Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             32 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adversarial attack via dual-stage network erosion Duan, Yexin

122 C p.
artikel
2 A few-shot malware classification approach for unknown family recognition using malware feature visualization Conti, Mauro

122 C p.
artikel
3 AflIot: Fuzzing on linux-based IoT device with binary-level instrumentation Du, Xuechao

122 C p.
artikel
4 An analysis of zero-trust architecture and its cost-effectiveness for organizational security Adahman, Zillah

122 C p.
artikel
5 A new intrusion detection system based on using non-linear statistical analysis and features selection techniques Al-Bakaa, Aliaa

122 C p.
artikel
6 An ontology oriented service framework for social IoT Dhillon, Parveen

122 C p.
artikel
7 A Proactive Approach to assess web application security through the integration of security tools in a Security Orchestration Platform Chahal, Navdeep S.

122 C p.
artikel
8 APT beaconing detection: A systematic review Abu Talib, Manar

122 C p.
artikel
9 Automated city shuttles: Mapping the key challenges in cybersecurity, privacy and standards to future developments Benyahya, Meriem

122 C p.
artikel
10 Background knowledge attacks in privacy-preserving data publishing models Desai, Nidhi

122 C p.
artikel
11 Barriers and enablers to adoption of cyber insurance in developing countries: An exploratory study of Malaysian organizations Abdul Hamid, Nor Hasnul Azirah

122 C p.
artikel
12 CAESAR8: An agile enterprise architecture approach to managing information security risks Loft, Paul

122 C p.
artikel
13 CIST: A Serious Game for Hardware Supply Chain Hart, Stephen

122 C p.
artikel
14 CoNN-IDS: Intrusion detection system based on collaborative neural networks and agile training Lee, Jung-San

122 C p.
artikel
15 Decision support for healthcare cyber security Özdemir Sönmez, Ferda

122 C p.
artikel
16 DMalNet: Dynamic malware analysis based on API feature engineering and graph learning Li, Ce

122 C p.
artikel
17 Editorial Board
122 C p.
artikel
18 Efficient and Robust Malware Detection Based on Control Flow Traces Using Deep Neural Networks Qiang, Weizhong

122 C p.
artikel
19 EII-MBS: Malware family classification via enhanced adversarial instruction behavior semantic learning Hao, Jingwei

122 C p.
artikel
20 Evaluation of Asian Countries using Data Center Security Index: A Spherical Fuzzy AHP-based EDAS Approach Özkan, Barış

122 C p.
artikel
21 Fairness and privacy preservation for facial images: GAN-based methods Tian, Huan

122 C p.
artikel
22 FS-IDS: A framework for intrusion detection based on few-shot learning Yang, Jingcheng

122 C p.
artikel
23 MinSIB: Minimized static instrumentation for fuzzing binaries Gu, Yeming

122 C p.
artikel
24 Misleading attention and classification: An adversarial attack to fool object detection models in the real world Zhang, Haotian

122 C p.
artikel
25 On the relativity of time: Implications and challenges of data drift on long-term effective android malware detection Guerra-Manzanares, Alejandro

122 C p.
artikel
26 Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security Schinagl, Stef

122 C p.
artikel
27 Practical Evaluation of Poisoning Attacks on Online Anomaly Detectors in Industrial Control Systems Kravchik, Moshe

122 C p.
artikel
28 Privacy, accuracy, and model fairness trade-offs in federated learning Gu, Xiuting

122 C p.
artikel
29 Security of Open Radio Access Networks Mimran, Dudu

122 C p.
artikel
30 Use of cyber attack and defense agents in cyber ranges: A case study Yamin, Muhammad Mudassar

122 C p.
artikel
31 Web-tracking compliance: websites’ level of confidence in the use of information-gathering technologies Martínez, David

122 C p.
artikel
32 Your Behaviors Reveal What You Need: A Practical Scheme Based on User Behaviors for Personalized Security Nudges Qu, Leilei

122 C p.
artikel
                             32 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland