nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations
|
Ogbanufe, Obi |
|
|
128 |
C |
p. |
artikel |
2 |
A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS
|
Sahay, Rishikesh |
|
|
128 |
C |
p. |
artikel |
3 |
A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security
|
Safaei Pour, Morteza |
|
|
128 |
C |
p. |
artikel |
4 |
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art
|
Ling, Xiang |
|
|
128 |
C |
p. |
artikel |
5 |
AIDTF: Adversarial training framework for network intrusion detection
|
Xiong, Wen Ding |
|
|
128 |
C |
p. |
artikel |
6 |
An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model
|
Zhang, Tianyue |
|
|
128 |
C |
p. |
artikel |
7 |
An omnidirectional approach to touch-based continuous authentication
|
Aaby, Peter |
|
|
128 |
C |
p. |
artikel |
8 |
Applying staged event-driven access control to combat ransomware
|
McIntosh, Timothy |
|
|
128 |
C |
p. |
artikel |
9 |
ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection
|
Nirmalapriya, G. |
|
|
128 |
C |
p. |
artikel |
10 |
A systematic threat analysis and defense strategies for the metaverse and extended reality systems
|
Qamar, Sara |
|
|
128 |
C |
p. |
artikel |
11 |
Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited
|
Arat, Ferhat |
|
|
128 |
C |
p. |
artikel |
12 |
Between a rock and a hard(ening) place: Cyber insurance in the ransomware era
|
Mott, Gareth |
|
|
128 |
C |
p. |
artikel |
13 |
BHMDC: A byte and hex n-gram based malware detection and classification method
|
Tang, Yonghe |
|
|
128 |
C |
p. |
artikel |
14 |
CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN
|
Nichelini, Alessandro |
|
|
128 |
C |
p. |
artikel |
15 |
Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms
|
Beuran, Razvan |
|
|
128 |
C |
p. |
artikel |
16 |
CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication
|
Yang, Haitian |
|
|
128 |
C |
p. |
artikel |
17 |
Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review
|
Sánchez-García, Isaac D. |
|
|
128 |
C |
p. |
artikel |
18 |
Detecting network-based internet censorship via latent feature representation learning
|
Duncan, Shawn P. |
|
|
128 |
C |
p. |
artikel |
19 |
DroidRL: Feature selection for android malware detection with reinforcement learning
|
Wu, Yinwei |
|
|
128 |
C |
p. |
artikel |
20 |
Editorial Board
|
|
|
|
128 |
C |
p. |
artikel |
21 |
EETC: An extended encrypted traffic classification algorithm based on variant resnet network
|
Ma, Xiuli |
|
|
128 |
C |
p. |
artikel |
22 |
Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing
|
Wang, Yu |
|
|
128 |
C |
p. |
artikel |
23 |
Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms
|
Wang, Zihao |
|
|
128 |
C |
p. |
artikel |
24 |
FECC: DNS tunnel detection model based on CNN and clustering
|
Liang, Jianbing |
|
|
128 |
C |
p. |
artikel |
25 |
Formally verifying security protocols built on watermarking and jamming
|
Costa, Gabriele |
|
|
128 |
C |
p. |
artikel |
26 |
“Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue
|
Reeves, Andrew |
|
|
128 |
C |
p. |
artikel |
27 |
Improving transferable adversarial attack via feature-momentum
|
He, Xianglong |
|
|
128 |
C |
p. |
artikel |
28 |
Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code
|
Schuckert, Felix |
|
|
128 |
C |
p. |
artikel |
29 |
Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice
|
Weickert, Tobias D. |
|
|
128 |
C |
p. |
artikel |
30 |
I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem
|
Li, Li |
|
|
128 |
C |
p. |
artikel |
31 |
KPDFI: Efficient data flow integrity based on key property against data corruption attack
|
Nie, Xiaofan |
|
|
128 |
C |
p. |
artikel |
32 |
Machine learning-based jamming attack classification and effective defense technique
|
Lee, Sun-Jin |
|
|
128 |
C |
p. |
artikel |
33 |
Modelling language for cyber security incident handling for critical infrastructures
|
Mouratidis, Haralambos |
|
|
128 |
C |
p. |
artikel |
34 |
Multi-targeted audio adversarial example for use against speech recognition systems
|
Ko, Kyoungmin |
|
|
128 |
C |
p. |
artikel |
35 |
Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness
|
Bovenzi, Giampaolo |
|
|
128 |
C |
p. |
artikel |
36 |
Network intrusion detection based on n-gram frequency and time-aware transformer
|
Han, Xueying |
|
|
128 |
C |
p. |
artikel |
37 |
On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies
|
Wong, Ann Yi |
|
|
128 |
C |
p. |
artikel |
38 |
PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning
|
Xing, Ying |
|
|
128 |
C |
p. |
artikel |
39 |
Privacy-preserving certificateless public auditing supporting different auditing frequencies
|
Huang, Yinghui |
|
|
128 |
C |
p. |
artikel |
40 |
RecMaL: Rectify the malware family label via hybrid analysis
|
Yang, Wang |
|
|
128 |
C |
p. |
artikel |
41 |
Robust unsupervised network intrusion detection with self-supervised masked context reconstruction
|
Wang, Wei |
|
|
128 |
C |
p. |
artikel |
42 |
ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language
|
Brust, Clemens-Alexander |
|
|
128 |
C |
p. |
artikel |
43 |
SecureRC: A system for privacy-preserving relation classification using secure multi-party computation
|
Gao, Chen |
|
|
128 |
C |
p. |
artikel |
44 |
Stationary mobile behavioral biometrics: A survey
|
Ray-Dowling, Aratrika |
|
|
128 |
C |
p. |
artikel |
45 |
The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains
|
Hoheisel, Raphael |
|
|
128 |
C |
p. |
artikel |
46 |
Topic and influence analysis on technological patents related to security vulnerabilities
|
Charmanas, Konstantinos |
|
|
128 |
C |
p. |
artikel |
47 |
Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM
|
Li, Yuzhe |
|
|
128 |
C |
p. |
artikel |
48 |
UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router
|
Qin, Chuan |
|
|
128 |
C |
p. |
artikel |
49 |
Where authorities fail and experts excel: Influencing internet users’ compliance intentions
|
Bansal, Gaurav |
|
|
128 |
C |
p. |
artikel |