nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A graph-based multifold model for anonymizing data with attributes of multiple types
|
Wang, Li-E. |
|
2018 |
72 |
C |
p. 122-135 |
artikel |
2 |
A kernel stack protection model against attacks from kernel execution units
|
Liu, Wangtong |
|
2018 |
72 |
C |
p. 96-106 |
artikel |
3 |
An efficient privacy mechanism for electronic health records
|
Anjum, Adeel |
|
2018 |
72 |
C |
p. 196-211 |
artikel |
4 |
A safety/security risk analysis approach of Industrial Control Systems: A cyber bowtie – combining new version of attack tree with bowtie analysis
|
Abdo, H. |
|
2018 |
72 |
C |
p. 175-195 |
artikel |
5 |
A survey on technical threat intelligence in the age of sophisticated cyber attacks
|
Tounsi, Wiem |
|
2018 |
72 |
C |
p. 212-233 |
artikel |
6 |
Combating the evolving spammers in online social networks
|
Fu, Qiang |
|
2018 |
72 |
C |
p. 60-73 |
artikel |
7 |
Inadvertent disclosures of inventions in social media affecting patent rights
|
Venugopal, A. Vijayalakshmi |
|
2018 |
72 |
C |
p. 136-144 |
artikel |
8 |
Inside Front Cover - Editorial Board Page/Cover image legend if applicable
|
|
|
2018 |
72 |
C |
p. CO2 |
artikel |
9 |
Light-weight and secure aggregation protocols based on Bloom filters✰
|
Klonowski, Marek |
|
2018 |
72 |
C |
p. 107-121 |
artikel |
10 |
Modeling time, probability, and configuration constraints for continuous cloud service certification
|
Anisetti, M. |
|
2018 |
72 |
C |
p. 234-254 |
artikel |
11 |
Privacy-preserving tabular data publishing: A comprehensive evaluation from web to cloud
|
Abdelhameed, Saad A. |
|
2018 |
72 |
C |
p. 74-95 |
artikel |
12 |
Record route IP traceback: Combating DoS attacks and the variants
|
Nur, Abdullah Yasin |
|
2018 |
72 |
C |
p. 13-25 |
artikel |
13 |
Reviewer Acknowledgement list_2017
|
|
|
2018 |
72 |
C |
p. I-V |
artikel |
14 |
Secure attribute-based data sharing for resource-limited users in cloud computing
|
Li, Jin |
|
2018 |
72 |
C |
p. 1-12 |
artikel |
15 |
Slow rate denial of service attacks against HTTP/2 and detection
|
Tripathi, Nikhil |
|
2018 |
72 |
C |
p. 255-272 |
artikel |
16 |
Survey of publicly available reports on advanced persistent threat actors
|
Lemay, Antoine |
|
2018 |
72 |
C |
p. 26-59 |
artikel |
17 |
TinyVisor: An extensible secure framework on android platforms
|
Shen, Dong |
|
2018 |
72 |
C |
p. 145-162 |
artikel |
18 |
User-friendly deniable storage for mobile devices
|
Chang, Bing |
|
2018 |
72 |
C |
p. 163-174 |
artikel |