nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive review of security vulnerabilities in heavy-duty vehicles: Comparative insights and current research gaps
|
Rahimi, Narges |
|
|
154 |
C |
p. |
artikel |
2 |
An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX
|
Coppolino, Luigi |
|
|
154 |
C |
p. |
artikel |
3 |
A novel proactive and dynamic cyber risk assessment methodology
|
Cheimonidis, Pavlos |
|
|
154 |
C |
p. |
artikel |
4 |
A novel symbolic model for analyzing Internet of Things protocols based on event logic
|
Li, Zehuan |
|
|
154 |
C |
p. |
artikel |
5 |
Bayes-based word weighting for enhanced vulnerability classification in critical infrastructure systems
|
Ben Yahya, Aissa |
|
|
154 |
C |
p. |
artikel |
6 |
Contrasting the optimal resource allocation to cybersecurity controls and cyber insurance using prospect theory versus expected utility theory
|
Joshi, Chaitanya |
|
|
154 |
C |
p. |
artikel |
7 |
Data-free fingerprinting technology for biometric classifiers
|
Ren, Ziting |
|
|
154 |
C |
p. |
artikel |
8 |
DecoyPot: A large language model-driven web API honeypot for realistic attacker engagement
|
Sezgin, Anıl |
|
|
154 |
C |
p. |
artikel |
9 |
Detection of on-manifold adversarial attacks via latent space transformation
|
Al-Fawa’reh, Mohmmad |
|
|
154 |
C |
p. |
artikel |
10 |
DPO-Face: Differential privacy obfuscation for facial sensitive regions
|
Luo, Yuling |
|
|
154 |
C |
p. |
artikel |
11 |
Dynamic anomaly detection using In-band Network Telemetry and GCN for cloud–edge collaborative networks
|
Pei, Jinchuan |
|
|
154 |
C |
p. |
artikel |
12 |
Editorial Board
|
|
|
|
154 |
C |
p. |
artikel |
13 |
Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data
|
Araujo, Iury |
|
|
154 |
C |
p. |
artikel |
14 |
Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts
|
Too, Dominic |
|
|
154 |
C |
p. |
artikel |
15 |
Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems
|
Bellante, Armando |
|
|
154 |
C |
p. |
artikel |
16 |
FC-Trans: Deep learning methods for network intrusion detection in big data environments
|
Zhu, Yuedi |
|
|
154 |
C |
p. |
artikel |
17 |
Frontline responders: Rethinking indicators of compromise for industrial control system security
|
Asiri, Mohammed |
|
|
154 |
C |
p. |
artikel |
18 |
Investigating the experiences of providing cyber security support to small- and medium-sized enterprises
|
Khan, Neeshe |
|
|
154 |
C |
p. |
artikel |
19 |
Leveraging inter-arrival time for efficient threat filtering: A parsimonious approach
|
Sahin, Onur |
|
|
154 |
C |
p. |
artikel |
20 |
LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics
|
Zhu, Tiantian |
|
|
154 |
C |
p. |
artikel |
21 |
LowPTor: A lightweight method for detecting extremely low-proportion darknet traffic
|
Zhang, Qiang |
|
|
154 |
C |
p. |
artikel |
22 |
LR-STGCN: Detecting and mitigating low-rate DDoS attacks in SDN based on spatial–temporal graph neural network
|
Wang, Jin |
|
|
154 |
C |
p. |
artikel |
23 |
Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment
|
Goyal, Nandita |
|
|
154 |
C |
p. |
artikel |
24 |
Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity
|
Xu, Hongsheng |
|
|
154 |
C |
p. |
artikel |
25 |
M3D-FL: Multi-layer Malicious Model Detection for Federated Learning in IoT networks
|
Ben Atia, Okba |
|
|
154 |
C |
p. |
artikel |
26 |
Penterep: Comprehensive penetration testing with adaptable interactive checklists
|
Lazarov, Willi |
|
|
154 |
C |
p. |
artikel |
27 |
Performance analysis of dynamic ABAC systems using a queuing theoretic framework
|
Madkaikar, Gaurav |
|
|
154 |
C |
p. |
artikel |
28 |
Power-ASTNN: A deobfuscation and AST neural network enabled effective detection method for malicious PowerShell Scripts
|
Zhang, Sanfeng |
|
|
154 |
C |
p. |
artikel |
29 |
RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats
|
Khan, Irfan |
|
|
154 |
C |
p. |
artikel |
30 |
Requirements framework for IoT device authentication using behavioral fingerprinting
|
Höfener, Ole |
|
|
154 |
C |
p. |
artikel |
31 |
Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection
|
Liu, Hongle |
|
|
154 |
C |
p. |
artikel |
32 |
Robust and reusable LINDDUN privacy threat knowledge
|
Sion, Laurens |
|
|
154 |
C |
p. |
artikel |
33 |
Robust intrusion detection based on personalized federated learning for IoT environment
|
Sun, Shimin |
|
|
154 |
C |
p. |
artikel |
34 |
SecRASP: Next generation web application security protection methodology and framework
|
He, Chenggang |
|
|
154 |
C |
p. |
artikel |
35 |
Security risk assessment in IoT environments: A taxonomy and survey
|
Waqdan, Mofareh |
|
|
154 |
C |
p. |
artikel |
36 |
Semantics-aware location privacy preserving: A differential privacy approach
|
Zou, Dikai |
|
|
154 |
C |
p. |
artikel |
37 |
Surf-Snooping: USB crosstalk leakage attacks on wireless charging
|
Hou, Yue |
|
|
154 |
C |
p. |
artikel |
38 |
Systematic analysis of security advice on the topic of insider threats
|
Stewart, Andrew |
|
|
154 |
C |
p. |
artikel |
39 |
Threat hunting for adversary impact inhibiting system recovery
|
Alsharabi, Naif |
|
|
154 |
C |
p. |
artikel |
40 |
Transformer-based knowledge distillation for explainable intrusion detection system
|
AL-Nomasy, Nadiah |
|
|
154 |
C |
p. |
artikel |
41 |
VuldiffFinder: Discovering inconsistencies in unstructured vulnerability information
|
Li, Qindong |
|
|
154 |
C |
p. |
artikel |
42 |
Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity
|
Basha, Nora |
|
|
154 |
C |
p. |
artikel |