nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive examination of email spoofing: Issues and prospects for email security
|
Sethuraman, Sibi Chakkaravarthy |
|
|
137 |
C |
p. |
artikel |
2 |
A comprehensive knowledge map for AI improving security management of cyber-physical system enabled smart manufacturing
|
Cao, Yu |
|
|
137 |
C |
p. |
artikel |
3 |
A deep learning technique to detect distributed denial of service attacks in software-defined networks
|
Gadallah, Waheed G. |
|
|
137 |
C |
p. |
artikel |
4 |
AMAD: Active learning-based multivariate time series anomaly detection for large-scale IT systems
|
Yu, Rongwei |
|
|
137 |
C |
p. |
artikel |
5 |
Analysis of statistical properties of variables in log data for advanced anomaly detection in cyber security
|
Wurzenberger, Markus |
|
|
137 |
C |
p. |
artikel |
6 |
Analyzing transparency and malicious insiders prevention for cloud computing environment
|
Rizvi, Syed |
|
|
137 |
C |
p. |
artikel |
7 |
Anomaly detection of aviation data bus based on SAE and IMD
|
Li, Huang |
|
|
137 |
C |
p. |
artikel |
8 |
An optimized neural network for prediction of security threats on software testing
|
Suman, |
|
|
137 |
C |
p. |
artikel |
9 |
A novel Android malware detection method with API semantics extraction
|
Yang, Hongyu |
|
|
137 |
C |
p. |
artikel |
10 |
A privacy preserving four-factor authentication protocol for internet of medical things
|
Guo, Ping |
|
|
137 |
C |
p. |
artikel |
11 |
A simple framework to enhance the adversarial robustness of deep learning-based intrusion detection system
|
Yuan, Xinwei |
|
|
137 |
C |
p. |
artikel |
12 |
A study of NoSQL query injection in Neo4j
|
Van Landuyt, Dimitri |
|
|
137 |
C |
p. |
artikel |
13 |
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack
|
Geng, Jiaxuan |
|
|
137 |
C |
p. |
artikel |
14 |
A survey on the evolution of fileless attacks and detection techniques
|
Liu, Side |
|
|
137 |
C |
p. |
artikel |
15 |
A two-stage model extraction attack on GANs with a small collected dataset
|
Sun, Hui |
|
|
137 |
C |
p. |
artikel |
16 |
Automated machine learning for deep learning based malware detection
|
Brown, Austin |
|
|
137 |
C |
p. |
artikel |
17 |
Combating alert fatigue with AlertPro: Context-aware alert prioritization using reinforcement learning for multi-step attack detection
|
Wang, Xiaoyu |
|
|
137 |
C |
p. |
artikel |
18 |
Content Disarm and Reconstruction of Microsoft Office OLE files
|
Dubin, Ran |
|
|
137 |
C |
p. |
artikel |
19 |
Cross-Layer RF Distance Bounding Scheme for Passive and Semi-passive Ubiquitous Computing Systems
|
Khalil, Fatima Mavra |
|
|
137 |
C |
p. |
artikel |
20 |
Data mining for cyber biosecurity risk management – A comprehensive review
|
Shankar, Deepa D. |
|
|
137 |
C |
p. |
artikel |
21 |
Designing accurate lightweight intrusion detection systems for IoT networks using fine-tuned linear SVM and feature selectors
|
Azimjonov, Jahongir |
|
|
137 |
C |
p. |
artikel |
22 |
Design principles for cognitively accessible cybersecurity training
|
Kävrestad, Joakim |
|
|
137 |
C |
p. |
artikel |
23 |
Detecting prototype pollution for node.js: Vulnerability review and new fuzzing inputs
|
Zhou, Peng |
|
|
137 |
C |
p. |
artikel |
24 |
Detect malicious websites by building a neural network to capture global and local features of websites
|
Zhang, Longwen |
|
|
137 |
C |
p. |
artikel |
25 |
Editorial Board
|
|
|
|
137 |
C |
p. |
artikel |
26 |
Enhanced face morphing attack detection using error-level analysis and efficient selective kernel network
|
Jia, Cheng-kun |
|
|
137 |
C |
p. |
artikel |
27 |
Ensuring secure interoperation of access control in a multidomain environment
|
Yang, Benyuan |
|
|
137 |
C |
p. |
artikel |
28 |
FACILE: A capsule network with fewer capsules and richer hierarchical information for malware image classification
|
Zou, Binghui |
|
|
137 |
C |
p. |
artikel |
29 |
FeSAD ransomware detection framework with machine learning using adaption to concept drift
|
Fernando, Damien Warren |
|
|
137 |
C |
p. |
artikel |
30 |
FLAD: Adaptive Federated Learning for DDoS attack detection
|
Doriguzzi-Corin, Roberto |
|
|
137 |
C |
p. |
artikel |
31 |
Generating sparse explanations for malicious Android opcode sequences using hierarchical LIME
|
Mitchell, Jeff |
|
|
137 |
C |
p. |
artikel |
32 |
Hello me, meet the real me: Voice synthesis attacks on voice assistants
|
Bilika, Domna |
|
|
137 |
C |
p. |
artikel |
33 |
How memory anxiety can influence password security behavior
|
Woods, Naomi |
|
|
137 |
C |
p. |
artikel |
34 |
Identifying vulnerabilities of industrial control systems using evolutionary multiobjective optimisation
|
Tuptuk, Nilufer |
|
|
137 |
C |
p. |
artikel |
35 |
Learning transferable targeted universal adversarial perturbations by sequential meta-learning
|
Weng, Juanjuan |
|
|
137 |
C |
p. |
artikel |
36 |
Let model keep evolving: Incremental learning for encrypted traffic classification
|
Li, Xiang |
|
|
137 |
C |
p. |
artikel |
37 |
M-MultiSVM: An efficient feature selection assisted network intrusion detection system using machine learning
|
Turukmane, Anil V |
|
|
137 |
C |
p. |
artikel |
38 |
Multivariate time series anomaly detection by fusion of deep convolution residual autoencoding reconstruction model and ConvLstm forecasting model
|
Chen, Hongsong |
|
|
137 |
C |
p. |
artikel |
39 |
Municipality2HTTPS: A study on HTTPS protocol's usage in Italian municipalities’ websites
|
Schiavone, Antonio Giovanni |
|
|
137 |
C |
p. |
artikel |
40 |
Personal CAPTCHA-based authentication protocol
|
Krzyworzeka, Natalia |
|
|
137 |
C |
p. |
artikel |
41 |
Predicting new hackers’ criminal careers: A group-based trajectory approach
|
Hoffman, Cameron John |
|
|
137 |
C |
p. |
artikel |
42 |
Preserving data privacy in machine learning systems
|
El Mestari, Soumia Zohra |
|
|
137 |
C |
p. |
artikel |
43 |
Remote access trojan traffic early detection method based on Markov matrices and deep learning
|
Pi, Ben |
|
|
137 |
C |
p. |
artikel |
44 |
Robust biometric scheme against replay attacks using one-time biometric templates
|
Gernot, Tanguy |
|
|
137 |
C |
p. |
artikel |
45 |
SABDTM: Security-first architecture-based dynamic trusted measurement scheme for operating system of the virtual computing node
|
Huang, Haoxiang |
|
|
137 |
C |
p. |
artikel |
46 |
Secure software development and testing: A model-based methodology
|
Casola, Valentina |
|
|
137 |
C |
p. |
artikel |
47 |
SHRIMPS: A framework for evaluating multi-user, multi-modal implicit authentication systems
|
Chen, Jiayi |
|
|
137 |
C |
p. |
artikel |
48 |
Signal enhancement and efficient DTW-based comparison for wearable gait recognition
|
Avola, Danilo |
|
|
137 |
C |
p. |
artikel |
49 |
Single-board device individual authentication based on hardware performance and autoencoder transformer models
|
Sánchez Sánchez, Pedro Miguel |
|
|
137 |
C |
p. |
artikel |
50 |
Spatial-temporal knowledge distillation for lightweight network traffic anomaly detection
|
Wang, Xintong |
|
|
137 |
C |
p. |
artikel |
51 |
Stealthy attack detection based on controlled invariant subspace for autonomous vehicles
|
Zhou, Man |
|
|
137 |
C |
p. |
artikel |
52 |
Survey: Automatic generation of attack trees and attack graphs
|
Konsta, Alyzia-Maria |
|
|
137 |
C |
p. |
artikel |
53 |
SynDroid: An adaptive enhanced Android malware classification method based on CTGAN-SVM
|
Li, Junhao |
|
|
137 |
C |
p. |
artikel |
54 |
Taking 5 minutes protects you for 5 months: Evaluating an anti-phishing awareness video
|
Berens, Benjamin M. |
|
|
137 |
C |
p. |
artikel |
55 |
The effect of environmental turbulence on cyber security risk management and organizational resilience
|
Durst, Susanne |
|
|
137 |
C |
p. |
artikel |
56 |
Toward the flow-centric detection of browser fingerprinting
|
Zhao, Rui |
|
|
137 |
C |
p. |
artikel |
57 |
Traffic spills the beans: A robust video identification attack against YouTube
|
Zhang, Xiyuan |
|
|
137 |
C |
p. |
artikel |
58 |
Unawareness detection: Discovering black-box malicious models and quantifying privacy leakage risks
|
Xu, Jiacheng |
|
|
137 |
C |
p. |
artikel |
59 |
Universal adversarial backdoor attacks to fool vertical federated learning
|
Chen, Peng |
|
|
137 |
C |
p. |
artikel |
60 |
When explainability turns into a threat - using xAI to fool a fake news detection method
|
Kozik, Rafał |
|
|
137 |
C |
p. |
artikel |
61 |
Withdrawal notice to ‘Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures’ [Computers & Security, 97 (2020) 101931]
|
Chowdhury, Noman H. |
|
|
137 |
C |
p. |
artikel |