Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             60 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective Nehme, Alaa

144 C p.
artikel
2 Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security Uma Mageswari, R.

144 C p.
artikel
3 A decentralized model for usage and information flow control in distributed systems Denis, Nathanael

144 C p.
artikel
4 Adopting security practices in software development process: Security testing framework for sustainable smart cities Mothanna, Yusuf

144 C p.
artikel
5 A frequency-injection backdoor attack against DNN-Based finger vein verification Zhang, Huijie

144 C p.
artikel
6 AIS-NIDS: An intelligent and self-sustaining network intrusion detection system Farrukh, Yasir Ali

144 C p.
artikel
7 A lightweight packet forwarding verification in SDN using sketch Chang, Heyu

144 C p.
artikel
8 A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy Chen, Zigang

144 C p.
artikel
9 A novel biometric authentication scheme with privacy protection based on SVM and ZKP Guo, Chunjie

144 C p.
artikel
10 APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion Xiao, Nan

144 C p.
artikel
11 A Red Team automated testing modeling and online planning method for post-penetration Wang, Zhenduo

144 C p.
artikel
12 A sequential deep learning framework for a robust and resilient network intrusion detection system Hore, Soumyadeep

144 C p.
artikel
13 Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments Zanke, Anna

144 C p.
artikel
14 A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems Monkam, Galamo F.

144 C p.
artikel
15 Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR Yu, Jingze

144 C p.
artikel
16 Combating temporal composition inference by high-order camouflaged network topology obfuscation Li, Xiaohui

144 C p.
artikel
17 Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises Glas, Magdalena

144 C p.
artikel
18 Corrigendum to “Disarming visualization-based approaches in malware detection systems” [Computers & Security Volume 126, March 2023, 103062] Fascí, Lara Saidia

144 C p.
artikel
19 Dealing with uncertainty in cyberspace Berg, Bibi van den

144 C p.
artikel
20 Detecting abnormal logins by discovering anomalous links via graph transformers Gonçalves, Luís

144 C p.
artikel
21 Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions Ye, Junjian

144 C p.
artikel
22 Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure Kim, Yoonjib

144 C p.
artikel
23 DNS root server resolution anomaly detection Li, Chao

144 C p.
artikel
24 DomEye: Detecting network covert channel of domain fronting with throughput fluctuation Xie, Yibo

144 C p.
artikel
25 Editorial Board
144 C p.
artikel
26 Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment Baltuttis, Dennik

144 C p.
artikel
27 Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion Xu, Zhenwu

144 C p.
artikel
28 Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective Francis, Saneesh P.

144 C p.
artikel
29 FDT: Improving the transferability of adversarial examples with frequency domain transformation Ling, Jie

144 C p.
artikel
30 FedIMP: Parameter Importance-based Model Poisoning attack against Federated learning system Li, Xuan

144 C p.
artikel
31 Few-VulD: A Few-shot learning framework for software vulnerability detection Zheng, Tianming

144 C p.
artikel
32 From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models McIntosh, Timothy R.

144 C p.
artikel
33 Fuzzing JavaScript engines with a syntax-aware neural program model Xu, Haoran

144 C p.
artikel
34 GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs Al-Eiadeh, Mohammad Ryiad

144 C p.
artikel
35 HClave: An isolated execution environment design for hypervisor runtime security Zhou, Qihang

144 C p.
artikel
36 Hilbert signal envelope-based multi-features methods for GNSS spoofing detection Wang, Xiaoyan

144 C p.
artikel
37 Hybrid optimization enabled squeeze net for phishing attack detection Kamble, Naresh

144 C p.
artikel
38 Improving quality of indicators of compromise using STIX graphs Chen, Sheng-Shan

144 C p.
artikel
39 Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity Wang, Xiaodi

144 C p.
artikel
40 Local graph smoothing for link prediction against universal attack Ding, Hongli

144 C p.
artikel
41 MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware Duan, Guoyun

144 C p.
artikel
42 Measuring privacy policy compliance in the Alexa ecosystem: In-depth analysis Shafei, Hassan A.

144 C p.
artikel
43 Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust Ma, Yukun

144 C p.
artikel
44 MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation Wang, Wenpeng

144 C p.
artikel
45 OSSIntegrity: Collaborative open-source code integrity verification Nahum, Mor

144 C p.
artikel
46 Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet means Garg, Sonakshi

144 C p.
artikel
47 Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding Tao, Yunting

144 C p.
artikel
48 Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree Zhao, Yongxin

144 C p.
artikel
49 Reducing fraud in organizations through information security policy compliance: An information security controls perspective Brown, Dennis

144 C p.
artikel
50 RETRACTED: TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping Li, Sicong

144 C p.
artikel
51 Robust DDoS attack detection with adaptive transfer learning Anley, Mulualem Bitew

144 C p.
artikel
52 STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems Tu, Fei-Fan

144 C p.
artikel
53 Stories behind decisions: Towards interpretable malware family classification with hierarchical attention Bao, Huaifeng

144 C p.
artikel
54 SUETA: Speaker-specific utterance ensemble based transfer attack on speaker identification system Zuo, Chu-Xiao

144 C p.
artikel
55 SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms Zheng, Weining

144 C p.
artikel
56 Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET Sathiya, R.

144 C p.
artikel
57 Targeted Model Inversion: Distilling style encoded in predictions Jeong, Hoyong

144 C p.
artikel
58 TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor Lyu, Qiuyun

144 C p.
artikel
59 Towards trustworthy cybersecurity operations using Bayesian Deep Learning to improve uncertainty quantification of anomaly detection Yang, Tengfei

144 C p.
artikel
60 VINCENT: Cyber-threat detection through vision transformers and knowledge distillation De Rose, Luca

144 C p.
artikel
                             60 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland