nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive deep learning benchmark for IoT IDS
|
Ahmad, Rasheed |
|
|
114 |
C |
p. |
artikel |
2 |
A linear convolution-based cancelable fingerprint biometric authentication system
|
Yang, Wencheng |
|
|
114 |
C |
p. |
artikel |
3 |
An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm
|
Zheng, Zhangqi |
|
|
114 |
C |
p. |
artikel |
4 |
An efficient network behavior anomaly detection using a hybrid DBN-LSTM network
|
Chen, Aiguo |
|
|
114 |
C |
p. |
artikel |
5 |
A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences
|
Garn, Bernhard |
|
|
114 |
C |
p. |
artikel |
6 |
Binary code traceability of multigranularity information fusion from the perspective of software genes
|
Huang, Yizhao |
|
|
114 |
C |
p. |
artikel |
7 |
Cloud computing security: A survey of service-based models
|
Khoda Parast, Fatemeh |
|
|
114 |
C |
p. |
artikel |
8 |
CNN based method for the development of cyber-attacks detection algorithms in industrial control systems
|
Nedeljkovic, Dusan |
|
|
114 |
C |
p. |
artikel |
9 |
Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security
|
Maesschalck, Sam |
|
|
114 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
114 |
C |
p. |
artikel |
11 |
GraphXSS: An efficient XSS payload detection approach based on graph convolutional network
|
Liu, Zhonglin |
|
|
114 |
C |
p. |
artikel |
12 |
HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection
|
Zheng, Faan |
|
|
114 |
C |
p. |
artikel |
13 |
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis
|
Karlsson, Fredrik |
|
|
114 |
C |
p. |
artikel |
14 |
Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents
|
Koutsokostas, Vasilios |
|
|
114 |
C |
p. |
artikel |
15 |
Misinformation warnings: Twitter’s soft moderation effects on COVID-19 vaccine belief echoes
|
Sharevski, Filipo |
|
|
114 |
C |
p. |
artikel |
16 |
PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks
|
Lu, Qian |
|
|
114 |
C |
p. |
artikel |
17 |
Privacy protection of China’s top websites: A Multi-layer privacy measurement via network behaviours and privacy policies
|
Lin, Xinjie |
|
|
114 |
C |
p. |
artikel |
18 |
Secure deduplication schemes for content delivery in mobile edge computing
|
Lin, Yu |
|
|
114 |
C |
p. |
artikel |
19 |
Specification and adaptive verification of access control policy for cyber-physical-social spaces
|
Cao, Yan |
|
|
114 |
C |
p. |
artikel |
20 |
VAEPass: A lightweight passwords guessing model based on variational auto-encoder
|
Yang, Kunyu |
|
|
114 |
C |
p. |
artikel |