nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A compliance assessment system for Incident Management process
|
Palma, Alessandro |
|
|
146 |
C |
p. |
artikel |
2 |
A cosine similarity-based labeling technique for vulnerability type detection using source codes
|
Öztürk, M. Maruf |
|
|
146 |
C |
p. |
artikel |
3 |
An intelligent diagnostic model for industrial equipment with privacy protection
|
Hu, Haibin |
|
|
146 |
C |
p. |
artikel |
4 |
Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks
|
Xie, Shujiang |
|
|
146 |
C |
p. |
artikel |
5 |
A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace
|
Dixit, Akanksha |
|
|
146 |
C |
p. |
artikel |
6 |
A recommendation attack detection approach integrating CNN with Bagging
|
Zhou, Quanqiang |
|
|
146 |
C |
p. |
artikel |
7 |
BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier
|
Babu, Sarath |
|
|
146 |
C |
p. |
artikel |
8 |
CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic
|
Driouch, Otman |
|
|
146 |
C |
p. |
artikel |
9 |
Corrigendum to “Model-agnostic Adversarial Example Detection via High-Frequency Amplification” [Computers & Security, Volume 141, June 2024, 103791]
|
Li, Qiao |
|
|
146 |
C |
p. |
artikel |
10 |
COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module
|
Zhang, Zheng |
|
|
146 |
C |
p. |
artikel |
11 |
Cue-based two factor authentication
|
Yang, Zhenhua |
|
|
146 |
C |
p. |
artikel |
12 |
Development and validation of coreLang: A threat modeling language for the ICT domain
|
Katsikeas, Sotirios |
|
|
146 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
146 |
C |
p. |
artikel |
14 |
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks
|
Mao, Zimin |
|
|
146 |
C |
p. |
artikel |
15 |
FAMCF: A few-shot Android malware family classification framework
|
Zhou, Fan |
|
|
146 |
C |
p. |
artikel |
16 |
Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming
|
Yang, Hanlin |
|
|
146 |
C |
p. |
artikel |
17 |
Fostering security research in the energy sector: A validation of open source intelligence for power grid model data
|
Klauzer, Anja |
|
|
146 |
C |
p. |
artikel |
18 |
Generation and deployment of honeytokens in relational databases for cyber deception
|
Prabhaker, Nilin |
|
|
146 |
C |
p. |
artikel |
19 |
HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity
|
Najafi, Pejman |
|
|
146 |
C |
p. |
artikel |
20 |
IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks
|
Kalaria, Rudri |
|
|
146 |
C |
p. |
artikel |
21 |
IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks
|
Zohourian, Alireza |
|
|
146 |
C |
p. |
artikel |
22 |
Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation
|
Chen, Jinyin |
|
|
146 |
C |
p. |
artikel |
23 |
MDADroid: A novel malware detection method by constructing functionality-API mapping
|
Yang, Jiyun |
|
|
146 |
C |
p. |
artikel |
24 |
PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks
|
Xie, Bailin |
|
|
146 |
C |
p. |
artikel |
25 |
Privacy policy analysis: A scoping review and research agenda
|
van der Schyff, Karl |
|
|
146 |
C |
p. |
artikel |
26 |
Privacy-preserving quadratic truth discovery based on Precision partitioning
|
Du, Ruizhong |
|
|
146 |
C |
p. |
artikel |
27 |
Protecting the play: An integrative review of cybersecurity in and for sports events
|
Bongiovanni, Ivano |
|
|
146 |
C |
p. |
artikel |
28 |
SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture
|
Zha, Chao |
|
|
146 |
C |
p. |
artikel |
29 |
Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention
|
Zhang, Bo |
|
|
146 |
C |
p. |
artikel |
30 |
Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks
|
Taheri, Rahim |
|
|
146 |
C |
p. |
artikel |