Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A long short-term memory (LSTM)-based distributed denial of service (DDoS) detection and defense system design in public cloud network environment Aydın, Hakan

118 C p.
artikel
2 A new DDoS attacks intrusion detection model based on deep learning for cybersecurity Akgun, Devrim

118 C p.
artikel
3 Anomalous distributed traffic: Detecting cyber security attacks amongst microservices using graph convolutional networks Jacob, Stephen

118 C p.
artikel
4 A systematic synthesis of critical success factors for cybersecurity Yeoh, William

118 C p.
artikel
5 Blindfold: Keeping private keys in PKIs and CDNs out of sight Galal, Hisham

118 C p.
artikel
6 Boosting adversarial attacks with transformed gradient He, Zhengyun

118 C p.
artikel
7 Cross-domain alert correlation methodology for industrial control systems Koucham, Oualid

118 C p.
artikel
8 DFAID: Density‐aware and feature‐deviated active intrusion detection over network traffic streams Li, Bin

118 C p.
artikel
9 Differentially private hierarchical tree with high efficiency Zhu, Hui

118 C p.
artikel
10 Editorial Board
118 C p.
artikel
11 Influencing the security prioritisation of an agile software development project Tøndel, Inger Anne

118 C p.
artikel
12 JStrong: Malicious JavaScript detection based on code semantic representation and graph neural network Fang, Yong

118 C p.
artikel
13 Latest trends of security and privacy in recommender systems: A comprehensive review and future perspectives Himeur, Yassine

118 C p.
artikel
14 MalSPM: Metamorphic malware behavior analysis and classification using sequential pattern mining Nawaz, M. Saqib

118 C p.
artikel
15 MGA-IDS: Optimal feature subset selection for anomaly detection framework on in-vehicle networks-CAN bus based on genetic algorithm and intrusion detection approach Aksu, Dogukan

118 C p.
artikel
16 Privacy-Preserving and verifiable SRC -based face recognition with cloud/edge server assistance Sun, Xin

118 C p.
artikel
17 PTB: Robust physical backdoor attacks against deep neural networks in real world Xue, Mingfu

118 C p.
artikel
18 SBTDDL: A novel framework for sensor-based threats detection on Android smartphones using deep learning Manimaran, S.

118 C p.
artikel
19 Secure biometric hashing against relation-based attacks via maximizing min-entropy Yu, Lianyi

118 C p.
artikel
20 Securing heterogeneous embedded devices against XSS attack in intelligent IoT system Chaudhary, Pooja

118 C p.
artikel
21 Security First, Security by Design, or Security Pragmatism – Strategic Roles of IT Security in Digitalization Projects Guggenmos, Florian

118 C p.
artikel
22 Step & turn—A novel bimodal behavioral biometric-based user verification scheme for physical access control Gupta, Sandeep

118 C p.
artikel
23 Strategic signaling for utility control in audit games Chen, Jianan

118 C p.
artikel
24 The self-assessed information security skills of the Finnish population: A regression analysis Kyytsönen, Maiju

118 C p.
artikel
25 The triggers that open the NLP model backdoors are hidden in the adversarial samples Shao, Kun

118 C p.
artikel
26 Transferable adversarial examples can efficiently fool topic models Wang, Zhen

118 C p.
artikel
27 Wasmati: An efficient static vulnerability scanner for WebAssembly Brito, Tiago

118 C p.
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland