Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             39 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adversarial attacks on YOLACT instance segmentation Zhang, Zhaoxin

116 C p.
artikel
2 A framework for data privacy and security accountability in data breach communications Thomas, Louise

116 C p.
artikel
3 A longitudinal study on improving employee information protective knowledge and behaviors Bélanger, France

116 C p.
artikel
4 A novel deep framework for dynamic malware detection based on API sequence intrinsic features Li, Ce

116 C p.
artikel
5 A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric J, Dharani

116 C p.
artikel
6 A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks Yan, Xiaobei

116 C p.
artikel
7 A study on the use of vulnerabilities databases in software engineering domain Alqahtani, Sultan S.

116 C p.
artikel
8 A systematic literature review of methods and datasets for anomaly-based network intrusion detection Yang, Zhen

116 C p.
artikel
9 Biometric masterkeys Gernot, Tanguy

116 C p.
artikel
10 CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation Chevrot, Antoine

116 C p.
artikel
11 CAVP: A context-aware vulnerability prioritization model Jung, Bill

116 C p.
artikel
12 Cognitively reconfigurable mimic-based heterogeneous password recovery system Li, Bin

116 C p.
artikel
13 Cyber security and the Leviathan Da Silva, Joseph

116 C p.
artikel
14 DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification Lan, Jinghong

116 C p.
artikel
15 Determination of ransomware payment based on Bayesian game models Fang, Rui

116 C p.
artikel
16 Differentially private self-normalizing neural networks for adversarial robustness in federated learning Ibitoye, Olakunle

116 C p.
artikel
17 Editorial Board
116 C p.
artikel
18 Egida: Automated security configuration deployment systems with early error detection Paya, Antonio

116 C p.
artikel
19 FeSA: Feature selection architecture for ransomware detection under concept drift Fernando, Damien Warren

116 C p.
artikel
20 FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices Fu, Anmin

116 C p.
artikel
21 Flexible software protection Van den Broeck, Jens

116 C p.
artikel
22 Image-based malware classification hybrid framework based on space-filling curves O’Shaughnessy, Stephen

116 C p.
artikel
23 Improving SSH detection model using IPA time and WGAN-GP Lee, Junwon

116 C p.
artikel
24 Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture M .P . , Ramkumar

116 C p.
artikel
25 IoT security certifications: Challenges and potential approaches Cirne, André

116 C p.
artikel
26 Modeling and executing cyber security exercise scenarios in cyber ranges Yamin, Muhammad Mudassar

116 C p.
artikel
27 MPSAutodetect: A Malicious Powershell Script Detection Model Based on Stacked Denoising Auto-Encoder Alahmadi, Amal

116 C p.
artikel
28 On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models Iyer, Padmavathi

116 C p.
artikel
29 On the vulnerability of anti-malware solutions to DNS attacks Nadler, Asaf

116 C p.
artikel
30 Optimization of code caves in malware binaries to evade machine learning detectors Yuste, Javier

116 C p.
artikel
31 PasswordTensor: Analyzing and explaining password strength using tensor decomposition Shin, Youjin

116 C p.
artikel
32 Preventive portfolio against data-selling ransomware—A game theory of encryption and deception Li, Zhen

116 C p.
artikel
33 Rethinking maximum-margin softmax for adversarial robustness Hassanin, Mohammed

116 C p.
artikel
34 Robust deep learning early alarm prediction model based on the behavioural smell for android malware Amer, Eslam

116 C p.
artikel
35 Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses Mages, Tobias

116 C p.
artikel
36 TrustBuilder: A non-repudiation scheme for IoT cloud applications Chen, Fei

116 C p.
artikel
37 Two decades of cyberattack simulations: A systematic literature review Engström, Viktor

116 C p.
artikel
38 Unsupervised malicious domain detection with less labeling effort Park, Kyung Ho

116 C p.
artikel
39 Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE) Khalid, Fatima

116 C p.
artikel
                             39 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland