Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             42 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive review of security vulnerabilities in heavy-duty vehicles: Comparative insights and current research gaps Rahimi, Narges

154 C p.
artikel
2 An experimental evaluation of TEE technology: Benchmarking transparent approaches based on SGX, SEV, and TDX Coppolino, Luigi

154 C p.
artikel
3 A novel proactive and dynamic cyber risk assessment methodology Cheimonidis, Pavlos

154 C p.
artikel
4 A novel symbolic model for analyzing Internet of Things protocols based on event logic Li, Zehuan

154 C p.
artikel
5 Bayes-based word weighting for enhanced vulnerability classification in critical infrastructure systems Ben Yahya, Aissa

154 C p.
artikel
6 Contrasting the optimal resource allocation to cybersecurity controls and cyber insurance using prospect theory versus expected utility theory Joshi, Chaitanya

154 C p.
artikel
7 Data-free fingerprinting technology for biometric classifiers Ren, Ziting

154 C p.
artikel
8 DecoyPot: A large language model-driven web API honeypot for realistic attacker engagement Sezgin, Anıl

154 C p.
artikel
9 Detection of on-manifold adversarial attacks via latent space transformation Al-Fawa’reh, Mohmmad

154 C p.
artikel
10 DPO-Face: Differential privacy obfuscation for facial sensitive regions Luo, Yuling

154 C p.
artikel
11 Dynamic anomaly detection using In-band Network Telemetry and GCN for cloud–edge collaborative networks Pei, Jinchuan

154 C p.
artikel
12 Editorial Board
154 C p.
artikel
13 Enhancing intrusion detection in containerized services: Assessing machine learning models and an advanced representation for system call data Araujo, Iury

154 C p.
artikel
14 Enhancing maritime cyber situational awareness: A cybersecurity visualisation for non-experts Too, Dominic

154 C p.
artikel
15 Evaluating the potential of quantum machine learning in cybersecurity: A case-study on PCA-based intrusion detection systems Bellante, Armando

154 C p.
artikel
16 FC-Trans: Deep learning methods for network intrusion detection in big data environments Zhu, Yuedi

154 C p.
artikel
17 Frontline responders: Rethinking indicators of compromise for industrial control system security Asiri, Mohammed

154 C p.
artikel
18 Investigating the experiences of providing cyber security support to small- and medium-sized enterprises Khan, Neeshe

154 C p.
artikel
19 Leveraging inter-arrival time for efficient threat filtering: A parsimonious approach Sahin, Onur

154 C p.
artikel
20 LinTracer: An efficient tracking system for cyberattack chains fusing entity and event semantics Zhu, Tiantian

154 C p.
artikel
21 LowPTor: A lightweight method for detecting extremely low-proportion darknet traffic Zhang, Qiang

154 C p.
artikel
22 LR-STGCN: Detecting and mitigating low-rate DDoS attacks in SDN based on spatial–temporal graph neural network Wang, Jin

154 C p.
artikel
23 Malicious behavior identification using Dual Attention Based dense bi-directional gated recurrent network in the cloud computing environment Goyal, Nandita

154 C p.
artikel
24 Malicious SMS detection using ensemble learning and SMOTE to improve mobile cybersecurity Xu, Hongsheng

154 C p.
artikel
25 M3D-FL: Multi-layer Malicious Model Detection for Federated Learning in IoT networks Ben Atia, Okba

154 C p.
artikel
26 Penterep: Comprehensive penetration testing with adaptable interactive checklists Lazarov, Willi

154 C p.
artikel
27 Performance analysis of dynamic ABAC systems using a queuing theoretic framework Madkaikar, Gaurav

154 C p.
artikel
28 Power-ASTNN: A deobfuscation and AST neural network enabled effective detection method for malicious PowerShell Scripts Zhang, Sanfeng

154 C p.
artikel
29 RADIANT: Reactive Autoencoder Defense for Industrial Adversarial Network Threats Khan, Irfan

154 C p.
artikel
30 Requirements framework for IoT device authentication using behavioral fingerprinting Höfener, Ole

154 C p.
artikel
31 Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection Liu, Hongle

154 C p.
artikel
32 Robust and reusable LINDDUN privacy threat knowledge Sion, Laurens

154 C p.
artikel
33 Robust intrusion detection based on personalized federated learning for IoT environment Sun, Shimin

154 C p.
artikel
34 SecRASP: Next generation web application security protection methodology and framework He, Chenggang

154 C p.
artikel
35 Security risk assessment in IoT environments: A taxonomy and survey Waqdan, Mofareh

154 C p.
artikel
36 Semantics-aware location privacy preserving: A differential privacy approach Zou, Dikai

154 C p.
artikel
37 Surf-Snooping: USB crosstalk leakage attacks on wireless charging Hou, Yue

154 C p.
artikel
38 Systematic analysis of security advice on the topic of insider threats Stewart, Andrew

154 C p.
artikel
39 Threat hunting for adversary impact inhibiting system recovery Alsharabi, Naif

154 C p.
artikel
40 Transformer-based knowledge distillation for explainable intrusion detection system AL-Nomasy, Nadiah

154 C p.
artikel
41 VuldiffFinder: Discovering inconsistencies in unstructured vulnerability information Li, Qindong

154 C p.
artikel
42 Wavelet-based CSI reconstruction for improved wireless security through channel reciprocity Basha, Nora

154 C p.
artikel
                             42 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland