nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis and Detection against Network Attacks in the Overlapping Phenomenon of Behavior Attribute
|
Xie, Jiang |
|
|
121 |
C |
p. |
artikel |
2 |
Android malware detection as a Bi-level problem
|
Jerbi, Manel |
|
|
121 |
C |
p. |
artikel |
3 |
An ensemble of pre-trained transformer models for imbalanced multiclass malware classification
|
Demirkıran, Ferhat |
|
|
121 |
C |
p. |
artikel |
4 |
An in-depth review of machine learning based Android malware detection
|
Muzaffar, Ali |
|
|
121 |
C |
p. |
artikel |
5 |
A survey on adversarial attacks in computer vision: Taxonomy, visualization and future directions
|
Long, Teng |
|
|
121 |
C |
p. |
artikel |
6 |
A Taxonomy for Threat Actors’ Persistence Techniques
|
Villalón-Huerta, Antonio |
|
|
121 |
C |
p. |
artikel |
7 |
A time-interval-based active learning framework for enhanced PE malware acquisition and detection
|
Finder, Ido |
|
|
121 |
C |
p. |
artikel |
8 |
Beyond robustness: Resilience verification of tree-based classifiers
|
Calzavara, Stefano |
|
|
121 |
C |
p. |
artikel |
9 |
Comparative research on network intrusion detection methods based on machine learning
|
Zhang, Chunying |
|
|
121 |
C |
p. |
artikel |
10 |
Datadriven false data injection attacks against cyber-physical power systems
|
Tian, Jiwei |
|
|
121 |
C |
p. |
artikel |
11 |
Defense against backdoor attack in federated learning
|
Lu, Shiwei |
|
|
121 |
C |
p. |
artikel |
12 |
Detecting unknown HTTP-based malicious communication behavior via generated adversarial flows and hierarchical traffic features
|
Yun, Xiaochun |
|
|
121 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
121 |
C |
p. |
artikel |
14 |
Evaluating multi-modal mobile behavioral biometrics using public datasets
|
Ray-Dowling, Aratrika |
|
|
121 |
C |
p. |
artikel |
15 |
Few-shot IoT attack detection based on RFP-CNN and adversarial unsupervised domain-adaptive regularization
|
Li, Kehong |
|
|
121 |
C |
p. |
artikel |
16 |
Footsteps in the fog: Certificateless fog-based access control
|
Frimpong, Eugene |
|
|
121 |
C |
p. |
artikel |
17 |
Governing cybersecurity from the boardroom: Challenges, drivers, and ways ahead
|
Gale, Megan |
|
|
121 |
C |
p. |
artikel |
18 |
HDFEF: A hierarchical and dynamic feature extraction framework for intrusion detection systems
|
Li, Yanan |
|
|
121 |
C |
p. |
artikel |
19 |
HyVulDect: A hybrid semantic vulnerability mining system based on graph neural network
|
Guo, Wenbo |
|
|
121 |
C |
p. |
artikel |
20 |
ID-based sanitizable signature data integrity auditing scheme with privacy-preserving
|
Liu, Zhenpeng |
|
|
121 |
C |
p. |
artikel |
21 |
Investigating perceptions about risk of data breaches in financial institutions: A routine activity-approach
|
Lee, Jaeung |
|
|
121 |
C |
p. |
artikel |
22 |
Keypad entry inference with sensor fusion from mobile and smart wearables
|
Liu, Yuanzhen |
|
|
121 |
C |
p. |
artikel |
23 |
KRYSTAL: Knowledge graph-based framework for tactical attack discovery in audit data
|
Kurniawan, Kabul |
|
|
121 |
C |
p. |
artikel |
24 |
Making federated learning robust to adversarial attacks by learning data and model association
|
Qayyum, Adnan |
|
|
121 |
C |
p. |
artikel |
25 |
MFMCNS: a multi-feature and multi-classifier network-based system for ransomworm detection
|
Almashhadani, Ahmad O. |
|
|
121 |
C |
p. |
artikel |
26 |
Multi-labeling of complex, multi-behavioral malware samples
|
García-Teodoro, P. |
|
|
121 |
C |
p. |
artikel |
27 |
Practical attacks on Login CSRF in OAuth
|
Arshad, Elham |
|
|
121 |
C |
p. |
artikel |
28 |
RADAMS: Resilient and adaptive alert and attention management strategy against Informational Denial-of-Service (IDoS) attacks
|
Huang, Linan |
|
|
121 |
C |
p. |
artikel |
29 |
Reinforcement learning based adversarial malware example generation against black-box detectors
|
Zhong, Fangtian |
|
|
121 |
C |
p. |
artikel |
30 |
SEDML: Securely and efficiently harnessing distributed knowledge in machine learning
|
Gao, Yansong |
|
|
121 |
C |
p. |
artikel |
31 |
#Segments: A Dominant Factor of Password Security to Resist against Data-driven Guessing
|
Wang, Chuanwang |
|
|
121 |
C |
p. |
artikel |
32 |
Stop bugging me! Evading modern-day wiretapping using adversarial perturbations
|
Mathov, Yael |
|
|
121 |
C |
p. |
artikel |
33 |
The effect of signal icon and persuasion strategy on warning design in online fraud
|
Wang, Jie |
|
|
121 |
C |
p. |
artikel |
34 |
Transferable adversarial examples based on global smooth perturbations
|
Liu, Yujia |
|
|
121 |
C |
p. |
artikel |