nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning
|
Tang, Yunlong |
|
|
142 |
C |
p. |
artikel |
2 |
A model transformation based security policy automatic management framework for software-defined networking
|
Meng, Yunfei |
|
|
142 |
C |
p. |
artikel |
3 |
Artificial self-attention rabbits battle royale multiscale network based robust and secure data transmission in mobile Ad Hoc networks
|
Gowtham, M.S. |
|
|
142 |
C |
p. |
artikel |
4 |
Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls
|
Shenderovitz, Gil |
|
|
142 |
C |
p. |
artikel |
5 |
CFOA: Exploring transferable adversarial examples by content feature optimization with attention guidance
|
Liu, Wanping |
|
|
142 |
C |
p. |
artikel |
6 |
Deep secure PalmNet: A novel cancelable palmprint template protection scheme with deep attention net and randomized hashing security mechanism
|
Khan, Md Sabuj |
|
|
142 |
C |
p. |
artikel |
7 |
Diversity supporting robustness: Enhancing adversarial robustness via differentiated ensemble predictions
|
Chen, Xi |
|
|
142 |
C |
p. |
artikel |
8 |
DP-GSGLD: A Bayesian optimizer inspired by differential privacy defending against privacy leakage in federated learning
|
Yang, Chengyi |
|
|
142 |
C |
p. |
artikel |
9 |
Driving behaviour change with cybersecurity awareness
|
Chaudhary, Sunil |
|
|
142 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
142 |
C |
p. |
artikel |
11 |
Exhaustive distributed intrusion detection system for UAVs attacks detection and security enforcement (E-DIDS)
|
Tlili, Fadhila |
|
|
142 |
C |
p. |
artikel |
12 |
Exploring eustress and fear: A new perspective on protection motivation in information security policy compliance within the financial sector
|
Aggarwal, Akshay |
|
|
142 |
C |
p. |
artikel |
13 |
Fast and practical intrusion detection system based on federated learning for VANET
|
Chen, Xiuzhen |
|
|
142 |
C |
p. |
artikel |
14 |
FinTem: A secure and non-invertible technique for fingerprint template protection
|
Hayat, Amber |
|
|
142 |
C |
p. |
artikel |
15 |
Fostering security-related citizenship through the employee-supervisor relationship: An examination of supervisor security embodiment
|
Davis, Joshua M. |
|
|
142 |
C |
p. |
artikel |
16 |
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning
|
Wang, Qiannan |
|
|
142 |
C |
p. |
artikel |
17 |
HyperGo: Probability-based directed hybrid fuzzing
|
Lin, Peihong |
|
|
142 |
C |
p. |
artikel |
18 |
Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system
|
Li, Yufeng |
|
|
142 |
C |
p. |
artikel |
19 |
Malware similarity and a new fuzzy hash: Compound Code Block Hash (CCBHash)
|
Onieva, Jose A. |
|
|
142 |
C |
p. |
artikel |
20 |
MeMalDet: A memory analysis-based malware detection framework using deep autoencoders and stacked ensemble under temporal evaluations
|
Maniriho, Pascal |
|
|
142 |
C |
p. |
artikel |
21 |
Multivariate time series anomaly detection with variational autoencoder and spatial–temporal graph network
|
Guan, Siwei |
|
|
142 |
C |
p. |
artikel |
22 |
Navigating Cybersecurity Governance: The influence of opportunity structures in socio-technical transitions for small and medium enterprises
|
Hoong, Yang |
|
|
142 |
C |
p. |
artikel |
23 |
Navigating quantum security risks in networked environments: A comprehensive study of quantum-safe network protocols
|
Baseri, Yaser |
|
|
142 |
C |
p. |
artikel |
24 |
NERO: NEural algorithmic reasoning for zeRO-day attack detection in the IoT: A hybrid approach
|
Cevallos M., Jesús F. |
|
|
142 |
C |
p. |
artikel |
25 |
Off-policy actor-critic deep reinforcement learning methods for alert prioritization in intrusion detection systems
|
Chavali, Lalitha |
|
|
142 |
C |
p. |
artikel |
26 |
On the insurability of cyber warfare: An investigation into the German cyber insurance market
|
Cremer, Frank |
|
|
142 |
C |
p. |
artikel |
27 |
Precursor of privacy leakage detection for individual user
|
Li, Xuefeng |
|
|
142 |
C |
p. |
artikel |
28 |
Reentrancy vulnerability detection based on graph convolutional networks and expert patterns under subspace mapping
|
Guo, Longtao |
|
|
142 |
C |
p. |
artikel |
29 |
Research on quality assessment methods for cybersecurity knowledge graphs
|
Shi, Ze |
|
|
142 |
C |
p. |
artikel |
30 |
Safeguarding cyberspace: Enhancing malicious website detection with PSOoptimized XGBoost and firefly-based feature selection
|
Sheikhi, Saeid |
|
|
142 |
C |
p. |
artikel |
31 |
Safeguarding media integrity: A hybrid optimized deep feature fusion based deepfake detection in videos
|
K, Jayashre |
|
|
142 |
C |
p. |
artikel |
32 |
SIDiLDNG: A similarity-based intrusion detection system using improved Levenshtein Distance and N-gram for CAN
|
Song, Jiaru |
|
|
142 |
C |
p. |
artikel |
33 |
The defining features of a robust information security climate
|
Gwebu, Kholekile L. |
|
|
142 |
C |
p. |
artikel |
34 |
To report or not to report? Extending Protection Motivation Theory to Vulnerability Discovery and Disclosure
|
Green, Andrew William |
|
|
142 |
C |
p. |
artikel |
35 |
Two-stage multi-datasource machine learning for attack technique and lifecycle detection
|
Lin, Ying-Dar |
|
|
142 |
C |
p. |
artikel |
36 |
Warning deterrence or knowledge guidance? Research on triggering mechanism of phishing sensitivity
|
Wang, Zhiying |
|
|
142 |
C |
p. |
artikel |
37 |
Zero-Ran Sniff: A zero-day ransomware early detection method based on zero-shot learning
|
Cen, Mingcan |
|
|
142 |
C |
p. |
artikel |