nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ABAC policy mining method based on hierarchical clustering and relationship extraction
|
Shang, Siyuan |
|
|
139 |
C |
p. |
artikel |
2 |
A feature selection based on genetic algorithm for intrusion detection of industrial control systems
|
Fang, Yushan |
|
|
139 |
C |
p. |
artikel |
3 |
An active learning framework using deep Q-network for zero-day attack detection
|
Wu, Yali |
|
|
139 |
C |
p. |
artikel |
4 |
An adversarial attack approach for eXplainable AI evaluation on deepfake detection models
|
Gowrisankar, Balachandar |
|
|
139 |
C |
p. |
artikel |
5 |
Anomaly detection for space information networks: A survey of challenges, techniques, and future directions
|
Diro, Abebe |
|
|
139 |
C |
p. |
artikel |
6 |
A review on security implementations in soft-processors for IoT applications
|
Caraveo-Cacep, Miguel Antonio |
|
|
139 |
C |
p. |
artikel |
7 |
A study on vulnerability of the Wickr login system in windows from a live forensics perspective
|
Kim, Giyoon |
|
|
139 |
C |
p. |
artikel |
8 |
A system dynamics approach to building counterfeit avoidance programs
|
Vepraskas, Matthew J |
|
|
139 |
C |
p. |
artikel |
9 |
A threshold traceable delegation authorization scheme for data sharing in healthcare
|
Zhao, Jing |
|
|
139 |
C |
p. |
artikel |
10 |
BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift
|
Jiang, Yongkang |
|
|
139 |
C |
p. |
artikel |
11 |
BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion
|
Xuan, Bona |
|
|
139 |
C |
p. |
artikel |
12 |
Certificateless cloud storage auditing supporting data ownership transfer
|
Huang, Yinghui |
|
|
139 |
C |
p. |
artikel |
13 |
Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach
|
Mvah, Fabrice |
|
|
139 |
C |
p. |
artikel |
14 |
Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands
|
van de Weijer, Steve |
|
|
139 |
C |
p. |
artikel |
15 |
Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks
|
Najar, Ashfaq Ahmad |
|
|
139 |
C |
p. |
artikel |
16 |
DAmpADF: A framework for DNS amplification attack defense based on Bloom filters and NAmpKeeper
|
Dai, Yunwei |
|
|
139 |
C |
p. |
artikel |
17 |
DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps
|
Wabi, Abdullahi Aishatu |
|
|
139 |
C |
p. |
artikel |
18 |
DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning
|
Khan, Muneeb Hassan |
|
|
139 |
C |
p. |
artikel |
19 |
Editorial Board
|
|
|
|
139 |
C |
p. |
artikel |
20 |
Efficient federated learning privacy preservation method with heterogeneous differential privacy
|
Ling, Jie |
|
|
139 |
C |
p. |
artikel |
21 |
EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection
|
Bostani, Hamid |
|
|
139 |
C |
p. |
artikel |
22 |
Examining usable security features and user perceptions of Physical Authentication Devices
|
Nanda, Ashish |
|
|
139 |
C |
p. |
artikel |
23 |
Expanding analytical capabilities in intrusion detection through ensemble-based multi-label classification
|
Hallaji, Ehsan |
|
|
139 |
C |
p. |
artikel |
24 |
Exploring compiler optimization space for control flow obfuscation
|
Ahmed, Hameeza |
|
|
139 |
C |
p. |
artikel |
25 |
Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach
|
Alshaikh, Omar |
|
|
139 |
C |
p. |
artikel |
26 |
Exploring the evidence for email phishing training: A scoping review
|
Marshall, Nina |
|
|
139 |
C |
p. |
artikel |
27 |
Federated learning for 5G and beyond, a blessing and a curse- an experimental study on intrusion detection systems
|
Djaidja, Taki Eddine Toufik |
|
|
139 |
C |
p. |
artikel |
28 |
Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems
|
Snehi, Manish |
|
|
139 |
C |
p. |
artikel |
29 |
Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems
|
Haque, Nur Imtiazul |
|
|
139 |
C |
p. |
artikel |
30 |
Future of generative adversarial networks (GAN) for anomaly detection in network security: A review
|
Lim, Willone |
|
|
139 |
C |
p. |
artikel |
31 |
GAPBAS: Genetic algorithm-based privacy budget allocation strategy in differential privacy K-means clustering algorithm
|
Li, Yong |
|
|
139 |
C |
p. |
artikel |
32 |
Gradient-based defense methods for data leakage in vertical federated learning
|
Chang, Wenhan |
|
|
139 |
C |
p. |
artikel |
33 |
HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing
|
Feng, Wangxin |
|
|
139 |
C |
p. |
artikel |
34 |
Hybrid rat swarm hunter prey optimization trained deep learning for network intrusion detection using CNN features
|
Parameswari, A. |
|
|
139 |
C |
p. |
artikel |
35 |
“I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents
|
Patterson, Clare M. |
|
|
139 |
C |
p. |
artikel |
36 |
Improving adversarial transferability through hybrid augmentation
|
Zhu, Peican |
|
|
139 |
C |
p. |
artikel |
37 |
Influences of displaying permission-related information on web single sign-on login decisions
|
Morkonda, Srivathsan G. |
|
|
139 |
C |
p. |
artikel |
38 |
Local aggressive and physically realizable adversarial attacks on 3D point cloud
|
Chen, Zhiyu |
|
|
139 |
C |
p. |
artikel |
39 |
Machine learning in identity and access management systems: Survey and deep dive
|
Aboukadri, Sara |
|
|
139 |
C |
p. |
artikel |
40 |
MAGIC: Malware behaviour analysis and impact quantification through signature co-occurrence and regression
|
S, Rohini |
|
|
139 |
C |
p. |
artikel |
41 |
MAlign: Explainable static raw-byte based malware family classification using sequence alignment
|
Saha, Shoumik |
|
|
139 |
C |
p. |
artikel |
42 |
MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network
|
Sun, Haili |
|
|
139 |
C |
p. |
artikel |
43 |
Multi-motion sensor behavior based continuous authentication on smartphones using gated two-tower transformer fusion networks
|
Zhao, Chengmei |
|
|
139 |
C |
p. |
artikel |
44 |
Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception
|
Rehman, Zubaida |
|
|
139 |
C |
p. |
artikel |
45 |
PVFL: Verifiable federated learning and prediction with privacy-preserving
|
Yin, Benxin |
|
|
139 |
C |
p. |
artikel |
46 |
RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports
|
Franco, Muriel F. |
|
|
139 |
C |
p. |
artikel |
47 |
ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems
|
Mahnamfar, Amin |
|
|
139 |
C |
p. |
artikel |
48 |
Shadow backdoor attack: Multi-intensity backdoor attack against federated learning
|
Ren, Qixian |
|
|
139 |
C |
p. |
artikel |
49 |
Smart homes under siege: Assessing the robustness of physical security against wireless network attacks
|
Allen, Ashley |
|
|
139 |
C |
p. |
artikel |
50 |
The applicability of a hybrid framework for automated phishing detection
|
van Geest, R.J. |
|
|
139 |
C |
p. |
artikel |
51 |
The human factor in phishing: Collecting and analyzing user behavior when reading emails
|
Gallo, Luigi |
|
|
139 |
C |
p. |
artikel |
52 |
Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples
|
Abolfathi, Masoumeh |
|
|
139 |
C |
p. |
artikel |
53 |
Unravelling the three lines model in cybersecurity: a systematic literature review
|
Valkenburg, Bert |
|
|
139 |
C |
p. |
artikel |
54 |
VDTriplet: Vulnerability detection with graph semantics using triplet model
|
Sun, Hao |
|
|
139 |
C |
p. |
artikel |
55 |
Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT)
|
Germán Márquez, A. |
|
|
139 |
C |
p. |
artikel |
56 |
Wasm-Mutate: Fast and effective binary diversification for WebAssembly
|
Cabrera-Arteaga, Javier |
|
|
139 |
C |
p. |
artikel |
57 |
XRan: Explainable deep learning-based ransomware detection using dynamic analysis
|
Gulmez, Sibel |
|
|
139 |
C |
p. |
artikel |