nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment
|
Aydın, Hakan |
|
|
118 |
C |
p. |
artikel |
2 |
A new DDoS attacks intrusion detection model based on deep learning for cybersecurity
|
Akgun, Devrim |
|
|
118 |
C |
p. |
artikel |
3 |
Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks
|
Jacob, Stephen |
|
|
118 |
C |
p. |
artikel |
4 |
A systematic synthesis of critical success factors for cybersecurity
|
Yeoh, William |
|
|
118 |
C |
p. |
artikel |
5 |
Blindfold: Keeping private keys in PKIs and CDNs out of sight
|
Galal, Hisham |
|
|
118 |
C |
p. |
artikel |
6 |
Boosting adversarial attacks with transformed gradient
|
He, Zhengyun |
|
|
118 |
C |
p. |
artikel |
7 |
Cross-domain alert correlation methodology for industrial control systems
|
Koucham, Oualid |
|
|
118 |
C |
p. |
artikel |
8 |
DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams
|
Li, Bin |
|
|
118 |
C |
p. |
artikel |
9 |
Differentially private hierarchical tree with high efficiency
|
Zhu, Hui |
|
|
118 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
118 |
C |
p. |
artikel |
11 |
Influencing the security prioritisation of an agile software development project
|
Tøndel, Inger Anne |
|
|
118 |
C |
p. |
artikel |
12 |
JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network
|
Fang, Yong |
|
|
118 |
C |
p. |
artikel |
13 |
Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives
|
Himeur, Yassine |
|
|
118 |
C |
p. |
artikel |
14 |
MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining
|
Nawaz, M. Saqib |
|
|
118 |
C |
p. |
artikel |
15 |
MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach
|
Aksu, Dogukan |
|
|
118 |
C |
p. |
artikel |
16 |
Privacy-Preserving and verifiable SRC -based face recognition with cloud/edge server assistance
|
Sun, Xin |
|
|
118 |
C |
p. |
artikel |
17 |
PTB: Robust physical backdoor attacks against deep neural networks in real world
|
Xue, Mingfu |
|
|
118 |
C |
p. |
artikel |
18 |
SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning
|
Manimaran, S. |
|
|
118 |
C |
p. |
artikel |
19 |
Secure biometric hashing against relation-based attacks via maximizing min-entropy
|
Yu, Lianyi |
|
|
118 |
C |
p. |
artikel |
20 |
Securing heterogeneous embedded devices against XSS attack in intelligent IoT system
|
Chaudhary, Pooja |
|
|
118 |
C |
p. |
artikel |
21 |
Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects
|
Guggenmos, Florian |
|
|
118 |
C |
p. |
artikel |
22 |
Step & turn—A novel bimodal behavioral biometric-based user verification scheme for physical access control
|
Gupta, Sandeep |
|
|
118 |
C |
p. |
artikel |
23 |
Strategic signaling for utility control in audit games
|
Chen, Jianan |
|
|
118 |
C |
p. |
artikel |
24 |
The self-assessed information security skills of the Finnish population: A regression analysis
|
Kyytsönen, Maiju |
|
|
118 |
C |
p. |
artikel |
25 |
The triggers that open the NLP model backdoors are hidden in the adversarial samples
|
Shao, Kun |
|
|
118 |
C |
p. |
artikel |
26 |
Transferable adversarial examples can efficiently fool topic models
|
Wang, Zhen |
|
|
118 |
C |
p. |
artikel |
27 |
Wasmati: An efficient static vulnerability scanner for WebAssembly
|
Brito, Tiago |
|
|
118 |
C |
p. |
artikel |