nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comic-based approach to permission request communication
|
Watson, Katie |
|
|
124 |
C |
p. |
artikel |
2 |
A critical review of the techniques used for anomaly detection of HTTP-based attacks: taxonomy, limitations and open challenges
|
Díaz-Verdejo, Jesús E. |
|
|
124 |
C |
p. |
artikel |
3 |
A hierarchical intrusion detection system based on extreme learning machine and nature-inspired optimization
|
Alzaqebah, Abdullah |
|
|
124 |
C |
p. |
artikel |
4 |
An analysis of fake social media engagement services
|
Nevado-Catalán, David |
|
|
124 |
C |
p. |
artikel |
5 |
Anomaly detection of adversarial examples using class-conditional generative adversarial networks
|
Wang, Hang |
|
|
124 |
C |
p. |
artikel |
6 |
Association between stress and information security policy non-compliance behavior: A meta-analysis
|
Aggarwal, Akshay |
|
|
124 |
C |
p. |
artikel |
7 |
A systematic method for measuring the performance of a cyber security operations centre analyst
|
Agyepong, Enoch |
|
|
124 |
C |
p. |
artikel |
8 |
AutoCert: Automated TOCTOU-secure digital certification for IoT with combined authentication and assurance
|
Khurshid, Anum |
|
|
124 |
C |
p. |
artikel |
9 |
Corrigendum to Concept drift and cross-device behavior: Challenges and implications for effective android malware detection Computers & Security, Volume 120, 102757
|
Guerra-Manzanares, Alejandro |
|
|
124 |
C |
p. |
artikel |
10 |
Corrigendum to “Towards to intelligent routing for DTN protocols using machine learning techniques” [Simulation Modelling Practice and Theory 117 (2022) 102475]
|
Alaoui, El Arbi Abdellaoui |
|
|
124 |
C |
p. |
artikel |
11 |
Cross-site scripting detection with two-channel feature fusion embedded in self-attention mechanism
|
Hu, Tianle |
|
|
124 |
C |
p. |
artikel |
12 |
Cybersecurity capabilities and cyber-attacks as drivers of investment in cybersecurity systems: A UK survey for 2018 and 2019
|
Fernandez De Arroyabe, Ignacio |
|
|
124 |
C |
p. |
artikel |
13 |
Decentralizing Cyber Physical Systems for Resilience: An Innovative Case Study from A Cybersecurity Perspective
|
Liang, Xueping |
|
|
124 |
C |
p. |
artikel |
14 |
Detection and mitigation of field flooding attacks on oil and gas critical infrastructure communication
|
Mohammed, Abubakar Sadiq |
|
|
124 |
C |
p. |
artikel |
15 |
Detection of Cache Pollution Attack Based on Federated Learning in Ultra-Dense Network
|
Yao, Lin |
|
|
124 |
C |
p. |
artikel |
16 |
DIVRS: Data integrity verification based on ring signature in cloud storage
|
Tian, Miao |
|
|
124 |
C |
p. |
artikel |
17 |
Editorial Board
|
|
|
|
124 |
C |
p. |
artikel |
18 |
Erratum to ‘Ensemble transfer attack targeting text classification systems’ [Computers & Security 117 (2022) 1–8/ 102695]
|
Kwon, Hyun |
|
|
124 |
C |
p. |
artikel |
19 |
ExpSSOA-Deep maxout: Exponential Shuffled shepherd optimization based Deep maxout network for intrusion detection using big data in cloud computing framework
|
Pandey, Bishwajeet Kumar |
|
|
124 |
C |
p. |
artikel |
20 |
Extended data plane architecture for in-network security services in software-defined networks
|
Kim, Jinwoo |
|
|
124 |
C |
p. |
artikel |
21 |
False data injection attacks detection with modified temporal multi-graph convolutional network in smart grids
|
Han, Yinghua |
|
|
124 |
C |
p. |
artikel |
22 |
FaultMorse: An automated controlled-channel attack via longest recurring sequence
|
Hu, Lifeng |
|
|
124 |
C |
p. |
artikel |
23 |
GC-NLDP: A graph clustering algorithm with local differential privacy
|
Fu, Nan |
|
|
124 |
C |
p. |
artikel |
24 |
GramBeddings: A New Neural Network for URL Based Identification of Phishing Web Pages Through N-gram Embeddings
|
Bozkir, Ahmet Selman |
|
|
124 |
C |
p. |
artikel |
25 |
ILL-IDS: An incremental lifetime learning IDS for VANETs
|
Huang, Yunfan |
|
|
124 |
C |
p. |
artikel |
26 |
Improving fuzzing assessment methods through the analysis of metrics and experimental conditions
|
Eceiza, Maialen |
|
|
124 |
C |
p. |
artikel |
27 |
Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity
|
Shaikh, Faheem Ahmed |
|
|
124 |
C |
p. |
artikel |
28 |
Intent-Driven Secure System Design: Methodology and Implementation
|
Ooi, Sian En |
|
|
124 |
C |
p. |
artikel |
29 |
Interactions of Framing and Timing in Nudging Online Game Security
|
Qu, Leilei |
|
|
124 |
C |
p. |
artikel |
30 |
Intrusion response systems for cyber-physical systems: A comprehensive survey
|
Bashendy, May |
|
|
124 |
C |
p. |
artikel |
31 |
MFXSS: An effective XSS vulnerability detection method in JavaScript based on multi-feature model
|
Liu, Zhonglin |
|
|
124 |
C |
p. |
artikel |
32 |
Modelling health-data breaches with application to cyber insurance
|
Li, Yuying |
|
|
124 |
C |
p. |
artikel |
33 |
MOTIF: A Malware Reference Dataset with Ground Truth Family Labels
|
Joyce, Robert J. |
|
|
124 |
C |
p. |
artikel |
34 |
MultiRHM: Defeating multi-staged enterprise intrusion attacks through multi-dimensional and multi-parameter host identity anonymization
|
Jafarian, Jafar Haadi |
|
|
124 |
C |
p. |
artikel |
35 |
One4All: Manipulate one agent to poison the cooperative multi-agent reinforcement learning
|
Zheng, Haibin |
|
|
124 |
C |
p. |
artikel |
36 |
PPT: A privacy-preserving global model training protocol for federated learning in P2P networks
|
Chen, Qian |
|
|
124 |
C |
p. |
artikel |
37 |
RETRACTED: I recognize you by your steps: Privacy impact of pedometer data
|
Dietrich, Aljoscha |
|
|
124 |
C |
p. |
artikel |
38 |
Secure outsourced NB: Accurate and efficient privacy-preserving Naive Bayes classification
|
Zhao, Xueli |
|
|
124 |
C |
p. |
artikel |
39 |
Software Compliance Requirements, Factors, and Policies: A Systematic Literature Review
|
Mubarkoot, Mohammed |
|
|
124 |
C |
p. |
artikel |
40 |
Software vulnerabilities in TensorFlow-based deep learning applications
|
Filus, Katarzyna |
|
|
124 |
C |
p. |
artikel |
41 |
Systematic analysis and comparison of security advice as datasets
|
Bellman, Christopher |
|
|
124 |
C |
p. |
artikel |
42 |
The Threat of Offensive AI to Organizations
|
Mirsky, Yisroel |
|
|
124 |
C |
p. |
artikel |
43 |
The valued coexistence of protection motivation and stewardship in information security behaviors
|
Ogbanufe, Obi |
|
|
124 |
C |
p. |
artikel |
44 |
Threat Modeling of Cyber-Physical Systems - A Case Study of a Microgrid System
|
Khalil, Shaymaa Mamdouh |
|
|
124 |
C |
p. |
artikel |
45 |
Top-k sparsification with secure aggregation for privacy-preserving federated learning
|
Lu, Shiwei |
|
|
124 |
C |
p. |
artikel |
46 |
Toward practical defense against traffic analysis attacks on encrypted DNS traffic
|
Niakanlahiji, Amirreza |
|
|
124 |
C |
p. |
artikel |
47 |
Towards a fair comparison and realistic evaluation framework of android malware detectors based on static analysis and machine learning
|
Molina-Coronado, Borja |
|
|
124 |
C |
p. |
artikel |
48 |
Tunter: Assessing Exploitability of Vulnerabilities with Taint-Guided Exploitable States Exploration
|
Wang, Ruipeng |
|
|
124 |
C |
p. |
artikel |
49 |
Virtually secure: A taxonomic assessment of cybersecurity challenges in virtual reality environments
|
Odeleye, Blessing |
|
|
124 |
C |
p. |
artikel |
50 |
When a RF beats a CNN and GRU, together—A comparison of deep learning and classical machine learning approaches for encrypted malware traffic classification
|
Lichy, Adi |
|
|
124 |
C |
p. |
artikel |