nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems
|
Debicha, Islam |
|
|
129 |
C |
p. |
artikel |
2 |
A hybrid deep learning framework for privacy preservation in edge computing
|
R, Harine Rajashree |
|
|
129 |
C |
p. |
artikel |
3 |
A hybrid scoring system for prioritization of software vulnerabilities
|
Sharma, Abhishek |
|
|
129 |
C |
p. |
artikel |
4 |
A lightweight deep learning framework for botnet detecting at the IoT edge
|
Wei, Chongbo |
|
|
129 |
C |
p. |
artikel |
5 |
An adaptive fuzzing method based on transformer and protocol similarity mutation
|
Wang, Wenpeng |
|
|
129 |
C |
p. |
artikel |
6 |
Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method
|
Lee, In |
|
|
129 |
C |
p. |
artikel |
7 |
Android static taint analysis based on multi branch search association
|
Tang, Chenghua |
|
|
129 |
C |
p. |
artikel |
8 |
A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA)
|
Niu, Zequn |
|
|
129 |
C |
p. |
artikel |
9 |
A security awareness and competency evaluation in the energy sector
|
Georgiadou, Anna |
|
|
129 |
C |
p. |
artikel |
10 |
A survey on the (in)security of trusted execution environments
|
Muñoz, Antonio |
|
|
129 |
C |
p. |
artikel |
11 |
ATS-O2A: A state-based adversarial attack strategy on deep reinforcement learning
|
Li, Xiangjuan |
|
|
129 |
C |
p. |
artikel |
12 |
Brainwave-based authentication using features fusion
|
TajDini, Mahyar |
|
|
129 |
C |
p. |
artikel |
13 |
Collaborative device-level botnet detection for internet of things
|
Nasir, Muhammad Hassan |
|
|
129 |
C |
p. |
artikel |
14 |
CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders
|
Catillo, Marta |
|
|
129 |
C |
p. |
artikel |
15 |
DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range
|
Du, Linfeng |
|
|
129 |
C |
p. |
artikel |
16 |
Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN
|
Liu, Linfeng |
|
|
129 |
C |
p. |
artikel |
17 |
Design of double-cross-based smartphone unlock mechanism
|
Li, Wenjuan |
|
|
129 |
C |
p. |
artikel |
18 |
Detection of anomalies of a non-deterministic software-defined networking control
|
Desgeorges, Loïc |
|
|
129 |
C |
p. |
artikel |
19 |
Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication
|
Freitas, Tadeu |
|
|
129 |
C |
p. |
artikel |
20 |
DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio
|
Ma, Binhao |
|
|
129 |
C |
p. |
artikel |
21 |
Editorial Board
|
|
|
|
129 |
C |
p. |
artikel |
22 |
Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution
|
John, Taran Cyriac |
|
|
129 |
C |
p. |
artikel |
23 |
Extending the classical side-channel analysis framework to access-driven cache attacks
|
Guo, Pengfei |
|
|
129 |
C |
p. |
artikel |
24 |
Full-stack vulnerability analysis of the cloud-native platform
|
Zeng, Qingyang |
|
|
129 |
C |
p. |
artikel |
25 |
Generation-based fuzzing? Don’t build a new generator, reuse!
|
Pang, Chengbin |
|
|
129 |
C |
p. |
artikel |
26 |
Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the GDPR
|
Mollaeefar, Majid |
|
|
129 |
C |
p. |
artikel |
27 |
Information security policies compliance in a global setting: An employee's perspective
|
Alraja, Mansour Naser |
|
|
129 |
C |
p. |
artikel |
28 |
Integrated cybersecurity methodology and supporting tools for healthcare operational information systems
|
Coutinho, Bruno |
|
|
129 |
C |
p. |
artikel |
29 |
Know your enemy: Conversational agents for security, education, training, and awareness at scale
|
Giboney, Justin Scott |
|
|
129 |
C |
p. |
artikel |
30 |
Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends
|
Gandhi, Jugal |
|
|
129 |
C |
p. |
artikel |
31 |
LR-BA: Backdoor attack against vertical federated learning using local latent representations
|
Gu, Yuhao |
|
|
129 |
C |
p. |
artikel |
32 |
RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks
|
Geden, Munir |
|
|
129 |
C |
p. |
artikel |
33 |
Security architecture for automotive communication networks with CAN FD
|
de Andrade, Ricardo |
|
|
129 |
C |
p. |
artikel |
34 |
Security defense decision method based on potential differential game for complex networks
|
Zhang, Hengwei |
|
|
129 |
C |
p. |
artikel |
35 |
SparSFA: Towards robust and communication-efficient peer-to-peer federated learning
|
Wang, Han |
|
|
129 |
C |
p. |
artikel |
36 |
Stealing and evading malware classifiers and antivirus at low false positive conditions
|
Rigaki, M. |
|
|
129 |
C |
p. |
artikel |
37 |
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training
|
Hull, David Michael |
|
|
129 |
C |
p. |
artikel |
38 |
Testing SOAR tools in use
|
Bridges, Robert A. |
|
|
129 |
C |
p. |
artikel |
39 |
Towards DDoS attack detection using deep learning approach
|
Aktar, Sharmin |
|
|
129 |
C |
p. |
artikel |
40 |
Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection
|
Lai, Yuan-Cheng |
|
|
129 |
C |
p. |
artikel |
41 |
Unveiling the process of phishing precautions taking: The moderating role of optimism bias
|
Lei, Wenjing |
|
|
129 |
C |
p. |
artikel |