nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection
|
Ammannamma, Tamminina |
|
|
150 |
C |
p. |
artikel |
2 |
A classification-by-retrieval framework for few-shot anomaly detection to detect API injection
|
Aharon, Udi |
|
|
150 |
C |
p. |
artikel |
3 |
A classifications framework for continuous biometric authentication (2018–2024)
|
Boshoff, Dutliff |
|
|
150 |
C |
p. |
artikel |
4 |
A combined side-channel and transient execution attack scheme on RISC-V processors
|
Dong, Renhai |
|
|
150 |
C |
p. |
artikel |
5 |
A cyber-resilient open architecture for drone control
|
d’Ambrosio, Nicola |
|
|
150 |
C |
p. |
artikel |
6 |
AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model
|
Chen, Minghao |
|
|
150 |
C |
p. |
artikel |
7 |
A hybrid DGA DefenseNet for detecting DGA domain names based on FastText and deep learning techniques
|
Chen, Jiann-Liang |
|
|
150 |
C |
p. |
artikel |
8 |
A hybrid model for detecting intrusions using stacked autoencoders and extreme gradient boosting
|
M.V., Hari Vinayak |
|
|
150 |
C |
p. |
artikel |
9 |
A hybrid ranking algorithm for secure and efficient iris template protection
|
Mohammed, Ali Hameed Yassir |
|
|
150 |
C |
p. |
artikel |
10 |
AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE
|
Xu, Lijuan |
|
|
150 |
C |
p. |
artikel |
11 |
A multi-source log semantic analysis-based attack investigation approach
|
Song, Yubo |
|
|
150 |
C |
p. |
artikel |
12 |
An adaptable security-by-design approach for ensuring a secure Over the Air (OTA) update in modern vehicles
|
Iyieke, Victormills |
|
|
150 |
C |
p. |
artikel |
13 |
An on-the-fly framework for usable access control policy mining
|
Guo, Yunchuan |
|
|
150 |
C |
p. |
artikel |
14 |
A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services
|
Wang, Yingqing |
|
|
150 |
C |
p. |
artikel |
15 |
A review of privacy-preserving biometric identification and authentication protocols
|
Zeng, Li |
|
|
150 |
C |
p. |
artikel |
16 |
A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0
|
Halawi Ghoson, Nourhan |
|
|
150 |
C |
p. |
artikel |
17 |
Assessing of software security reliability: Dimensional security assurance techniques
|
Ali, Mohammad |
|
|
150 |
C |
p. |
artikel |
18 |
Assessing the effect of cybersecurity training on End-users: A Meta-analysis
|
Prümmer, Julia |
|
|
150 |
C |
p. |
artikel |
19 |
A technique to detect and mitigate false data injection attacks in Cyber–Physical Systems
|
Padhan, Sushree |
|
|
150 |
C |
p. |
artikel |
20 |
A trajectory privacy protection method based on the replacement of points of interest in hotspot regions
|
Gui, Ruowei |
|
|
150 |
C |
p. |
artikel |
21 |
ATSDetector: An Android Trojan spyware detection approach with multi-features
|
Wang, Siyu |
|
|
150 |
C |
p. |
artikel |
22 |
AttacKG+: Boosting attack graph construction with Large Language Models
|
Zhang, Yongheng |
|
|
150 |
C |
p. |
artikel |
23 |
Automated detection of cyber attacks in healthcare systems: A novel scheme with advanced feature extraction and classification
|
Nasayreh, Ahmad |
|
|
150 |
C |
p. |
artikel |
24 |
CD-Net: Robust mobile traffic classification against apps updating
|
Chen, Yanan |
|
|
150 |
C |
p. |
artikel |
25 |
Conditional entropy-based hybrid DDoS detection model for IoT networks
|
Pandey, Nimisha |
|
|
150 |
C |
p. |
artikel |
26 |
Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel
|
Liu, Danjun |
|
|
150 |
C |
p. |
artikel |
27 |
Control-flow attestation: Concepts, solutions, and open challenges
|
Sha, Zhanyu |
|
|
150 |
C |
p. |
artikel |
28 |
CORAL: Container Online Risk Assessment with Logical attack graphs
|
Tayouri, David |
|
|
150 |
C |
p. |
artikel |
29 |
Covert timing channel detection based on isolated binary trees
|
Lin, Yuwei |
|
|
150 |
C |
p. |
artikel |
30 |
Cyberattack event logs classification using deep learning with semantic feature analysis
|
Alzu’bi, Ahmad |
|
|
150 |
C |
p. |
artikel |
31 |
Cybersecurity in smart agriculture: A systematic literature review
|
Campoverde-Molina, Milton |
|
|
150 |
C |
p. |
artikel |
32 |
Cybersecurity serious games development: A systematic review
|
Ng, Chiu Yeong |
|
|
150 |
C |
p. |
artikel |
33 |
CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation
|
Malach, Alon |
|
|
150 |
C |
p. |
artikel |
34 |
Detection of CIFA using SMOTEBoost and LSTM in NDN
|
Liu, Liang |
|
|
150 |
C |
p. |
artikel |
35 |
Detection of compromised functions in a serverless cloud environment
|
Ben-Shimol, Lavi |
|
|
150 |
C |
p. |
artikel |
36 |
Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network
|
Karpagavalli, C. |
|
|
150 |
C |
p. |
artikel |
37 |
Editorial Board
|
|
|
|
150 |
C |
p. |
artikel |
38 |
Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis
|
Oroni, Chrispus Zacharia |
|
|
150 |
C |
p. |
artikel |
39 |
Enhancing information security through brainprint: A longitudinal study on ERP identity authentication
|
Zhang, Yufeng |
|
|
150 |
C |
p. |
artikel |
40 |
Enhancing network tunnels anonymity through increasing combined traffic in a clustered structure
|
Mirzaei, Reza |
|
|
150 |
C |
p. |
artikel |
41 |
Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data
|
Ahmadian, Rouhollah |
|
|
150 |
C |
p. |
artikel |
42 |
Evading backdoor defenses: Concealing genuine backdoors through scapegoat strategy
|
Qian, Yaguan |
|
|
150 |
C |
p. |
artikel |
43 |
Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition
|
Baseri, Yaser |
|
|
150 |
C |
p. |
artikel |
44 |
Factors impacting cybersecurity transformation: An Industry 5.0 perspective
|
Chaudhuri, Abhik |
|
|
150 |
C |
p. |
artikel |
45 |
FuzzAGG: A fuzzing-driven attack graph generation framework for industrial robot systems
|
Liu, Xiaosheng |
|
|
150 |
C |
p. |
artikel |
46 |
Fuzzing trusted execution environments with Rust
|
Blinowski, Grzegorz |
|
|
150 |
C |
p. |
artikel |
47 |
Generate universal adversarial perturbations by shortest-distance soft maximum direction attack
|
Liu, Dengbo |
|
|
150 |
C |
p. |
artikel |
48 |
Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation
|
Nguyen, Nhung H. |
|
|
150 |
C |
p. |
artikel |
49 |
How do mental models affect cybersecurity awareness? The roles of questioning styles, need for cognition, and graphical representations
|
Xie, Yuntian |
|
|
150 |
C |
p. |
artikel |
50 |
How to De-CyFa the actor-observer bias in cybersecurity fatigue: Building the CyFa measure of attribution styles and mitigation strategies
|
Reeves, Andrew |
|
|
150 |
C |
p. |
artikel |
51 |
Hybrid feature extraction and integrated deep learning for cloud-based malware detection
|
Nguyen, Pham Sy |
|
|
150 |
C |
p. |
artikel |
52 |
IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks
|
Chen, Jinfeng |
|
|
150 |
C |
p. |
artikel |
53 |
Interpretable adversarial example detection via high-level concept activation vector
|
Li, Jiaxing |
|
|
150 |
C |
p. |
artikel |
54 |
Interpretable CAA classification based on incorporating feature channel attention into LSTM
|
Hou, Yiting |
|
|
150 |
C |
p. |
artikel |
55 |
Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems
|
Mohammed, Ahmad Burhan |
|
|
150 |
C |
p. |
artikel |
56 |
Job demands, identity, and outcomes: The mediating role of cynicism among Cybersecurity-focused employees
|
Ogbanufe, Obi |
|
|
150 |
C |
p. |
artikel |
57 |
Kellect: A Kernel-based efficient and lossless event log collector for windows security
|
Chen, Tieming |
|
|
150 |
C |
p. |
artikel |
58 |
LDCDroid: Learning data drift characteristics for handling the model aging problem in Android malware detection
|
Liu, Zhen |
|
|
150 |
C |
p. |
artikel |
59 |
LeakFocus: Catching the perpetrator in routing leak event
|
Xie, Yuancheng |
|
|
150 |
C |
p. |
artikel |
60 |
MeNU: Memorizing normality for UAV anomaly detection with a few sensor values
|
Yoo, Jeong Do |
|
|
150 |
C |
p. |
artikel |
61 |
MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features
|
Zhang, Sanfeng |
|
|
150 |
C |
p. |
artikel |
62 |
Multi-domains personalized local differential privacy frequency estimation mechanism for utility optimization
|
Li, Yunfei |
|
|
150 |
C |
p. |
artikel |
63 |
Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks
|
Rajkumar, M. |
|
|
150 |
C |
p. |
artikel |
64 |
Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms
|
Nolan, Louis |
|
|
150 |
C |
p. |
artikel |
65 |
Oblivious and distributed firewall policies for securing firewalls from malicious attacks
|
Allami, Ali |
|
|
150 |
C |
p. |
artikel |
66 |
On providing multi-level security assurance based on Common Criteria for O-RAN mobile network equipment. A test case: O-RAN Distributed Unit
|
Krawiec, Piotr |
|
|
150 |
C |
p. |
artikel |
67 |
Open Digital Rights Enforcement framework (ODRE): From descriptive to enforceable policies
|
Cimmino, Andrea |
|
|
150 |
C |
p. |
artikel |
68 |
Optimizing network security: Weighted average ensemble of BPNN and RELM in EPRN-WPS intrusion detection
|
Pavithra, P.S. |
|
|
150 |
C |
p. |
artikel |
69 |
Palm vein template protection scheme for resisting similarity attack
|
Li, Yunpeng |
|
|
150 |
C |
p. |
artikel |
70 |
Practical clean-label backdoor attack against static malware detection
|
Zhan, Dazhi |
|
|
150 |
C |
p. |
artikel |
71 |
Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction
|
Okonkwo, Chinedu |
|
|
150 |
C |
p. |
artikel |
72 |
Profiling the victim - cyber risk in commercial banks
|
Smaga, Paweł |
|
|
150 |
C |
p. |
artikel |
73 |
RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors
|
Hirano, Manabu |
|
|
150 |
C |
p. |
artikel |
74 |
RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection
|
Cen, Mingcan |
|
|
150 |
C |
p. |
artikel |
75 |
RBD24 : A labelled dataset with risk activities using log application data
|
Calvo, Albert |
|
|
150 |
C |
p. |
artikel |
76 |
Reconsidering neutralization techniques in behavioral cybersecurity as cybersecurity hygiene discounting
|
Siponen, Mikko |
|
|
150 |
C |
p. |
artikel |
77 |
Retraction notice to “TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping” [Computers & Security 144 (2024) 103937]
|
Li, Sicong |
|
|
150 |
C |
p. |
artikel |
78 |
Sensor attack online classification for UAVs using machine learning
|
Wei, Xiaomin |
|
|
150 |
C |
p. |
artikel |
79 |
SLIFER: Investigating performance and robustness of malware detection pipelines
|
Ponte, Andrea |
|
|
150 |
C |
p. |
artikel |
80 |
SMCD: Privacy-preserving deep learning based malicious code detection
|
Mu, Gaoli |
|
|
150 |
C |
p. |
artikel |
81 |
Social-Hunter: A social heuristics-based approach to early unveiling unknown malicious logins using valid accounts
|
Tang, Mingsheng |
|
|
150 |
C |
p. |
artikel |
82 |
SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques
|
Veit, Maxime Fabian |
|
|
150 |
C |
p. |
artikel |
83 |
TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage
|
Tian, Hui |
|
|
150 |
C |
p. |
artikel |
84 |
Textual adversarial attacks in cybersecurity named entity recognition
|
Jiang, Tian |
|
|
150 |
C |
p. |
artikel |
85 |
Towards prompt tuning-based software vulnerability assessment with continual learning
|
Xue, Jiacheng |
|
|
150 |
C |
p. |
artikel |
86 |
Unmasking the hidden credential leaks in password managers and VPN clients
|
Chatzoglou, Efstratios |
|
|
150 |
C |
p. |
artikel |
87 |
Unveiling the veiled: An early stage detection of fileless malware
|
Singh, Narendra |
|
|
150 |
C |
p. |
artikel |
88 |
Unveiling traffic paths: Explainable path signature feature-based encrypted traffic classification
|
Xu, Shi-Jie |
|
|
150 |
C |
p. |
artikel |