nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review on deep learning algorithms: Security and privacy issues
|
Tayyab, Muhammad |
|
|
131 |
C |
p. |
artikel |
2 |
An analysis of how many undiscovered vulnerabilities remain in information systems
|
Spring, Jonathan M. |
|
|
131 |
C |
p. |
artikel |
3 |
Assessing the security of inter-app communications in android through reinforcement learning
|
Romdhana, Andrea |
|
|
131 |
C |
p. |
artikel |
4 |
A survey on indoor positioning security and privacy
|
Sartayeva, Yerkezhan |
|
|
131 |
C |
p. |
artikel |
5 |
BoAu: Malicious traffic detection with noise labels based on boundary augmentation
|
Yuan, Qingjun |
|
|
131 |
C |
p. |
artikel |
6 |
Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies
|
Cartwright, Anna |
|
|
131 |
C |
p. |
artikel |
7 |
CL-GAN: A GAN-based continual learning model for generating and detecting AGDs
|
Ren, Yimo |
|
|
131 |
C |
p. |
artikel |
8 |
Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks
|
Sáez-de-Cámara, Xabier |
|
|
131 |
C |
p. |
artikel |
9 |
Common vulnerability scoring system prediction based on open source intelligence information sources
|
Kühn, Philipp |
|
|
131 |
C |
p. |
artikel |
10 |
Data Flooding against Ransomware: Concepts and Implementations
|
Berardi, Davide |
|
|
131 |
C |
p. |
artikel |
11 |
Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime
|
Barreto, Carlos |
|
|
131 |
C |
p. |
artikel |
12 |
Editorial Board
|
|
|
|
131 |
C |
p. |
artikel |
13 |
Enforcement of separation of duty constraints in attribute-based access control
|
Yang, Benyuan |
|
|
131 |
C |
p. |
artikel |
14 |
Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation
|
Beu, Nathan |
|
|
131 |
C |
p. |
artikel |
15 |
Formal verification of fraud-resilience in a crowdsourcing consensus protocol
|
Afzaal, Hamra |
|
|
131 |
C |
p. |
artikel |
16 |
Privacy-Preserving federated learning: An application for big data load forecast in buildings
|
Khalil, Maysaa |
|
|
131 |
C |
p. |
artikel |
17 |
PrSLoc: Sybil attack detection for localization with private observers using differential privacy
|
Yuan, Yachao |
|
|
131 |
C |
p. |
artikel |
18 |
Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach
|
Sang, Yafei |
|
|
131 |
C |
p. |
artikel |
19 |
Using multi-audio feature fusion for android malware detection
|
Tarwireyi, Paul |
|
|
131 |
C |
p. |
artikel |
20 |
WebAssembly diversification for malware evasion
|
Cabrera-Arteaga, Javier |
|
|
131 |
C |
p. |
artikel |
21 |
Would US citizens accept cybersecurity deresponsibilization? Perhaps not
|
Renaud, Karen |
|
|
131 |
C |
p. |
artikel |