nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial attacks on YOLACT instance segmentation
|
Zhang, Zhaoxin |
|
|
116 |
C |
p. |
artikel |
2 |
A framework for data privacy and security accountability in data breach communications
|
Thomas, Louise |
|
|
116 |
C |
p. |
artikel |
3 |
A longitudinal study on improving employee information protective knowledge and behaviors
|
Bélanger, France |
|
|
116 |
C |
p. |
artikel |
4 |
A novel deep framework for dynamic malware detection based on API sequence intrinsic features
|
Li, Ce |
|
|
116 |
C |
p. |
artikel |
5 |
A Privacy-Preserving Framework for Endorsement Process in Hyperledger Fabric
|
J, Dharani |
|
|
116 |
C |
p. |
artikel |
6 |
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
|
Yan, Xiaobei |
|
|
116 |
C |
p. |
artikel |
7 |
A study on the use of vulnerabilities databases in software engineering domain
|
Alqahtani, Sultan S. |
|
|
116 |
C |
p. |
artikel |
8 |
A systematic literature review of methods and datasets for anomaly-based network intrusion detection
|
Yang, Zhen |
|
|
116 |
C |
p. |
artikel |
9 |
Biometric masterkeys
|
Gernot, Tanguy |
|
|
116 |
C |
p. |
artikel |
10 |
CAE: Contextual auto-encoder for multivariate time-series anomaly detection in air transportation
|
Chevrot, Antoine |
|
|
116 |
C |
p. |
artikel |
11 |
CAVP: A context-aware vulnerability prioritization model
|
Jung, Bill |
|
|
116 |
C |
p. |
artikel |
12 |
Cognitively reconfigurable mimic-based heterogeneous password recovery system
|
Li, Bin |
|
|
116 |
C |
p. |
artikel |
13 |
Cyber security and the Leviathan
|
Da Silva, Joseph |
|
|
116 |
C |
p. |
artikel |
14 |
DarknetSec: A novel self-attentive deep learning method for darknet traffic classification and application identification
|
Lan, Jinghong |
|
|
116 |
C |
p. |
artikel |
15 |
Determination of ransomware payment based on Bayesian game models
|
Fang, Rui |
|
|
116 |
C |
p. |
artikel |
16 |
Differentially private self-normalizing neural networks for adversarial robustness in federated learning
|
Ibitoye, Olakunle |
|
|
116 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
116 |
C |
p. |
artikel |
18 |
Egida: Automated security configuration deployment systems with early error detection
|
Paya, Antonio |
|
|
116 |
C |
p. |
artikel |
19 |
FeSA: Feature selection architecture for ransomware detection under concept drift
|
Fernando, Damien Warren |
|
|
116 |
C |
p. |
artikel |
20 |
FH-CFI: Fine-grained hardware-assisted control flow integrity for ARM-based IoT devices
|
Fu, Anmin |
|
|
116 |
C |
p. |
artikel |
21 |
Flexible software protection
|
Van den Broeck, Jens |
|
|
116 |
C |
p. |
artikel |
22 |
Image-based malware classification hybrid framework based on space-filling curves
|
O’Shaughnessy, Stephen |
|
|
116 |
C |
p. |
artikel |
23 |
Improving SSH detection model using IPA time and WGAN-GP
|
Lee, Junwon |
|
|
116 |
C |
p. |
artikel |
24 |
Intrusion detection in big data using hybrid feature fusion and optimization enabled deep learning based on spark architecture
|
M .P . , Ramkumar |
|
|
116 |
C |
p. |
artikel |
25 |
IoT security certifications: Challenges and potential approaches
|
Cirne, André |
|
|
116 |
C |
p. |
artikel |
26 |
Modeling and executing cyber security exercise scenarios in cyber ranges
|
Yamin, Muhammad Mudassar |
|
|
116 |
C |
p. |
artikel |
27 |
MPSAutodetect: A Malicious Powershell Script Detection Model Based on Stacked Denoising Auto-Encoder
|
Alahmadi, Amal |
|
|
116 |
C |
p. |
artikel |
28 |
On the Expressive Power of Negated Conditions and Negative Authorizations in Access Control Models
|
Iyer, Padmavathi |
|
|
116 |
C |
p. |
artikel |
29 |
On the vulnerability of anti-malware solutions to DNS attacks
|
Nadler, Asaf |
|
|
116 |
C |
p. |
artikel |
30 |
Optimization of code caves in malware binaries to evade machine learning detectors
|
Yuste, Javier |
|
|
116 |
C |
p. |
artikel |
31 |
PasswordTensor: Analyzing and explaining password strength using tensor decomposition
|
Shin, Youjin |
|
|
116 |
C |
p. |
artikel |
32 |
Preventive portfolio against data-selling ransomware—A game theory of encryption and deception
|
Li, Zhen |
|
|
116 |
C |
p. |
artikel |
33 |
Rethinking maximum-margin softmax for adversarial robustness
|
Hassanin, Mohammed |
|
|
116 |
C |
p. |
artikel |
34 |
Robust deep learning early alarm prediction model based on the behavioural smell for android malware
|
Amer, Eslam |
|
|
116 |
C |
p. |
artikel |
35 |
Towards an information-theoretic framework of intrusion detection for composed systems and robustness analyses
|
Mages, Tobias |
|
|
116 |
C |
p. |
artikel |
36 |
TrustBuilder: A non-repudiation scheme for IoT cloud applications
|
Chen, Fei |
|
|
116 |
C |
p. |
artikel |
37 |
Two decades of cyberattack simulations: A systematic literature review
|
Engström, Viktor |
|
|
116 |
C |
p. |
artikel |
38 |
Unsupervised malicious domain detection with less labeling effort
|
Park, Kyung Ho |
|
|
116 |
C |
p. |
artikel |
39 |
Vulnerability analysis of Qualcomm Secure Execution Environment (QSEE)
|
Khalid, Fatima |
|
|
116 |
C |
p. |
artikel |