards with unknown side-channel countermeasures
|
Jin, Chengbin |
|
|
113 |
C |
p. |
artikel |
12 |
CLTracer: A Cross-Ledger Tracing framework based on address relationships
|
Zhang, Zongyang |
|
|
113 |
C |
p. |
artikel |
13 |
Deep face fuzzy vault: Implementation and performance
|
Rathgeb, Christian |
|
|
113 |
C |
p. |
artikel |
14 |
Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants
|
Cheong Lien Sung, Dillon |
|
|
113 |
C |
p. |
artikel |
15 |
Developing decision support for cybersecurity threat and incident managers
|
van der Kleij, Rick |
|
|
113 |
C |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
113 |
C |
p. |
artikel |
17 |
Efficient handover protocol for 5G and beyond networks
|
Nyangaresi, Vincent Omollo |
|
|
113 |
C |
p. |
artikel |
18 |
EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM
|
Choi, Yeseul |
|
|
113 |
C |
p. |
artikel |
19 |
Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes
|
Jim, Lincy E. |
|
|
113 |
C |
p. |
artikel |
20 |
Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning
|
Gibert, Daniel |
|
|
113 |
C |
p. |
artikel |
21 |
FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks
|
Yu, Mengran |
|
|
113 |
C |
p. |
artikel |
22 |
Identifying malicious nodes in wireless sensor networks based on correlation detection
|
Lai, Yingxu |
|
|
113 |
C |
p. |
artikel |
23 |
Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning
|
Obaidat, Islam |
|
|
113 |
C |
p. |
artikel |
24 |
Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function
|
Pu, Cong |
|
|
113 |
C |
p. |
artikel |
25 |
Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study
|
Wang, Zihao |
|
|
113 |
C |
p. |
artikel |
26 |
Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation
|
Cheng, Yueqiang |
|
|
113 |
C |
p. |
artikel |
27 |
Modeling effective cybersecurity training frameworks: A delphi method-based study
|
Chowdhury, Nabin |
|
|
113 |
C |
p. |
artikel |
28 |
Multiuser physical layer security mechanism in the wireless communication system of the IIOT
|
Du, Ruizhong |
|
|
113 |
C |
p. |
artikel |
29 |
On Detecting and Classifying DGA Botnets and their Families
|
Tuan, Tong Anh |
|
|
113 |
C |
p. |
artikel |
30 |
Open-Set source camera identification based on envelope of data clustering optimization (EDCO)
|
Wang, Bo |
|
|
113 |
C |
p. |
artikel |
31 |
Personal big data pricing method based on differential privacy
|
Shen, Yuncheng |
|
|
113 |
C |
p. |
artikel |
32 |
Real-world smartphone-based gait recognition
|
Alobaidi, Hind |
|
|
113 |
C |
p. |
artikel |
33 |
Reviewer Acknowledgement 2021
|
|
|
|
113 |
C |
p. |
artikel |
34 |
Topology-theoretic approach to address attribute linkage attacks in differential privacy
|
Wang, Jincheng |
|
|
113 |
C |
p. |
artikel |
35 |
Towards differential access control and privacy-preserving for secure media data sharing in the cloud
|
Zheng, Tengfei |
|
|
113 |
C |
p. |
artikel |
36 |
Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence
|
Chen, Yan |
|
|
113 |
C |
p. |
artikel |