nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Add noise to remove noise: Local differential privacy for feature selection
|
Alishahi, Mina |
|
|
123 |
C |
p. |
artikel |
2 |
Aggregate attack surface management for network discovery of operational technology
|
Ashley, Travis |
|
|
123 |
C |
p. |
artikel |
3 |
A GPU-based machine learning approach for detection of botnet attacks
|
Motylinski, Michal |
|
|
123 |
C |
p. |
artikel |
4 |
An Android Malware Detection and Classification Approach Based on Contrastive Lerning
|
Yang, Shaojie |
|
|
123 |
C |
p. |
artikel |
5 |
An automated closed-loop framework to enforce security policies from anomaly detection
|
Henriques, João |
|
|
123 |
C |
p. |
artikel |
6 |
An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions
|
Bang, Ankur O. |
|
|
123 |
C |
p. |
artikel |
7 |
Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases
|
..zdemir S..nmez, Ferda |
|
|
123 |
C |
p. |
artikel |
8 |
Behind the last line of defense: Surviving SoC faults and intrusions
|
Gouveia, Inês Pinto |
|
|
123 |
C |
p. |
artikel |
9 |
Black box attack and network intrusion detection using machine learning for malicious traffic
|
Zhu, Yiran |
|
|
123 |
C |
p. |
artikel |
10 |
Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective
|
Islami, Lejla |
|
|
123 |
C |
p. |
artikel |
11 |
Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations
|
Walshe, T. |
|
|
123 |
C |
p. |
artikel |
12 |
Editorial Board
|
|
|
|
123 |
C |
p. |
artikel |
13 |
Extreme minority class detection in imbalanced data for network intrusion
|
Milosevic, Marija S. |
|
|
123 |
C |
p. |
artikel |
14 |
Formal verification of TLS 1.2 by automatically generating proof scores
|
Tran, Duong Dinh |
|
|
123 |
C |
p. |
artikel |
15 |
Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique
|
Hussain, Tariq |
|
|
123 |
C |
p. |
artikel |
16 |
Investigating machine learning attacks on financial time series models
|
Gallagher, Michael |
|
|
123 |
C |
p. |
artikel |
17 |
MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection
|
Lan, Jinghong |
|
|
123 |
C |
p. |
artikel |
18 |
PISA: Pixel skipping-based attentional black-box adversarial attack
|
Wang, Jie |
|
|
123 |
C |
p. |
artikel |
19 |
Privacy-Preserving Convolution Neural Network Inference with Edge-assistance
|
Guo, Li |
|
|
123 |
C |
p. |
artikel |
20 |
Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network
|
Singh, Neeraj Kumar |
|
|
123 |
C |
p. |
artikel |
21 |
Visually imperceptible adversarial patch attacks
|
Qian, Yaguan |
|
|
123 |
C |
p. |
artikel |
22 |
Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails
|
Butavicius, Marcus |
|
|
123 |
C |
p. |
artikel |