nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective
|
Nehme, Alaa |
|
|
144 |
C |
p. |
artikel |
2 |
Addressing security challenges in industry 4.0: AVA-MA approach for strengthening SDN-IoT network security
|
Uma Mageswari, R. |
|
|
144 |
C |
p. |
artikel |
3 |
A decentralized model for usage and information flow control in distributed systems
|
Denis, Nathanael |
|
|
144 |
C |
p. |
artikel |
4 |
Adopting security practices in software development process: Security testing framework for sustainable smart cities
|
Mothanna, Yusuf |
|
|
144 |
C |
p. |
artikel |
5 |
A frequency-injection backdoor attack against DNN-Based finger vein verification
|
Zhang, Huijie |
|
|
144 |
C |
p. |
artikel |
6 |
AIS-NIDS: An intelligent and self-sustaining network intrusion detection system
|
Farrukh, Yasir Ali |
|
|
144 |
C |
p. |
artikel |
7 |
A lightweight packet forwarding verification in SDN using sketch
|
Chang, Heyu |
|
|
144 |
C |
p. |
artikel |
8 |
A method for recovering adversarial samples with both adversarial attack forensics and recognition accuracy
|
Chen, Zigang |
|
|
144 |
C |
p. |
artikel |
9 |
A novel biometric authentication scheme with privacy protection based on SVM and ZKP
|
Guo, Chunjie |
|
|
144 |
C |
p. |
artikel |
10 |
APT-MMF: An advanced persistent threat actor attribution method based on multimodal and multilevel feature fusion
|
Xiao, Nan |
|
|
144 |
C |
p. |
artikel |
11 |
A Red Team automated testing modeling and online planning method for post-penetration
|
Wang, Zhenduo |
|
|
144 |
C |
p. |
artikel |
12 |
A sequential deep learning framework for a robust and resilient network intrusion detection system
|
Hore, Soumyadeep |
|
|
144 |
C |
p. |
artikel |
13 |
Assessing information security culture: A mixed-methods approach to navigating challenges in international corporate IT departments
|
Zanke, Anna |
|
|
144 |
C |
p. |
artikel |
14 |
A topological data analysis approach for detecting data poisoning attacks against machine learning based network intrusion detection systems
|
Monkam, Galamo F. |
|
|
144 |
C |
p. |
artikel |
15 |
Cloud storage auditing and data sharing with data deduplication and private information protection for cloud-based EMR
|
Yu, Jingze |
|
|
144 |
C |
p. |
artikel |
16 |
Combating temporal composition inference by high-order camouflaged network topology obfuscation
|
Li, Xiaohui |
|
|
144 |
C |
p. |
artikel |
17 |
Complex yet attainable? An interdisciplinary approach to designing better cyber range exercises
|
Glas, Magdalena |
|
|
144 |
C |
p. |
artikel |
18 |
Corrigendum to “Disarming visualization-based approaches in malware detection systems” [Computers & Security Volume 126, March 2023, 103062]
|
Fascí, Lara Saidia |
|
|
144 |
C |
p. |
artikel |
19 |
Dealing with uncertainty in cyberspace
|
Berg, Bibi van den |
|
|
144 |
C |
p. |
artikel |
20 |
Detecting abnormal logins by discovering anomalous links via graph transformers
|
Gonçalves, Luís |
|
|
144 |
C |
p. |
artikel |
21 |
Detecting command injection vulnerabilities in Linux-based embedded firmware with LLM-based taint analysis of library functions
|
Ye, Junjian |
|
|
144 |
C |
p. |
artikel |
22 |
Detecting Distributed Denial-of-Service (DDoS) attacks that generate false authentications on Electric Vehicle (EV) charging infrastructure
|
Kim, Yoonjib |
|
|
144 |
C |
p. |
artikel |
23 |
DNS root server resolution anomaly detection
|
Li, Chao |
|
|
144 |
C |
p. |
artikel |
24 |
DomEye: Detecting network covert channel of domain fronting with throughput fluctuation
|
Xie, Yibo |
|
|
144 |
C |
p. |
artikel |
25 |
Editorial Board
|
|
|
|
144 |
C |
p. |
artikel |
26 |
Effects of visual risk indicators on phishing detection behavior: An eye-tracking experiment
|
Baltuttis, Dennik |
|
|
144 |
C |
p. |
artikel |
27 |
Empowering Data Owners: An Efficient and Verifiable Scheme for Secure Data Deletion
|
Xu, Zhenwu |
|
|
144 |
C |
p. |
artikel |
28 |
Exploring gender dynamics in cybersecurity education: A self-determination theory and social cognitive theory perspective
|
Francis, Saneesh P. |
|
|
144 |
C |
p. |
artikel |
29 |
FDT: Improving the transferability of adversarial examples with frequency domain transformation
|
Ling, Jie |
|
|
144 |
C |
p. |
artikel |
30 |
FedIMP: Parameter Importance-based Model Poisoning attack against Federated learning system
|
Li, Xuan |
|
|
144 |
C |
p. |
artikel |
31 |
Few-VulD: A Few-shot learning framework for software vulnerability detection
|
Zheng, Tianming |
|
|
144 |
C |
p. |
artikel |
32 |
From COBIT to ISO 42001: Evaluating cybersecurity frameworks for opportunities, risks, and regulatory compliance in commercializing large language models
|
McIntosh, Timothy R. |
|
|
144 |
C |
p. |
artikel |
33 |
Fuzzing JavaScript engines with a syntax-aware neural program model
|
Xu, Haoran |
|
|
144 |
C |
p. |
artikel |
34 |
GeniGraph: A genetic-based novel security defense resource allocation method for interdependent systems modeled by attack graphs
|
Al-Eiadeh, Mohammad Ryiad |
|
|
144 |
C |
p. |
artikel |
35 |
HClave: An isolated execution environment design for hypervisor runtime security
|
Zhou, Qihang |
|
|
144 |
C |
p. |
artikel |
36 |
Hilbert signal envelope-based multi-features methods for GNSS spoofing detection
|
Wang, Xiaoyan |
|
|
144 |
C |
p. |
artikel |
37 |
Hybrid optimization enabled squeeze net for phishing attack detection
|
Kamble, Naresh |
|
|
144 |
C |
p. |
artikel |
38 |
Improving quality of indicators of compromise using STIX graphs
|
Chen, Sheng-Shan |
|
|
144 |
C |
p. |
artikel |
39 |
Joint relational triple extraction with enhanced representation and binary tagging framework in cybersecurity
|
Wang, Xiaodi |
|
|
144 |
C |
p. |
artikel |
40 |
Local graph smoothing for link prediction against universal attack
|
Ding, Hongli |
|
|
144 |
C |
p. |
artikel |
41 |
MaDroid: A maliciousness-aware multifeatured dataset for detecting android malware
|
Duan, Guoyun |
|
|
144 |
C |
p. |
artikel |
42 |
Measuring privacy policy compliance in the Alexa ecosystem: In-depth analysis
|
Shafei, Hassan A. |
|
|
144 |
C |
p. |
artikel |
43 |
Morpheus: An efficient timing-based attestation framework for safeguarding hypervisor integrity with dynamic trust
|
Ma, Yukun |
|
|
144 |
C |
p. |
artikel |
44 |
MTA Fuzzer: A low-repetition rate Modbus TCP fuzzing method based on Transformer and Mutation Target Adaptation
|
Wang, Wenpeng |
|
|
144 |
C |
p. |
artikel |
45 |
OSSIntegrity: Collaborative open-source code integrity verification
|
Nahum, Mor |
|
|
144 |
C |
p. |
artikel |
46 |
Privacy in manifolds: Combining k-anonymity with differential privacy on Fréchet means
|
Garg, Sonakshi |
|
|
144 |
C |
p. |
artikel |
47 |
Privacy-preserving outsourcing scheme of face recognition based on locally linear embedding
|
Tao, Yunting |
|
|
144 |
C |
p. |
artikel |
48 |
Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree
|
Zhao, Yongxin |
|
|
144 |
C |
p. |
artikel |
49 |
Reducing fraud in organizations through information security policy compliance: An information security controls perspective
|
Brown, Dennis |
|
|
144 |
C |
p. |
artikel |
50 |
RETRACTED: TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping
|
Li, Sicong |
|
|
144 |
C |
p. |
artikel |
51 |
Robust DDoS attack detection with adaptive transfer learning
|
Anley, Mulualem Bitew |
|
|
144 |
C |
p. |
artikel |
52 |
STFT-TCAN: A TCN-attention based multivariate time series anomaly detection architecture with time-frequency analysis for cyber-industrial systems
|
Tu, Fei-Fan |
|
|
144 |
C |
p. |
artikel |
53 |
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention
|
Bao, Huaifeng |
|
|
144 |
C |
p. |
artikel |
54 |
SUETA: Speaker-specific utterance ensemble based transfer attack on speaker identification system
|
Zuo, Chu-Xiao |
|
|
144 |
C |
p. |
artikel |
55 |
SVulDetector: Vulnerability detection based on similarity using tree-based attention and weighted graph embedding mechanisms
|
Zheng, Weining |
|
|
144 |
C |
p. |
artikel |
56 |
Swarm optimized differential evolution and probabilistic extreme learning based intrusion detection in MANET
|
Sathiya, R. |
|
|
144 |
C |
p. |
artikel |
57 |
Targeted Model Inversion: Distilling style encoded in predictions
|
Jeong, Hoyong |
|
|
144 |
C |
p. |
artikel |
58 |
TFAN: A Task-adaptive Feature Alignment Network for few-shot website fingerprinting attacks on Tor
|
Lyu, Qiuyun |
|
|
144 |
C |
p. |
artikel |
59 |
Towards trustworthy cybersecurity operations using Bayesian Deep Learning to improve uncertainty quantification of anomaly detection
|
Yang, Tengfei |
|
|
144 |
C |
p. |
artikel |
60 |
VINCENT: Cyber-threat detection through vision transformers and knowledge distillation
|
De Rose, Luca |
|
|
144 |
C |
p. |
artikel |