nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable, Scalable and DoS-resilient Secure Vehicular Communication
|
Jin, Hongyu |
|
|
156 |
C |
p. |
artikel |
2 |
Antivirus applied to Google Chrome's extension malware
|
Pereira, Gabriela Leite |
|
|
156 |
C |
p. |
artikel |
3 |
ARLHNIDS-IoT: An accurate and robust lightweight hybrid-NIDS for IoT network security
|
Srivastava, Arpita |
|
|
156 |
C |
p. |
artikel |
4 |
Assessing the impact of packing on static machine learning-based malware detection and classification systems
|
Gibert, Daniel |
|
|
156 |
C |
p. |
artikel |
5 |
Assessing the usefulness of Data Flow Diagrams for validating security threats
|
Mbaka, Winnie Bahati |
|
|
156 |
C |
p. |
artikel |
6 |
CNN-AutoMIC: Combining convolutional neural network and autoencoder to learn non-linear features for KNN-based malware image classification
|
Andriani, Simone |
|
|
156 |
C |
p. |
artikel |
7 |
Corrigendum to “Threat hunting for adversary impact inhibiting system recovery” [Computers & Security, Volume 154, July 2025, 104464]
|
Alsharabi, Naif |
|
|
156 |
C |
p. |
artikel |
8 |
Covert penetrations: Analyzing and defending SCADA systems from stealth and Hijacking attacks
|
Wali, Syed |
|
|
156 |
C |
p. |
artikel |
9 |
Decision tree based invariants for intrusion detection in industrial control system
|
Samiah, Abdul |
|
|
156 |
C |
p. |
artikel |
10 |
Deep learning-based prediction of reflection attacks using NetFlow data
|
Chuah, Edward |
|
|
156 |
C |
p. |
artikel |
11 |
Detecting Cybercrime in Online Video Gaming
|
Higgs, James |
|
|
156 |
C |
p. |
artikel |
12 |
DISTR: Detecting multi-stage IoT botnets through contextual traffic and causal analytics
|
Meng, Fanchao |
|
|
156 |
C |
p. |
artikel |
13 |
Editorial Board
|
|
|
|
156 |
C |
p. |
artikel |
14 |
Enhancing encrypted traffic analysis via source APIs: A robust approach for malicious traffic detection
|
Lin, Wanshuang |
|
|
156 |
C |
p. |
artikel |
15 |
Feature selection method for network intrusion based on hybrid meta-heuristic dynamic optimization algorithm
|
Gong, XingYu |
|
|
156 |
C |
p. |
artikel |
16 |
Implementing and integrating security controls: A practitioners’ perspective
|
Sinan, Maysa |
|
|
156 |
C |
p. |
artikel |
17 |
Industrial internet of things fortify: multi-domain feature learning framework with deepdetectnet++ for improved intrusion detection
|
Singh, Kuldeep |
|
|
156 |
C |
p. |
artikel |
18 |
Intrusion detection system for autonomous vehicles using sensor spatio-temporal information
|
Liu, Qingxin |
|
|
156 |
C |
p. |
artikel |
19 |
Investigating the Impact of Label-flipping Attacks against Federated Learning for Collaborative Intrusion Detection
|
Lavaur, Léo |
|
|
156 |
C |
p. |
artikel |
20 |
Light-weight slow-rate attack detection framework for resource-constrained Industrial Cyber–Physical Systems
|
Zahid, Farzana |
|
|
156 |
C |
p. |
artikel |
21 |
Multi-dimensional assessment for Android application security based on users’ evaluation
|
Shi, Guang |
|
|
156 |
C |
p. |
artikel |
22 |
Network intrusion datasets: A survey, limitations, and recommendations
|
Goldschmidt, Patrik |
|
|
156 |
C |
p. |
artikel |
23 |
PM k R: Privacy-preserving multi-keyword top- k reachability query
|
Xu, Ting |
|
|
156 |
C |
p. |
artikel |
24 |
Privacy-preserving spatiotemporal trajectory generalization publishing scheme with differential privacy
|
Niu, Yutong |
|
|
156 |
C |
p. |
artikel |
25 |
Retraction notice to “I Recognize you by Your Steps: Privacy Impact of Pedometer Data” [Computers & Security 124 (2022) 102994]
|
Dietrich, Aljoscha |
|
|
156 |
C |
p. |
artikel |
26 |
Safety-security convergence: Automation of IEC 62443-3-2
|
Da Silva, Mike |
|
|
156 |
C |
p. |
artikel |
27 |
Shadow information security practices in organizations: The role of information security transparency, overload, and psychological empowerment
|
Dang-Pham, Duy |
|
|
156 |
C |
p. |
artikel |
28 |
The Security Awareness Adventure: A serious game for security awareness training utilizing a state transition system and a probabilistic model
|
Li, Tong |
|
|
156 |
C |
p. |
artikel |
29 |
Threat detection in reconfigurable Cyber–Physical Systems through Spatio-Temporal Anomaly Detection using graph attention network
|
Canonico, Roberto |
|
|
156 |
C |
p. |
artikel |
30 |
VADP: Visitor-attribute-based adaptive differential privacy for IoMT data sharing
|
Zhang, Shaobo |
|
|
156 |
C |
p. |
artikel |
31 |
Who are querying for me? Measuring the dependency and centralization in recursive resolution
|
Luo, Meng |
|
|
156 |
C |
p. |
artikel |