Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             86 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptive edge security framework for dynamic IoT security policies in diverse environments Halgamuge, Malka N.

148 C p.
artikel
2 Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks Li, Heqing

148 C p.
artikel
3 Adaptive sensor attack detection and defense framework for autonomous vehicles based on density Miao, Zujia

148 C p.
artikel
4 Advancing IoMT security: A two-factor authentication model employing PUF and Fuzzy logic techniques Kalam, Sidra

148 C p.
artikel
5 Advancing IoT security: A novel intrusion detection system for evolving threats in industry 4.0 using optimized convolutional sparse Ficks law graph point trans-Net Mathina, P.A.

148 C p.
artikel
6 Adversarial attacks based on time-series features for traffic detection Lu, Hongyu

148 C p.
artikel
7 A fast modularity hardware Trojan detection technique for large scale gate-level netlists Chen, Wei

148 C p.
artikel
8 A fine-grained approach for Android taint analysis based on labeled taint value graphs Xiang, Dongming

148 C p.
artikel
9 A graph representation framework for encrypted network traffic classification Okonkwo, Zulu

148 C p.
artikel
10 A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system Bamber, Sukhvinder Singh

148 C p.
artikel
11 A large-scale analysis of the effectiveness of publicly reported security patches Woo, Seunghoon

148 C p.
artikel
12 A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2 Liu, Taotao

148 C p.
artikel
13 An automated dynamic quality assessment method for cyber threat intelligence Yang, Libin

148 C p.
artikel
14 An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things Kumar, Prabhat

148 C p.
artikel
15 A new generation cyber-physical system: A comprehensive review from security perspective Rani, Sita

148 C p.
artikel
16 An explainable unsupervised anomaly detection framework for Industrial Internet of Things Abudurexiti, Yilixiati

148 C p.
artikel
17 An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC Jafar, Mousa Tayseer

148 C p.
artikel
18 A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK Zambianco, Marco

148 C p.
artikel
19 A robust federated learning algorithm for partially trusted environments Li, Yong

148 C p.
artikel
20 A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET D, Sunitha

148 C p.
artikel
21 A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions Sun, Panjun

148 C p.
artikel
22 A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G Zhang, Shunliang

148 C p.
artikel
23 A trust model for VANETs using malicious-aware multiple routing Dang, Xiaorui

148 C p.
artikel
24 AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software Wang, Chiheng

148 C p.
artikel
25 Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection Yuan, Ying

148 C p.
artikel
26 CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique Cai, Saihua

148 C p.
artikel
27 Certificate-based multi-copy cloud storage auditing supporting data dynamics Zhou, Hao

148 C p.
artikel
28 Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions Mersinas, Konstantinos

148 C p.
artikel
29 DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security Omolara, Abiodun Esther

148 C p.
artikel
30 Dealing with uncertainty in cybersecurity decision support Zhang, Yunxiao

148 C p.
artikel
31 Designing accountable IoT systems to overcome IoT storage limitation Li, Jiacheng

148 C p.
artikel
32 Detecting interest flooding attacks in NDN: A probability-based event-driven approach Kumari, Matta Krishna

148 C p.
artikel
33 Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning Lv, Fei

148 C p.
artikel
34 DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem Han, Yufei

148 C p.
artikel
35 Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices Vasalou, Asimina

148 C p.
artikel
36 Dynamically stabilized recurrent neural network optimized with intensified sand cat swarm optimization for intrusion detection in wireless sensor network Punitha, A.

148 C p.
artikel
37 Edge-featured multi-hop attention graph neural network for intrusion detection system Deng, Ping

148 C p.
artikel
38 Editorial Board
148 C p.
artikel
39 Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection Wehbe, Nathalie

148 C p.
artikel
40 Encoder decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learning Khan, Raviha

148 C p.
artikel
41 Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication Zhang, Jie

148 C p.
artikel
42 Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks Lakshmi, Vimitha R. Vidhya

148 C p.
artikel
43 Entity and relation extractions for threat intelligence knowledge graphs Mouiche, Inoussa

148 C p.
artikel
44 E-WebGuard: Enhanced neural architectures for precision web attack detection Zhou, Luchen

148 C p.
artikel
45 Examining the factors that impact the severity of cyberattacks on critical infrastructures Roumani, Yaman

148 C p.
artikel
46 FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering Vidyasri, P.

148 C p.
artikel
47 From Dis-empowerment to empowerment: Crafting a healthcare cybersecurity self-assessment Burke, Wendy

148 C p.
artikel
48 Fuzzing drones for anomaly detection: A systematic literature review Malviya, Vikas K.

148 C p.
artikel
49 GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction Xiao, Fengrui

148 C p.
artikel
50 HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance Zhou, Weidong

148 C p.
artikel
51 ICS-LTU2022: A dataset for ICS vulnerabilities Alanazi, Manar

148 C p.
artikel
52 Improving IIoT security: Unveiling threats through advanced side-channel analysis He, Dalin

148 C p.
artikel
53 LaAeb: A comprehensive log-text analysis based approach for insider threat detection Fei, Kexiong

148 C p.
artikel
54 Malware classification through Abstract Syntax Trees and L-moments Rose, Anthony J.

148 C p.
artikel
55 MFT: A novel memory flow transformer efficient intrusion detection method Jiang, Xuefeng

148 C p.
artikel
56 MIDAS: Multi-layered attack detection architecture with decision optimisation Rendall, Kieran

148 C p.
artikel
57 MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection Rai, Anuj

148 C p.
artikel
58 Multi-perspective API call sequence behavior analysis and fusion for malware classification Wu, Peng

148 C p.
artikel
59 NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction Shafi, MohammadMoein

148 C p.
artikel
60 PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction Prasad, Y. Bhanu

148 C p.
artikel
61 PenGym: Realistic training environment for reinforcement learning pentesting agents Nguyen, Huynh Phuong Thanh

148 C p.
artikel
62 Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach Wang, Xiaoqing

148 C p.
artikel
63 Precision strike: Precise backdoor attack with dynamic trigger Li, Qingyun

148 C p.
artikel
64 Privacy protection against user profiling through optimal data generalization Gil, César

148 C p.
artikel
65 Provenance-based APT campaigns detection via masked graph representation learning Ren, Jiafeng

148 C p.
artikel
66 RAF-AG: Report analysis framework for attack path generation Mai, Khang

148 C p.
artikel
67 ReckDroid: Detecting red packet fraud in Android apps Cheng, Yu

148 C p.
artikel
68 Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study Waelchli, Sandro

148 C p.
artikel
69 Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols Arenas, Mónica P.

148 C p.
artikel
70 SecOnto: Ontological Representation of Security Directives Castiglione, Gianpietro

148 C p.
artikel
71 SecureQwen: Leveraging LLMs for vulnerability detection in python codebases Mechri, Abdechakour

148 C p.
artikel
72 Security awareness, decision style, knowledge, and phishing email detection: Moderated mediation analyses Sturman, Daniel

148 C p.
artikel
73 Survey of source code vulnerability analysis based on deep learning Liang, Chen

148 C p.
artikel
74 TEE-MR: Developer-friendly data oblivious programming for trusted execution environments Alam, A.K.M. Mubashwir

148 C p.
artikel
75 Testing the limits of SPDM: Authentication of intermittently connected devices Alves, Renan C.A.

148 C p.
artikel
76 Thread-sensitive fuzzing for concurrency bug detection Zhao, Jingwen

148 C p.
artikel
77 TIMFuser: A multi-granular fusion framework for cyber threat intelligence Ma, Chunyan

148 C p.
artikel
78 Towards a cybersecurity culture-behaviour framework: A rapid evidence review Sutton, Anna

148 C p.
artikel
79 Towards more realistic evaluations: The impact of label delays in malware detection pipelines Botacin, Marcus

148 C p.
artikel
80 TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests Lv, Liuying

148 C p.
artikel
81 TrustCNAV: Certificateless aggregate authentication of civil navigation messages in GNSS Wu, Zhijun

148 C p.
artikel
82 VulTR: Software vulnerability detection model based on multi-layer key feature enhancement He, Haitao

148 C p.
artikel
83 WF-LDPSR: A local differential privacy mechanism based on water-filling for secure release of trajectory statistics data Li, Yan-zi

148 C p.
artikel
84 What do we need to know about the Chief Information Security Officer? A literature review and research agenda Sahin, Zeynep

148 C p.
artikel
85 Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language Gaber, Matthew

148 C p.
artikel
86 ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices Bai, Fenhua

148 C p.
artikel
                             86 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland