Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Add noise to remove noise: Local differential privacy for feature selection Alishahi, Mina

123 C p.
artikel
2 Aggregate attack surface management for network discovery of operational technology Ashley, Travis

123 C p.
artikel
3 A GPU-based machine learning approach for detection of botnet attacks Motylinski, Michal

123 C p.
artikel
4 An Android Malware Detection and Classification Approach Based on Contrastive Lerning Yang, Shaojie

123 C p.
artikel
5 An automated closed-loop framework to enforce security policies from anomaly detection Henriques, João

123 C p.
artikel
6 An IoT Inventory Before Deployment: A Survey on IoT Protocols, Communication Technologies, Vulnerabilities, Attacks, and Future Research Directions Bang, Ankur O.

123 C p.
artikel
7 Attack Dynamics: An Automatic Attack Graph Generation Framework Based on System Topology, CAPEC, CWE, and CVE Databases ..zdemir S..nmez, Ferda

123 C p.
artikel
8 Behind the last line of defense: Surviving SoC faults and intrusions Gouveia, Inês Pinto

123 C p.
artikel
9 Black box attack and network intrusion detection using machine learning for malicious traffic Zhu, Yiran

123 C p.
artikel
10 Capturing drivers’ privacy preferences for intelligent transportation systems: An intercultural perspective Islami, Lejla

123 C p.
artikel
11 Coordinated Vulnerability Disclosure programme effectiveness: Issues and recommendations Walshe, T.

123 C p.
artikel
12 Editorial Board
123 C p.
artikel
13 Extreme minority class detection in imbalanced data for network intrusion Milosevic, Marija S.

123 C p.
artikel
14 Formal verification of TLS 1.2 by automatically generating proof scores Tran, Duong Dinh

123 C p.
artikel
15 Improving Source location privacy in social Internet of Things using a hybrid phantom routing technique Hussain, Tariq

123 C p.
artikel
16 Investigating machine learning attacks on financial time series models Gallagher, Michael

123 C p.
artikel
17 MEMBER: A multi-task learning model with hybrid deep features for network intrusion detection Lan, Jinghong

123 C p.
artikel
18 PISA: Pixel skipping-based attentional black-box adversarial attack Wang, Jie

123 C p.
artikel
19 Privacy-Preserving Convolution Neural Network Inference with Edge-assistance Guo, Li

123 C p.
artikel
20 Statistical machine learning defensive mechanism against cyber intrusion in smart grid cyber-physical network Singh, Neeraj Kumar

123 C p.
artikel
21 Visually imperceptible adversarial patch attacks Qian, Yaguan

123 C p.
artikel
22 Why people keep falling for phishing scams: The effects of time pressure and deception cues on the detection of phishing emails Butavicius, Marcus

123 C p.
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland