Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             36 results found
no title author magazine year volume issue page(s) type
1 A cascaded federated deep learning based framework for detecting wormhole attacks in IoT networks Alghamdi, Rubayyi

125 C p.
article
2 A hands-on gaze on HTTP/3 security through the lens of HTTP/2 and a public dataset Chatzoglou, Efstratios

125 C p.
article
3 A novel cancelable fingerprint scheme based on random security sampling mechanism and relocation bloom filter Sun, Yanan

125 C p.
article
4 A secure annuli CAPTCHA system Zhang, Jie

125 C p.
article
5 A Systematic Security Assessment and Review of Internet of Things in the Context of Authentication Saqib, Manasha

125 C p.
article
6 BinVulDet: Detecting vulnerability in binary program via decompiled pseudo code and BiLSTM-attention Wang, Yan

125 C p.
article
7 Corrigendum to ‘Research on Lightweight Anomaly Detection of Multimedia Traffic in Edge Computing’ Computer & Security, 111(2021) 102463 Zhao, Xu

125 C p.
article
8 Cross-domain vulnerability detection using graph embedding and domain adaptation Li, Xin

125 C p.
article
9 Editorial Board
125 C p.
article
10 Evaluating protection motivation based cybersecurity awareness training on Kirkpatrick's Model Khan, Naurin Farooq

125 C p.
article
11 Explaining information seeking intentions: Insights from a Slovenian social engineering awareness campaign Vrhovec, Simon

125 C p.
article
12 FlowTracker: Improved flow correlation attacks with denoising and contrastive learning Guan, Zhong

125 C p.
article
13 Forensic readiness of industrial control systems under stealthy attacks Azzam, Mazen

125 C p.
article
14 HANDOM: Heterogeneous Attention Network Model for Malicious Domain Detection Wang, Qing

125 C p.
article
15 IoT malware classification based on reinterpreted function-call graphs Wu, Chia-Yi

125 C p.
article
16 Keystroke and swipe biometrics fusion to enhance smartphones authentication Al-Saraireh, Jaafer

125 C p.
article
17 LIGAA: Generative adversarial attack method based on low-frequency information Zhu, Hegui

125 C p.
article
18 Managing the Inevitable – A Maturity Model to Establish Incident Response Management Capabilities Bitzer, Michael

125 C p.
article
19 Perspectives of non-expert users on cyber security and privacy: An analysis of online discussions on twitter Pattnaik, Nandita

125 C p.
article
20 Preserving data privacy in federated learning through large gradient pruning Zhang, Zhiqiu

125 C p.
article
21 Pwnable-Sherpa: An interactive coaching system with a case study of pwnable challenges Kim, Sung-Kyung

125 C p.
article
22 Reading is not believing: A multimodal adversarial attacker for Chinese-NLP model Ge, Zhaocheng

125 C p.
article
23 Reconstruct face from features based on genetic algorithm using GAN generator as a distribution constraint Dong, Xingbo

125 C p.
article
24 SCADA vulnerabilities and attacks: A review of the state‐of‐the‐art and open issues Alanazi, Manar

125 C p.
article
25 Security analysis and improvement of a public auditing scheme for secure data storage in fog-to-cloud computing Zhang, Wenfang

125 C p.
article
26 Seeking rhetorical validity in fear appeal research: An application of rhetorical theory Johnston, Allen

125 C p.
article
27 Stability analysis and optimal control of worm propagation model with saturated incidence rate Wang, Ruiling

125 C p.
article
28 Stacking ensemble-based HIDS framework for detecting anomalous system processes in Windows based operating systems using multiple word embedding Kumar, Yogendra

125 C p.
article
29 Synthetic attack data generation model applying generative adversarial network for intrusion detection Kumar, Vikash

125 C p.
article
30 The vibration knows who you are! A further analysis on usable authentication for smartwatch users Lee, Sunwoo

125 C p.
article
31 Threat modeling framework for mobile communication systems Rao, Siddharth Prakash

125 C p.
article
32 Three-classification face manipulation detection using attention-based feature decomposition Cao, Yungui

125 C p.
article
33 Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study Butt, Muhammad Atif

125 C p.
article
34 UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management Xu, Guangquan

125 C p.
article
35 Using contextual factors to predict information security overconfidence: A machine learning approach Frank, Muriel

125 C p.
article
36 Wdt-SCAN: Clustering decentralized social graphs with local differential privacy Hou, Lihe

125 C p.
article
                             36 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands