Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             21 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review on deep learning algorithms: Security and privacy issues Tayyab, Muhammad

131 C p.
artikel
2 An analysis of how many undiscovered vulnerabilities remain in information systems Spring, Jonathan M.

131 C p.
artikel
3 Assessing the security of inter-app communications in android through reinforcement learning Romdhana, Andrea

131 C p.
artikel
4 A survey on indoor positioning security and privacy Sartayeva, Yerkezhan

131 C p.
artikel
5 BoAu: Malicious traffic detection with noise labels based on boundary augmentation Yuan, Qingjun

131 C p.
artikel
6 Cascading information on best practice: Cyber security risk management in UK micro and small businesses and the role of IT companies Cartwright, Anna

131 C p.
artikel
7 CL-GAN: A GAN-based continual learning model for generating and detecting AGDs Ren, Yimo

131 C p.
artikel
8 Clustered federated learning architecture for network anomaly detection in large scale heterogeneous IoT networks Sáez-de-Cámara, Xabier

131 C p.
artikel
9 Common vulnerability scoring system prediction based on open source intelligence information sources Kühn, Philipp

131 C p.
artikel
10 Data Flooding against Ransomware: Concepts and Implementations Berardi, Davide

131 C p.
artikel
11 Duopoly insurers’ incentives for data quality under a mandatory cyber data sharing regime Barreto, Carlos

131 C p.
artikel
12 Editorial Board
131 C p.
artikel
13 Enforcement of separation of duty constraints in attribute-based access control Yang, Benyuan

131 C p.
artikel
14 Falling for phishing attempts: An investigation of individual differences that are associated with behavior in a naturalistic phishing simulation Beu, Nathan

131 C p.
artikel
15 Formal verification of fraud-resilience in a crowdsourcing consensus protocol Afzaal, Hamra

131 C p.
artikel
16 Privacy-Preserving federated learning: An application for big data load forecast in buildings Khalil, Maysaa

131 C p.
artikel
17 PrSLoc: Sybil attack detection for localization with private observers using differential privacy Yuan, Yachao

131 C p.
artikel
18 Toward IoT device fingerprinting from proprietary protocol traffic via key-blocks aware approach Sang, Yafei

131 C p.
artikel
19 Using multi-audio feature fusion for android malware detection Tarwireyi, Paul

131 C p.
artikel
20 WebAssembly diversification for malware evasion Cabrera-Arteaga, Javier

131 C p.
artikel
21 Would US citizens accept cybersecurity deresponsibilization? Perhaps not Renaud, Karen

131 C p.
artikel
                             21 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland