Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks Alghamdi, Rubayyi

125 C p.
artikel
2 A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset Chatzoglou, Efstratios

125 C p.
artikel
3 A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter Sun, Yanan

125 C p.
artikel
4 A secure annuli CAPTCHA system Zhang, Jie

125 C p.
artikel
5 A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication Saqib, Manasha

125 C p.
artikel
6 BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention Wang, Yan

125 C p.
artikel
7 Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 102463 Zhao, Xu

125 C p.
artikel
8 Cross-domain vulnerability detection using graph embedding and domain adaptation Li, Xin

125 C p.
artikel
9 Editorial Board
125 C p.
artikel
10 Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model Khan, Naurin Farooq

125 C p.
artikel
11 Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign Vrhovec, Simon

125 C p.
artikel
12 FlowTracker: Improved flow correlation attacks with denoising and contrastive learning Guan, Zhong

125 C p.
artikel
13 Forensic readiness of industrial control systems under stealthy attacks Azzam, Mazen

125 C p.
artikel
14 HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection Wang, Qing

125 C p.
artikel
15 IoT malware classification based on reinterpreted function-call graphs Wu, Chia-Yi

125 C p.
artikel
16 Keystroke and swipe biometrics fusion to enhance smartphones authentication Al-Saraireh, Jaafer

125 C p.
artikel
17 LIGAA: Generative adversarial attack method based on low-frequency information Zhu, Hegui

125 C p.
artikel
18 Managing the Inevitable – A Maturity Model to Establish Incident Response Management Capabilities Bitzer, Michael

125 C p.
artikel
19 Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter Pattnaik, Nandita

125 C p.
artikel
20 Preserving data privacy in federated learning through large gradient pruning Zhang, Zhiqiu

125 C p.
artikel
21 Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges Kim, Sung-Kyung

125 C p.
artikel
22 Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model Ge, Zhaocheng

125 C p.
artikel
23 Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint Dong, Xingbo

125 C p.
artikel
24 SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues Alanazi, Manar

125 C p.
artikel
25 Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing Zhang, Wenfang

125 C p.
artikel
26 Seeking rhetorical validity in fear appeal research: An application of rhetorical theory Johnston, Allen

125 C p.
artikel
27 Stability analysis and optimal control of worm propagation model with saturated incidence rate Wang, Ruiling

125 C p.
artikel
28 Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding Kumar, Yogendra

125 C p.
artikel
29 Synthetic attack data generation model applying generative adversarial network for intrusion detection Kumar, Vikash

125 C p.
artikel
30 The vibration knows who you are! A further analysis on usable authentication for smartwatch users Lee, Sunwoo

125 C p.
artikel
31 Threat modeling framework for mobile communication systems Rao, Siddharth Prakash

125 C p.
artikel
32 Three-classification face manipulation detection using attention-based feature decomposition Cao, Yungui

125 C p.
artikel
33 Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study Butt, Muhammad Atif

125 C p.
artikel
34 UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management Xu, Guangquan

125 C p.
artikel
35 Using contextual factors to predict information security overconfidence: A machine learning approach Frank, Muriel

125 C p.
artikel
36 Wdt-SCAN: Clustering decentralized social graphs with local differential privacy Hou, Lihe

125 C p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland