nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive survey on cyber deception techniques to improve honeypot performance
|
Javadpour, Amir |
|
|
140 |
C |
p. |
artikel |
2 |
A critical survey of the security and privacy aspects of the Aadhaar framework
|
Sadhya, Debanjan |
|
|
140 |
C |
p. |
artikel |
3 |
Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems
|
Liu, Yaru |
|
|
140 |
C |
p. |
artikel |
4 |
Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems
|
Bui, Hang Thanh |
|
|
140 |
C |
p. |
artikel |
5 |
A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement
|
Kong, Lingdi |
|
|
140 |
C |
p. |
artikel |
6 |
An intelligent multi-layer framework with SHAP integration for botnet detection and classification
|
Gupta, Swechchha |
|
|
140 |
C |
p. |
artikel |
7 |
Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection
|
Rani, B. Selva |
|
|
140 |
C |
p. |
artikel |
8 |
A review on client-server attacks and defenses in federated learning
|
Sharma, Anee |
|
|
140 |
C |
p. |
artikel |
9 |
A task offloading approach based on risk assessment to mitigate edge DDoS attacks
|
Huang, Haiou |
|
|
140 |
C |
p. |
artikel |
10 |
A typology of cybersecurity behavior among knowledge workers
|
Baltuttis, Dennik |
|
|
140 |
C |
p. |
artikel |
11 |
Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence
|
Li, Lingzi |
|
|
140 |
C |
p. |
artikel |
12 |
BopSkyline: Boosting privacy-preserving skyline query service in the cloud
|
Wang, Weibo |
|
|
140 |
C |
p. |
artikel |
13 |
can-train-and-test: A curated CAN dataset for automotive intrusion detection
|
Lampe, Brooke |
|
|
140 |
C |
p. |
artikel |
14 |
ChatGPT or Bard: Who is a better Certified Ethical Hacker?
|
Raman, Raghu |
|
|
140 |
C |
p. |
artikel |
15 |
Contextual feature representation for image-based insider threat classification
|
Duan, Shu-Min |
|
|
140 |
C |
p. |
artikel |
16 |
DawnGNN: Documentation augmented windows malware detection using graph neural network
|
Feng, Pengbin |
|
|
140 |
C |
p. |
artikel |
17 |
Defending novice user privacy: An evaluation of default web browser configurations
|
Radivojevic, Kristina |
|
|
140 |
C |
p. |
artikel |
18 |
Detecting APT attacks using an attack intent-driven and sequence-based learning approach
|
Yue, Hao |
|
|
140 |
C |
p. |
artikel |
19 |
Development & psychometrics of the SOLID-S – An inventory assessing software security culture in software development companies
|
Glasauer, Christina |
|
|
140 |
C |
p. |
artikel |
20 |
DROPSYS: Detection of ROP attacks using system information
|
Kim, Seon Kwon |
|
|
140 |
C |
p. |
artikel |
21 |
Economics of incident response panels in cyber insurance
|
Arce, Daniel |
|
|
140 |
C |
p. |
artikel |
22 |
Editorial Board
|
|
|
|
140 |
C |
p. |
artikel |
23 |
Empirical evaluation of a threat modeling language as a cybersecurity assessment tool
|
Katsikeas, Sotirios |
|
|
140 |
C |
p. |
artikel |
24 |
Enforcing security policies on interacting authentication systems
|
Buccafurri, Francesco |
|
|
140 |
C |
p. |
artikel |
25 |
Ethical principles shaping values-based cybersecurity decision-making
|
Fenech, Joseph |
|
|
140 |
C |
p. |
artikel |
26 |
Evaluating the security of CAPTCHAs utilized on Bangladeshi websites
|
Shibbir, Md. Neyamul Islam |
|
|
140 |
C |
p. |
artikel |
27 |
Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity
|
Tao, Shouzheng |
|
|
140 |
C |
p. |
artikel |
28 |
Exploring security and trust mechanisms in online social networks: An extensive review
|
Jethava, Gordhan |
|
|
140 |
C |
p. |
artikel |
29 |
False Data Injection Attack with Max-Min Optimization in Smart Grid
|
Bhattar, Poornachandratejasvi Laxman |
|
|
140 |
C |
p. |
artikel |
30 |
Few-shot graph classification on cross-site scripting attacks detection
|
Pan, Hongyu |
|
|
140 |
C |
p. |
artikel |
31 |
GGT: Graph-guided testing for adversarial sample detection of deep neural network
|
Chen, Zuohui |
|
|
140 |
C |
p. |
artikel |
32 |
GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding
|
Gu, Jintao |
|
|
140 |
C |
p. |
artikel |
33 |
Information security threats and organizational readiness in nWFH scenarios
|
Jayarao, Guruprasad B |
|
|
140 |
C |
p. |
artikel |
34 |
Intrusion detection method based on improved social network search algorithm
|
Yang, Zhongjun |
|
|
140 |
C |
p. |
artikel |
35 |
LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems
|
Ali, Hala |
|
|
140 |
C |
p. |
artikel |
36 |
LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels
|
Zhang, Jiebao |
|
|
140 |
C |
p. |
artikel |
37 |
Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review
|
Pritee, Zinniya Taffannum |
|
|
140 |
C |
p. |
artikel |
38 |
Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques
|
Sun, Huaqi |
|
|
140 |
C |
p. |
artikel |
39 |
MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis
|
Alkofahi, Hamza |
|
|
140 |
C |
p. |
artikel |
40 |
MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks
|
Sousa, Bruno |
|
|
140 |
C |
p. |
artikel |
41 |
M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks
|
Javanmardi, Saeed |
|
|
140 |
C |
p. |
artikel |
42 |
NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce
|
Rus, Adrian-Cătălin |
|
|
140 |
C |
p. |
artikel |
43 |
Observational equivalence and security games: Enhancing the formal analysis of security protocols
|
Cai, Liujia |
|
|
140 |
C |
p. |
artikel |
44 |
Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation
|
Bhardwaj, Sonam |
|
|
140 |
C |
p. |
artikel |
45 |
PeerG: A P2P botnet detection method based on representation learning and graph contrastive learning
|
Wu, Guangli |
|
|
140 |
C |
p. |
artikel |
46 |
Python source code vulnerability detection with named entity recognition
|
Ehrenberg, Melanie |
|
|
140 |
C |
p. |
artikel |
47 |
RRIoT: Recurrent reinforcement learning for cyber threat detection on IoT devices
|
Rookard, Curtis |
|
|
140 |
C |
p. |
artikel |
48 |
SCFI: Efficient forward fine-grained control flow integrity based on coarse-grained ISA extensions
|
She, Cairui |
|
|
140 |
C |
p. |
artikel |
49 |
Securing SatCom user segment: A study on cybersecurity challenges in view of IRIS 2
|
Casaril, Francesco |
|
|
140 |
C |
p. |
artikel |
50 |
Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing
|
Jose. G, Sahaya Stalin |
|
|
140 |
C |
p. |
artikel |
51 |
Semi-supervised log anomaly detection based on bidirectional temporal convolution network
|
Yin, Zhichao |
|
|
140 |
C |
p. |
artikel |
52 |
SNDMI: Spyware network traffic detection method based on inducement operations
|
Peng, Jiaxin |
|
|
140 |
C |
p. |
artikel |
53 |
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users
|
Xie, Yitian |
|
|
140 |
C |
p. |
artikel |
54 |
The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign
|
Chrysanthou, Anargyros |
|
|
140 |
C |
p. |
artikel |
55 |
TOMSAC - Methodology for trade-off management between automotive safety and cyber security
|
Sabaliauskaite, Giedre |
|
|
140 |
C |
p. |
artikel |
56 |
TS-Mal: Malware detection model using temporal and structural features learning
|
Li, Wanyu |
|
|
140 |
C |
p. |
artikel |
57 |
User-empowered secure privacy-preserving authentication scheme for Digital Twin
|
Patel, Chintan |
|
|
140 |
C |
p. |
artikel |
58 |
WaTrojan: Wavelet domain trigger injection for backdoor attacks
|
Zhang, Zhenghao |
|
|
140 |
C |
p. |
artikel |
59 |
WF3A: A N-shot website fingerprinting with effective fusion feature attention
|
Wang, Zhiquan |
|
|
140 |
C |
p. |
artikel |
60 |
XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models
|
Nguyen, Qui Ngoc |
|
|
140 |
C |
p. |
artikel |