Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A decision-making framework for user authentication using keystroke dynamics Medvedev, Viktor

155 C p.
artikel
2 A malware traffic detection method based on Victim-Attacker interaction patterns Qu, Yanze

155 C p.
artikel
3 An evolutionary wrapper to support intrusion detection system configuration Maldonado, Javier

155 C p.
artikel
4 Anomalous identity recognition model based on vehicle driving characteristic verification in typical scenarios Chen, Xing

155 C p.
artikel
5 A survey on security and privacy issues in wearable health monitoring devices Zhang, Bonan

155 C p.
artikel
6 Automated penetration testing: Formalization and realization Skandylas, Charilaos

155 C p.
artikel
7 Can individual differences in cognitive capacity predict cybersecurity performance? Cole, Kelly A

155 C p.
artikel
8 DFirmSan: A lightweight dynamic memory sanitizer for Linux-based firmware Yang, Shanquan

155 C p.
artikel
9 Editorial Board
155 C p.
artikel
10 End-to-end anomaly detection of service function chain through multi-source data in cloud-native systems Chen, Xuefei

155 C p.
artikel
11 Exploring capacitive swipe gesture for user authentication using a new large dataset K.C., Kiran

155 C p.
artikel
12 FLADEN: Federated Learning for Anomaly DEtection in IoT Networks Hendaoui, Fatma

155 C p.
artikel
13 HScheduler: An execution history-based seed scheduling strategy for hardware fuzzing Guo, Zihui

155 C p.
artikel
14 Industrial control system intrusion detection method based on belief rule base with gradient descent Li, Jinyuan

155 C p.
artikel
15 iQUIC: An intelligent framework for defending QUIC connection ID-based DoS attack using advantage actor–critic RL Dey, Debasmita

155 C p.
artikel
16 IR-IDS: A network intrusion detection method based on causal feature selection and explainable model optimization Gao, Yazhuo

155 C p.
artikel
17 LTL-based runtime verification framework for cyber-attack anomaly prediction in cyber–physical systems Akande, Ayodeji James

155 C p.
artikel
18 Privacy preservation techniques through data lifecycle: A comprehensive literature survey Madhusudhanan, Sheema

155 C p.
artikel
19 Protecting machine learning from poisoning attacks: A risk-based approach Bena, Nicola

155 C p.
artikel
20 SAFE-IDS: A privacy-preserving framework for overcoming non-IID challenges in federated intrusion detection ugli, Alimov Abdulboriy Abdulkhay

155 C p.
artikel
21 Securing IoT devices in edge computing through reinforcement learning Kumar, Anit

155 C p.
artikel
22 Securing the Internet of Robotic Things (IoRT) against DDoS Attacks: A Federated Learning with Differential Privacy Clustering Approach Nkoom, Matilda

155 C p.
artikel
23 Towards targeted and universal adversarial attacks against network traffic classification Ding, Ruiyang

155 C p.
artikel
24 Updating Windows malware detectors: Balancing robustness and regression against adversarial EXEmples Kozak, Matous

155 C p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland