Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             34 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparative analysis of incident reporting formats Menges, Florian

73 C p. 87-101
artikel
2 A malware detection method based on family behavior graph Ding, Yuxin

73 C p. 73-86
artikel
3 A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments Wei, Hang

73 C p. 207-218
artikel
4 A new risk-based authentication management model oriented on user's experience Sepczuk, Mariusz

73 C p. 17-33
artikel
5 Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach Chen, Sen

73 C p. 326-344
artikel
6 Automatic security policy enforcement in computer systems Adi, Kamel

73 C p. 156-171
artikel
7 Correlating human traits and cyber security behavior intentions Gratian, Margaret

73 C p. 345-358
artikel
8 Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network Vennila, Ganesan

73 C p. 1-16
artikel
9 Editorial Board
73 C p. ii
artikel
10 Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing Luo, Yuchuan

73 C p. 492-506
artikel
11 Efficient dynamic malware analysis using virtual time control mechanics Lin, Chih-Hung

73 C p. 359-373
artikel
12 Exploring the effect of uncertainty avoidance on taking voluntary protective security actions Aurigemma, Salvatore

73 C p. 219-234
artikel
13 Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics Horsman, Graeme

73 C p. 294-306
artikel
14 Goalkeeper: Comprehensive process enforcement from the hypervisor Bushouse, Micah

73 C p. 459-473
artikel
15 Intelligent agents defending for an IoT world: A review Coulter, Rory

73 C p. 439-458
artikel
16 Linking data and process perspectives for conformance analysis Alizadeh, Mahdi

73 C p. 172-193
artikel
17 Location privacy in public access points positioning: An optimization and geometry approach Mao, Yunlong

73 C p. 425-438
artikel
18 LPSE: Lightweight password-strength estimation for password meters Guo, Yimin

73 C p. 507-518
artikel
19 Malware classification using self organising feature maps and machine activity data Burnap, Pete

73 C p. 399-410
artikel
20 MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem Karopoulos, Georgios

73 C p. 307-325
artikel
21 Mobile phishing attacks and defence mechanisms: State of art and open research challenges Goel, Diksha

73 C p. 519-544
artikel
22 Network intrusion detection system based on recursive feature addition and bigram technique Hamed, Tarfa

73 C p. 137-155
artikel
23 Privacy preserving fine-grained location-based access control for mobile cloud Baseri, Yaser

73 C p. 249-265
artikel
24 Process mining and hierarchical clustering to help intrusion alert visualization de Alvarenga, Sean Carlisto

73 C p. 474-491
artikel
25 R-Locker: Thwarting ransomware action through a honeyfile-based approach Gómez-Hernández, J.A.

73 C p. 389-398
artikel
26 ROPSentry: Runtime defense against ROP attacks using hardware performance counters Das, Sanjeev

73 C p. 374-388
artikel
27 Secure provenance using an authenticated data structure approach Jamil, Fuzel

73 C p. 34-56
artikel
28 Social engineering in cybersecurity: The evolution of a concept Hatfield, Joseph M.

73 C p. 102-113
artikel
29 Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition Buchler, Norbou

73 C p. 114-136
artikel
30 Taxonomy of mobile users' security awareness Bitton, Ron

73 C p. 266-293
artikel
31 The market's response toward privacy and mass surveillance: The Snowden aftermath Patsakis, Constantinos

73 C p. 194-206
artikel
32 The performance cost of software obfuscation for Android applications Zhuang, Yan

73 C p. 57-72
artikel
33 Toward a more dependable hybrid analysis of android malware using aspect-oriented programming Ali-Gombe, Aisha I.

73 C p. 235-248
artikel
34 UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs Maciá-Fernández, Gabriel

73 C p. 411-424
artikel
                             34 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland