nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing
|
Gong, Zhimao |
|
|
138 |
C |
p. |
artikel |
2 |
Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533]
|
Skeoch, Henry R.K. |
|
|
138 |
C |
p. |
artikel |
3 |
Corrigendum to “Survey: Automatic generation of attack trees and attack graphs” [Computers & Security Volume 137, February 2024, 103602]
|
Konsta, Alyzia-Maria |
|
|
138 |
C |
p. |
artikel |
4 |
DDoS attack detection and mitigation using deep neural network in SDN environment
|
Hnamte, Vanlalruata |
|
|
138 |
C |
p. |
artikel |
5 |
DDoS family: A novel perspective for massive types of DDoS attacks
|
Zhao, Ziming |
|
|
138 |
C |
p. |
artikel |
6 |
Deception in double extortion ransomware attacks: An analysis of profitability and credibility
|
Meurs, Tom |
|
|
138 |
C |
p. |
artikel |
7 |
Editorial Board
|
|
|
|
138 |
C |
p. |
artikel |
8 |
Editorial: Special issue on ARES 2022
|
Coppa, Emilio |
|
|
138 |
C |
p. |
artikel |
9 |
Fortifying healthcare: An action research approach to developing an effective SETA program
|
Williams, Jason A. |
|
|
138 |
C |
p. |
artikel |
10 |
Improved privacy-preserving PCA using optimized homomorphic matrix multiplication
|
Ma, Xirong |
|
|
138 |
C |
p. |
artikel |
11 |
Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives
|
Guerra-Manzanares, Alejandro |
|
|
138 |
C |
p. |
artikel |
12 |
PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network
|
Wang, Maoli |
|
|
138 |
C |
p. |
artikel |
13 |
SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices
|
Li, Xixing |
|
|
138 |
C |
p. |
artikel |
14 |
Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction
|
Kruzikova, Agata |
|
|
138 |
C |
p. |
artikel |
15 |
Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China
|
Tao, Shouzheng |
|
|
138 |
C |
p. |
artikel |
16 |
Unveiling encrypted traffic types through hierarchical network characteristics
|
Chen, Yufan |
|
|
138 |
C |
p. |
artikel |
17 |
Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis
|
Xiao, Haitao |
|
|
138 |
C |
p. |
artikel |