Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             30 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A compliance assessment system for Incident Management process Palma, Alessandro

146 C p.
artikel
2 A cosine similarity-based labeling technique for vulnerability type detection using source codes Öztürk, M. Maruf

146 C p.
artikel
3 An intelligent diagnostic model for industrial equipment with privacy protection Hu, Haibin

146 C p.
artikel
4 Anomaly detection for multivariate time series in IoT using discrete wavelet decomposition and dual graph attention networks Xie, Shujiang

146 C p.
artikel
5 A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace Dixit, Akanksha

146 C p.
artikel
6 A recommendation attack detection approach integrating CNN with Bagging Zhou, Quanqiang

146 C p.
artikel
7 BD-MDLC: Behavior description-based enhanced malware detection for windows environment using longformer classifier Babu, Sarath

146 C p.
artikel
8 CANSat-IDS: An adaptive distributed Intrusion Detection System for satellites, based on combined classification of CAN traffic Driouch, Otman

146 C p.
artikel
9 Corrigendum to “Model-agnostic Adversarial Example Detection via High-Frequency Amplification” [Computers & Security, Volume 141, June 2024, 103791] Li, Qiao

146 C p.
artikel
10 COVER: Enhancing virtualization obfuscation through dynamic scheduling using flash controller-based secure module Zhang, Zheng

146 C p.
artikel
11 Cue-based two factor authentication Yang, Zhenhua

146 C p.
artikel
12 Development and validation of coreLang: A threat modeling language for the ICT domain Katsikeas, Sotirios

146 C p.
artikel
13 Editorial Board
146 C p.
artikel
14 Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks Mao, Zimin

146 C p.
artikel
15 FAMCF: A few-shot Android malware family classification framework Zhou, Fan

146 C p.
artikel
16 Fault-tolerant security-efficiency combined authentication scheme for manned-unmanned teaming Yang, Hanlin

146 C p.
artikel
17 Fostering security research in the energy sector: A validation of open source intelligence for power grid model data Klauzer, Anja

146 C p.
artikel
18 Generation and deployment of honeytokens in relational databases for cyber deception Prabhaker, Nilin

146 C p.
artikel
19 HEOD: Human-assisted Ensemble Outlier Detection for cybersecurity Najafi, Pejman

146 C p.
artikel
20 IoTPredictor: A security framework for predicting IoT device behaviours and detecting malicious devices against cyber attacks Kalaria, Rudri

146 C p.
artikel
21 IoT-PRIDS: Leveraging packet representations for intrusion detection in IoT networks Zohourian, Alireza

146 C p.
artikel
22 Like teacher, like pupil: Transferring backdoors via feature-based knowledge distillation Chen, Jinyin

146 C p.
artikel
23 MDADroid: A novel malware detection method by constructing functionality-API mapping Yang, Jiyun

146 C p.
artikel
24 PHP-based malicious webshell detection based on abstract syntax tree simplification and explicit duration recurrent networks Xie, Bailin

146 C p.
artikel
25 Privacy policy analysis: A scoping review and research agenda van der Schyff, Karl

146 C p.
artikel
26 Privacy-preserving quadratic truth discovery based on Precision partitioning Du, Ruizhong

146 C p.
artikel
27 Protecting the play: An integrative review of cybersecurity in and for sports events Bongiovanni, Ivano

146 C p.
artikel
28 SKT-IDS: Unknown attack detection method based on Sigmoid Kernel Transformation and encoder–decoder architecture Zha, Chao

146 C p.
artikel
29 Transformer-based end-to-end attack on text CAPTCHAs with triplet deep attention Zhang, Bo

146 C p.
artikel
30 Unveiling vulnerabilities in deep learning-based malware detection: Differential privacy driven adversarial attacks Taheri, Rahim

146 C p.
artikel
                             30 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland