Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             41 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adv-Bot: Realistic adversarial botnet attacks against network intrusion detection systems Debicha, Islam

129 C p.
artikel
2 A hybrid deep learning framework for privacy preservation in edge computing R, Harine Rajashree

129 C p.
artikel
3 A hybrid scoring system for prioritization of software vulnerabilities Sharma, Abhishek

129 C p.
artikel
4 A lightweight deep learning framework for botnet detecting at the IoT edge Wei, Chongbo

129 C p.
artikel
5 An adaptive fuzzing method based on transformer and protocol similarity mutation Wang, Wenpeng

129 C p.
artikel
6 Analyzing web descriptions of cybersecurity breaches in the healthcare provider sector: A content analytics research method Lee, In

129 C p.
artikel
7 Android static taint analysis based on multi branch search association Tang, Chenghua

129 C p.
artikel
8 A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA) Niu, Zequn

129 C p.
artikel
9 A security awareness and competency evaluation in the energy sector Georgiadou, Anna

129 C p.
artikel
10 A survey on the (in)security of trusted execution environments Muñoz, Antonio

129 C p.
artikel
11 ATS-O2A: A state-based adversarial attack strategy on deep reinforcement learning Li, Xiangjuan

129 C p.
artikel
12 Brainwave-based authentication using features fusion TajDini, Mahyar

129 C p.
artikel
13 Collaborative device-level botnet detection for internet of things Nasir, Muhammad Hassan

129 C p.
artikel
14 CPS-GUARD: Intrusion detection for cyber-physical systems and IoT devices using outlier-aware deep autoencoders Catillo, Marta

129 C p.
artikel
15 DBWE-Corbat: Background network traffic generation using dynamic word embedding and contrastive learning for cyber range Du, Linfeng

129 C p.
artikel
16 Defense against underwater spy-robots: A distributed anti-theft topology control mechanism for insecure UASN Liu, Linfeng

129 C p.
artikel
17 Design of double-cross-based smartphone unlock mechanism Li, Wenjuan

129 C p.
artikel
18 Detection of anomalies of a non-deterministic software-defined networking control Desgeorges, Loïc

129 C p.
artikel
19 Deterministic or probabilistic? - A survey on Byzantine fault tolerant state machine replication Freitas, Tadeu

129 C p.
artikel
20 DIHBA: Dynamic, invisible and high attack success rate boundary backdoor attack with low poison ratio Ma, Binhao

129 C p.
artikel
21 Editorial Board
129 C p.
artikel
22 Evolving malice scoring models for ransomware detection: An automated approach by utilising genetic programming and cooperative coevolution John, Taran Cyriac

129 C p.
artikel
23 Extending the classical side-channel analysis framework to access-driven cache attacks Guo, Pengfei

129 C p.
artikel
24 Full-stack vulnerability analysis of the cloud-native platform Zeng, Qingyang

129 C p.
artikel
25 Generation-based fuzzing? Don’t build a new generator, reuse! Pang, Chengbin

129 C p.
artikel
26 Identifying and quantifying trade-offs in multi-stakeholder risk evaluation with applications to the data protection impact assessment of the GDPR Mollaeefar, Majid

129 C p.
artikel
27 Information security policies compliance in a global setting: An employee's perspective Alraja, Mansour Naser

129 C p.
artikel
28 Integrated cybersecurity methodology and supporting tools for healthcare operational information systems Coutinho, Bruno

129 C p.
artikel
29 Know your enemy: Conversational agents for security, education, training, and awareness at scale Giboney, Justin Scott

129 C p.
artikel
30 Logic locking for IP security: A comprehensive analysis on challenges, techniques, and trends Gandhi, Jugal

129 C p.
artikel
31 LR-BA: Backdoor attack against vertical federated learning using local latent representations Gu, Yuhao

129 C p.
artikel
32 RegGuard: Leveraging CPU registers for mitigation of control- and data-oriented attacks Geden, Munir

129 C p.
artikel
33 Security architecture for automotive communication networks with CAN FD de Andrade, Ricardo

129 C p.
artikel
34 Security defense decision method based on potential differential game for complex networks Zhang, Hengwei

129 C p.
artikel
35 SparSFA: Towards robust and communication-efficient peer-to-peer federated learning Wang, Han

129 C p.
artikel
36 Stealing and evading malware classifiers and antivirus at low false positive conditions Rigaki, M.

129 C p.
artikel
37 Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training Hull, David Michael

129 C p.
artikel
38 Testing SOAR tools in use Bridges, Robert A.

129 C p.
artikel
39 Towards DDoS attack detection using deep learning approach Aktar, Sharmin

129 C p.
artikel
40 Two-phase Defense Against Poisoning Attacks on Federated Learning-based Intrusion Detection Lai, Yuan-Cheng

129 C p.
artikel
41 Unveiling the process of phishing precautions taking: The moderating role of optimism bias Lei, Wenjing

129 C p.
artikel
                             41 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland