Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             50 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comic-based approach to permission request communication Watson, Katie

124 C p.
artikel
2 A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges Díaz-Verdejo, Jesús E.

124 C p.
artikel
3 A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization Alzaqebah, Abdullah

124 C p.
artikel
4 An analysis of fake social media engagement services Nevado-Catalán, David

124 C p.
artikel
5 Anomaly detection of adversarial examples using class-conditional generative adversarial networks Wang, Hang

124 C p.
artikel
6 Association between stress and information security policy non-compliance behavior: A meta-analysis Aggarwal, Akshay

124 C p.
artikel
7 A systematic method for measuring the performance of a cyber security operations centre analyst Agyepong, Enoch

124 C p.
artikel
8 AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance Khurshid, Anum

124 C p.
artikel
9 Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757 Guerra-Manzanares, Alejandro

124 C p.
artikel
10 Corrigendum to “Towards to intelligent routing for DTN protocols using machine learning techniques” [Simulation Modelling Practice and Theory 117 (2022) 102475] Alaoui, El Arbi Abdellaoui

124 C p.
artikel
11 Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism Hu, Tianle

124 C p.
artikel
12 Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019 Fernandez De Arroyabe, Ignacio

124 C p.
artikel
13 Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective Liang, Xueping

124 C p.
artikel
14 Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication Mohammed, Abubakar Sadiq

124 C p.
artikel
15 Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network Yao, Lin

124 C p.
artikel
16 DIVRS: Data integrity verification based on ring signature in cloud storage Tian, Miao

124 C p.
artikel
17 Editorial Board
124 C p.
artikel
18 Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695] Kwon, Hyun

124 C p.
artikel
19 ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework Pandey, Bishwajeet Kumar

124 C p.
artikel
20 Extended data plane architecture for in-network security services in software-defined networks Kim, Jinwoo

124 C p.
artikel
21 False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids Han, Yinghua

124 C p.
artikel
22 FaultMorse: An automated controlled-channel attack via longest recurring sequence Hu, Lifeng

124 C p.
artikel
23 GC-NLDP: A graph clustering algorithm with local differential privacy Fu, Nan

124 C p.
artikel
24 GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings Bozkir, Ahmet Selman

124 C p.
artikel
25 ILL-IDS: An incremental lifetime learning IDS for VANETs Huang, Yunfan

124 C p.
artikel
26 Improving fuzzing assessment methods through the analysis of metrics and experimental conditions Eceiza, Maialen

124 C p.
artikel
27 Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity Shaikh, Faheem Ahmed

124 C p.
artikel
28 Intent-Driven Secure System Design: Methodology and Implementation Ooi, Sian En

124 C p.
artikel
29 Interactions of Framing and Timing in Nudging Online Game Security Qu, Leilei

124 C p.
artikel
30 Intrusion response systems for cyber-physical systems: A comprehensive survey Bashendy, May

124 C p.
artikel
31 MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model Liu, Zhonglin

124 C p.
artikel
32 Modelling health-data breaches with application to cyber insurance Li, Yuying

124 C p.
artikel
33 MOTIF: A Malware Reference Dataset with Ground Truth Family Labels Joyce, Robert J.

124 C p.
artikel
34 MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization Jafarian, Jafar Haadi

124 C p.
artikel
35 One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning Zheng, Haibin

124 C p.
artikel
36 PPT: A privacy-preserving global model training protocol for federated learning in P2P networks Chen, Qian

124 C p.
artikel
37 RETRACTED: I recognize you by your steps: Privacy impact of pedometer data Dietrich, Aljoscha

124 C p.
artikel
38 Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification Zhao, Xueli

124 C p.
artikel
39 Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review Mubarkoot, Mohammed

124 C p.
artikel
40 Software vulnerabilities in TensorFlow-based deep learning applications Filus, Katarzyna

124 C p.
artikel
41 Systematic analysis and comparison of security advice as datasets Bellman, Christopher

124 C p.
artikel
42 The Threat of Offensive AI to Organizations Mirsky, Yisroel

124 C p.
artikel
43 The valued coexistence of protection motivation and stewardship in information security behaviors Ogbanufe, Obi

124 C p.
artikel
44 Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System Khalil, Shaymaa Mamdouh

124 C p.
artikel
45 Top-k sparsification with secure aggregation for privacy-preserving federated learning Lu, Shiwei

124 C p.
artikel
46 Toward practical defense against traffic analysis attacks on encrypted DNS traffic Niakanlahiji, Amirreza

124 C p.
artikel
47 Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning Molina-Coronado, Borja

124 C p.
artikel
48 Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration Wang, Ruipeng

124 C p.
artikel
49 Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments Odeleye, Blessing

124 C p.
artikel
50 When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification Lichy, Adi

124 C p.
artikel
                             50 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland