nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A decision-making framework for user authentication using keystroke dynamics
|
Medvedev, Viktor |
|
|
155 |
C |
p. |
artikel |
2 |
A malware traffic detection method based on Victim-Attacker interaction patterns
|
Qu, Yanze |
|
|
155 |
C |
p. |
artikel |
3 |
An evolutionary wrapper to support intrusion detection system configuration
|
Maldonado, Javier |
|
|
155 |
C |
p. |
artikel |
4 |
Anomalous identity recognition model based on vehicle driving characteristic verification in typical scenarios
|
Chen, Xing |
|
|
155 |
C |
p. |
artikel |
5 |
A survey on security and privacy issues in wearable health monitoring devices
|
Zhang, Bonan |
|
|
155 |
C |
p. |
artikel |
6 |
Automated penetration testing: Formalization and realization
|
Skandylas, Charilaos |
|
|
155 |
C |
p. |
artikel |
7 |
Can individual differences in cognitive capacity predict cybersecurity performance?
|
Cole, Kelly A |
|
|
155 |
C |
p. |
artikel |
8 |
DFirmSan: A lightweight dynamic memory sanitizer for Linux-based firmware
|
Yang, Shanquan |
|
|
155 |
C |
p. |
artikel |
9 |
Editorial Board
|
|
|
|
155 |
C |
p. |
artikel |
10 |
End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems
|
Chen, Xuefei |
|
|
155 |
C |
p. |
artikel |
11 |
Exploring capacitive swipe gesture for user authentication using a new large dataset
|
K.C., Kiran |
|
|
155 |
C |
p. |
artikel |
12 |
FLADEN: Federated Learning for Anomaly DEtection in IoT Networks
|
Hendaoui, Fatma |
|
|
155 |
C |
p. |
artikel |
13 |
HScheduler: An execution history-based seed scheduling strategy for hardware fuzzing
|
Guo, Zihui |
|
|
155 |
C |
p. |
artikel |
14 |
Industrial control system intrusion detection method based on belief rule base with gradient descent
|
Li, Jinyuan |
|
|
155 |
C |
p. |
artikel |
15 |
iQUIC: An intelligent framework for defending QUIC connection ID-based DoS attack using advantage actor–critic RL
|
Dey, Debasmita |
|
|
155 |
C |
p. |
artikel |
16 |
IR-IDS: A network intrusion detection method based on causal feature selection and explainable model optimization
|
Gao, Yazhuo |
|
|
155 |
C |
p. |
artikel |
17 |
LTL-based runtime verification framework for cyber-attack anomaly prediction in cyber–physical systems
|
Akande, Ayodeji James |
|
|
155 |
C |
p. |
artikel |
18 |
Privacy preservation techniques through data lifecycle: A comprehensive literature survey
|
Madhusudhanan, Sheema |
|
|
155 |
C |
p. |
artikel |
19 |
Protecting machine learning from poisoning attacks: A risk-based approach
|
Bena, Nicola |
|
|
155 |
C |
p. |
artikel |
20 |
SAFE-IDS: A privacy-preserving framework for overcoming non-IID challenges in federated intrusion detection
|
ugli, Alimov Abdulboriy Abdulkhay |
|
|
155 |
C |
p. |
artikel |
21 |
Securing IoT devices in edge computing through reinforcement learning
|
Kumar, Anit |
|
|
155 |
C |
p. |
artikel |
22 |
Securing the Internet of Robotic Things (IoRT) against DDoS Attacks: A Federated Learning with Differential Privacy Clustering Approach
|
Nkoom, Matilda |
|
|
155 |
C |
p. |
artikel |
23 |
Towards targeted and universal adversarial attacks against network traffic classification
|
Ding, Ruiyang |
|
|
155 |
C |
p. |
artikel |
24 |
Updating Windows malware detectors: Balancing robustness and regression against adversarial EXEmples
|
Kozak, Matous |
|
|
155 |
C |
p. |
artikel |