Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             45 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive survey of covert communication techniques, limitations and future challenges Makhdoom, Imran

120 C p.
artikel
2 AdIoTack: Quantifying and refining resilience of decision tree ensemble inference models against adversarial volumetric attacks on IoT networks Pashamokhtari, Arman

120 C p.
artikel
3 Adversarial training for deep learning-based cyberattack detection in IoT-based smart city applications Rashid, Md. Mamunur

120 C p.
artikel
4 An empirical study of vulnerability discovery methods over the past ten years Cui, Lei

120 C p.
artikel
5 An evaluation of potential attack surfaces based on attack tree modelling and risk matrix applied to self-sovereign identity Naik, Nitin

120 C p.
artikel
6 A new multi-label dataset for Web attacks CAPEC classification using machine learning techniques Riera, Tomás Sureda

120 C p.
artikel
7 An internet of secure and private things: A service-oriented architecture Showail, Ahmad

120 C p.
artikel
8 Assessing website password practices – Unchanged after fifteen years? Furnell, Steven

120 C p.
artikel
9 Attributes impacting cybersecurity policy development: An evidence from seven nations Mishra, Alok

120 C p.
artikel
10 Authenticating tier-two body area network devices through user-specific signal propagation characteristics Umar, Mubarak

120 C p.
artikel
11 Backdoor smoothing: Demystifying backdoor attacks on deep neural networks Grosse, Kathrin

120 C p.
artikel
12 Beholder – A CEP-based intrusion detection and prevention systems for IoT environments Lima, Milton

120 C p.
artikel
13 CLICKA: Collecting and leveraging identity cues with keystroke dynamics Buckley, Oliver

120 C p.
artikel
14 Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Guerra-Manzanares, Alejandro

120 C p.
artikel
15 Datasets are not enough: Challenges in labeling network traffic Guerra, Jorge Luis

120 C p.
artikel
16 Deep learning based cross architecture internet of things malware detection and classification Chaganti, Rajasekhar

120 C p.
artikel
17 Editorial Board
120 C p.
artikel
18 Efficient ABAC based information sharing within MQTT environments under emergencies Colombo, Pietro

120 C p.
artikel
19 EvilModel 2.0: Bringing Neural Network Models into Malware Attacks Wang, Zhi

120 C p.
artikel
20 Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions Chen, Xuyang

120 C p.
artikel
21 Fuzzing vulnerability discovery techniques: Survey, challenges and future directions Beaman, Craig

120 C p.
artikel
22 HAGDetector: Heterogeneous DGA domain name detection model Liang, Jianbing

120 C p.
artikel
23 IFAttn: Binary code similarity analysis based on interpretable features with attention Jiang, Shuai

120 C p.
artikel
24 Improving transferability of adversarial examples by saliency distribution and data augmentation Dong, Yansong

120 C p.
artikel
25 Insights into security and privacy towards fog computing evolution Sicari, Sabrina

120 C p.
artikel
26 KPointer: Keep the code pointers on the stack point to the right code Li, YongGang

120 C p.
artikel
27 KRTunnel: DNS channel detector for mobile devices Wang, Senmiao

120 C p.
artikel
28 LEGO: A hybrid toolkit for efficient 2PC-based privacy-preserving machine learning Zhou, Zhipeng

120 C p.
artikel
29 Malware‐SMELL: A zero‐shot learning strategy for detecting zero‐day vulnerabilities Barros, Pedro H.

120 C p.
artikel
30 MMM-RF: A novel high accuracy multinomial mixture model for network intrusion detection systems Hammad, Mohamed

120 C p.
artikel
31 On-manifold adversarial attack based on latent space substitute model Zhang, Chunkai

120 C p.
artikel
32 Organizational and team culture as antecedents of protection motivation among IT employees Sharma, Shwadhin

120 C p.
artikel
33 Reducing false positives in bank anti-fraud systems based on rule induction in distributed tree-based models Vorobyev, Ivan

120 C p.
artikel
34 Remote Registration and Group Authentication of IoT Devices in 5G Cellular Network Goswami, Hemangi

120 C p.
artikel
35 Robust stacking ensemble model for darknet traffic classification under adversarial settings Mohanty, Hardhik

120 C p.
artikel
36 Secure Virtual Machine Image Storage Process into a Trusted Zone-based Cloud Storage BALMANY, Chawki EL

120 C p.
artikel
37 Tamp-X: Attacking explainable natural language classifiers through tampered activations Ali, Hassan

120 C p.
artikel
38 The cybersecurity behavioral research: A tertiary study Khan, Naurin Farooq

120 C p.
artikel
39 The cybersecurity risk estimation engine: A tool for possibility based risk analysis Baskerville, Richard L.

120 C p.
artikel
40 The nature of security: A conceptual framework for integral-comprehensive modeling of IT security and cybersecurity Villalón-Fonseca, Ricardo

120 C p.
artikel
41 Threat classification model for security information event management focusing on model efficiency Kim, Jae-yeol

120 C p.
artikel
42 Uncovering APT malware traffic using deep learning combined with time sequence and association analysis Niu, Weina

120 C p.
artikel
43 Vulcan: Automatic extraction and analysis of cyber threat intelligence from unstructured text Jo, Hyeonseong

120 C p.
artikel
44 What changed in the cyber-security after COVID-19? Kumar, Rajesh

120 C p.
artikel
45 XSS adversarial example attacks based on deep reinforcement learning Chen, Li

120 C p.
artikel
                             45 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland