Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accessible authentication: Assessing the applicability for users with disabilities Furnell, Steven

113 C p.
artikel
2 A Feature-driven Method for Automating the Assessment of OSINT Cyber Threat Sources Tundis, Andrea

113 C p.
artikel
3 A Novel Password Policy Focusing on Altering User Password Selection Habits: A Statistical Analysis on Breached Data Güven, Ebu Yusuf

113 C p.
artikel
4 AntiTomo: Network topology obfuscation against adversarial tomography-based topology inference Liu, Yaqun

113 C p.
artikel
5 A privacy preservation method for multiple-source unstructured data in online social networks Wang, Chenguang

113 C p.
artikel
6 A Systematical and longitudinal study of evasive behaviors in windows malware Galloro, Nicola

113 C p.
artikel
7 A systematic literature review on online assessment security: Current challenges and integrity strategies Garg, Manika

113 C p.
artikel
8 A systematic survey on security concerns in cryptocurrencies: State-of-the-art and perspectives Quamara, Sidharth

113 C p.
artikel
9 A system to calculate Cyber Value-at-Risk Erola, Arnau

113 C p.
artikel
10 Black-box adversarial attacks on XSS attack detection model Wang, Qiuhua

113 C p.
artikel
11 Breaking real-world COTS USIM cards with unknown side-channel countermeasures Jin, Chengbin

113 C p.
artikel
12 CLTracer: A Cross-Ledger Tracing framework based on address relationships Zhang, Zongyang

113 C p.
artikel
13 Deep face fuzzy vault: Implementation and performance Rathgeb, Christian

113 C p.
artikel
14 Design-knowledge in learning plant dynamics for detecting process anomalies in water treatment plants Cheong Lien Sung, Dillon

113 C p.
artikel
15 Developing decision support for cybersecurity threat and incident managers van der Kleij, Rick

113 C p.
artikel
16 Editorial Board
113 C p.
artikel
17 Efficient handover protocol for 5G and beyond networks Nyangaresi, Vincent Omollo

113 C p.
artikel
18 EmuID: Detecting presence of emulation through microarchitectural characteristic on ARM Choi, Yeseul

113 C p.
artikel
19 Enhanced MANET security using artificial immune system based danger theory to detect selfish nodes Jim, Lincy E.

113 C p.
artikel
20 Enhancing the insertion of NOP instructions to obfuscate malware via deep reinforcement learning Gibert, Daniel

113 C p.
artikel
21 FE-DaST: Fast and effective data-free substitute training for black-box adversarial attacks Yu, Mengran

113 C p.
artikel
22 Identifying malicious nodes in wireless sensor networks based on correlation detection Lai, Yingxu

113 C p.
artikel
23 Jadeite: A novel image-behavior-based approach for Java malware detection using deep learning Obaidat, Islam

113 C p.
artikel
24 Lightweight Sybil Attack Detection in IoT based on Bloom Filter and Physical Unclonable Function Pu, Cong

113 C p.
artikel
25 Machine learning for encrypted malicious traffic detection: Approaches, datasets and comparative study Wang, Zihao

113 C p.
artikel
26 Meltdown-type attacks are still feasible in the wall of kernel page-Table isolation Cheng, Yueqiang

113 C p.
artikel
27 Modeling effective cybersecurity training frameworks: A delphi method-based study Chowdhury, Nabin

113 C p.
artikel
28 Multiuser physical layer security mechanism in the wireless communication system of the IIOT Du, Ruizhong

113 C p.
artikel
29 On Detecting and Classifying DGA Botnets and their Families Tuan, Tong Anh

113 C p.
artikel
30 Open-Set source camera identification based on envelope of data clustering optimization (EDCO) Wang, Bo

113 C p.
artikel
31 Personal big data pricing method based on differential privacy Shen, Yuncheng

113 C p.
artikel
32 Real-world smartphone-based gait recognition Alobaidi, Hind

113 C p.
artikel
33 Reviewer Acknowledgement 2021
113 C p.
artikel
34 Topology-theoretic approach to address attribute linkage attacks in differential privacy Wang, Jincheng

113 C p.
artikel
35 Towards differential access control and privacy-preserving for secure media data sharing in the cloud Zheng, Tengfei

113 C p.
artikel
36 Voluntary and instrumental information security policy compliance: an integrated view of prosocial motivation, self-regulation and deterrence Chen, Yan

113 C p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland