nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms
|
Taleby Ahvanooey, Milad |
|
|
130 |
C |
p. |
artikel |
2 |
Analyzing effective mitigation of DDoS attack with software defined networking
|
Dayal, Neelam |
|
|
130 |
C |
p. |
artikel |
3 |
An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers
|
Pirca, Ana Maria |
|
|
130 |
C |
p. |
artikel |
4 |
An intelligent recommendation method based on multi-interest network and adversarial deep learning
|
Meng, Shunmei |
|
|
130 |
C |
p. |
artikel |
5 |
A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function
|
Gupta, Prajjwal |
|
|
130 |
C |
p. |
artikel |
6 |
A novel Evil Twin MiTM attack through 802.11v protocol exploitation
|
Louca, Constantinos |
|
|
130 |
C |
p. |
artikel |
7 |
A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning
|
Bhat, Parnika |
|
|
130 |
C |
p. |
artikel |
8 |
Automated GDPR compliance assessment for cross-border personal data transfers in android applications
|
Guamán, Danny S. |
|
|
130 |
C |
p. |
artikel |
9 |
C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement
|
Dong, Cong |
|
|
130 |
C |
p. |
artikel |
10 |
Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classification
|
Saleh, Mariam M. |
|
|
130 |
C |
p. |
artikel |
11 |
CROSS: A framework for cyber risk optimisation in smart homes
|
Zhang, Yunxiao |
|
|
130 |
C |
p. |
artikel |
12 |
Cyber expert feedback: Experiences, expectations, and opinions about cyber deception
|
Ferguson-Walter, Kimberly J. |
|
|
130 |
C |
p. |
artikel |
13 |
DDOFM: Dynamic malicious domain detection method based on feature mining
|
Wang, Han |
|
|
130 |
C |
p. |
artikel |
14 |
Edge intelligence secure frameworks: Current state and future challenges
|
Villar-Rodriguez, Esther |
|
|
130 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
130 |
C |
p. |
artikel |
16 |
Few-shot weakly-supervised cybersecurity anomaly detection
|
Kale, Rahul |
|
|
130 |
C |
p. |
artikel |
17 |
GAMBD: Generating adversarial malware against MalConv
|
Li, Kun |
|
|
130 |
C |
p. |
artikel |
18 |
GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge
|
Sun, Peishuai |
|
|
130 |
C |
p. |
artikel |
19 |
Improving ransomware detection based on portable executable header using xception convolutional neural network
|
Moreira, Caio C. |
|
|
130 |
C |
p. |
artikel |
20 |
Learning domain-invariant representation for generalizing face forgery detection
|
Wu, Yuanlu |
|
|
130 |
C |
p. |
artikel |
21 |
Locally differentially private multi-dimensional data collection via haar transform
|
Zhang, Dongyue |
|
|
130 |
C |
p. |
artikel |
22 |
NE-GConv: A lightweight node edge graph convolutional network for intrusion detection
|
Altaf, Tanzeela |
|
|
130 |
C |
p. |
artikel |
23 |
Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers
|
Nwankpa, Joseph K. |
|
|
130 |
C |
p. |
artikel |
24 |
The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks
|
Aebissa, Berhanu |
|
|
130 |
C |
p. |
artikel |
25 |
The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention
|
Jiang, Randi |
|
|
130 |
C |
p. |
artikel |
26 |
The meta attack language - a formal description
|
Wideł, Wojciech |
|
|
130 |
C |
p. |
artikel |
27 |
VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs
|
Fan, Yuanhai |
|
|
130 |
C |
p. |
artikel |
28 |
Why people replace their aging smart devices: A push–pull–mooring perspective
|
Lenz, Julia |
|
|
130 |
C |
p. |
artikel |