Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A case of smart devices that compromise home cybersecurity Bonaventura, Davide

151 C p.
artikel
2 A comprehensive review of current trends, challenges, and opportunities in text data privacy Shahriar, Sakib

151 C p.
artikel
3 “Alexa, how do you protect my privacy?” A quantitative study of user preferences and requirements about smart speaker privacy settings Hernández Acosta, Luca

151 C p.
artikel
4 A model for information security vulnerability awareness Mejias, Roberto J.

151 C p.
artikel
5 Analysis of human reliability in detecting GPS spoofing on ECDIS in congested waterways under evidential reasoning and HEART approach Kurt, Yasin Burak

151 C p.
artikel
6 An anomaly detection model for in-vehicle networks based on lightweight convolution with spectral residuals Luo, Feng

151 C p.
artikel
7 A novel framework to identify cybersecurity challenges and opportunities for organizational digital transformation in the cloud Liang, Xueping

151 C p.
artikel
8 A Segmented Stack Randomization for bare-metal IoT devices Jung, Junho

151 C p.
artikel
9 Comparative analysis of EU-based cybersecurity skills frameworks Almeida, Fernando

151 C p.
artikel
10 CO-STOP: A robust P4-powered adaptive framework for comprehensive detection and mitigation of coordinated and multi-faceted attacks in SD-IoT networks El-Sayed, Ameer

151 C p.
artikel
11 CRO-PUF: Resilience to machine learning and differential power attacks Miah, Arafat

151 C p.
artikel
12 Current research on Internet of Things (IoT) security protocols: A survey Mishra, Raghavendra

151 C p.
artikel
13 Design and implementation of a closed loop time delay feedback control (CLTD-FC) system for mitigating DDos attacks Huang, Kaijiao

151 C p.
artikel
14 Detection and prevention of spear phishing attacks: A comprehensive survey Birthriya, Santosh Kumar

151 C p.
artikel
15 Dynamic privacy loss management: The innovation of α-confidence differential privacy filters and odometers Qin, Zhongyuan

151 C p.
artikel
16 Editorial Board
151 C p.
artikel
17 Enhancing can security with ML-based IDS: Strategies and efficacies against adversarial attacks Lin, Ying-Dar

151 C p.
artikel
18 Erasure code backup system for data security Lee, Rong-Teng

151 C p.
artikel
19 Exposure of software vulnerabilities on Twitter: Analyzing vendors’ behavior of releasing software patches Syed, Romilla

151 C p.
artikel
20 FedMSE: Semi-supervised federated learning approach for IoT network intrusion detection Nguyen, Van Tuan

151 C p.
artikel
21 FineGCP: Fine-grained dependency graph community partitioning for attack investigation Wang, Zhaoyang

151 C p.
artikel
22 Gamifying information security: Adversarial risk exploration for IT/OT infrastructures Luh, Robert

151 C p.
artikel
23 GraphFVD: Property graph-based fine-grained vulnerability detection Shao, Miaomiao

151 C p.
artikel
24 HAE-HRL: A network intrusion detection system utilizing a novel autoencoder and a hybrid enhanced LSTM-CNN-based residual network Xue, Yankun

151 C p.
artikel
25 How to decrypt files encrypted by Rhysida ransomware without the attacker’s private key Kim, Giyoon

151 C p.
artikel
26 IDPFilter: Mitigating interdependent privacy issues in third-party apps Liu, Shuaishuai

151 C p.
artikel
27 Investigating the impact of feature selection on adversarial transferability in intrusion detection system Adeke, James Msughter

151 C p.
artikel
28 K-Salp Swarm Anomaly Detection (K-SAD): A novel clustering and threshold-based approach for cybersecurity applications Kılıç, Vahide Nida

151 C p.
artikel
29 Mitigating security stress: Exploring the contingent role of collaborative communication in enhancing information security compliance Hwang, Inho

151 C p.
artikel
30 Multidimensional categorical data collection under shuffled differential privacy Wang, Ning

151 C p.
artikel
31 Multi-probability sampling-based detection of malicious switching nodes in SDN Xiao, Jingxu

151 C p.
artikel
32 Neurosymbolic learning and domain knowledge-driven explainable AI for enhanced IoT network attack detection and response Kalutharage, Chathuranga Sampath

151 C p.
artikel
33 Optimized dual access control for cloud-based data storage and distribution using global-context residual recurrent neural network Rafi, Shaik Mohammad

151 C p.
artikel
34 PatchView: Multi-modality detection of security patches Farhi, Nitzan

151 C p.
artikel
35 Realistic and balanced automated threat emulation Holm, Hannes

151 C p.
artikel
36 Safeguarding connected autonomous vehicle communication: Protocols, intra- and inter-vehicular attacks and defenses Aledhari, Mohammed

151 C p.
artikel
37 SCASS: Breaking into SCADA Systems Security d’Ambrosio, Nicola

151 C p.
artikel
38 Stochastic gradient boosted distributed decision trees security approach for detecting cyber anomalies and classifying multiclass cyber-attacks Sekhar, J C

151 C p.
artikel
39 Strengthening cybersecurity: TestCloudIDS dataset and SparkShield algorithm for robust threat detection Vashishtha, Lalit Kumar

151 C p.
artikel
40 Sublinear smart semantic search based on knowledge graph over encrypted database Li, Jiaxin

151 C p.
artikel
41 Towards privacy-preserving compressed sensing reconstruction in cloud Xu, Kaidi

151 C p.
artikel
42 Using approximate matching and machine learning to uncover malicious activity in logs Flynn, Rory

151 C p.
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland