Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             17 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A novel dual cloud server privacy-preserving scheme in spatial crowdsourcing Gong, Zhimao

138 C p.
artikel
2 Corrigendum to “Expanding the Gordon-Loeb model to cyber-insurance” [Computers & Security Volume 112 (2022) 102533] Skeoch, Henry R.K.

138 C p.
artikel
3 Corrigendum to “Survey: Automatic generation of attack trees and attack graphs” [Computers & Security Volume 137, February 2024, 103602] Konsta, Alyzia-Maria

138 C p.
artikel
4 DDoS attack detection and mitigation using deep neural network in SDN environment Hnamte, Vanlalruata

138 C p.
artikel
5 DDoS family: A novel perspective for massive types of DDoS attacks Zhao, Ziming

138 C p.
artikel
6 Deception in double extortion ransomware attacks: An analysis of profitability and credibility Meurs, Tom

138 C p.
artikel
7 Editorial Board
138 C p.
artikel
8 Editorial: Special issue on ARES 2022 Coppa, Emilio

138 C p.
artikel
9 Fortifying healthcare: An action research approach to developing an effective SETA program Williams, Jason A.

138 C p.
artikel
10 Improved privacy-preserving PCA using optimized homomorphic matrix multiplication Ma, Xirong

138 C p.
artikel
11 Machine Learning for Android Malware Detection: Mission Accomplished? A Comprehensive Review of Open Challenges and Future Perspectives Guerra-Manzanares, Alejandro

138 C p.
artikel
12 PhishHunter: Detecting camouflaged IDN-based phishing attacks via Siamese neural network Wang, Maoli

138 C p.
artikel
13 SHFuzz: Service handler-aware fuzzing for detecting multi-type vulnerabilities in embedded devices Li, Xixing

138 C p.
artikel
14 Two-factor authentication time: How time-efficiency and time-satisfaction are associated with perceived security and satisfaction Kruzikova, Agata

138 C p.
artikel
15 Understanding information sensitivity perceptions and its impact on information privacy concerns in e-commerce services: Insights from China Tao, Shouzheng

138 C p.
artikel
16 Unveiling encrypted traffic types through hierarchical network characteristics Chen, Yufan

138 C p.
artikel
17 Unveiling shadows: A comprehensive framework for insider threat detection based on statistical and sequential analysis Xiao, Haitao

138 C p.
artikel
                             17 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland