nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial malware sample generation method based on the prototype of deep learning detector
|
Qiao, Yanchen |
|
|
119 |
C |
p. |
artikel |
2 |
Apícula: Static detection of API calls in generic streams of bytes
|
D’Onghia, Mario |
|
|
119 |
C |
p. |
artikel |
3 |
Behavioral embedding for continuous user verification in global settings
|
Levi, Matan |
|
|
119 |
C |
p. |
artikel |
4 |
Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise
|
Shillair, Ruth |
|
|
119 |
C |
p. |
artikel |
5 |
Editorial Board
|
|
|
|
119 |
C |
p. |
artikel |
6 |
Everything you control is not everything: Achieving intention-concealed visit on social networks
|
Li, Helin |
|
|
119 |
C |
p. |
artikel |
7 |
Feature fusion-based malicious code detection with dual attention mechanism and BiLSTM
|
Shen, Gaoning |
|
|
119 |
C |
p. |
artikel |
8 |
Ibn Sina: A patient privacy‐preserving authentication protocol in medical internet of things
|
Rasslan, Mohamed |
|
|
119 |
C |
p. |
artikel |
9 |
MARK: Fill in the blanks through a JointGAN based data augmentation for network anomaly detection
|
Patil, Rajendra |
|
|
119 |
C |
p. |
artikel |
10 |
On how VoIP attacks foster the malicious call ecosystem
|
Carrillo-Mondéjar, J. |
|
|
119 |
C |
p. |
artikel |
11 |
Reducing Ransomware Crime: Analysis of Victims’ Payment Decisions
|
Yuryna Connolly, Alena |
|
|
119 |
C |
p. |
artikel |
12 |
The role of national cybersecurity strategies on the improvement of cybersecurity education
|
AlDaajeh, Saleh |
|
|
119 |
C |
p. |
artikel |
13 |
Time for De-cluttering: Digital clutter scaling for individuals and enterprises
|
Uğur, Naciye Güliz |
|
|
119 |
C |
p. |
artikel |
14 |
Towards a privacy protection-capable noise fingerprinting for numerically aggregated data
|
Hu, Yun |
|
|
119 |
C |
p. |
artikel |