nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A closer look into DHCP starvation attack in wireless networks
|
Hubballi, Neminath |
|
2017 |
65 |
C |
p. 387-404 18 p. |
artikel |
2 |
AndroDialysis: Analysis of Android Intent Effectiveness in Malware Detection
|
Feizollah, Ali |
|
2017 |
65 |
C |
p. 121-134 14 p. |
artikel |
3 |
Android resource usage risk assessment using hidden Markov model and online learning
|
Rashidi, Bahman |
|
2017 |
65 |
C |
p. 90-107 18 p. |
artikel |
4 |
Anomaly detection of network-initiated LTE signaling traffic in wireless sensor and actuator networks based on a Hidden semi-Markov Model
|
Bang, June-ho |
|
2017 |
65 |
C |
p. 108-120 13 p. |
artikel |
5 |
Application layer HTTP-GET flood DDoS attacks: Research landscape and challenges
|
Singh, Karanpreet |
|
2017 |
65 |
C |
p. 344-372 29 p. |
artikel |
6 |
A privacy-preserving cancelable iris template generation scheme using decimal encoding and look-up table mapping
|
Dwivedi, Rudresh |
|
2017 |
65 |
C |
p. 373-386 14 p. |
artikel |
7 |
A survey of cloud computing data integrity schemes: Design challenges, taxonomy and future trends
|
Zafar, Faheem |
|
2017 |
65 |
C |
p. 29-49 21 p. |
artikel |
8 |
A survey of intrusion detection systems based on ensemble and hybrid classifiers
|
Aburomman, Abdulla Amin |
|
2017 |
65 |
C |
p. 135-152 18 p. |
artikel |
9 |
Contents
|
|
|
2017 |
65 |
C |
p. iii-iv nvt p. |
artikel |
10 |
Context- and bias-free probabilistic mission impact assessment
|
Motzek, Alexander |
|
2017 |
65 |
C |
p. 166-186 21 p. |
artikel |
11 |
Defense against packet collusion attacks in opportunistic networks
|
Alajeely, Majeed |
|
2017 |
65 |
C |
p. 269-282 14 p. |
artikel |
12 |
Detection of network anomalies using Improved-MSPCA with sketches
|
Chen, Zhaomin |
|
2017 |
65 |
C |
p. 314-328 15 p. |
artikel |
13 |
DroidNative: Automating and optimizing detection of Android native code malware variants
|
Alam, Shahid |
|
2017 |
65 |
C |
p. 230-246 17 p. |
artikel |
14 |
Efficient integrity verification of replicated data in cloud computing system
|
Yi, Mingxu |
|
2017 |
65 |
C |
p. 202-212 11 p. |
artikel |
15 |
Exploring the learning capabilities of convolutional neural networks for robust image watermarking
|
Kandi, Haribabu |
|
2017 |
65 |
C |
p. 247-268 22 p. |
artikel |
16 |
Formal modelling and analysis of receipt-free auction protocols in applied pi
|
Dong, Naipeng |
|
2017 |
65 |
C |
p. 405-432 28 p. |
artikel |
17 |
IFC - Editorial Board
|
|
|
2017 |
65 |
C |
p. CO2- 1 p. |
artikel |
18 |
Information systems continuity process: Conceptual foundations for the study of the “social”
|
Niemimaa, Marko |
|
2017 |
65 |
C |
p. 1-13 13 p. |
artikel |
19 |
Introducing cybernomics: A unifying economic framework for measuring cyber risk
|
Ruan, Keyun |
|
2017 |
65 |
C |
p. 77-89 13 p. |
artikel |
20 |
Introducing OSSF: A framework for online service cybersecurity risk management
|
Meszaros, Jan |
|
2017 |
65 |
C |
p. 300-313 14 p. |
artikel |
21 |
Mind your SMSes: Mitigating social engineering in second factor authentication
|
Siadati, Hossein |
|
2017 |
65 |
C |
p. 14-28 15 p. |
artikel |
22 |
Modeling and analysis of identity threat behaviors through text mining of identity theft stories
|
Nokhbeh Zaeem, Razieh |
|
2017 |
65 |
C |
p. 50-63 14 p. |
artikel |
23 |
NFD: Non-technical loss fraud detection in Smart Grid
|
Han, Wenlin |
|
2017 |
65 |
C |
p. 187-201 15 p. |
artikel |
24 |
P2P routing table poisoning: A quorum-based sanitizing approach
|
Ismail, Hatem |
|
2017 |
65 |
C |
p. 283-299 17 p. |
artikel |
25 |
Profiling cybersecurity competition participants: Self-efficacy, decision-making and interests predict effectiveness of competitions as a recruitment tool
|
Bashir, Masooda |
|
2017 |
65 |
C |
p. 153-165 13 p. |
artikel |
26 |
The role of information security learning and individual factors in disclosing patients' health information
|
Park, Eun Hee |
|
2017 |
65 |
C |
p. 64-76 13 p. |
artikel |
27 |
Towards enhancing click-draw based graphical passwords using multi-touch behaviours on smartphones
|
Meng, Weizhi |
|
2017 |
65 |
C |
p. 213-229 17 p. |
artikel |
28 |
vmOS: A virtualization-based, secure desktop system
|
Liang, Hongliang |
|
2017 |
65 |
C |
p. 329-343 15 p. |
artikel |