Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             68 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Comprehensive Survey for IoT Security Datasets Taxonomy, Classification and Machine Learning Mechanisms Alex, Christin

132 C p.
artikel
2 Adaptive monitoring, detection, and response for agile digital service chains Repetto, Matteo

132 C p.
artikel
3 ADFL: Defending backdoor attacks in federated learning via adversarial distillation Zhu, Chengcheng

132 C p.
artikel
4 A framework for designing vulnerability metrics Albanese, Massimiliano

132 C p.
artikel
5 A framework for threat intelligence extraction and fusion Guo, Yongyan

132 C p.
artikel
6 A hierarchical deep reinforcement learning model with expert prior knowledge for intelligent penetration testing Li, Qianyu

132 C p.
artikel
7 A hybrid method for analysis and detection of malicious executables in IoT network Subrahmanyam, Singam Sai Bala

132 C p.
artikel
8 A low cost and effective multi-instance abnormal driving behavior detection system under edge computing Wang, Zhihua

132 C p.
artikel
9 A modular framework for auditing IoT devices and networks Rizvi, Syed

132 C p.
artikel
10 An extended view on measuring tor AS-level adversaries Gegenhuber, Gabriel K.

132 C p.
artikel
11 Anti-money laundering supervision by intelligent algorithm Yang, Guangyi

132 C p.
artikel
12 A privacy calculus model for contact tracing apps: Analyzing the use behavior of the German Corona-Warn-App with a longitudinal user study Harborth, David

132 C p.
artikel
13 A privacy threat model for identity verification based on facial recognition Beltrán, Marta

132 C p.
artikel
14 Barriers to a cybersecurity career: Analysis across career stage and gender Giboney, Justin Scott

132 C p.
artikel
15 BINO: Automatic recognition of inline binary functions from template classes Binosi, Lorenzo

132 C p.
artikel
16 Con-Detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis Ali, Hassan

132 C p.
artikel
17 Confine: Fine-grained system call filtering for container attack surface reduction Rostamipoor, Maryam

132 C p.
artikel
18 Continuous authentication with feature-level fusion of touch gestures and keystroke dynamics to solve security and usability issues Stylios, Ioannis

132 C p.
artikel
19 CPID: Insider threat detection using profiling and cyber-persona identification Racherache, Badis

132 C p.
artikel
20 CRA-RPL: A Novel Lightweight challenge-Response authentication-based technique for securing RPL against dropped DAO attacks Goel, Shefali

132 C p.
artikel
21 Cryptographic ransomware encryption detection: Survey Begovic, Kenan

132 C p.
artikel
22 Cyber-physical attack graphs (CPAGs): Composable and scalable attack graphs for cyber-physical systems Barrère, Martín

132 C p.
artikel
23 Cybersecurity communities of practice: Strategies for creating gateways to participation Fisk, Nathan

132 C p.
artikel
24 Cybersecurity Insights Gleaned from World Religions Renaud, Karen

132 C p.
artikel
25 Cyber-threat intelligence for security decision-making: A review and research agenda for practice Ainslie, Scott

132 C p.
artikel
26 Deep-discovery: Anomaly discovery in software-defined networks using artificial neural networks Shaji, Neena Susan

132 C p.
artikel
27 Dependable federated learning for IoT intrusion detection against poisoning attacks Yang, Run

132 C p.
artikel
28 Design, implementation, and automation of a risk management approach for man-at-the-End software protection Basile, Cataldo

132 C p.
artikel
29 Detecting compromised IoT devices: Existing techniques, challenges, and a way forward Makhdoom, Imran

132 C p.
artikel
30 Differential evolution-based convolutional neural networks: An automatic architecture design method for intrusion detection in industrial control systems Huang, Jia-Cheng

132 C p.
artikel
31 DKaaS: DARK-KERNEL as a service for active cyber threat intelligence Charan, P.V. Sai

132 C p.
artikel
32 DNS tunnelling detection by fusing encoding feature and behavioral feature Tu, Yu

132 C p.
artikel
33 Edge-HetIoT defense against DDoS attack using learning techniques Mahadik, Shalaka S.

132 C p.
artikel
34 Editorial Board
132 C p.
artikel
35 Efficient privacy preserving algorithms for hiding sensitive high utility itemsets Ashraf, Mohamed

132 C p.
artikel
36 Enhancing federated learning robustness in adversarial environment through clustering Non-IID features Li, Yanli

132 C p.
artikel
37 Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks Deng, Liting

132 C p.
artikel
38 Evaluating organizational phishing awareness training on an enterprise scale Hillman, Doron

132 C p.
artikel
39 Explainable cyber threat behavior identification based on self-adversarial topic generation Ge, Wenhan

132 C p.
artikel
40 FCEVAL: An effective and quantitative platform for evaluating fuzzer combinations fairly and easily Zhao, Xiaoyun

132 C p.
artikel
41 Game-theoretic APT defense: An experimental study on robotics Rass, Stefan

132 C p.
artikel
42 GenDroid: A query-efficient black-box android adversarial attack framework Xu, Guangquan

132 C p.
artikel
43 Improve individual fairness in federated learning via adversarial training Li, Jie

132 C p.
artikel
44 Improvements to code2vec: Generating path vectors using RNN Sun, Xuekai

132 C p.
artikel
45 ITC: Intrusion tolerant controller for multicontroller SDN architecture Sanoussi, Nouhad

132 C p.
artikel
46 Learning from cyber security incidents: A systematic review and future research agenda Patterson, Clare M.

132 C p.
artikel
47 Light can be Dangerous: Stealthy and Effective Physical-world Adversarial Attack by Spot Light LI, Yufeng

132 C p.
artikel
48 Low frequency sparse adversarial attack Liu, Jiyuan

132 C p.
artikel
49 Mitigation strategies against the phishing attacks: A systematic literature review Naqvi, Bilal

132 C p.
artikel
50 MOSTO: A toolkit to facilitate security auditing of ICS devices using Modbus/TCP Rodríguez, Ricardo J.

132 C p.
artikel
51 MultiTLS: using multiple and diverse ciphers for stronger secure channels Moura, Ricardo

132 C p.
artikel
52 Object-free backdoor attack and defense on semantic segmentation Mao, Jiaoze

132 C p.
artikel
53 Paying attention to cyber-attacks: A multi-layer perceptron with self-attention mechanism Rendón-Segador, Fernando J.

132 C p.
artikel
54 PIGNUS: A Deep Learning model for IDS in industrial internet-of-things Jayalaxmi, P.L.S.

132 C p.
artikel
55 Privacy-centered authentication: A new framework and analysis Robles-González, Antonio

132 C p.
artikel
56 RHEMAT: Robust human ear based multimodal authentication technique Ganapathi, Iyyakutti Iyappan

132 C p.
artikel
57 SCOUT: Security by computing OUTliers on activity logs Ianni, Michele

132 C p.
artikel
58 SecChecker: Inspecting the security implementation of 5G Commercial Off-The-Shelf (COTS) mobile devices Yu, Chuan

132 C p.
artikel
59 Security and performance implications of BGP rerouting-resistant guard selection algorithms for Tor Mitseva, Asya

132 C p.
artikel
60 SWMAT: Mel-frequency cepstral coefficients-based memory fingerprinting for IoT devices Vijayakanthan, Ramyapandian

132 C p.
artikel
61 The tensions of cyber-resilience: From sensemaking to practice Dupont, Benoît

132 C p.
artikel
62 Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory Frank, Muriel

132 C p.
artikel
63 Understanding the adoption of digital conferencing tools: Unpacking the impact of privacy concerns and incident response efficacy Kumar, Kiran

132 C p.
artikel
64 Unmanned Aerial Vehicle (UAV) Forensics: The Good, The Bad, and the Unaddressed Studiawan, Hudan

132 C p.
artikel
65 User-centric security analysis of MitID: The Danish passwordless digital identity solution Kingo, Thomas

132 C p.
artikel
66 Virtual reality for improving cyber situational awareness in security operations centers Munsinger, Brita

132 C p.
artikel
67 Vulnerability detection through cross-modal feature enhancement and fusion Tao, Wenxin

132 C p.
artikel
68 What you can read is what you can't execute Li, YongGang

132 C p.
artikel
                             68 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland