nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptive edge security framework for dynamic IoT security policies in diverse environments
|
Halgamuge, Malka N. |
|
|
148 |
C |
p. |
artikel |
2 |
Adaptive multi-granularity trust management scheme for UAV visual sensor security under adversarial attacks
|
Li, Heqing |
|
|
148 |
C |
p. |
artikel |
3 |
Adaptive sensor attack detection and defense framework for autonomous vehicles based on density
|
Miao, Zujia |
|
|
148 |
C |
p. |
artikel |
4 |
Advancing IoMT security: A two-factor authentication model employing PUF and Fuzzy logic techniques
|
Kalam, Sidra |
|
|
148 |
C |
p. |
artikel |
5 |
Advancing IoT security: A novel intrusion detection system for evolving threats in industry 4.0 using optimized convolutional sparse Ficks law graph point trans-Net
|
Mathina, P.A. |
|
|
148 |
C |
p. |
artikel |
6 |
Adversarial attacks based on time-series features for traffic detection
|
Lu, Hongyu |
|
|
148 |
C |
p. |
artikel |
7 |
A fast modularity hardware Trojan detection technique for large scale gate-level netlists
|
Chen, Wei |
|
|
148 |
C |
p. |
artikel |
8 |
A fine-grained approach for Android taint analysis based on labeled taint value graphs
|
Xiang, Dongming |
|
|
148 |
C |
p. |
artikel |
9 |
A graph representation framework for encrypted network traffic classification
|
Okonkwo, Zulu |
|
|
148 |
C |
p. |
artikel |
10 |
A hybrid CNN-LSTM approach for intelligent cyber intrusion detection system
|
Bamber, Sukhvinder Singh |
|
|
148 |
C |
p. |
artikel |
11 |
A large-scale analysis of the effectiveness of publicly reported security patches
|
Woo, Seunghoon |
|
|
148 |
C |
p. |
artikel |
12 |
A multiscale approach for network intrusion detection based on variance–covariance subspace distance and EQL v2
|
Liu, Taotao |
|
|
148 |
C |
p. |
artikel |
13 |
An automated dynamic quality assessment method for cyber threat intelligence
|
Yang, Libin |
|
|
148 |
C |
p. |
artikel |
14 |
An enhanced Deep-Learning empowered Threat-Hunting Framework for software-defined Internet of Things
|
Kumar, Prabhat |
|
|
148 |
C |
p. |
artikel |
15 |
A new generation cyber-physical system: A comprehensive review from security perspective
|
Rani, Sita |
|
|
148 |
C |
p. |
artikel |
16 |
An explainable unsupervised anomaly detection framework for Industrial Internet of Things
|
Abudurexiti, Yilixiati |
|
|
148 |
C |
p. |
artikel |
17 |
An innovative practical roadmap for optimal control strategies in malware propagation through the integration of RL with MPC
|
Jafar, Mousa Tayseer |
|
|
148 |
C |
p. |
artikel |
18 |
A Proactive Decoy Selection Scheme for Cyber Deception using MITRE ATT&CK
|
Zambianco, Marco |
|
|
148 |
C |
p. |
artikel |
19 |
A robust federated learning algorithm for partially trusted environments
|
Li, Yong |
|
|
148 |
C |
p. |
artikel |
20 |
A secure routing and black hole attack detection system using coot Chimp Optimization Algorithm-based Deep Q Network in MANET
|
D, Sunitha |
|
|
148 |
C |
p. |
artikel |
21 |
A survey on privacy and security issues in IoT-based environments: Technologies, protection measures and future directions
|
Sun, Panjun |
|
|
148 |
C |
p. |
artikel |
22 |
A systematic survey on physical layer security oriented to reconfigurable intelligent surface empowered 6G
|
Zhang, Shunliang |
|
|
148 |
C |
p. |
artikel |
23 |
A trust model for VANETs using malicious-aware multiple routing
|
Dang, Xiaorui |
|
|
148 |
C |
p. |
artikel |
24 |
AugPersist: Automatically augmenting the persistence of coverage-based greybox fuzzing for persistent software
|
Wang, Chiheng |
|
|
148 |
C |
p. |
artikel |
25 |
Beyond the west: Revealing and bridging the gap between Western and Chinese phishing website detection
|
Yuan, Ying |
|
|
148 |
C |
p. |
artikel |
26 |
CDDA-MD: An efficient malicious traffic detection method based on concept drift detection and adaptation technique
|
Cai, Saihua |
|
|
148 |
C |
p. |
artikel |
27 |
Certificate-based multi-copy cloud storage auditing supporting data dynamics
|
Zhou, Hao |
|
|
148 |
C |
p. |
artikel |
28 |
Cybersecurity behavior change: A conceptualization of ethical principles for behavioral interventions
|
Mersinas, Konstantinos |
