Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             28 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AFPr-AM: A novel Fuzzy-AHP based privacy risk assessment model for strategic information management of social media platforms Taleby Ahvanooey, Milad

130 C p.
artikel
2 Analyzing effective mitigation of DDoS attack with software defined networking Dayal, Neelam

130 C p.
artikel
3 An empirical evaluation of the effectiveness of attack graphs and MITRE ATT&CK matrices in aiding cyber attack perception amongst decision-makers Pirca, Ana Maria

130 C p.
artikel
4 An intelligent recommendation method based on multi-interest network and adversarial deep learning Meng, Shunmei

130 C p.
artikel
5 A Novel Data Poisoning Attack in Federated Learning based on Inverted Loss Function Gupta, Prajjwal

130 C p.
artikel
6 A novel Evil Twin MiTM attack through 802.11v protocol exploitation Louca, Constantinos

130 C p.
artikel
7 A system call-based android malware detection approach with homogeneous & heterogeneous ensemble machine learning Bhat, Parnika

130 C p.
artikel
8 Automated GDPR compliance assessment for cross-border personal data transfers in android applications Guamán, Danny S.

130 C p.
artikel
9 C-BEDIM and S-BEDIM: Lateral movement detection in enterprise network through behavior deviation measurement Dong, Cong

130 C p.
artikel
10 Combining raw data and engineered features for optimizing encrypted and compressed internet of things traffic classification Saleh, Mariam M.

130 C p.
artikel
11 CROSS: A framework for cyber risk optimisation in smart homes Zhang, Yunxiao

130 C p.
artikel
12 Cyber expert feedback: Experiences, expectations, and opinions about cyber deception Ferguson-Walter, Kimberly J.

130 C p.
artikel
13 DDOFM: Dynamic malicious domain detection method based on feature mining Wang, Han

130 C p.
artikel
14 Edge intelligence secure frameworks: Current state and future challenges Villar-Rodriguez, Esther

130 C p.
artikel
15 Editorial Board
130 C p.
artikel
16 Few-shot weakly-supervised cybersecurity anomaly detection Kale, Rahul

130 C p.
artikel
17 GAMBD: Generating adversarial malware against MalConv Li, Kun

130 C p.
artikel
18 GPMT: Generating practical malicious traffic based on adversarial attacks with little prior knowledge Sun, Peishuai

130 C p.
artikel
19 Improving ransomware detection based on portable executable header using xception convolutional neural network Moreira, Caio C.

130 C p.
artikel
20 Learning domain-invariant representation for generalizing face forgery detection Wu, Yuanlu

130 C p.
artikel
21 Locally differentially private multi-dimensional data collection via haar transform Zhang, Dongyue

130 C p.
artikel
22 NE-GConv: A lightweight node edge graph convolutional network for intrusion detection Altaf, Tanzeela

130 C p.
artikel
23 Remote vigilance: The roles of cyber awareness and cybersecurity policies among remote workers Nwankpa, Joseph K.

130 C p.
artikel
24 The direct and indirect effect of organizational justice on employee intention to comply with information security policy: The case of Ethiopian banks Aebissa, Berhanu

130 C p.
artikel
25 The impact of work pressure and work completion justification on intentional nonmalicious information security policy violation intention Jiang, Randi

130 C p.
artikel
26 The meta attack language - a formal description Wideł, Wojciech

130 C p.
artikel
27 VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs Fan, Yuanhai

130 C p.
artikel
28 Why people replace their aging smart devices: A push–pull–mooring perspective Lenz, Julia

130 C p.
artikel
                             28 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland