nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid method of entropy and SSAE-SVM based DDoS detection and mitigation mechanism in SDN
|
Long, Zhang |
|
|
115 |
C |
p. |
artikel |
2 |
A Model For risk-Based adaptive security controls
|
Calvo, Miguel |
|
|
115 |
C |
p. |
artikel |
3 |
Birds of a feather: Collective privacy of online social activist groups
|
Jia, Haiyan |
|
|
115 |
C |
p. |
artikel |
4 |
Control flow equivalence method for establishing sanctity of compiling
|
Awadhutkar, Payas |
|
|
115 |
C |
p. |
artikel |
5 |
CRUSOE: A toolset for cyber situational awareness and decision support in incident handling
|
Husák, Martin |
|
|
115 |
C |
p. |
artikel |
6 |
Digital forensic analysis methodology for private browsing: Firefox and Chrome on Linux as a case study
|
Fernández-Fuentes, Xosé |
|
|
115 |
C |
p. |
artikel |
7 |
Dynamic face authentication systems: Deep learning verification for camera close-Up and head rotation paradigms
|
Castelblanco, Alejandra |
|
|
115 |
C |
p. |
artikel |
8 |
Editorial Board
|
|
|
|
115 |
C |
p. |
artikel |
9 |
EfficientNet convolutional neural networks-based Android malware detection
|
Yadav, Pooja |
|
|
115 |
C |
p. |
artikel |
10 |
Enhancing malware analysis sandboxes with emulated user behavior
|
Liu, Songsong |
|
|
115 |
C |
p. |
artikel |
11 |
Hiding payments in lightning network with approximate differentially private payment channels
|
van Dam, Gijs |
|
|
115 |
C |
p. |
artikel |
12 |
Network traffic analysis through node behaviour classification: a graph-based approach with temporal dissection and data-level preprocessing
|
Zola, F. |
|
|
115 |
C |
p. |
artikel |
13 |
Orchestration of APT malware evasive manoeuvers employed for eluding anti-virus and sandbox defense
|
Sharma, Amit |
|
|
115 |
C |
p. |
artikel |
14 |
Privacy-preserving Naive Bayes classification in semi-fully distributed data model
|
Vu, Duy-Hien |
|
|
115 |
C |
p. |
artikel |
15 |
Probabilistic modelling of deception-based security framework using markov decision process
|
Haseeb, Junaid |
|
|
115 |
C |
p. |
artikel |
16 |
Situational Crime Prevention (SCP) techniques to prevent and control cybercrimes: A focused systematic review
|
Ho, Heemeng |
|
|
115 |
C |
p. |
artikel |
17 |
SPrivAD: A secure and privacy-preserving mutually dependent authentication and data access scheme for smart communities
|
Sani, Abubakar Sadiq |
|
|
115 |
C |
p. |
artikel |
18 |
The commodification of consent
|
Woods, Daniel W. |
|
|
115 |
C |
p. |
artikel |
19 |
Usable and secure? User perception of four authentication methods for mobile banking
|
Kruzikova, Agata |
|
|
115 |
C |
p. |
artikel |