nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial attack via dual-stage network erosion
|
Duan, Yexin |
|
|
122 |
C |
p. |
artikel |
2 |
A few-shot malware classification approach for unknown family recognition using malware feature visualization
|
Conti, Mauro |
|
|
122 |
C |
p. |
artikel |
3 |
AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation
|
Du, Xuechao |
|
|
122 |
C |
p. |
artikel |
4 |
An analysis of zero-trust architecture and its cost-effectiveness for organizational security
|
Adahman, Zillah |
|
|
122 |
C |
p. |
artikel |
5 |
A new intrusion detection system based on using non-linear statistical analysis and features selection techniques
|
Al-Bakaa, Aliaa |
|
|
122 |
C |
p. |
artikel |
6 |
An ontology oriented service framework for social IoT
|
Dhillon, Parveen |
|
|
122 |
C |
p. |
artikel |
7 |
A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform
|
Chahal, Navdeep S. |
|
|
122 |
C |
p. |
artikel |
8 |
APT beaconing detection: A systematic review
|
Abu Talib, Manar |
|
|
122 |
C |
p. |
artikel |
9 |
Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments
|
Benyahya, Meriem |
|
|
122 |
C |
p. |
artikel |
10 |
Background knowledge attacks in privacy-preserving data publishing models
|
Desai, Nidhi |
|
|
122 |
C |
p. |
artikel |
11 |
Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations
|
Abdul Hamid, Nor Hasnul Azirah |
|
|
122 |
C |
p. |
artikel |
12 |
CAESAR8: An agile enterprise architecture approach to managing information security risks
|
Loft, Paul |
|
|
122 |
C |
p. |
artikel |
13 |
CIST: A Serious Game for Hardware Supply Chain
|
Hart, Stephen |
|
|
122 |
C |
p. |
artikel |
14 |
CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training
|
Lee, Jung-San |
|
|
122 |
C |
p. |
artikel |
15 |
Decision support for healthcare cyber security
|
Özdemir Sönmez, Ferda |
|
|
122 |
C |
p. |
artikel |
16 |
DMalNet: Dynamic malware analysis based on API feature engineering and graph learning
|
Li, Ce |
|
|
122 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
122 |
C |
p. |
artikel |
18 |
Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks
|
Qiang, Weizhong |
|
|
122 |
C |
p. |
artikel |
19 |
EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning
|
Hao, Jingwei |
|
|
122 |
C |
p. |
artikel |
20 |
Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach
|
Özkan, Barış |
|
|
122 |
C |
p. |
artikel |
21 |
Fairness and privacy preservation for facial images: GAN-based methods
|
Tian, Huan |
|
|
122 |
C |
p. |
artikel |
22 |
FS-IDS: A framework for intrusion detection based on few-shot learning
|
Yang, Jingcheng |
|
|
122 |
C |
p. |
artikel |
23 |
MinSIB: Minimized static instrumentation for fuzzing binaries
|
Gu, Yeming |
|
|
122 |
C |
p. |
artikel |
24 |
Misleading attention and classification: An adversarial attack to fool object detection models in the real world
|
Zhang, Haotian |
|
|
122 |
C |
p. |
artikel |
25 |
On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection
|
Guerra-Manzanares, Alejandro |
|
|
122 |
C |
p. |
artikel |
26 |
Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security
|
Schinagl, Stef |
|
|
122 |
C |
p. |
artikel |
27 |
Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems
|
Kravchik, Moshe |
|
|
122 |
C |
p. |
artikel |
28 |
Privacy, accuracy, and model fairness trade-offs in federated learning
|
Gu, Xiuting |
|
|
122 |
C |
p. |
artikel |
29 |
Security of Open Radio Access Networks
|
Mimran, Dudu |
|
|
122 |
C |
p. |
artikel |
30 |
Use of cyber attack and defense agents in cyber ranges: A case study
|
Yamin, Muhammad Mudassar |
|
|
122 |
C |
p. |
artikel |
31 |
Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies
|
Martínez, David |
|
|
122 |
C |
p. |
artikel |
32 |
Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges
|
Qu, Leilei |
|
|
122 |
C |
p. |
artikel |