nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms
|
Alex, Christin |
|
|
132 |
C |
p. |
artikel |
2 |
Adaptive monitoring, detection, and response for agile digital service chains
|
Repetto, Matteo |
|
|
132 |
C |
p. |
artikel |
3 |
ADFL: Defending backdoor attacks in federated learning via adversarial distillation
|
Zhu, Chengcheng |
|
|
132 |
C |
p. |
artikel |
4 |
A framework for designing vulnerability metrics
|
Albanese, Massimiliano |
|
|
132 |
C |
p. |
artikel |
5 |
A framework for threat intelligence extraction and fusion
|
Guo, Yongyan |
|
|
132 |
C |
p. |
artikel |
6 |
A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testing
|
Li, Qianyu |
|
|
132 |
C |
p. |
artikel |
7 |
A hybrid method for analysis and detection of malicious executables in IoT network
|
Subrahmanyam, Singam Sai Bala |
|
|
132 |
C |
p. |
artikel |
8 |
A low cost and effective multi-instance abnormal driving behavior detection system under edge computing
|
Wang, Zhihua |
|
|
132 |
C |
p. |
artikel |
9 |
A modular framework for auditing IoT devices and networks
|
Rizvi, Syed |
|
|
132 |
C |
p. |
artikel |
10 |
An extended view on measuring tor AS-level adversaries
|
Gegenhuber, Gabriel K. |
|
|
132 |
C |
p. |
artikel |
11 |
Anti-money laundering supervision by intelligent algorithm
|
Yang, Guangyi |
|
|
132 |
C |
p. |
artikel |
12 |
A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study
|
Harborth, David |
|
|
132 |
C |
p. |
artikel |
13 |
A privacy threat model for identity verification based on facial recognition
|
Beltrán, Marta |
|
|
132 |
C |
p. |
artikel |
14 |
Barriers to a cybersecurity career: Analysis across career stage and gender
|
Giboney, Justin Scott |
|
|
132 |
C |
p. |
artikel |
15 |
BINO: Automatic recognition of inline binary functions from template classes
|
Binosi, Lorenzo |
|
|
132 |
C |
p. |
artikel |
16 |
Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
|
Ali, Hassan |
|
|
132 |
C |
p. |
artikel |
17 |
Confine: Fine-grained system call filtering for container attack surface reduction
|
Rostamipoor, Maryam |
|
|
132 |
C |
p. |
artikel |
18 |
Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues
|
Stylios, Ioannis |
|
|
132 |
C |
p. |
artikel |
19 |
CPID: Insider threat detection using profiling and cyber-persona identification
|
Racherache, Badis |
|
|
132 |
C |
p. |
artikel |
20 |
CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks
|
Goel, Shefali |
|
|
132 |
C |
p. |
artikel |
21 |
Cryptographic ransomware encryption detection: Survey
|
Begovic, Kenan |
|
|
132 |
C |
p. |
artikel |
22 |
Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems
|
Barrère, Martín |
|
|
132 |
C |
p. |
artikel |
23 |
Cybersecurity communities of practice: Strategies for creating gateways to participation
|
Fisk, Nathan |
|
|
132 |
C |
p. |
artikel |
24 |
Cybersecurity Insights Gleaned from World Religions
|
Renaud, Karen |
|
|
132 |
C |
p. |
artikel |
25 |
Cyber-threat intelligence for security decision-making: A review and research agenda for practice
|
Ainslie, Scott |
|
|
132 |
C |
p. |
artikel |
26 |
Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks
|
Shaji, Neena Susan |
|
|
132 |
C |
p. |
artikel |
27 |
Dependable federated learning for IoT intrusion detection against poisoning attacks
|
Yang, Run |
|
|
132 |
C |
p. |
artikel |
28 |
Design, implementation, and automation of a risk management approach for man-at-the-End software protection
|
Basile, Cataldo |
|
|
132 |
C |
p. |
artikel |
29 |
Detecting compromised IoT devices: Existing techniques, challenges, and a way forward
|
Makhdoom, Imran |
|
|
132 |
C |
p. |
artikel |
30 |
Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems
|
Huang, Jia-Cheng |
|
|
132 |
C |
p. |
artikel |
31 |
DKaaS: DARK-KERNEL as a service for active cyber threat intelligence
|
Charan, P.V. Sai |
|
|
132 |
C |
p. |
artikel |
32 |
DNS tunnelling detection by fusing encoding feature and behavioral feature
|
Tu, Yu |
|
|
132 |
C |
p. |
artikel |
33 |
Edge-HetIoT defense against DDoS attack using learning techniques
|
Mahadik, Shalaka S. |
|
|
132 |
C |
p. |
artikel |
34 |
Editorial Board
|
|
|
|
132 |
C |
