Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             20 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive deep learning benchmark for IoT IDS Ahmad, Rasheed

114 C p.
artikel
2 A linear convolution-based cancelable fingerprint biometric authentication system Yang, Wencheng

114 C p.
artikel
3 An approach for predicting multiple-type overflow vulnerabilities based on combination features and a time series neural network algorithm Zheng, Zhangqi

114 C p.
artikel
4 An efficient network behavior anomaly detection using a hybrid DBN-LSTM network Chen, Aiguo

114 C p.
artikel
5 A Two-Step TLS-Based Browser fingerprinting approach using combinatorial sequences Garn, Bernhard

114 C p.
artikel
6 Binary code traceability of multigranularity information fusion from the perspective of software genes Huang, Yizhao

114 C p.
artikel
7 Cloud computing security: A survey of service-based models Khoda Parast, Fatemeh

114 C p.
artikel
8 CNN based method for the development of cyber-attacks detection algorithms in industrial control systems Nedeljkovic, Dusan

114 C p.
artikel
9 Don’t get stung, cover your ICS in honey: How do honeypots fit within industrial control system security Maesschalck, Sam

114 C p.
artikel
10 Editorial Board
114 C p.
artikel
11 GraphXSS: An efficient XSS payload detection approach based on graph convolutional network Liu, Zhonglin

114 C p.
artikel
12 HDP-CNN: Highway deep pyramid convolution neural network combining word-level and character-level representations for phishing website detection Zheng, Faan

114 C p.
artikel
13 Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis Karlsson, Fredrik

114 C p.
artikel
14 Invoice #31415 attached: Automated analysis of malicious Microsoft Office documents Koutsokostas, Vasilios

114 C p.
artikel
15 Misinformation warnings: Twitter’s soft moderation effects on COVID-19 vaccine belief echoes Sharevski, Filipo

114 C p.
artikel
16 PEDR: Exploiting phase error drift range to detect full-model rogue access point attacks Lu, Qian

114 C p.
artikel
17 Privacy protection of China’s top websites: A Multi-layer privacy measurement via network behaviours and privacy policies Lin, Xinjie

114 C p.
artikel
18 Secure deduplication schemes for content delivery in mobile edge computing Lin, Yu

114 C p.
artikel
19 Specification and adaptive verification of access control policy for cyber-physical-social spaces Cao, Yan

114 C p.
artikel
20 VAEPass: A lightweight passwords guessing model based on variational auto-encoder Yang, Kunyu

114 C p.
artikel
                             20 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland