nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An automatic classification algorithm for software vulnerability based on weighted word vector and fusion neural network
|
Wang, Qian |
|
|
126 |
C |
p. |
artikel |
2 |
A permission-carrying security policy and static enforcement for information flows in Android programs
|
Liu, Xiaojian |
|
|
126 |
C |
p. |
artikel |
3 |
Attack graph analysis: An explanatory guide
|
Zenitani, Kengo |
|
|
126 |
C |
p. |
artikel |
4 |
Audio adversarial detection through classification score on speech recognition systems
|
Kwon, Hyun |
|
|
126 |
C |
p. |
artikel |
5 |
Automated verification of Telegram’s MTProto 2.0 in the symbolic model
|
Miculan, Marino |
|
|
126 |
C |
p. |
artikel |
6 |
Cyber attack detection with QR code images using lightweight deep learning models
|
Alaca, Yusuf |
|
|
126 |
C |
p. |
artikel |
7 |
Design of privacy preserving model based on clustering involved anonymization along with feature selection
|
Srijayanthi, S. |
|
|
126 |
C |
p. |
artikel |
8 |
Disarming visualization-based approaches in malware detection systems
|
Saidia Fascí, Lara |
|
|
126 |
C |
p. |
artikel |
9 |
D-Score: An expert-based method for assessing the detectability of IoT-related cyber-attacks
|
Meidan, Yair |
|
|
126 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
126 |
C |
p. |
artikel |
11 |
Enhancing false negative and positive rates for efficient insider threat detection
|
AlSlaiman, Muhanned |
|
|
126 |
C |
p. |
artikel |
12 |
Flooding attack mitigator for in-vehicle CAN using fault confinement in CAN protocol
|
Park, Sung Bum |
|
|
126 |
C |
p. |
artikel |
13 |
GAIL-PT: An intelligent penetration testing framework with generative adversarial imitation learning
|
Chen, Jinyin |
|
|
126 |
C |
p. |
artikel |
14 |
Intelligent IoT-BOTNET attack detection model with optimized hybrid classification model
|
Bojarajulu, Balaganesh |
|
|
126 |
C |
p. |
artikel |
15 |
Machine Learning Modeling of GPS Features with Applications to UAV Location Spoofing Detection and Classification
|
Nayfeh, Mohammad |
|
|
126 |
C |
p. |
artikel |
16 |
MCTVD: A malware classification method based on three-channel visualization and deep learning
|
Deng, Huaxin |
|
|
126 |
C |
p. |
artikel |
17 |
Penetration testing of connected households
|
Heiding, Fredrik |
|
|
126 |
C |
p. |
artikel |
18 |
Selective forwarding attack detection and network recovery mechanism based on cloud-edge cooperation in software-defined wireless sensor network
|
Luo, Shiyao |
|
|
126 |
C |
p. |
artikel |
19 |
The mediating role of perceived risks and benefits when self-disclosing: A study of social media trust and FoMO
|
van der Schyff, Karl |
|
|
126 |
C |
p. |
artikel |
20 |
Understanding situation awareness in SOCs, a systematic literature review
|
Ofte, Håvard Jakobsen |
|
|
126 |
C |
p. |
artikel |
21 |
VERI: A Large-scale Open-Source Components Vulnerability Detection in IoT Firmware
|
Cheng, Yiran |
|
|
126 |
C |
p. |
artikel |