nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks
|
Alghamdi, Rubayyi |
|
|
125 |
C |
p. |
artikel |
2 |
A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset
|
Chatzoglou, Efstratios |
|
|
125 |
C |
p. |
artikel |
3 |
A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter
|
Sun, Yanan |
|
|
125 |
C |
p. |
artikel |
4 |
A secure annuli CAPTCHA system
|
Zhang, Jie |
|
|
125 |
C |
p. |
artikel |
5 |
A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication
|
Saqib, Manasha |
|
|
125 |
C |
p. |
artikel |
6 |
BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention
|
Wang, Yan |
|
|
125 |
C |
p. |
artikel |
7 |
Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 102463
|
Zhao, Xu |
|
|
125 |
C |
p. |
artikel |
8 |
Cross-domain vulnerability detection using graph embedding and domain adaptation
|
Li, Xin |
|
|
125 |
C |
p. |
artikel |
9 |
Editorial Board
|
|
|
|
125 |
C |
p. |
artikel |
10 |
Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model
|
Khan, Naurin Farooq |
|
|
125 |
C |
p. |
artikel |
11 |
Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign
|
Vrhovec, Simon |
|
|
125 |
C |
p. |
artikel |
12 |
FlowTracker: Improved flow correlation attacks with denoising and contrastive learning
|
Guan, Zhong |
|
|
125 |
C |
p. |
artikel |
13 |
Forensic readiness of industrial control systems under stealthy attacks
|
Azzam, Mazen |
|
|
125 |
C |
p. |
artikel |
14 |
HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection
|
Wang, Qing |
|
|
125 |
C |
p. |
artikel |
15 |
IoT malware classification based on reinterpreted function-call graphs
|
Wu, Chia-Yi |
|
|
125 |
C |
p. |
artikel |
16 |
Keystroke and swipe biometrics fusion to enhance smartphones authentication
|
Al-Saraireh, Jaafer |
|
|
125 |
C |
p. |
artikel |
17 |
LIGAA: Generative adversarial attack method based on low-frequency information
|
Zhu, Hegui |
|
|
125 |
C |
p. |
artikel |
18 |
Managing the Inevitable – A Maturity Model to Establish Incident Response Management Capabilities
|
Bitzer, Michael |
|
|
125 |
C |
p. |
artikel |
19 |
Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter
|
Pattnaik, Nandita |
|
|
125 |
C |
p. |
artikel |
20 |
Preserving data privacy in federated learning through large gradient pruning
|
Zhang, Zhiqiu |
|
|
125 |
C |
p. |
artikel |
21 |
Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges
|
Kim, Sung-Kyung |
|
|
125 |
C |
p. |
artikel |
22 |
Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model
|
Ge, Zhaocheng |
|
|
125 |
C |
p. |
artikel |
23 |
Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint
|
Dong, Xingbo |
|
|
125 |
C |
p. |
artikel |
24 |
SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues
|
Alanazi, Manar |
|
|
125 |
C |
p. |
artikel |
25 |
Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing
|
Zhang, Wenfang |
|
|
125 |
C |
p. |
artikel |
26 |
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory
|
Johnston, Allen |
|
|
125 |
C |
p. |
artikel |
27 |
Stability analysis and optimal control of worm propagation model with saturated incidence rate
|
Wang, Ruiling |
|
|
125 |
C |
p. |
artikel |
28 |
Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding
|
Kumar, Yogendra |
|
|
125 |
C |
p. |
artikel |
29 |
Synthetic attack data generation model applying generative adversarial network for intrusion detection
|
Kumar, Vikash |
|
|
125 |
C |
p. |
artikel |
30 |
The vibration knows who you are! A further analysis on usable authentication for smartwatch users
|
Lee, Sunwoo |
|
|
125 |
C |
p. |
artikel |
31 |
Threat modeling framework for mobile communication systems
|
Rao, Siddharth Prakash |
|
|
125 |
C |
p. |
artikel |
32 |
Three-classification face manipulation detection using attention-based feature decomposition
|
Cao, Yungui |
|
|
125 |
C |
p. |
artikel |
33 |
Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
|
Butt, Muhammad Atif |
|
|
125 |
C |
p. |
artikel |
34 |
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management
|
Xu, Guangquan |
|
|
125 |
C |
p. |
artikel |
35 |
Using contextual factors to predict information security overconfidence: A machine learning approach
|
Frank, Muriel |
|
|
125 |
C |
p. |
artikel |
36 |
Wdt-SCAN: Clustering decentralized social graphs with local differential privacy
|
Hou, Lihe |
|
|
125 |
C |
p. |
artikel |