Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             47 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning Lilhore, Umesh Kumar

136 C p.
artikel
2 A comprehensive analysis of website fingerprinting defenses on Tor Xiao, Xi

136 C p.
artikel
3 AdvCheck: Characterizing adversarial examples via local gradient checking Chen, Ruoxi

136 C p.
artikel
4 A hybrid cyber defense framework for reconnaissance attack in industrial control systems Qin, Xingsheng

136 C p.
artikel
5 AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability D Dunston, Snofy

136 C p.
artikel
6 A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism Cai, Saihua

136 C p.
artikel
7 Analysis of machine learning approaches to packing detection Bertrand Van Ouytsel, Charles-Henry

136 C p.
artikel
8 APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning Vo, Hoang V.

136 C p.
artikel
9 APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing Song, Haina

136 C p.
artikel
10 Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems Paya, Antonio

136 C p.
artikel
11 A survey on cybersecurity knowledge graph construction Zhao, Xiaojuan

136 C p.
artikel
12 A systematic review of current cybersecurity training methods Prümmer, Julia

136 C p.
artikel
13 Comparative evaluation of recent universal adversarial perturbations in image classification Weng, Juanjuan

136 C p.
artikel
14 Cookie disclaimers: Dark patterns and lack of transparency Berens, Benjamin Maximilian

136 C p.
artikel
15 Correlated differential privacy based logistic regression for supplier data protection Liu, Ming

136 C p.
artikel
16 CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters Chen, Tieming

136 C p.
artikel
17 CyberEntRel: Joint extraction of cyber entities and relations using deep learning Ahmed, Kashan

136 C p.
artikel
18 Defending against model extraction attacks with OOD feature learning and decision boundary confusion Liang, Chuang

136 C p.
artikel
19 Distance-based linkage of personal microbiome records for identification and its privacy implications Mayer, Rudolf

136 C p.
artikel
20 Editorial Board
136 C p.
artikel
21 Effective defense strategies in network security using improved double dueling deep Q-network Zhu, Zhengwei

136 C p.
artikel
22 Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach Shen, Quan

136 C p.
artikel
23 Enhance membership inference attacks in federated learning He, Xinlong

136 C p.
artikel
24 Enhancing the transferability of adversarial samples with random noise techniques Huang, Jiahao

136 C p.
artikel
25 Facilitating and impeding factors to insiders’ prosocial rule breaking in South Korea Park, Eun Hee

136 C p.
artikel
26 Federated learning backdoor attack detection with persistence diagram Ma, Zihan

136 C p.
artikel
27 HP-MIA: A novel membership inference attack scheme for high membership prediction precision Chen, Shi

136 C p.
artikel
28 Improved capsule networks based on Nash equilibrium for malicious code classification Wang, Meng

136 C p.
artikel
29 Integrity coded databases - protecting data integrity for outsourced databases Yeh, Jyh-haw

136 C p.
artikel
30 IoTSecSim: A framework for modelling and simulation of security in Internet of things Chee, Kok Onn

136 C p.
artikel
31 Learning a deep-feature clustering model for gait-based individual identification Taha, Kamal

136 C p.
artikel
32 Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches Rustam, Furqan

136 C p.
artikel
33 Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET Reka, R

136 C p.
artikel
34 Optimization-based adversarial perturbations against twin support vector machines Wang, Wenjie

136 C p.
artikel
35 PDHF: Effective phishing detection model combining optimal artificial and automatic deep features Zhu, Erzhou

136 C p.
artikel
36 PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning Prasad, Arvind

136 C p.
artikel
37 Protocol clustering of unknown traffic based on embedding of protocol specification Li, Junchen

136 C p.
artikel
38 Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees Mikuletič, Samanta

136 C p.
artikel
39 SGBA: A stealthy scapegoat backdoor attack against deep neural networks He, Ying

136 C p.
artikel
40 SuM: Efficient shadow stack protection on ARM Cortex-M Choi, Wonwoo

136 C p.
artikel
41 Threat modeling of industrial control systems: A systematic literature review Khalil, Shaymaa Mamdouh

136 C p.
artikel
42 To pass or not to pass: Privacy-preserving physical access control García-Rodríguez, Jesús

136 C p.
artikel
43 Towards efficient Secure Boolean Range Query over encrypted spatial data Zhao, Xuan

136 C p.
artikel
44 Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack Wang, Wenbo

136 C p.
artikel
45 VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks Huang, Yuxian

136 C p.
artikel
46 Which factors predict susceptibility to phishing? An empirical study Ribeiro, Liliana

136 C p.
artikel
47 You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation Najafi, Pejman

136 C p.
artikel
                             47 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland