Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             37 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning Tang, Yunlong

142 C p.
artikel
2 A model transformation based security policy automatic management framework for software-defined networking Meng, Yunfei

142 C p.
artikel
3 Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks Gowtham, M.S.

142 C p.
artikel
4 Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls Shenderovitz, Gil

142 C p.
artikel
5 CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance Liu, Wanping

142 C p.
artikel
6 Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism Khan, Md Sabuj

142 C p.
artikel
7 Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions Chen, Xi

142 C p.
artikel
8 DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning Yang, Chengyi

142 C p.
artikel
9 Driving behaviour change with cybersecurity awareness Chaudhary, Sunil

142 C p.
artikel
10 Editorial Board
142 C p.
artikel
11 Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS) Tlili, Fadhila

142 C p.
artikel
12 Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector Aggarwal, Akshay

142 C p.
artikel
13 Fast and practical intrusion detection system based on federated learning for VANET Chen, Xiuzhen

142 C p.
artikel
14 FinTem: A secure and non-invertible technique for fingerprint template protection Hayat, Amber

142 C p.
artikel
15 Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment Davis, Joshua M.

142 C p.
artikel
16 GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning Wang, Qiannan

142 C p.
artikel
17 HyperGo: Probability-based directed hybrid fuzzing Lin, Peihong

142 C p.
artikel
18 Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system Li, Yufeng

142 C p.
artikel
19 Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash) Onieva, Jose A.

142 C p.
artikel
20 MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations Maniriho, Pascal

142 C p.
artikel
21 Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network Guan, Siwei

142 C p.
artikel
22 Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises Hoong, Yang

142 C p.
artikel
23 Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols Baseri, Yaser

142 C p.
artikel
24 NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach Cevallos M., Jesús F.

142 C p.
artikel
25 Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems Chavali, Lalitha

142 C p.
artikel
26 On the insurability of cyber warfare: An investigation into the German cyber insurance market Cremer, Frank

142 C p.
artikel
27 Precursor of privacy leakage detection for individual user Li, Xuefeng

142 C p.
artikel
28 Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping Guo, Longtao

142 C p.
artikel
29 Research on quality assessment methods for cybersecurity knowledge graphs Shi, Ze

142 C p.
artikel
30 Safeguarding cyberspace: Enhancing malicious website detection with PSOoptimized XGBoost and firefly-based feature selection Sheikhi, Saeid

142 C p.
artikel
31 Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos K, Jayashre

142 C p.
artikel
32 SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN Song, Jiaru

142 C p.
artikel
33 The defining features of a robust information security climate Gwebu, Kholekile L.

142 C p.
artikel
34 To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure Green, Andrew William

142 C p.
artikel
35 Two-stage multi-datasource machine learning for attack technique and lifecycle detection Lin, Ying-Dar

142 C p.
artikel
36 Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity Wang, Zhiying

142 C p.
artikel
37 Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning Cen, Mingcan

142 C p.
artikel
                             37 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland