nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A balanced supervised contrastive learning-based method for encrypted network traffic classification
|
Ma, Yuxiang |
|
|
145 |
C |
p. |
artikel |
2 |
Advancing IoT security with flame: A hybrid approach combining fuzzy logic and artificial lizard search optimization
|
S, Senthil Pandi |
|
|
145 |
C |
p. |
artikel |
3 |
Adversarial Machine Learning in Industry: A Systematic Literature Review
|
Jedrzejewski, Felix Viktor |
|
|
145 |
C |
p. |
artikel |
4 |
A framework for mapping organisational workforce knowledge profile in cyber security
|
Nautiyal, Lata |
|
|
145 |
C |
p. |
artikel |
5 |
A novel passive-active detection system for false data injection attacks in industrial control systems
|
Ma, Yi-Wei |
|
|
145 |
C |
p. |
artikel |
6 |
A survey of large language models for cyber threat detection
|
Chen, Yiren |
|
|
145 |
C |
p. |
artikel |
7 |
Benchmarking of synthetic network data: Reviewing challenges and approaches
|
Wolf, Maximilian |
|
|
145 |
C |
p. |
artikel |
8 |
bjCnet: A contrastive learning-based framework for software defect prediction
|
Han, Jiaxuan |
|
|
145 |
C |
p. |
artikel |
9 |
Boosting the transferability of adversarial CAPTCHAs
|
Xu, Zisheng |
|
|
145 |
C |
p. |
artikel |
10 |
Charting new waters with CRAMMTS: A survey-driven cybersecurity risk analysis method for maritime stakeholders
|
Tatar, Unal |
|
|
145 |
C |
p. |
artikel |
11 |
Cybersecurity preparedness of small-to-medium businesses: A Western Australia study with broader implications
|
Chidukwani, Alladean |
|
|
145 |
C |
p. |
artikel |
12 |
Decoding developer password patterns: A comparative analysis of password extraction and selection practices
|
Lykousas, Nikolaos |
|
|
145 |
C |
p. |
artikel |
13 |
Detection and mitigation of vampire attacks with secure routing in WSN using weighted RNN and optimal path selection
|
Arunachalam, Rajesh |
|
|
145 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
145 |
C |
p. |
artikel |
15 |
Enhancing network intrusion detection performance using generative adversarial networks
|
Zhao, Xinxing |
|
|
145 |
C |
p. |
artikel |
16 |
Enhancing privacy policy comprehension through Privacify: A user-centric approach using advanced language models
|
Woodring, Justin |
|
|
145 |
C |
p. |
artikel |
17 |
Extending limited datasets with GAN-like self-supervision for SMS spam detection
|
Anidjar, Or Haim |
|
|
145 |
C |
p. |
artikel |
18 |
HAformer: Semantic fusion of hex machine code and assembly code for cross-architecture binary vulnerability detection
|
Jiang, Xunzhi |
|
|
145 |
C |
p. |
artikel |
19 |
Incorrect compliance and correct noncompliance with information security policies: A framework of rule-related information security behaviour
|
Niemimaa, Marko |
|
|
145 |
C |
p. |
artikel |
20 |
LLM-TIKG: Threat intelligence knowledge graph construction utilizing large language model
|
Hu, Yuelin |
|
|
145 |
C |
p. |
artikel |
21 |
Modeling and study of defense outsourcing against advanced persistent threat through impulsive differential game approach
|
Qin, Yang |
|
|
145 |
C |
p. |
artikel |
22 |
NIDS-Vis: Improving the generalized adversarial robustness of network intrusion detection system
|
He, Ke |
|
|
145 |
C |
p. |
artikel |
23 |
On DGA Detection and Classification Using P4 Programmable Switches
|
AlSabeh, Ali |
|
|
145 |
C |
p. |
artikel |
24 |
OSTIS: A novel Organization-Specific Threat Intelligence System
|
Arikkat, Dincy R. |
|
|
145 |
C |
p. |
artikel |
25 |
REACT: Autonomous intrusion response system for intelligent vehicles
|
Hamad, Mohammad |
|
|
145 |
C |
p. |
artikel |
26 |
SCL-CVD: Supervised contrastive learning for code vulnerability detection via GraphCodeBERT
|
Wang, Rongcun |
|
|
145 |
C |
p. |
artikel |
27 |
Secured lightweight authentication for 6LoWPANs in machine-to-machine communications
|
Ashrif, Fatma Foad |
|
|
145 |
C |
p. |
artikel |
28 |
Towards intrusion detection in fog environments using generative adversarial network and long short-term memory network
|
Qu, Aiyan |
|
|
145 |
C |
p. |
artikel |
29 |
Towards zero trust security in connected vehicles: A comprehensive survey
|
Annabi, Malak |
|
|
145 |
C |
p. |
artikel |
30 |
Voltage inspector: Sender identification for in-vehicle CAN bus using voltage slice
|
Zhang, Guiqi |
|
|
145 |
C |
p. |
artikel |