|
|
148 |
C |
p. |
artikel |
29 |
DaE2: Unmasking malicious URLs by leveraging diverse and efficient ensemble machine learning for online security
|
Omolara, Abiodun Esther |
|
|
148 |
C |
p. |
artikel |
30 |
Dealing with uncertainty in cybersecurity decision support
|
Zhang, Yunxiao |
|
|
148 |
C |
p. |
artikel |
31 |
Designing accountable IoT systems to overcome IoT storage limitation
|
Li, Jiacheng |
|
|
148 |
C |
p. |
artikel |
32 |
Detecting interest flooding attacks in NDN: A probability-based event-driven approach
|
Kumari, Matta Krishna |
|
|
148 |
C |
p. |
artikel |
33 |
Detection of cyberattack in Industrial Control Networks using multiple adaptive local kernel learning
|
Lv, Fei |
|
|
148 |
C |
p. |
artikel |
34 |
DMSCTS: Dynamic measurement scheme for the containers-hybrid-deployment based on trusted subsystem
|
Han, Yufei |
|
|
148 |
C |
p. |
artikel |
35 |
Doing cybersecurity at home: A human-centred approach for mitigating attacks in AI-enabled home devices
|
Vasalou, Asimina |
|
|
148 |
C |
p. |
artikel |
36 |
Dynamically stabilized recurrent neural network optimized with intensified sand cat swarm optimization for intrusion detection in wireless sensor network
|
Punitha, A. |
|
|
148 |
C |
p. |
artikel |
37 |
Edge-featured multi-hop attention graph neural network for intrusion detection system
|
Deng, Ping |
|
|
148 |
C |
p. |
artikel |
38 |
Editorial Board
|
|
|
|
148 |
C |
p. |
artikel |
39 |
Empowering 5G SBA security: Time series transformer for HTTP/2 anomaly detection
|
Wehbe, Nathalie |
|
|
148 |
C |
p. |
artikel |
40 |
Encoder decoder-based Virtual Physically Unclonable Function for Internet of Things device authentication using split-learning
|
Khan, Raviha |
|
|
148 |
C |
p. |
artikel |
41 |
Enhanced cell phone security: An ultrasonic and sensor fusion-based persistent cell phone protection method integrating anti-theft & identity authentication
|
Zhang, Jie |
|
|
148 |
C |
p. |
artikel |
42 |
Enhancing data integrity in opportunistic mobile social network: Leveraging Berkle Tree and secure data routing against attacks
|
Lakshmi, Vimitha R. Vidhya |
|
|
148 |
C |
p. |
artikel |
43 |
Entity and relation extractions for threat intelligence knowledge graphs
|
Mouiche, Inoussa |
|
|
148 |
C |
p. |
artikel |
44 |
E-WebGuard: Enhanced neural architectures for precision web attack detection
|
Zhou, Luchen |
|
|
148 |
C |
p. |
artikel |
45 |
Examining the factors that impact the severity of cyberattacks on critical infrastructures
|
Roumani, Yaman |
|
|
148 |
C |
p. |
artikel |
46 |
FDN-SA: Fuzzy deep neural-stacked autoencoder-based phishing attack detection in social engineering
|
Vidyasri, P. |
|
|
148 |
C |
p. |
artikel |
47 |
From Dis-empowerment to empowerment: Crafting a healthcare cybersecurity self-assessment
|
Burke, Wendy |
|
|
148 |
C |
p. |
artikel |
48 |
Fuzzing drones for anomaly detection: A systematic literature review
|
Malviya, Vikas K. |
|
|
148 |
C |
p. |
artikel |
49 |
GRAIN: Graph neural network and reinforcement learning aided causality discovery for multi-step attack scenario reconstruction
|
Xiao, Fengrui |
|
|
148 |
C |
p. |
artikel |
50 |
HIDIM: A novel framework of network intrusion detection for hierarchical dependency and class imbalance
|
Zhou, Weidong |
|
|
148 |
C |
p. |
artikel |
51 |
ICS-LTU2022: A dataset for ICS vulnerabilities
|
Alanazi, Manar |
|
|
148 |
C |
p. |
artikel |
52 |
Improving IIoT security: Unveiling threats through advanced side-channel analysis
|
He, Dalin |
|
|
148 |
C |
p. |
artikel |
53 |
LaAeb: A comprehensive log-text analysis based approach for insider threat detection
|
Fei, Kexiong |
|
|
148 |
C |
p. |
artikel |
54 |
Malware classification through Abstract Syntax Trees and L-moments
|
Rose, Anthony J. |
|
|
148 |
C |
p. |
artikel |
55 |
MFT: A novel memory flow transformer efficient intrusion detection method
|
Jiang, Xuefeng |
|
|
148 |
C |
p. |
artikel |
56 |
MIDAS: Multi-layered attack detection architecture with decision optimisation
|
Rendall, Kieran |
|
|
148 |
C |
p. |
artikel |
57 |
MoSFPAD: An end-to-end ensemble of MobileNet and Support Vector Classifier for fingerprint presentation attack detection
|
Rai, Anuj |
|
|
148 |
C |
p. |
artikel |
58 |
Multi-perspective API call sequence behavior analysis and fusion for malware classification
|
Wu, Peng |
|
|
148 |
C |
p. |
artikel |
59 |
NTLFlowLyzer: Towards generating an intrusion detection dataset and intruders behavior profiling through network and transport layers traffic analysis and pattern extraction
|
Shafi, MohammadMoein |
|
|
148 |
C |
p. |
artikel |
60 |
PDSMV3-DCRNN: A novel ensemble deep learning framework for enhancing phishing detection and URL extraction
|
Prasad, Y. Bhanu |
|
|
148 |
C |
p. |
artikel |
61 |
PenGym: Realistic training environment for reinforcement learning pentesting agents
|
Nguyen, Huynh Phuong Thanh |
|
|
148 |
C |
p. |
artikel |
62 |
Practically implementing an LLM-supported collaborative vulnerability remediation process: A team-based approach
|
Wang, Xiaoqing |
|
|
148 |
C |
p. |
artikel |
63 |
Precision strike: Precise backdoor attack with dynamic trigger
|
Li, Qingyun |
|
|
148 |
C |
p. |
artikel |
64 |
Privacy protection against user profiling through optimal data generalization
|
Gil, César |
|
|
148 |
C |
p. |
artikel |
65 |
Provenance-based APT campaigns detection via masked graph representation learning
|
Ren, Jiafeng |
|
|
148 |
C |
p. |
artikel |
66 |
RAF-AG: Report analysis framework for attack path generation
|
Mai, Khang |
|
|
148 |
C |
p. |
artikel |
67 |
ReckDroid: Detecting red packet fraud in Android apps
|
Cheng, Yu |
|
|
148 |
C |
p. |
artikel |
68 |
Reducing the risk of social engineering attacks using SOAR measures in a real world environment: A case study
|
Waelchli, Sandro |
|
|
148 |
C |
p. |
artikel |
69 |
Remote secure object authentication: Secure sketches, fuzzy extractors, and security protocols
|
Arenas, Mónica P. |
|
|
148 |
C |
p. |
artikel |
70 |
SecOnto: Ontological Representation of Security Directives
|
Castiglione, Gianpietro |
|
|
148 |
C |
p. |
artikel |
71 |
SecureQwen: Leveraging LLMs for vulnerability detection in python codebases
|
Mechri, Abdechakour |
|
|
148 |
C |
p. |
artikel |
72 |
Security awareness, decision style, knowledge, and phishing email detection: Moderated mediation analyses
|
Sturman, Daniel |
|
|
148 |
C |
p. |
artikel |
73 |
Survey of source code vulnerability analysis based on deep learning
|
Liang, Chen |
|
|
148 |
C |
p. |
artikel |
74 |
TEE-MR: Developer-friendly data oblivious programming for trusted execution environments
|
Alam, A.K.M. Mubashwir |
|
|
148 |
C |
p. |
artikel |
75 |
Testing the limits of SPDM: Authentication of intermittently connected devices
|
Alves, Renan C.A. |
|
|
148 |
C |
p. |
artikel |
76 |
Thread-sensitive fuzzing for concurrency bug detection
|
Zhao, Jingwen |
|
|
148 |
C |
p. |
artikel |
77 |
TIMFuser: A multi-granular fusion framework for cyber threat intelligence
|
Ma, Chunyan |
|
|
148 |
C |
p. |
artikel |
78 |
Towards a cybersecurity culture-behaviour framework: A rapid evidence review
|
Sutton, Anna |
|
|
148 |
C |
p. |
artikel |
79 |
Towards more realistic evaluations: The impact of label delays in malware detection pipelines
|
Botacin, Marcus |
|
|
148 |
C |
p. |
artikel |
80 |
TrojanProbe: Fingerprinting Trojan tunnel implementations by actively probing crafted HTTP requests
|
Lv, Liuying |
|
|
148 |
C |
p. |
artikel |
81 |
TrustCNAV: Certificateless aggregate authentication of civil navigation messages in GNSS
|
Wu, Zhijun |
|
|
148 |
C |
p. |
artikel |
82 |
VulTR: Software vulnerability detection model based on multi-layer key feature enhancement
|
He, Haitao |
|
|
148 |
C |
p. |
artikel |
83 |
WF-LDPSR: A local differential privacy mechanism based on water-filling for secure release of trajectory statistics data
|
Li, Yan-zi |
|
|
148 |
C |
p. |
artikel |
84 |
What do we need to know about the Chief Information Security Officer? A literature review and research agenda
|
Sahin, Zeynep |
|
|
148 |
C |
p. |
artikel |
85 |
Zero day ransomware detection with Pulse: Function classification with Transformer models and assembly language
|
Gaber, Matthew |
|
|
148 |
C |
p. |
artikel |
86 |
ZKSA: Secure mutual Attestation against TOCTOU Zero-knowledge Proof based for IoT Devices
|
Bai, Fenhua |
|
|
148 |
C |
p. |
artikel |