p. |
artikel |
35 |
Efficient privacy preserving algorithms for hiding sensitive high utility itemsets
|
Ashraf, Mohamed |
|
|
132 |
C |
p. |
artikel |
36 |
Enhancing federated learning robustness in adversarial environment through clustering Non-IID features
|
Li, Yanli |
|
|
132 |
C |
p. |
artikel |
37 |
Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks
|
Deng, Liting |
|
|
132 |
C |
p. |
artikel |
38 |
Evaluating organizational phishing awareness training on an enterprise scale
|
Hillman, Doron |
|
|
132 |
C |
p. |
artikel |
39 |
Explainable cyber threat behavior identification based on self-adversarial topic generation
|
Ge, Wenhan |
|
|
132 |
C |
p. |
artikel |
40 |
FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily
|
Zhao, Xiaoyun |
|
|
132 |
C |
p. |
artikel |
41 |
Game-theoretic APT defense: An experimental study on robotics
|
Rass, Stefan |
|
|
132 |
C |
p. |
artikel |
42 |
GenDroid: A query-efficient black-box android adversarial attack framework
|
Xu, Guangquan |
|
|
132 |
C |
p. |
artikel |
43 |
Improve individual fairness in federated learning via adversarial training
|
Li, Jie |
|
|
132 |
C |
p. |
artikel |
44 |
Improvements to code2vec: Generating path vectors using RNN
|
Sun, Xuekai |
|
|
132 |
C |
p. |
artikel |
45 |
ITC: Intrusion tolerant controller for multicontroller SDN architecture
|
Sanoussi, Nouhad |
|
|
132 |
C |
p. |
artikel |
46 |
Learning from cyber security incidents: A systematic review and future research agenda
|
Patterson, Clare M. |
|
|
132 |
C |
p. |
artikel |
47 |
Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light
|
LI, Yufeng |
|
|
132 |
C |
p. |
artikel |
48 |
Low frequency sparse adversarial attack
|
Liu, Jiyuan |
|
|
132 |
C |
p. |
artikel |
49 |
Mitigation strategies against the phishing attacks: A systematic literature review
|
Naqvi, Bilal |
|
|
132 |
C |
p. |
artikel |
50 |
MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP
|
Rodríguez, Ricardo J. |
|
|
132 |
C |
p. |
artikel |
51 |
MultiTLS: using multiple and diverse ciphers for stronger secure channels
|
Moura, Ricardo |
|
|
132 |
C |
p. |
artikel |
52 |
Object-free backdoor attack and defense on semantic segmentation
|
Mao, Jiaoze |
|
|
132 |
C |
p. |
artikel |
53 |
Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism
|
Rendón-Segador, Fernando J. |
|
|
132 |
C |
p. |
artikel |
54 |
PIGNUS: A Deep Learning model for IDS in industrial internet-of-things
|
Jayalaxmi, P.L.S. |
|
|
132 |
C |
p. |
artikel |
55 |
Privacy-centered authentication: A new framework and analysis
|
Robles-González, Antonio |
|
|
132 |
C |
p. |
artikel |
56 |
RHEMAT: Robust human ear based multimodal authentication technique
|
Ganapathi, Iyyakutti Iyappan |
|
|
132 |
C |
p. |
artikel |
57 |
SCOUT: Security by computing OUTliers on activity logs
|
Ianni, Michele |
|
|
132 |
C |
p. |
artikel |
58 |
SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devices
|
Yu, Chuan |
|
|
132 |
C |
p. |
artikel |
59 |
Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor
|
Mitseva, Asya |
|
|
132 |
C |
p. |
artikel |
60 |
SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices
|
Vijayakanthan, Ramyapandian |
|
|
132 |
C |
p. |
artikel |
61 |
The tensions of cyber-resilience: From sensemaking to practice
|
Dupont, Benoît |
|
|
132 |
C |
p. |
artikel |
62 |
Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory
|
Frank, Muriel |
|
|
132 |
C |
p. |
artikel |
63 |
Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy
|
Kumar, Kiran |
|
|
132 |
C |
p. |
artikel |
64 |
Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed
|
Studiawan, Hudan |
|
|
132 |
C |
p. |
artikel |
65 |
User-centric security analysis of MitID: The Danish passwordless digital identity solution
|
Kingo, Thomas |
|
|
132 |
C |
p. |
artikel |
66 |
Virtual reality for improving cyber situational awareness in security operations centers
|
Munsinger, Brita |
|
|
132 |
C |
p. |
artikel |
67 |
Vulnerability detection through cross-modal feature enhancement and fusion
|
Tao, Wenxin |
|
|
132 |
C |
p. |
artikel |
68 |
What you can read is what you can't execute
|
Li, YongGang |
|
|
132 |
C |
p. |
artikel |