Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             60 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive survey on cyber deception techniques to improve honeypot performance Javadpour, Amir

140 C p.
artikel
2 A critical survey of the security and privacy aspects of the Aadhaar framework Sadhya, Debanjan

140 C p.
artikel
3 Adversarial sample attacks and defenses based on LSTM-ED in industrial control systems Liu, Yaru

140 C p.
artikel
4 Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems Bui, Hang Thanh

140 C p.
artikel
5 A multi-type vulnerability detection framework with parallel perspective fusion and hierarchical feature enhancement Kong, Lingdi

140 C p.
artikel
6 An intelligent multi-layer framework with SHAP integration for botnet detection and classification Gupta, Swechchha

140 C p.
artikel
7 Archimedes Fire Hawk Optimization enabled feature selection with deep maxout for network intrusion detection Rani, B. Selva

140 C p.
artikel
8 A review on client-server attacks and defenses in federated learning Sharma, Anee

140 C p.
artikel
9 A task offloading approach based on risk assessment to mitigate edge DDoS attacks Huang, Haiou

140 C p.
artikel
10 A typology of cybersecurity behavior among knowledge workers Baltuttis, Dennik

140 C p.
artikel
11 Automated discovery and mapping ATT&CK tactics and techniques for unstructured cyber threat intelligence Li, Lingzi

140 C p.
artikel
12 BopSkyline: Boosting privacy-preserving skyline query service in the cloud Wang, Weibo

140 C p.
artikel
13 can-train-and-test: A curated CAN dataset for automotive intrusion detection Lampe, Brooke

140 C p.
artikel
14 ChatGPT or Bard: Who is a better Certified Ethical Hacker? Raman, Raghu

140 C p.
artikel
15 Contextual feature representation for image-based insider threat classification Duan, Shu-Min

140 C p.
artikel
16 DawnGNN: Documentation augmented windows malware detection using graph neural network Feng, Pengbin

140 C p.
artikel
17 Defending novice user privacy: An evaluation of default web browser configurations Radivojevic, Kristina

140 C p.
artikel
18 Detecting APT attacks using an attack intent-driven and sequence-based learning approach Yue, Hao

140 C p.
artikel
19 Development & psychometrics of the SOLID-S – An inventory assessing software security culture in software development companies Glasauer, Christina

140 C p.
artikel
20 DROPSYS: Detection of ROP attacks using system information Kim, Seon Kwon

140 C p.
artikel
21 Economics of incident response panels in cyber insurance Arce, Daniel

140 C p.
artikel
22 Editorial Board
140 C p.
artikel
23 Empirical evaluation of a threat modeling language as a cybersecurity assessment tool Katsikeas, Sotirios

140 C p.
artikel
24 Enforcing security policies on interacting authentication systems Buccafurri, Francesco

140 C p.
artikel
25 Ethical principles shaping values-based cybersecurity decision-making Fenech, Joseph

140 C p.
artikel
26 Evaluating the security of CAPTCHAs utilized on Bangladeshi websites Shibbir, Md. Neyamul Islam

140 C p.
artikel
27 Examining the inconsistent effect of privacy control on privacy concerns in e-commerce services: The moderating role of privacy experience and risk propensity Tao, Shouzheng

140 C p.
artikel
28 Exploring security and trust mechanisms in online social networks: An extensive review Jethava, Gordhan

140 C p.
artikel
29 False Data Injection Attack with Max-Min Optimization in Smart Grid Bhattar, Poornachandratejasvi Laxman

140 C p.
artikel
30 Few-shot graph classification on cross-site scripting attacks detection Pan, Hongyu

140 C p.
artikel
31 GGT: Graph-guided testing for adversarial sample detection of deep neural network Chen, Zuohui

140 C p.
artikel
32 GSEDroid: GNN-based Android malware detection framework using lightweight semantic embedding Gu, Jintao

140 C p.
artikel
33 Information security threats and organizational readiness in nWFH scenarios Jayarao, Guruprasad B

140 C p.
artikel
34 Intrusion detection method based on improved social network search algorithm Yang, Zhongjun

140 C p.
artikel
35 LAAKA: Lightweight Anonymous Authentication and Key Agreement Scheme for Secure Fog-Driven IoT Systems Ali, Hala

140 C p.
artikel
36 LP-BFGS attack: An adversarial attack based on the Hessian with limited pixels Zhang, Jiebao

140 C p.
artikel
37 Machine learning and deep learning for user authentication and authorization in cybersecurity: A state-of-the-art review Pritee, Zinniya Taffannum

140 C p.
artikel
38 Malware2ATT&CK: A sophisticated model for mapping malware to ATT&CK techniques Sun, Huaqi

140 C p.
artikel
39 MitM attacks on intellectual property and integrity of additive manufacturing systems: A security analysis Alkofahi, Hamza

140 C p.
artikel
40 MONDEO-Tactics5G: Multistage botnet detection and tactics for 5G/6G networks Sousa, Bruno

140 C p.
artikel
41 M-RL: A mobility and impersonation-aware IDS for DDoS UDP flooding attacks in IoT-Fog networks Javanmardi, Saeed

140 C p.
artikel
42 NAISS: A reverse proxy approach to mitigate MageCart's e-skimmers in e-commerce Rus, Adrian-Cătălin

140 C p.
artikel
43 Observational equivalence and security games: Enhancing the formal analysis of security protocols Cai, Liujia

140 C p.
artikel
44 Overcoming the lack of labeled data: Training malware detection models using adversarial domain adaptation Bhardwaj, Sonam

140 C p.
artikel
45 PeerG: A P2P botnet detection method based on representation learning and graph contrastive learning Wu, Guangli

140 C p.
artikel
46 Python source code vulnerability detection with named entity recognition Ehrenberg, Melanie

140 C p.
artikel
47 RRIoT: Recurrent reinforcement learning for cyber threat detection on IoT devices Rookard, Curtis

140 C p.
artikel
48 SCFI: Efficient forward fine-grained control flow integrity based on coarse-grained ISA extensions She, Cairui

140 C p.
artikel
49 Securing SatCom user segment: A study on cybersecurity challenges in view of IRIS 2 Casaril, Francesco

140 C p.
artikel
50 Self-Attention conditional generative adversarial network optimised with crayfish optimization algorithm for improving cyber security in cloud computing Jose. G, Sahaya Stalin

140 C p.
artikel
51 Semi-supervised log anomaly detection based on bidirectional temporal convolution network Yin, Zhichao

140 C p.
artikel
52 SNDMI: Spyware network traffic detection method based on inducement operations Peng, Jiaxin

140 C p.
artikel
53 Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users Xie, Yitian

140 C p.
artikel
54 The anatomy of deception: Measuring technical and human factors of a large-scale phishing campaign Chrysanthou, Anargyros

140 C p.
artikel
55 TOMSAC - Methodology for trade-off management between automotive safety and cyber security Sabaliauskaite, Giedre

140 C p.
artikel
56 TS-Mal: Malware detection model using temporal and structural features learning Li, Wanyu

140 C p.
artikel
57 User-empowered secure privacy-preserving authentication scheme for Digital Twin Patel, Chintan

140 C p.
artikel
58 WaTrojan: Wavelet domain trigger injection for backdoor attacks Zhang, Zhenghao

140 C p.
artikel
59 WF3A: A N-shot website fingerprinting with effective fusion feature attention Wang, Zhiquan

140 C p.
artikel
60 XLMR4MD: New Vietnamese dataset and framework for detecting the consistency of description and permission in Android applications using large language models Nguyen, Qui Ngoc

140 C p.
artikel
                             60 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland