Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             34 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute Xie, Jiang

121 C p.
artikel
2 Android malware detection as a Bi-level problem Jerbi, Manel

121 C p.
artikel
3 An ensemble of pre-trained transformer models for imbalanced multiclass malware classification Demirkıran, Ferhat

121 C p.
artikel
4 An in-depth review of machine learning based Android malware detection Muzaffar, Ali

121 C p.
artikel
5 A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions Long, Teng

121 C p.
artikel
6 A Taxonomy for Threat Actors’ Persistence Techniques Villalón-Huerta, Antonio

121 C p.
artikel
7 A time-interval-based active learning framework for enhanced PE malware acquisition and detection Finder, Ido

121 C p.
artikel
8 Beyond robustness: Resilience verification of tree-based classifiers Calzavara, Stefano

121 C p.
artikel
9 Comparative research on network intrusion detection methods based on machine learning Zhang, Chunying

121 C p.
artikel
10 Datadriven false data injection attacks against cyber-physical power systems Tian, Jiwei

121 C p.
artikel
11 Defense against backdoor attack in federated learning Lu, Shiwei

121 C p.
artikel
12 Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features Yun, Xiaochun

121 C p.
artikel
13 Editorial Board
121 C p.
artikel
14 Evaluating multi-modal mobile behavioral biometrics using public datasets Ray-Dowling, Aratrika

121 C p.
artikel
15 Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization Li, Kehong

121 C p.
artikel
16 Footsteps in the fog: Certificateless fog-based access control Frimpong, Eugene

121 C p.
artikel
17 Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead Gale, Megan

121 C p.
artikel
18 HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems Li, Yanan

121 C p.
artikel
19 HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network Guo, Wenbo

121 C p.
artikel
20 ID-based sanitizable signature data integrity auditing scheme with privacy-preserving Liu, Zhenpeng

121 C p.
artikel
21 Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach Lee, Jaeung

121 C p.
artikel
22 Keypad entry inference with sensor fusion from mobile and smart wearables Liu, Yuanzhen

121 C p.
artikel
23 KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data Kurniawan, Kabul

121 C p.
artikel
24 Making federated learning robust to adversarial attacks by learning data and model association Qayyum, Adnan

121 C p.
artikel
25 MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection Almashhadani, Ahmad O.

121 C p.
artikel
26 Multi-labeling of complex, multi-behavioral malware samples García-Teodoro, P.

121 C p.
artikel
27 Practical attacks on Login CSRF in OAuth Arshad, Elham

121 C p.
artikel
28 RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks Huang, Linan

121 C p.
artikel
29 Reinforcement learning based adversarial malware example generation against black-box detectors Zhong, Fangtian

121 C p.
artikel
30 SEDML: Securely and efficiently harnessing distributed knowledge in machine learning Gao, Yansong

121 C p.
artikel
31 #Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing Wang, Chuanwang

121 C p.
artikel
32 Stop bugging me! Evading modern-day wiretapping using adversarial perturbations Mathov, Yael

121 C p.
artikel
33 The effect of signal icon and persuasion strategy on warning design in online fraud Wang, Jie

121 C p.
artikel
34 Transferable adversarial examples based on global smooth perturbations Liu, Yujia

121 C p.
artikel
                             34 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland