nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive survey of covert communication techniques, limitations and future challenges
|
Makhdoom, Imran |
|
|
120 |
C |
p. |
artikel |
2 |
AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks
|
Pashamokhtari, Arman |
|
|
120 |
C |
p. |
artikel |
3 |
Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications
|
Rashid, Md. Mamunur |
|
|
120 |
C |
p. |
artikel |
4 |
An empirical study of vulnerability discovery methods over the past ten years
|
Cui, Lei |
|
|
120 |
C |
p. |
artikel |
5 |
An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity
|
Naik, Nitin |
|
|
120 |
C |
p. |
artikel |
6 |
A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques
|
Riera, Tomás Sureda |
|
|
120 |
C |
p. |
artikel |
7 |
An internet of secure and private things: A service-oriented architecture
|
Showail, Ahmad |
|
|
120 |
C |
p. |
artikel |
8 |
Assessing website password practices – Unchanged after fifteen years?
|
Furnell, Steven |
|
|
120 |
C |
p. |
artikel |
9 |
Attributes impacting cybersecurity policy development: An evidence from seven nations
|
Mishra, Alok |
|
|
120 |
C |
p. |
artikel |
10 |
Authenticating tier-two body area network devices through user-specific signal propagation characteristics
|
Umar, Mubarak |
|
|
120 |
C |
p. |
artikel |
11 |
Backdoor smoothing: Demystifying backdoor attacks on deep neural networks
|
Grosse, Kathrin |
|
|
120 |
C |
p. |
artikel |
12 |
Beholder – A CEP-based intrusion detection and prevention systems for IoT environments
|
Lima, Milton |
|
|
120 |
C |
p. |
artikel |
13 |
CLICKA: Collecting and leveraging identity cues with keystroke dynamics
|
Buckley, Oliver |
|
|
120 |
C |
p. |
artikel |
14 |
Concept drift and cross-device behavior: Challenges and implications for effective android malware detection
|
Guerra-Manzanares, Alejandro |
|
|
120 |
C |
p. |
artikel |
15 |
Datasets are not enough: Challenges in labeling network traffic
|
Guerra, Jorge Luis |
|
|
120 |
C |
p. |
artikel |
16 |
Deep learning based cross architecture internet of things malware detection and classification
|
Chaganti, Rajasekhar |
|
|
120 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
120 |
C |
p. |
artikel |
18 |
Efficient ABAC based information sharing within MQTT environments under emergencies
|
Colombo, Pietro |
|
|
120 |
C |
p. |
artikel |
19 |
EvilModel 2.0: Bringing Neural Network Models into Malware Attacks
|
Wang, Zhi |
|
|
120 |
C |
p. |
artikel |
20 |
Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions
|
Chen, Xuyang |
|
|
120 |
C |
p. |
artikel |
21 |
Fuzzing vulnerability discovery techniques: Survey, challenges and future directions
|
Beaman, Craig |
|
|
120 |
C |
p. |
artikel |
22 |
HAGDetector: Heterogeneous DGA domain name detection model
|
Liang, Jianbing |
|
|
120 |
C |
p. |
artikel |
23 |
IFAttn: Binary code similarity analysis based on interpretable features with attention
|
Jiang, Shuai |
|
|
120 |
C |
p. |
artikel |
24 |
Improving transferability of adversarial examples by saliency distribution and data augmentation
|
Dong, Yansong |
|
|
120 |
C |
p. |
artikel |
25 |
Insights into security and privacy towards fog computing evolution
|
Sicari, Sabrina |
|
|
120 |
C |
p. |
artikel |
26 |
KPointer: Keep the code pointers on the stack point to the right code
|
Li, YongGang |
|
|
120 |
C |
p. |
artikel |
27 |
KRTunnel: DNS channel detector for mobile devices
|
Wang, Senmiao |
|
|
120 |
C |
p. |
artikel |
28 |
LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning
|
Zhou, Zhipeng |
|
|
120 |
C |
p. |
artikel |
29 |
Malware‐SMELL: A zero‐shot learning strategy for detecting zero‐day vulnerabilities
|
Barros, Pedro H. |
|
|
120 |
C |
p. |
artikel |
30 |
MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems
|
Hammad, Mohamed |
|
|
120 |
C |
p. |
artikel |
31 |
On-manifold adversarial attack based on latent space substitute model
|
Zhang, Chunkai |
|
|
120 |
C |
p. |
artikel |
32 |
Organizational and team culture as antecedents of protection motivation among IT employees
|
Sharma, Shwadhin |
|
|
120 |
C |
p. |
artikel |
33 |
Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models
|
Vorobyev, Ivan |
|
|
120 |
C |
p. |
artikel |
34 |
Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network
|
Goswami, Hemangi |
|
|
120 |
C |
p. |
artikel |
35 |
Robust stacking ensemble model for darknet traffic classification under adversarial settings
|
Mohanty, Hardhik |
|
|
120 |
C |
p. |
artikel |
36 |
Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage
|
BALMANY, Chawki EL |
|
|
120 |
C |
p. |
artikel |
37 |
Tamp-X: Attacking explainable natural language classifiers through tampered activations
|
Ali, Hassan |
|
|
120 |
C |
p. |
artikel |
38 |
The cybersecurity behavioral research: A tertiary study
|
Khan, Naurin Farooq |
|
|
120 |
C |
p. |
artikel |
39 |
The cybersecurity risk estimation engine: A tool for possibility based risk analysis
|
Baskerville, Richard L. |
|
|
120 |
C |
p. |
artikel |
40 |
The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity
|
Villalón-Fonseca, Ricardo |
|
|
120 |
C |
p. |
artikel |
41 |
Threat classification model for security information event management focusing on model efficiency
|
Kim, Jae-yeol |
|
|
120 |
C |
p. |
artikel |
42 |
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis
|
Niu, Weina |
|
|
120 |
C |
p. |
artikel |
43 |
Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text
|
Jo, Hyeonseong |
|
|
120 |
C |
p. |
artikel |
44 |
What changed in the cyber-security after COVID-19?
|
Kumar, Rajesh |
|
|
120 |
C |
p. |
artikel |
45 |
XSS adversarial example attacks based on deep reinforcement learning
|
Chen, Li |
|
|
120 |
C |
p. |
artikel |