Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             36 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adversarial attack for object detectors under complex conditions Qin, Yingxin

134 C p.
artikel
2 Adversarial attacks on multi-focus image fusion models Jin, Xin

134 C p.
artikel
3 An innovative two-stage algorithm to optimize Firewall rule ordering Coscia, Antonio

134 C p.
artikel
4 A performance overview of machine learning-based defense strategies for advanced persistent threats in industrial control systems Imran, Muhammad

134 C p.
artikel
5 A survey on biometric cryptosystems and their applications Sharma, Shreyansh

134 C p.
artikel
6 ATDAD: One-class adversarial learning for tabular data anomaly detection Yang, Xiaohui

134 C p.
artikel
7 A variable adversarial attack method based on filtering Li, Jiachun

134 C p.
artikel
8 AVX-TSCHA: Leaking information through AVX extensions in commercial processors Kim, Suryeon

134 C p.
artikel
9 Balancing software and training requirements for information security Fujs, Damjan

134 C p.
artikel
10 Bit scanner: Anomaly detection for in-vehicle CAN bus using binary sequence whitelisting Zhang, Guiqi

134 C p.
artikel
11 Designing for privacy: Exploring the influence of affect and individual characteristics on users' interactions with privacy policies Kitkowska, Agnieszka

134 C p.
artikel
12 Detecting and mitigating DDoS attacks with moving target defense approach based on automated flow classification in SDN networks Ribeiro, Marcos Aurélio

134 C p.
artikel
13 Detection method of Golden Chip-Free Hardware Trojan based on the combination of ResNeXt structure and attention mechanism Chen, Shouhong

134 C p.
artikel
14 Detection of malicious PE files using synthesized DNA artifacts Ngwobia, Sunday Cosmos

134 C p.
artikel
15 Digital forensic analysis of the private mode of browsers on Android Fernández-Fuentes, Xosé

134 C p.
artikel
16 Editorial Board
134 C p.
artikel
17 Extended right-angle difference ternary co-relation pattern: A new feature descriptor for face anti-spoofing Raghuram Jingade, Raghavendra

134 C p.
artikel
18 FePN: A robust feature purification network to defend against adversarial examples Cao, Dongliang

134 C p.
artikel
19 Harnessing GPT-4 for generation of cybersecurity GRC policies: A focus on ransomware attack mitigation McIntosh, Timothy

134 C p.
artikel
20 Learning from safety science: A way forward for studying cybersecurity incidents in organizations Ebert, Nico

134 C p.
artikel
21 Model update for intrusion detection: Analyzing the performance of delayed labeling and active learning strategies Olímpio Jr., Gilberto

134 C p.
artikel
22 Multi-level fine-tuning, data augmentation, and few-shot learning for specialized cyber threat intelligence Bayer, Markus

134 C p.
artikel
23 Nature-inspired intrusion detection system for protecting software-defined networks controller Kumar, Chandan

134 C p.
artikel
24 On the self-adjustment of privacy safeguards for query log streams Pàmies-Estrems, David

134 C p.
artikel
25 Operations-informed incident response playbooks Shaked, Avi

134 C p.
artikel
26 Privacy-preserving healthcare monitoring for IoT devices under edge computing Cao, Wei

134 C p.
artikel
27 RDPCF: Range-based differentially private user data perturbation for collaborative filtering Guo, Taolin

134 C p.
artikel
28 Security and privacy problems in voice assistant applications: A survey Li, Jingjin

134 C p.
artikel
29 SlicedLocator: Code vulnerability locator based on sliced dependence graph Wu, Bolun

134 C p.
artikel
30 SoK: Realistic adversarial attacks and defenses for intelligent network intrusion detection Vitorino, João

134 C p.
artikel
31 StratDef: Strategic defense against adversarial attacks in ML-based malware detection Rashid, Aqib

134 C p.
artikel
32 The mediating role of security anxiety in internet threat avoidance behavior Wang, Xuan

134 C p.
artikel
33 VRKeyLogger: Virtual keystroke inference attack via eavesdropping controller usage pattern in WebVR Lee, Jiyeon

134 C p.
artikel
34 WCGAN-GP based synthetic attack data generation with GA based feature selection for IDS Srivastava, Arpita

134 C p.
artikel
35 When expectation fails and motivation prevails: the mediating role of awareness in bridging the expectancy-capability gap in mobile identity protection Alhelaly, Yasser

134 C p.
artikel
36 ZTWeb: Cross site scripting detection based on zero trust Wu, Anbin

134 C p.
artikel
                             36 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland