nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AdStop: Efficient flow-based mobile adware detection using machine learning
|
Alani, Mohammed M. |
|
|
117 |
C |
p. |
artikel |
2 |
A few-shot meta-learning based siamese neural network using entropy features for ransomware classification
|
Zhu, Jinting |
|
|
117 |
C |
p. |
artikel |
3 |
A novel privacy-aware model for nonparametric decentralized detection
|
Ma, Qian |
|
|
117 |
C |
p. |
artikel |
4 |
Assessing frameworks for eliciting privacy & security requirements from laws and regulations
|
Olukoya, Oluwafemi |
|
|
117 |
C |
p. |
artikel |
5 |
Assessing system of systems information security risk with OASoSIS
|
Ki-Aries, Duncan |
|
|
117 |
C |
p. |
artikel |
6 |
Can my firewall system enforce this policy?
|
Ceragioli, Lorenzo |
|
|
117 |
C |
p. |
artikel |
7 |
Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection
|
Chohra, Aniss |
|
|
117 |
C |
p. |
artikel |
8 |
Communizer: A collaborative cloud-based self-protecting software communities framework - Focus on the alert coordination system
|
Iraqi, Omar |
|
|
117 |
C |
p. |
artikel |
9 |
Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599]
|
Haseeb, Junaid |
|
|
117 |
C |
p. |
artikel |
10 |
DeMal: Module decomposition of malware based on community discovery
|
Huang, Yuyao |
|
|
117 |
C |
p. |
artikel |
11 |
Designing effective masking strategies for cyberdefense through human experimentation and cognitive models
|
Aggarwal, Palvi |
|
|
117 |
C |
p. |
artikel |
12 |
DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control
|
Lu, Jintian |
|
|
117 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
117 |
C |
p. |
artikel |
14 |
Efficient optimisation framework for convolutional neural networks with secure multiparty computation
|
Berry, Cate |
|
|
117 |
C |
p. |
artikel |
15 |
Ensemble transfer attack targeting text classification systems
|
Kwon, Hyun |
|
|
117 |
C |
p. |
artikel |
16 |
Fuzzing-based hard-label black-box attacks against machine learning models
|
Qin, Yi |
|
|
117 |
C |
p. |
artikel |
17 |
Hybrid intrusion detection system based on Dempster-Shafer evidence theory
|
Qiu, Weicheng |
|
|
117 |
C |
p. |
artikel |
18 |
Joint prediction on security event and time interval through deep learning
|
Wu, Songyun |
|
|
117 |
C |
p. |
artikel |
19 |
Machine learning-based early detection of IoT botnets using network-edge traffic
|
Kumar, Ayush |
|
|
117 |
C |
p. |
artikel |
20 |
Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN)
|
Sadique, Farhan |
|
|
117 |
C |
p. |
artikel |
21 |
On the privacy protection of indoor location dataset using anonymization
|
Fathalizadeh, Amir |
|
|
117 |
C |
p. |
artikel |
22 |
Survey on smart homes: Vulnerabilities, risks, and countermeasures
|
Hammi, Badis |
|
|
117 |
C |
p. |
artikel |
23 |
VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures
|
Katsikeas, Sotirios |
|
|
117 |
C |
p. |
artikel |
24 |
White-box content camouflage attacks against deep learning
|
Chen, Tianrong |
|
|
117 |
C |
p. |
artikel |