nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A case of smart devices that compromise home cybersecurity
|
Bonaventura, Davide |
|
|
151 |
C |
p. |
artikel |
2 |
A comprehensive review of current trends, challenges, and opportunities in text data privacy
|
Shahriar, Sakib |
|
|
151 |
C |
p. |
artikel |
3 |
“Alexa, how do you protect my privacy?” A quantitative study of user preferences and requirements about smart speaker privacy settings
|
Hernández Acosta, Luca |
|
|
151 |
C |
p. |
artikel |
4 |
A model for information security vulnerability awareness
|
Mejias, Roberto J. |
|
|
151 |
C |
p. |
artikel |
5 |
Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach
|
Kurt, Yasin Burak |
|
|
151 |
C |
p. |
artikel |
6 |
An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals
|
Luo, Feng |
|
|
151 |
C |
p. |
artikel |
7 |
A novel framework to identify cybersecurity challenges and opportunities for organizational digital transformation in the cloud
|
Liang, Xueping |
|
|
151 |
C |
p. |
artikel |
8 |
A Segmented Stack Randomization for bare-metal IoT devices
|
Jung, Junho |
|
|
151 |
C |
p. |
artikel |
9 |
Comparative analysis of EU-based cybersecurity skills frameworks
|
Almeida, Fernando |
|
|
151 |
C |
p. |
artikel |
10 |
CO-STOP: A robust P4-powered adaptive framework for comprehensive detection and mitigation of coordinated and multi-faceted attacks in SD-IoT networks
|
El-Sayed, Ameer |
|
|
151 |
C |
p. |
artikel |
11 |
CRO-PUF: Resilience to machine learning and differential power attacks
|
Miah, Arafat |
|
|
151 |
C |
p. |
artikel |
12 |
Current research on Internet of Things (IoT) security protocols: A survey
|
Mishra, Raghavendra |
|
|
151 |
C |
p. |
artikel |
13 |
Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks
|
Huang, Kaijiao |
|
|
151 |
C |
p. |
artikel |
14 |
Detection and prevention of spear phishing attacks: A comprehensive survey
|
Birthriya, Santosh Kumar |
|
|
151 |
C |
p. |
artikel |
15 |
Dynamic privacy loss management: The innovation of α-confidence differential privacy filters and odometers
|
Qin, Zhongyuan |
|
|
151 |
C |
p. |
artikel |
16 |
Editorial Board
|
|
|
|
151 |
C |
p. |
artikel |
17 |
Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks
|
Lin, Ying-Dar |
|
|
151 |
C |
p. |
artikel |
18 |
Erasure code backup system for data security
|
Lee, Rong-Teng |
|
|
151 |
C |
p. |
artikel |
19 |
Exposure of software vulnerabilities on Twitter: Analyzing vendors’ behavior of releasing software patches
|
Syed, Romilla |
|
|
151 |
C |
p. |
artikel |
20 |
FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection
|
Nguyen, Van Tuan |
|
|
151 |
C |
p. |
artikel |
21 |
FineGCP: Fine-grained dependency graph community partitioning for attack investigation
|
Wang, Zhaoyang |
|
|
151 |
C |
p. |
artikel |
22 |
Gamifying information security: Adversarial risk exploration for IT/OT infrastructures
|
Luh, Robert |
|
|
151 |
C |
p. |
artikel |
23 |
GraphFVD: Property graph-based fine-grained vulnerability detection
|
Shao, Miaomiao |
|
|
151 |
C |
p. |
artikel |
24 |
HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network
|
Xue, Yankun |
|
|
151 |
C |
p. |
artikel |
25 |
How to decrypt files encrypted by Rhysida ransomware without the attacker’s private key
|
Kim, Giyoon |
|
|
151 |
C |
p. |
artikel |
26 |
IDPFilter: Mitigating interdependent privacy issues in third-party apps
|
Liu, Shuaishuai |
|
|
151 |
C |
p. |
artikel |
27 |
Investigating the impact of feature selection on adversarial transferability in intrusion detection system
|
Adeke, James Msughter |
|
|
151 |
C |
p. |
artikel |
28 |
K-Salp Swarm Anomaly Detection (K-SAD): A novel clustering and threshold-based approach for cybersecurity applications
|
Kılıç, Vahide Nida |
|
|
151 |
C |
p. |
artikel |
29 |
Mitigating security stress: Exploring the contingent role of collaborative communication in enhancing information security compliance
|
Hwang, Inho |
|
|
151 |
C |
p. |
artikel |
30 |
Multidimensional categorical data collection under shuffled differential privacy
|
Wang, Ning |
|
|
151 |
C |
p. |
artikel |
31 |
Multi-probability sampling-based detection of malicious switching nodes in SDN
|
Xiao, Jingxu |
|
|
151 |
C |
p. |
artikel |
32 |
Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response
|
Kalutharage, Chathuranga Sampath |
|
|
151 |
C |
p. |
artikel |
33 |
Optimized dual access control for cloud-based data storage and distribution using global-context residual recurrent neural network
|
Rafi, Shaik Mohammad |
|
|
151 |
C |
p. |
artikel |
34 |
PatchView: Multi-modality detection of security patches
|
Farhi, Nitzan |
|
|
151 |
C |
p. |
artikel |
35 |
Realistic and balanced automated threat emulation
|
Holm, Hannes |
|
|
151 |
C |
p. |
artikel |
36 |
Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses
|
Aledhari, Mohammed |
|
|
151 |
C |
p. |
artikel |
37 |
SCASS: Breaking into SCADA Systems Security
|
d’Ambrosio, Nicola |
|
|
151 |
C |
p. |
artikel |
38 |
Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks
|
Sekhar, J C |
|
|
151 |
C |
p. |
artikel |
39 |
Strengthening cybersecurity: TestCloudIDS dataset and SparkShield algorithm for robust threat detection
|
Vashishtha, Lalit Kumar |
|
|
151 |
C |
p. |
artikel |
40 |
Sublinear smart semantic search based on knowledge graph over encrypted database
|
Li, Jiaxin |
|
|
151 |
C |
p. |
artikel |
41 |
Towards privacy-preserving compressed sensing reconstruction in cloud
|
Xu, Kaidi |
|
|
151 |
C |
p. |
artikel |
42 |
Using approximate matching and machine learning to uncover malicious activity in logs
|
Flynn, Rory |
|
|
151 |
C |
p. |
artikel |