nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An expert system for privacy-driven vessel detection harnessing YOLOv8 and strengthened by SHA-256
|
Guggilam, Naga Venkata Rishika |
|
|
143 |
C |
p. |
artikel |
2 |
Automated federated learning for intrusion detection of industrial control systems based on evolutionary neural architecture search
|
Shao, Jun-Min |
|
|
143 |
C |
p. |
artikel |
3 |
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition
|
Hu, Yanfei |
|
|
143 |
C |
p. |
artikel |
4 |
CatchFuzz: Reliable active anti-fuzzing techniques against coverage-guided fuzzer
|
Kim, Hee Yeon |
|
|
143 |
C |
p. |
artikel |
5 |
CETP: A novel semi-supervised framework based on contrastive pre-training for imbalanced encrypted traffic classification
|
Lin, Xinjie |
|
|
143 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
143 |
C |
p. |
artikel |
7 |
Enhancing adversarial robustness for deep metric learning via neural discrete adversarial training
|
Li, Chaofei |
|
|
143 |
C |
p. |
artikel |
8 |
EPFL-DAC: Enhancing Privacy in Federated Learning with Dynamic Aggregation and Clipping
|
Wei, Qianjin |
|
|
143 |
C |
p. |
artikel |
9 |
Investigating the use of protective technologies after data breach: The roles of psychological distance, technological service type and organizational justice
|
Ayaburi, Emmanuel W. |
|
|
143 |
C |
p. |
artikel |
10 |
MAG-PUFs: Authenticating IoT devices via electromagnetic physical unclonable functions and deep learning
|
Ibrahim, Omar Adel |
|
|
143 |
C |
p. |
artikel |
11 |
Multimodal-based abnormal behavior detection method in virtualization environment
|
Zheng, Luxin |
|
|
143 |
C |
p. |
artikel |
12 |
"No point worrying" – The role of threat devaluation in information security behavior
|
Thompson, Nik |
|
|
143 |
C |
p. |
artikel |
13 |
Performance comparison analysis of classification methodologies for effective detection of intrusions
|
Bingu, Rajesh |
|
|
143 |
C |
p. |
artikel |
14 |
sec-certs: Examining the security certification practice for better vulnerability mitigation
|
Janovsky, Adam |
|
|
143 |
C |
p. |
artikel |
15 |
Vulnerability detection through machine learning-based fuzzing: A systematic review
|
Bamohabbat Chafjiri, Sadegh |
|
|
143 |
C |
p. |
artikel |