nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adversarial attack for object detectors under complex conditions
|
Qin, Yingxin |
|
|
134 |
C |
p. |
artikel |
2 |
Adversarial attacks on multi-focus image fusion models
|
Jin, Xin |
|
|
134 |
C |
p. |
artikel |
3 |
An innovative two-stage algorithm to optimize Firewall rule ordering
|
Coscia, Antonio |
|
|
134 |
C |
p. |
artikel |
4 |
A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems
|
Imran, Muhammad |
|
|
134 |
C |
p. |
artikel |
5 |
A survey on biometric cryptosystems and their applications
|
Sharma, Shreyansh |
|
|
134 |
C |
p. |
artikel |
6 |
ATDAD: One-class adversarial learning for tabular data anomaly detection
|
Yang, Xiaohui |
|
|
134 |
C |
p. |
artikel |
7 |
A variable adversarial attack method based on filtering
|
Li, Jiachun |
|
|
134 |
C |
p. |
artikel |
8 |
AVX-TSCHA: Leaking information through AVX extensions in commercial processors
|
Kim, Suryeon |
|
|
134 |
C |
p. |
artikel |
9 |
Balancing software and training requirements for information security
|
Fujs, Damjan |
|
|
134 |
C |
p. |
artikel |
10 |
Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting
|
Zhang, Guiqi |
|
|
134 |
C |
p. |
artikel |
11 |
Designing for privacy: Exploring the influence of affect and individual characteristics on users' interactions with privacy policies
|
Kitkowska, Agnieszka |
|
|
134 |
C |
p. |
artikel |
12 |
Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks
|
Ribeiro, Marcos Aurélio |
|
|
134 |
C |
p. |
artikel |
13 |
Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism
|
Chen, Shouhong |
|
|
134 |
C |
p. |
artikel |
14 |
Detection of malicious PE files using synthesized DNA artifacts
|
Ngwobia, Sunday Cosmos |
|
|
134 |
C |
p. |
artikel |
15 |
Digital forensic analysis of the private mode of browsers on Android
|
Fernández-Fuentes, Xosé |
|
|
134 |
C |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
134 |
C |
p. |
artikel |
17 |
Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing
|
Raghuram Jingade, Raghavendra |
|
|
134 |
C |
p. |
artikel |
18 |
FePN: A robust feature purification network to defend against adversarial examples
|
Cao, Dongliang |
|
|
134 |
C |
p. |
artikel |
19 |
Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation
|
McIntosh, Timothy |
|
|
134 |
C |
p. |
artikel |
20 |
Learning from safety science: A way forward for studying cybersecurity incidents in organizations
|
Ebert, Nico |
|
|
134 |
C |
p. |
artikel |
21 |
Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies
|
Olímpio Jr., Gilberto |
|
|
134 |
C |
p. |
artikel |
22 |
Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence
|
Bayer, Markus |
|
|
134 |
C |
p. |
artikel |
23 |
Nature-inspired intrusion detection system for protecting software-defined networks controller
|
Kumar, Chandan |
|
|
134 |
C |
p. |
artikel |
24 |
On the self-adjustment of privacy safeguards for query log streams
|
Pàmies-Estrems, David |
|
|
134 |
C |
p. |
artikel |
25 |
Operations-informed incident response playbooks
|
Shaked, Avi |
|
|
134 |
C |
p. |
artikel |
26 |
Privacy-preserving healthcare monitoring for IoT devices under edge computing
|
Cao, Wei |
|
|
134 |
C |
p. |
artikel |
27 |
RDPCF: Range-based differentially private user data perturbation for collaborative filtering
|
Guo, Taolin |
|
|
134 |
C |
p. |
artikel |
28 |
Security and privacy problems in voice assistant applications: A survey
|
Li, Jingjin |
|
|
134 |
C |
p. |
artikel |
29 |
SlicedLocator: Code vulnerability locator based on sliced dependence graph
|
Wu, Bolun |
|
|
134 |
C |
p. |
artikel |
30 |
SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection
|
Vitorino, João |
|
|
134 |
C |
p. |
artikel |
31 |
StratDef: Strategic defense against adversarial attacks in ML-based malware detection
|
Rashid, Aqib |
|
|
134 |
C |
p. |
artikel |
32 |
The mediating role of security anxiety in internet threat avoidance behavior
|
Wang, Xuan |
|
|
134 |
C |
p. |
artikel |
33 |
VRKeyLogger: Virtual keystroke inference attack via eavesdropping controller usage pattern in WebVR
|
Lee, Jiyeon |
|
|
134 |
C |
p. |
artikel |
34 |
WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS
|
Srivastava, Arpita |
|
|
134 |
C |
p. |
artikel |
35 |
When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection
|
Alhelaly, Yasser |
|
|
134 |
C |
p. |
artikel |
36 |
ZTWeb: Cross site scripting detection based on zero trust
|
Wu, Anbin |
|
|
134 |
C |
p. |
artikel |