Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             57 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 ABAC policy mining method based on hierarchical clustering and relationship extraction Shang, Siyuan

139 C p.
artikel
2 A feature selection based on genetic algorithm for intrusion detection of industrial control systems Fang, Yushan

139 C p.
artikel
3 An active learning framework using deep Q-network for zero-day attack detection Wu, Yali

139 C p.
artikel
4 An adversarial attack approach for eXplainable AI evaluation on deepfake detection models Gowrisankar, Balachandar

139 C p.
artikel
5 Anomaly detection for space information networks: A survey of challenges, techniques, and future directions Diro, Abebe

139 C p.
artikel
6 A review on security implementations in soft-processors for IoT applications Caraveo-Cacep, Miguel Antonio

139 C p.
artikel
7 A study on vulnerability of the Wickr login system in windows from a live forensics perspective Kim, Giyoon

139 C p.
artikel
8 A system dynamics approach to building counterfeit avoidance programs Vepraskas, Matthew J

139 C p.
artikel
9 A threshold traceable delegation authorization scheme for data sharing in healthcare Zhao, Jing

139 C p.
artikel
10 BenchMFC: A benchmark dataset for trustworthy malware family classification under concept drift Jiang, Yongkang

139 C p.
artikel
11 BiTCN-TAEfficientNet malware classification approach based on sequence and RGB fusion Xuan, Bona

139 C p.
artikel
12 Certificateless cloud storage auditing supporting data ownership transfer Huang, Yinghui

139 C p.
artikel
13 Countering ARP spoofing attacks in software-defined networks using a game-theoretic approach Mvah, Fabrice

139 C p.
artikel
14 Cybercrime during the COVID-19 pandemic: Prevalence, nature and impact of cybercrime for citizens and SME owners in the Netherlands van de Weijer, Steve

139 C p.
artikel
15 Cyber-Secure SDN: A CNN-Based Approach for Efficient Detection and Mitigation of DDoS attacks Najar, Ashfaq Ahmad

139 C p.
artikel
16 DAmpADF: A framework for DNS amplification attack defense based on Bloom filters and NAmpKeeper Dai, Yunwei

139 C p.
artikel
17 DDOS attack detection in SDN: Method of attacks, detection techniques, challenges and research gaps Wabi, Abdullahi Aishatu

139 C p.
artikel
18 DivaCAN: Detecting in-vehicle intrusion attacks on a controller area network using ensemble learning Khan, Muneeb Hassan

139 C p.
artikel
19 Editorial Board
139 C p.
artikel
20 Efficient federated learning privacy preservation method with heterogeneous differential privacy Ling, Jie

139 C p.
artikel
21 EvadeDroid: A practical evasion attack on machine learning for black-box Android malware detection Bostani, Hamid

139 C p.
artikel
22 Examining usable security features and user perceptions of Physical Authentication Devices Nanda, Ashish

139 C p.
artikel
23 Expanding analytical capabilities in intrusion detection through ensemble-based multi-label classification Hallaji, Ehsan

139 C p.
artikel
24 Exploring compiler optimization space for control flow obfuscation Ahmed, Hameeza

139 C p.
artikel
25 Exploring perceptions of decision-makers and specialists in defensive machine learning cybersecurity applications: The need for a standardised approach Alshaikh, Omar

139 C p.
artikel
26 Exploring the evidence for email phishing training: A scoping review Marshall, Nina

139 C p.
artikel
27 Federated learning for 5G and beyond, a blessing and a curse- an experimental study on intrusion detection systems Djaidja, Taki Eddine Toufik

139 C p.
artikel
28 Foggier skies, clearer clouds: A real-time IoT-DDoS attack mitigation framework in fog-assisted software-defined cyber-physical systems Snehi, Manish

139 C p.
artikel
29 Formal threat analysis of machine learning-based control systems: A study on smart healthcare systems Haque, Nur Imtiazul

139 C p.
artikel
30 Future of generative adversarial networks (GAN) for anomaly detection in network security: A review Lim, Willone

139 C p.
artikel
31 GAPBAS: Genetic algorithm-based privacy budget allocation strategy in differential privacy K-means clustering algorithm Li, Yong

139 C p.
artikel
32 Gradient-based defense methods for data leakage in vertical federated learning Chang, Wenhan

139 C p.
artikel
33 HSTW: A robust network flow watermarking method based on hybrid packet sequence-timing Feng, Wangxin

139 C p.
artikel
34 Hybrid rat swarm hunter prey optimization trained deep learning for network intrusion detection using CNN features Parameswari, A.

139 C p.
artikel
35 “I don't think we're there yet”: The practices and challenges of organisational learning from cyber security incidents Patterson, Clare M.

139 C p.
artikel
36 Improving adversarial transferability through hybrid augmentation Zhu, Peican

139 C p.
artikel
37 Influences of displaying permission-related information on web single sign-on login decisions Morkonda, Srivathsan G.

139 C p.
artikel
38 Local aggressive and physically realizable adversarial attacks on 3D point cloud Chen, Zhiyu

139 C p.
artikel
39 Machine learning in identity and access management systems: Survey and deep dive Aboukadri, Sara

139 C p.
artikel
40 MAGIC: Malware behaviour analysis and impact quantification through signature co-occurrence and regression S, Rohini

139 C p.
artikel
41 MAlign: Explainable static raw-byte based malware family classification using sequence alignment Saha, Shoumik

139 C p.
artikel
42 MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network Sun, Haili

139 C p.
artikel
43 Multi-motion sensor behavior based continuous authentication on smartphones using gated two-tower transformer fusion networks Zhao, Chengmei

139 C p.
artikel
44 Proactive defense mechanism: Enhancing IoT security through diversity-based moving target defense and cyber deception Rehman, Zubaida

139 C p.
artikel
45 PVFL: Verifiable federated learning and prediction with privacy-preserving Yin, Benxin

139 C p.
artikel
46 RCVaR: An economic approach to estimate cyberattacks costs using data from industry reports Franco, Muriel F.

139 C p.
artikel
47 ROSTAM: A passwordless web single sign-on solution mitigating server breaches and integrating credential manager and federated identity systems Mahnamfar, Amin

139 C p.
artikel
48 Shadow backdoor attack: Multi-intensity backdoor attack against federated learning Ren, Qixian

139 C p.
artikel
49 Smart homes under siege: Assessing the robustness of physical security against wireless network attacks Allen, Ashley

139 C p.
artikel
50 The applicability of a hybrid framework for automated phishing detection van Geest, R.J.

139 C p.
artikel
51 The human factor in phishing: Collecting and analyzing user behavior when reading emails Gallo, Luigi

139 C p.
artikel
52 Toward enhancing web privacy on HTTPS traffic: A novel SuperLearner attack model and an efficient defense approach with adversarial examples Abolfathi, Masoumeh

139 C p.
artikel
53 Unravelling the three lines model in cybersecurity: a systematic literature review Valkenburg, Bert

139 C p.
artikel
54 VDTriplet: Vulnerability detection with graph semantics using triplet model Sun, Hao

139 C p.
artikel
55 Vulnerability impact analysis in software project dependencies based on Satisfiability Modulo Theories (SMT) Germán Márquez, A.

139 C p.
artikel
56 Wasm-Mutate: Fast and effective binary diversification for WebAssembly Cabrera-Arteaga, Javier

139 C p.
artikel
57 XRan: Explainable deep learning-based ransomware detection using dynamic analysis Gulmez, Sibel

139 C p.
artikel
                             57 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland