Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             88 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A bio-inspired optimal feature with convolutional GhostNet based squeeze excited deep-scale capsule network for intrusion detection Ammannamma, Tamminina

150 C p.
artikel
2 A classification-by-retrieval framework for few-shot anomaly detection to detect API injection Aharon, Udi

150 C p.
artikel
3 A classifications framework for continuous biometric authentication (2018–2024) Boshoff, Dutliff

150 C p.
artikel
4 A combined side-channel and transient execution attack scheme on RISC-V processors Dong, Renhai

150 C p.
artikel
5 A cyber-resilient open architecture for drone control d’Ambrosio, Nicola

150 C p.
artikel
6 AECR: Automatic attack technique intelligence extraction based on fine-tuned large language model Chen, Minghao

150 C p.
artikel
7 A hybrid DGA DefenseNet for detecting DGA domain names based on FastText and deep learning techniques Chen, Jiann-Liang

150 C p.
artikel
8 A hybrid model for detecting intrusions using stacked autoencoders and extreme gradient boosting M.V., Hari Vinayak

150 C p.
artikel
9 A hybrid ranking algorithm for secure and efficient iris template protection Mohammed, Ali Hameed Yassir

150 C p.
artikel
10 AJSAGE: A intrusion detection scheme based on Jump-Knowledge Connection To GraphSAGE Xu, Lijuan

150 C p.
artikel
11 A multi-source log semantic analysis-based attack investigation approach Song, Yubo

150 C p.
artikel
12 An adaptable security-by-design approach for ensuring a secure Over the Air (OTA) update in modern vehicles Iyieke, Victormills

150 C p.
artikel
13 An on-the-fly framework for usable access control policy mining Guo, Yunchuan

150 C p.
artikel
14 A reliability anomaly detection method based on enhanced GRU-Autoencoder for Vehicular Fog Computing services Wang, Yingqing

150 C p.
artikel
15 A review of privacy-preserving biometric identification and authentication protocols Zeng, Li

150 C p.
artikel
16 A review on the static and dynamic risk assessment methods for OT cybersecurity in industry 4.0 Halawi Ghoson, Nourhan

150 C p.
artikel
17 Assessing of software security reliability: Dimensional security assurance techniques Ali, Mohammad

150 C p.
artikel
18 Assessing the effect of cybersecurity training on End-users: A Meta-analysis Prümmer, Julia

150 C p.
artikel
19 A technique to detect and mitigate false data injection attacks in Cyber–Physical Systems Padhan, Sushree

150 C p.
artikel
20 A trajectory privacy protection method based on the replacement of points of interest in hotspot regions Gui, Ruowei

150 C p.
artikel
21 ATSDetector: An Android Trojan spyware detection approach with multi-features Wang, Siyu

150 C p.
artikel
22 AttacKG+: Boosting attack graph construction with Large Language Models Zhang, Yongheng

150 C p.
artikel
23 Automated detection of cyber attacks in healthcare systems: A novel scheme with advanced feature extraction and classification Nasayreh, Ahmad

150 C p.
artikel
24 CD-Net: Robust mobile traffic classification against apps updating Chen, Yanan

150 C p.
artikel
25 Conditional entropy-based hybrid DDoS detection model for IoT networks Pandey, Nimisha

150 C p.
artikel
26 Constructing arbitrary write via puppet objects and delivering gadgets in Linux kernel Liu, Danjun

150 C p.
artikel
27 Control-flow attestation: Concepts, solutions, and open challenges Sha, Zhanyu

150 C p.
artikel
28 CORAL: Container Online Risk Assessment with Logical attack graphs Tayouri, David

150 C p.
artikel
29 Covert timing channel detection based on isolated binary trees Lin, Yuwei

150 C p.
artikel
30 Cyberattack event logs classification using deep learning with semantic feature analysis Alzu’bi, Ahmad

150 C p.
artikel
31 Cybersecurity in smart agriculture: A systematic literature review Campoverde-Molina, Milton

150 C p.
artikel
32 Cybersecurity serious games development: A systematic review Ng, Chiu Yeong

150 C p.
artikel
33 CyberShapley: Explanation, prioritization, and triage of cybersecurity alerts using informative graph representation Malach, Alon

150 C p.
artikel
34 Detection of CIFA using SMOTEBoost and LSTM in NDN Liu, Liang

150 C p.
artikel
35 Detection of compromised functions in a serverless cloud environment Ben-Shimol, Lavi

150 C p.
artikel
36 Edge Implicit Weighting with graph transformers for robust intrusion detection in Internet of Things network Karpagavalli, C.

150 C p.
artikel
37 Editorial Board
150 C p.
artikel
38 Enhancing cyber safety in e-learning environment through cybersecurity awareness and information security compliance: PLS-SEM and FsQCA analysis Oroni, Chrispus Zacharia

150 C p.
artikel
39 Enhancing information security through brainprint: A longitudinal study on ERP identity authentication Zhang, Yufeng

150 C p.
artikel
40 Enhancing network tunnels anonymity through increasing combined traffic in a clustered structure Mirzaei, Reza

150 C p.
artikel
41 Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data Ahmadian, Rouhollah

150 C p.
artikel
42 Evading backdoor defenses: Concealing genuine backdoors through scapegoat strategy Qian, Yaguan

150 C p.
artikel
43 Evaluation framework for quantum security risk assessment: A comprehensive strategy for quantum-safe transition Baseri, Yaser

150 C p.
artikel
44 Factors impacting cybersecurity transformation: An Industry 5.0 perspective Chaudhuri, Abhik

150 C p.
artikel
45 FuzzAGG: A fuzzing-driven attack graph generation framework for industrial robot systems Liu, Xiaosheng

150 C p.
artikel
46 Fuzzing trusted execution environments with Rust Blinowski, Grzegorz

150 C p.
artikel
47 Generate universal adversarial perturbations by shortest-distance soft maximum direction attack Liu, Dengbo

150 C p.
artikel
48 Graphical security modelling for Autonomous Vehicles: A novel approach to threat analysis and defence evaluation Nguyen, Nhung H.

150 C p.
artikel
49 How do mental models affect cybersecurity awareness? The roles of questioning styles, need for cognition, and graphical representations Xie, Yuntian

150 C p.
artikel
50 How to De-CyFa the actor-observer bias in cybersecurity fatigue: Building the CyFa measure of attribution styles and mitigation strategies Reeves, Andrew

150 C p.
artikel
51 Hybrid feature extraction and integrated deep learning for cloud-based malware detection Nguyen, Pham Sy

150 C p.
artikel
52 IEA-DMS: An Interpretable feature-driven, Efficient and Accurate Detection Method for Slow HTTP DoS in high-speed networks Chen, Jinfeng

150 C p.
artikel
53 Interpretable adversarial example detection via high-level concept activation vector Li, Jiaxing

150 C p.
artikel
54 Interpretable CAA classification based on incorporating feature channel attention into LSTM Hou, Yiting

150 C p.
artikel
55 Investigation on datasets toward intelligent intrusion detection systems for Intra and inter-UAVs communication systems Mohammed, Ahmad Burhan

150 C p.
artikel
56 Job demands, identity, and outcomes: The mediating role of cynicism among Cybersecurity-focused employees Ogbanufe, Obi

150 C p.
artikel
57 Kellect: A Kernel-based efficient and lossless event log collector for windows security Chen, Tieming

150 C p.
artikel
58 LDCDroid: Learning data drift characteristics for handling the model aging problem in Android malware detection Liu, Zhen

150 C p.
artikel
59 LeakFocus: Catching the perpetrator in routing leak event Xie, Yuancheng

150 C p.
artikel
60 MeNU: Memorizing normality for UAV anomaly detection with a few sensor values Yoo, Jeong Do

150 C p.
artikel
61 MPDroid: A multimodal pre-training Android malware detection method with static and dynamic features Zhang, Sanfeng

150 C p.
artikel
62 Multi-domains personalized local differential privacy frequency estimation mechanism for utility optimization Li, Yunfei

150 C p.
artikel
63 Multi-view consistent generative adversarial network for enhancing intrusion detection with prevention systems in mobile ad hoc networks against security attacks Rajkumar, M.

150 C p.
artikel
64 Navigating challenging terrain surrounding DoD response to homeland attacks on critical infrastructure: Case studies of prior incidents utilizing an extended taxonomy of cyber harms Nolan, Louis

150 C p.
artikel
65 Oblivious and distributed firewall policies for securing firewalls from malicious attacks Allami, Ali

150 C p.
artikel
66 On providing multi-level security assurance based on Common Criteria for O-RAN mobile network equipment. A test case: O-RAN Distributed Unit Krawiec, Piotr

150 C p.
artikel
67 Open Digital Rights Enforcement framework (ODRE): From descriptive to enforceable policies Cimmino, Andrea

150 C p.
artikel
68 Optimizing network security: Weighted average ensemble of BPNN and RELM in EPRN-WPS intrusion detection Pavithra, P.S.

150 C p.
artikel
69 Palm vein template protection scheme for resisting similarity attack Li, Yunpeng

150 C p.
artikel
70 Practical clean-label backdoor attack against static malware detection Zhan, Dazhi

150 C p.
artikel
71 Privacy and security of wearable internet of things: A scoping review and conceptual framework development for safety and health management in construction Okonkwo, Chinedu

150 C p.
artikel
72 Profiling the victim - cyber risk in commercial banks Smaga, Paweł

150 C p.
artikel
73 RanSMAP: Open dataset of Ransomware Storage and Memory Access Patterns for creating deep learning based ransomware detectors Hirano, Manabu

150 C p.
artikel
74 RansoGuard: A RNN-based framework leveraging pre-attack sensitive APIs for early ransomware detection Cen, Mingcan

150 C p.
artikel
75 RBD24 : A labelled dataset with risk activities using log application data Calvo, Albert

150 C p.
artikel
76 Reconsidering neutralization techniques in behavioral cybersecurity as cybersecurity hygiene discounting Siponen, Mikko

150 C p.
artikel
77 Retraction notice to “TriCh-LKRepNet: A large kernel convolutional malicious code classification network for structure reparameterisation and triple-channel mapping” [Computers & Security 144 (2024) 103937] Li, Sicong

150 C p.
artikel
78 Sensor attack online classification for UAVs using machine learning Wei, Xiaomin

150 C p.
artikel
79 SLIFER: Investigating performance and robustness of malware detection pipelines Ponte, Andrea

150 C p.
artikel
80 SMCD: Privacy-preserving deep learning based malicious code detection Mu, Gaoli

150 C p.
artikel
81 Social-Hunter: A social heuristics-based approach to early unveiling unknown malicious logins using valid accounts Tang, Mingsheng

150 C p.
artikel
82 SoK: The past decade of user deception in emails and today’s email clients’ susceptibility to phishing techniques Veit, Maxime Fabian

150 C p.
artikel
83 TEEMRDA: Leveraging trusted execution environments for multi-replica data auditing in cloud storage Tian, Hui

150 C p.
artikel
84 Textual adversarial attacks in cybersecurity named entity recognition Jiang, Tian

150 C p.
artikel
85 Towards prompt tuning-based software vulnerability assessment with continual learning Xue, Jiacheng

150 C p.
artikel
86 Unmasking the hidden credential leaks in password managers and VPN clients Chatzoglou, Efstratios

150 C p.
artikel
87 Unveiling the veiled: An early stage detection of fileless malware Singh, Narendra

150 C p.
artikel
88 Unveiling traffic paths: Explainable path signature feature-based encrypted traffic classification Xu, Shi-Jie

150 C p.
artikel
                             88 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland