Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AdStop: Efficient flow-based mobile adware detection using machine learning Alani, Mohammed M.

117 C p.
artikel
2 A few-shot meta-learning based siamese neural network using entropy features for ransomware classification Zhu, Jinting

117 C p.
artikel
3 A novel privacy-aware model for nonparametric decentralized detection Ma, Qian

117 C p.
artikel
4 Assessing frameworks for eliciting privacy & security requirements from laws and regulations Olukoya, Oluwafemi

117 C p.
artikel
5 Assessing system of systems information security risk with OASoSIS Ki-Aries, Duncan

117 C p.
artikel
6 Can my firewall system enforce this policy? Ceragioli, Lorenzo

117 C p.
artikel
7 Chameleon: Optimized feature selection using particle swarm optimization and ensemble methods for network anomaly detection Chohra, Aniss

117 C p.
artikel
8 Communizer: A collaborative cloud-based self-protecting software communities framework - Focus on the alert coordination system Iraqi, Omar

117 C p.
artikel
9 Corrigendum to ‘Probabilistic modelling of deception-based security framework using markov decision process’ [Computers & Security 115 (2022)/102599] Haseeb, Junaid

117 C p.
artikel
10 DeMal: Module decomposition of malware based on community discovery Huang, Yuyao

117 C p.
artikel
11 Designing effective masking strategies for cyberdefense through human experimentation and cognitive models Aggarwal, Palvi

117 C p.
artikel
12 DIFCS: A Secure Cloud Data Sharing Approach Based on Decentralized Information Flow Control Lu, Jintian

117 C p.
artikel
13 Editorial Board
117 C p.
artikel
14 Efficient optimisation framework for convolutional neural networks with secure multiparty computation Berry, Cate

117 C p.
artikel
15 Ensemble transfer attack targeting text classification systems Kwon, Hyun

117 C p.
artikel
16 Fuzzing-based hard-label black-box attacks against machine learning models Qin, Yi

117 C p.
artikel
17 Hybrid intrusion detection system based on Dempster-Shafer evidence theory Qiu, Weicheng

117 C p.
artikel
18 Joint prediction on security event and time interval through deep learning Wu, Songyun

117 C p.
artikel
19 Machine learning-based early detection of IoT botnets using network-edge traffic Kumar, Ayush

117 C p.
artikel
20 Modeling and analyzing attacker behavior in IoT botnet using temporal convolution network (TCN) Sadique, Farhan

117 C p.
artikel
21 On the privacy protection of indoor location dataset using anonymization Fathalizadeh, Amir

117 C p.
artikel
22 Survey on smart homes: Vulnerabilities, risks, and countermeasures Hammi, Badis

117 C p.
artikel
23 VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures Katsikeas, Sotirios

117 C p.
artikel
24 White-box content camouflage attacks against deep learning Chen, Tianrong

117 C p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland