Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             31 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accountable, Scalable and DoS-resilient Secure Vehicular Communication Jin, Hongyu

156 C p.
artikel
2 Antivirus applied to Google Chrome's extension malware Pereira, Gabriela Leite

156 C p.
artikel
3 ARLHNIDS-IoT: An accurate and robust lightweight hybrid-NIDS for IoT network security Srivastava, Arpita

156 C p.
artikel
4 Assessing the impact of packing on static machine learning-based malware detection and classification systems Gibert, Daniel

156 C p.
artikel
5 Assessing the usefulness of Data Flow Diagrams for validating security threats Mbaka, Winnie Bahati

156 C p.
artikel
6 CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for KNN-based malware image classification Andriani, Simone

156 C p.
artikel
7 Corrigendum to “Threat hunting for adversary impact inhibiting system recovery” [Computers & Security, Volume 154, July 2025, 104464] Alsharabi, Naif

156 C p.
artikel
8 Covert penetrations: Analyzing and defending SCADA systems from stealth and Hijacking attacks Wali, Syed

156 C p.
artikel
9 Decision tree based invariants for intrusion detection in industrial control system Samiah, Abdul

156 C p.
artikel
10 Deep learning-based prediction of reflection attacks using NetFlow data Chuah, Edward

156 C p.
artikel
11 Detecting Cybercrime in Online Video Gaming Higgs, James

156 C p.
artikel
12 DISTR: Detecting multi-stage IoT botnets through contextual traffic and causal analytics Meng, Fanchao

156 C p.
artikel
13 Editorial Board
156 C p.
artikel
14 Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection Lin, Wanshuang

156 C p.
artikel
15 Feature selection method for network intrusion based on hybrid meta-heuristic dynamic optimization algorithm Gong, XingYu

156 C p.
artikel
16 Implementing and integrating security controls: A practitioners’ perspective Sinan, Maysa

156 C p.
artikel
17 Industrial internet of things fortify: multi-domain feature learning framework with deepdetectnet++ for improved intrusion detection Singh, Kuldeep

156 C p.
artikel
18 Intrusion detection system for autonomous vehicles using sensor spatio-temporal information Liu, Qingxin

156 C p.
artikel
19 Investigating the Impact of Label-flipping Attacks against Federated Learning for Collaborative Intrusion Detection Lavaur, Léo

156 C p.
artikel
20 Light-weight slow-rate attack detection framework for resource-constrained Industrial Cyber–Physical Systems Zahid, Farzana

156 C p.
artikel
21 Multi-dimensional assessment for Android application security based on users’ evaluation Shi, Guang

156 C p.
artikel
22 Network intrusion datasets: A survey, limitations, and recommendations Goldschmidt, Patrik

156 C p.
artikel
23 PM k R: Privacy-preserving multi-keyword top- k reachability query Xu, Ting

156 C p.
artikel
24 Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy Niu, Yutong

156 C p.
artikel
25 Retraction notice to “I Recognize you by Your Steps: Privacy Impact of Pedometer Data” [Computers & Security 124 (2022) 102994] Dietrich, Aljoscha

156 C p.
artikel
26 Safety-security convergence: Automation of IEC 62443-3-2 Da Silva, Mike

156 C p.
artikel
27 Shadow information security practices in organizations: The role of information security transparency, overload, and psychological empowerment Dang-Pham, Duy

156 C p.
artikel
28 The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model Li, Tong

156 C p.
artikel
29 Threat detection in reconfigurable Cyber–Physical Systems through Spatio-Temporal Anomaly Detection using graph attention network Canonico, Roberto

156 C p.
artikel
30 VADP: Visitor-attribute-based adaptive differential privacy for IoMT data sharing Zhang, Shaobo

156 C p.
artikel
31 Who are querying for me? Measuring the dependency and centralization in recursive resolution Luo, Meng

156 C p.
artikel
                             31 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland