Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             49 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations Ogbanufe, Obi

128 C p.
artikel
2 A comparative risk analysis on CyberShip system with STPA-Sec, STRIDE and CORAS Sahay, Rishikesh

128 C p.
artikel
3 A Comprehensive Survey of Recent Internet Measurement Techniques for Cyber Security Safaei Pour, Morteza

128 C p.
artikel
4 Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art Ling, Xiang

128 C p.
artikel
5 AIDTF: Adversarial training framework for network intrusion detection Xiong, Wen Ding

128 C p.
artikel
6 An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model Zhang, Tianyue

128 C p.
artikel
7 An omnidirectional approach to touch-based continuous authentication Aaby, Peter

128 C p.
artikel
8 Applying staged event-driven access control to combat ransomware McIntosh, Timothy

128 C p.
artikel
9 ASCA-squeeze net: Aquila sine cosine algorithm enabled hybrid deep learning networks for digital image forgery detection Nirmalapriya, G.

128 C p.
artikel
10 A systematic threat analysis and defense strategies for the metaverse and extended reality systems Qamar, Sara

128 C p.
artikel
11 Attack Path Detection for IIoT Enabled Cyber Physical Systems: Revisited Arat, Ferhat

128 C p.
artikel
12 Between a rock and a hard(ening) place: Cyber insurance in the ransomware era Mott, Gareth

128 C p.
artikel
13 BHMDC: A byte and hex n-gram based malware detection and classification method Tang, Yonghe

128 C p.
artikel
14 CANova: A hybrid intrusion detection framework based on automatic signal classification for CAN Nichelini, Alessandro

128 C p.
artikel
15 Capability Assessment Methodology and Comparative Analysis of Cybersecurity Training Platforms Beuran, Razvan

128 C p.
artikel
16 CKDAN: Content and keystroke dual attention networks with pre-trained models for continuous authentication Yang, Haitian

128 C p.
artikel
17 Countermeasures and their taxonomies for risk treatment in cybersecurity: A systematic mapping review Sánchez-García, Isaac D.

128 C p.
artikel
18 Detecting network-based internet censorship via latent feature representation learning Duncan, Shawn P.

128 C p.
artikel
19 DroidRL: Feature selection for android malware detection with reinforcement learning Wu, Yinwei

128 C p.
artikel
20 Editorial Board
128 C p.
artikel
21 EETC: An extended encrypted traffic classification algorithm based on variant resnet network Ma, Xiuli

128 C p.
artikel
22 Efficient and secure content-based image retrieval with deep neural networks in the mobile cloud computing Wang, Yu

128 C p.
artikel
23 Feature mining for encrypted malicious traffic detection with deep learning and other machine learning algorithms Wang, Zihao

128 C p.
artikel
24 FECC: DNS tunnel detection model based on CNN and clustering Liang, Jianbing

128 C p.
artikel
25 Formally verifying security protocols built on watermarking and jamming Costa, Gabriele

128 C p.
artikel
26 “Generic and unusable”1: Understanding employee perceptions of cybersecurity training and measuring advice fatigue Reeves, Andrew

128 C p.
artikel
27 Improving transferable adversarial attack via feature-momentum He, Xianglong

128 C p.
artikel
28 Insecurity Refactoring: Automated Injection of Vulnerabilities in Source Code Schuckert, Felix

128 C p.
artikel
29 Is cybersecurity research missing a trick? Integrating insights from the psychology of habit into research and practice Weickert, Tobias D.

128 C p.
artikel
30 I will only know after using it: The repeat purchasers of smart home appliances and the privacy paradox problem Li, Li

128 C p.
artikel
31 KPDFI: Efficient data flow integrity based on key property against data corruption attack Nie, Xiaofan

128 C p.
artikel
32 Machine learning-based jamming attack classification and effective defense technique Lee, Sun-Jin

128 C p.
artikel
33 Modelling language for cyber security incident handling for critical infrastructures Mouratidis, Haralambos

128 C p.
artikel
34 Multi-targeted audio adversarial example for use against speech recognition systems Ko, Kyoungmin

128 C p.
artikel
35 Network anomaly detection methods in IoT environments via deep learning: A Fair comparison of performance and robustness Bovenzi, Giampaolo

128 C p.
artikel
36 Network intrusion detection based on n-gram frequency and time-aware transformer Han, Xueying

128 C p.
artikel
37 On the Security of Containers: Threat Modeling, Attack Analysis, and Mitigation Strategies Wong, Ann Yi

128 C p.
artikel
38 PeerRemove: An adaptive node removal strategy for P2P botnet based on deep reinforcement learning Xing, Ying

128 C p.
artikel
39 Privacy-preserving certificateless public auditing supporting different auditing frequencies Huang, Yinghui

128 C p.
artikel
40 RecMaL: Rectify the malware family label via hybrid analysis Yang, Wang

128 C p.
artikel
41 Robust unsupervised network intrusion detection with self-supervised masked context reconstruction Wang, Wei

128 C p.
artikel
42 ROMEO: A binary vulnerability detection dataset for exploring Juliet through the lens of assembly language Brust, Clemens-Alexander

128 C p.
artikel
43 SecureRC: A system for privacy-preserving relation classification using secure multi-party computation Gao, Chen

128 C p.
artikel
44 Stationary mobile behavioral biometrics: A survey Ray-Dowling, Aratrika

128 C p.
artikel
45 The development of phishing during the COVID-19 pandemic: An analysis of over 1100 targeted domains Hoheisel, Raphael

128 C p.
artikel
46 Topic and influence analysis on technological patents related to security vulnerabilities Charmanas, Konstantinos

128 C p.
artikel
47 Towards practical differential privacy in data analysis: Understanding the effect of epsilon on utility in private ERM Li, Yuzhe

128 C p.
artikel
48 UCRF: Static analyzing firmware to generate under-constrained seed for fuzzing SOHO router Qin, Chuan

128 C p.
artikel
49 Where authorities fail and experts excel: Influencing internet users’ compliance intentions Bansal, Gaurav

128 C p.
artikel
                             49 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland