Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             61 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive examination of email spoofing: Issues and prospects for email security Sethuraman, Sibi Chakkaravarthy

137 C p.
artikel
2 A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing Cao, Yu

137 C p.
artikel
3 A deep learning technique to detect distributed denial of service attacks in software-defined networks Gadallah, Waheed G.

137 C p.
artikel
4 AMAD: Active learning-based multivariate time series anomaly detection for large-scale IT systems Yu, Rongwei

137 C p.
artikel
5 Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security Wurzenberger, Markus

137 C p.
artikel
6 Analyzing transparency and malicious insiders prevention for cloud computing environment Rizvi, Syed

137 C p.
artikel
7 Anomaly detection of aviation data bus based on SAE and IMD Li, Huang

137 C p.
artikel
8 An optimized neural network for prediction of security threats on software testing Suman,

137 C p.
artikel
9 A novel Android malware detection method with API semantics extraction Yang, Hongyu

137 C p.
artikel
10 A privacy preserving four-factor authentication protocol for internet of medical things Guo, Ping

137 C p.
artikel
11 A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system Yuan, Xinwei

137 C p.
artikel
12 A study of NoSQL query injection in Neo4j Van Landuyt, Dimitri

137 C p.
artikel
13 A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack Geng, Jiaxuan

137 C p.
artikel
14 A survey on the evolution of fileless attacks and detection techniques Liu, Side

137 C p.
artikel
15 A two-stage model extraction attack on GANs with a small collected dataset Sun, Hui

137 C p.
artikel
16 Automated machine learning for deep learning based malware detection Brown, Austin

137 C p.
artikel
17 Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection Wang, Xiaoyu

137 C p.
artikel
18 Content Disarm and Reconstruction of Microsoft Office OLE files Dubin, Ran

137 C p.
artikel
19 Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems Khalil, Fatima Mavra

137 C p.
artikel
20 Data mining for cyber biosecurity risk management – A comprehensive review Shankar, Deepa D.

137 C p.
artikel
21 Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors Azimjonov, Jahongir

137 C p.
artikel
22 Design principles for cognitively accessible cybersecurity training Kävrestad, Joakim

137 C p.
artikel
23 Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs Zhou, Peng

137 C p.
artikel
24 Detect malicious websites by building a neural network to capture global and local features of websites Zhang, Longwen

137 C p.
artikel
25 Editorial Board
137 C p.
artikel
26 Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network Jia, Cheng-kun

137 C p.
artikel
27 Ensuring secure interoperation of access control in a multidomain environment Yang, Benyuan

137 C p.
artikel
28 FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification Zou, Binghui

137 C p.
artikel
29 FeSAD ransomware detection framework with machine learning using adaption to concept drift Fernando, Damien Warren

137 C p.
artikel
30 FLAD: Adaptive Federated Learning for DDoS attack detection Doriguzzi-Corin, Roberto

137 C p.
artikel
31 Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME Mitchell, Jeff

137 C p.
artikel
32 Hello me, meet the real me: Voice synthesis attacks on voice assistants Bilika, Domna

137 C p.
artikel
33 How memory anxiety can influence password security behavior Woods, Naomi

137 C p.
artikel
34 Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation Tuptuk, Nilufer

137 C p.
artikel
35 Learning transferable targeted universal adversarial perturbations by sequential meta-learning Weng, Juanjuan

137 C p.
artikel
36 Let model keep evolving: Incremental learning for encrypted traffic classification Li, Xiang

137 C p.
artikel
37 M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning Turukmane, Anil V

137 C p.
artikel
38 Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model Chen, Hongsong

137 C p.
artikel
39 Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities’ websites Schiavone, Antonio Giovanni

137 C p.
artikel
40 Personal CAPTCHA-based authentication protocol Krzyworzeka, Natalia

137 C p.
artikel
41 Predicting new hackers’ criminal careers: A group-based trajectory approach Hoffman, Cameron John

137 C p.
artikel
42 Preserving data privacy in machine learning systems El Mestari, Soumia Zohra

137 C p.
artikel
43 Remote access trojan traffic early detection method based on Markov matrices and deep learning Pi, Ben

137 C p.
artikel
44 Robust biometric scheme against replay attacks using one-time biometric templates Gernot, Tanguy

137 C p.
artikel
45 SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node Huang, Haoxiang

137 C p.
artikel
46 Secure software development and testing: A model-based methodology Casola, Valentina

137 C p.
artikel
47 SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems Chen, Jiayi

137 C p.
artikel
48 Signal enhancement and efficient DTW-based comparison for wearable gait recognition Avola, Danilo

137 C p.
artikel
49 Single-board device individual authentication based on hardware performance and autoencoder transformer models Sánchez Sánchez, Pedro Miguel

137 C p.
artikel
50 Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection Wang, Xintong

137 C p.
artikel
51 Stealthy attack detection based on controlled invariant subspace for autonomous vehicles Zhou, Man

137 C p.
artikel
52 Survey: Automatic generation of attack trees and attack graphs Konsta, Alyzia-Maria

137 C p.
artikel
53 SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM Li, Junhao

137 C p.
artikel
54 Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video Berens, Benjamin M.

137 C p.
artikel
55 The effect of environmental turbulence on cyber security risk management and organizational resilience Durst, Susanne

137 C p.
artikel
56 Toward the flow-centric detection of browser fingerprinting Zhao, Rui

137 C p.
artikel
57 Traffic spills the beans: A robust video identification attack against YouTube Zhang, Xiyuan

137 C p.
artikel
58 Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks Xu, Jiacheng

137 C p.
artikel
59 Universal adversarial backdoor attacks to fool vertical federated learning Chen, Peng

137 C p.
artikel
60 When explainability turns into a threat - using xAI to fool a fake news detection method Kozik, Rafał

137 C p.
artikel
61 Withdrawal notice to ‘Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures’ [Computers & Security, 97 (2020) 101931] Chowdhury, Noman H.

137 C p.
artikel
                             61 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland