nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cognitive security framework for detecting intrusions in IoT and 5G utilizing deep learning
|
Lilhore, Umesh Kumar |
|
|
136 |
C |
p. |
artikel |
2 |
A comprehensive analysis of website fingerprinting defenses on Tor
|
Xiao, Xi |
|
|
136 |
C |
p. |
artikel |
3 |
AdvCheck: Characterizing adversarial examples via local gradient checking
|
Chen, Ruoxi |
|
|
136 |
C |
p. |
artikel |
4 |
A hybrid cyber defense framework for reconnaissance attack in industrial control systems
|
Qin, Xingsheng |
|
|
136 |
C |
p. |
artikel |
5 |
AIPA: An Adversarial Imperceptible Patch Attack on Medical Datasets and its Interpretability
|
D Dunston, Snofy |
|
|
136 |
C |
p. |
artikel |
6 |
A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism
|
Cai, Saihua |
|
|
136 |
C |
p. |
artikel |
7 |
Analysis of machine learning approaches to packing detection
|
Bertrand Van Ouytsel, Charles-Henry |
|
|
136 |
C |
p. |
artikel |
8 |
APELID: Enhancing real-time intrusion detection with augmented WGAN and parallel ensemble learning
|
Vo, Hoang V. |
|
|
136 |
C |
p. |
artikel |
9 |
APLDP: Adaptive personalized local differential privacy data collection in mobile crowdsensing
|
Song, Haina |
|
|
136 |
C |
p. |
artikel |
10 |
Apollon: A robust defense system against Adversarial Machine Learning attacks in Intrusion Detection Systems
|
Paya, Antonio |
|
|
136 |
C |
p. |
artikel |
11 |
A survey on cybersecurity knowledge graph construction
|
Zhao, Xiaojuan |
|
|
136 |
C |
p. |
artikel |
12 |
A systematic review of current cybersecurity training methods
|
Prümmer, Julia |
|
|
136 |
C |
p. |
artikel |
13 |
Comparative evaluation of recent universal adversarial perturbations in image classification
|
Weng, Juanjuan |
|
|
136 |
C |
p. |
artikel |
14 |
Cookie disclaimers: Dark patterns and lack of transparency
|
Berens, Benjamin Maximilian |
|
|
136 |
C |
p. |
artikel |
15 |
Correlated differential privacy based logistic regression for supplier data protection
|
Liu, Ming |
|
|
136 |
C |
p. |
artikel |
16 |
CTIMD: Cyber threat intelligence enhanced malware detection using API call sequences with parameters
|
Chen, Tieming |
|
|
136 |
C |
p. |
artikel |
17 |
CyberEntRel: Joint extraction of cyber entities and relations using deep learning
|
Ahmed, Kashan |
|
|
136 |
C |
p. |
artikel |
18 |
Defending against model extraction attacks with OOD feature learning and decision boundary confusion
|
Liang, Chuang |
|
|
136 |
C |
p. |
artikel |
19 |
Distance-based linkage of personal microbiome records for identification and its privacy implications
|
Mayer, Rudolf |
|
|
136 |
C |
p. |
artikel |
20 |
Editorial Board
|
|
|
|
136 |
C |
p. |
artikel |
21 |
Effective defense strategies in network security using improved double dueling deep Q-network
|
Zhu, Zhengwei |
|
|
136 |
C |
p. |
artikel |
22 |
Endpoint security reinforcement via integrated zero-trust systems: A collaborative approach
|
Shen, Quan |
|
|
136 |
C |
p. |
artikel |
23 |
Enhance membership inference attacks in federated learning
|
He, Xinlong |
|
|
136 |
C |
p. |
artikel |
24 |
Enhancing the transferability of adversarial samples with random noise techniques
|
Huang, Jiahao |
|
|
136 |
C |
p. |
artikel |
25 |
Facilitating and impeding factors to insiders’ prosocial rule breaking in South Korea
|
Park, Eun Hee |
|
|
136 |
C |
p. |
artikel |
26 |
Federated learning backdoor attack detection with persistence diagram
|
Ma, Zihan |
|
|
136 |
C |
p. |
artikel |
27 |
HP-MIA: A novel membership inference attack scheme for high membership prediction precision
|
Chen, Shi |
|
|
136 |
C |
p. |
artikel |
28 |
Improved capsule networks based on Nash equilibrium for malicious code classification
|
Wang, Meng |
|
|
136 |
C |
p. |
artikel |
29 |
Integrity coded databases - protecting data integrity for outsourced databases
|
Yeh, Jyh-haw |
|
|
136 |
C |
p. |
artikel |
30 |
IoTSecSim: A framework for modelling and simulation of security in Internet of things
|
Chee, Kok Onn |
|
|
136 |
C |
p. |
artikel |
31 |
Learning a deep-feature clustering model for gait-based individual identification
|
Taha, Kamal |
|
|
136 |
C |
p. |
artikel |
32 |
Malicious traffic detection in multi-environment networks using novel S-DATE and PSO-D-SEM approaches
|
Rustam, Furqan |
|
|
136 |
C |
p. |
artikel |
33 |
Multi head self-attention gated graph convolutional network based multi‑attack intrusion detection in MANET
|
Reka, R |
|
|
136 |
C |
p. |
artikel |
34 |
Optimization-based adversarial perturbations against twin support vector machines
|
Wang, Wenjie |
|
|
136 |
C |
p. |
artikel |
35 |
PDHF: Effective phishing detection model combining optimal artificial and automatic deep features
|
Zhu, Erzhou |
|
|
136 |
C |
p. |
artikel |
36 |
PhiUSIIL: A diverse security profile empowered phishing URL detection framework based on similarity index and incremental learning
|
Prasad, Arvind |
|
|
136 |
C |
p. |
artikel |
37 |
Protocol clustering of unknown traffic based on embedding of protocol specification
|
Li, Junchen |
|
|
136 |
C |
p. |
artikel |
38 |
Security and privacy oriented information security culture (ISC): Explaining unauthorized access to healthcare data by nursing employees
|
Mikuletič, Samanta |
|
|
136 |
C |
p. |
artikel |
39 |
SGBA: A stealthy scapegoat backdoor attack against deep neural networks
|
He, Ying |
|
|
136 |
C |
p. |
artikel |
40 |
SuM: Efficient shadow stack protection on ARM Cortex-M
|
Choi, Wonwoo |
|
|
136 |
C |
p. |
artikel |
41 |
Threat modeling of industrial control systems: A systematic literature review
|
Khalil, Shaymaa Mamdouh |
|
|
136 |
C |
p. |
artikel |
42 |
To pass or not to pass: Privacy-preserving physical access control
|
García-Rodríguez, Jesús |
|
|
136 |
C |
p. |
artikel |
43 |
Towards efficient Secure Boolean Range Query over encrypted spatial data
|
Zhao, Xuan |
|
|
136 |
C |
p. |
artikel |
44 |
Transformer-based framework for alert aggregation and attack prediction in a multi-stage attack
|
Wang, Wenbo |
|
|
136 |
C |
p. |
artikel |
45 |
VPPFL: A verifiable privacy-preserving federated learning scheme against poisoning attacks
|
Huang, Yuxian |
|
|
136 |
C |
p. |
artikel |
46 |
Which factors predict susceptibility to phishing? An empirical study
|
Ribeiro, Liliana |
|
|
136 |
C |
p. |
artikel |
47 |
You are your friends: Detecting malware via guilt-by-association and exempt-by-reputation
|
Najafi, Pejman |
|
|
136 |
C |
p. |
artikel |