nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative analysis of incident reporting formats
|
Menges, Florian |
|
|
73 |
C |
p. 87-101 |
artikel |
2 |
A malware detection method based on family behavior graph
|
Ding, Yuxin |
|
|
73 |
C |
p. 73-86 |
artikel |
3 |
A new BRB model for security-state assessment of cloud computing based on the impact of external and internal environments
|
Wei, Hang |
|
|
73 |
C |
p. 207-218 |
artikel |
4 |
A new risk-based authentication management model oriented on user's experience
|
Sepczuk, Mariusz |
|
|
73 |
C |
p. 17-33 |
artikel |
5 |
Automated poisoning attacks and defenses in malware detection systems: An adversarial machine learning approach
|
Chen, Sen |
|
|
73 |
C |
p. 326-344 |
artikel |
6 |
Automatic security policy enforcement in computer systems
|
Adi, Kamel |
|
|
73 |
C |
p. 156-171 |
artikel |
7 |
Correlating human traits and cyber security behavior intentions
|
Gratian, Margaret |
|
|
73 |
C |
p. 345-358 |
artikel |
8 |
Dynamic voice spammers detection using Hidden Markov Model for Voice over Internet Protocol network
|
Vennila, Ganesan |
|
|
73 |
C |
p. 1-16 |
artikel |
9 |
Editorial Board
|
|
|
|
73 |
C |
p. ii |
artikel |
10 |
Efficient auditing for shared data in the cloud with secure user revocation and computations outsourcing
|
Luo, Yuchuan |
|
|
73 |
C |
p. 492-506 |
artikel |
11 |
Efficient dynamic malware analysis using virtual time control mechanics
|
Lin, Chih-Hung |
|
|
73 |
C |
p. 359-373 |
artikel |
12 |
Exploring the effect of uncertainty avoidance on taking voluntary protective security actions
|
Aurigemma, Salvatore |
|
|
73 |
C |
p. 219-234 |
artikel |
13 |
Framework for Reliable Experimental Design (FRED): A research framework to ensure the dependable interpretation of digital data for digital forensics
|
Horsman, Graeme |
|
|
73 |
C |
p. 294-306 |
artikel |
14 |
Goalkeeper: Comprehensive process enforcement from the hypervisor
|
Bushouse, Micah |
|
|
73 |
C |
p. 459-473 |
artikel |
15 |
Intelligent agents defending for an IoT world: A review
|
Coulter, Rory |
|
|
73 |
C |
p. 439-458 |
artikel |
16 |
Linking data and process perspectives for conformance analysis
|
Alizadeh, Mahdi |
|
|
73 |
C |
p. 172-193 |
artikel |
17 |
Location privacy in public access points positioning: An optimization and geometry approach
|
Mao, Yunlong |
|
|
73 |
C |
p. 425-438 |
artikel |
18 |
LPSE: Lightweight password-strength estimation for password meters
|
Guo, Yimin |
|
|
73 |
C |
p. 507-518 |
artikel |
19 |
Malware classification using self organising feature maps and machine activity data
|
Burnap, Pete |
|
|
73 |
C |
p. 399-410 |
artikel |
20 |
MASKER: Masking for privacy-preserving aggregation in the smart grid ecosystem
|
Karopoulos, Georgios |
|
|
73 |
C |
p. 307-325 |
artikel |
21 |
Mobile phishing attacks and defence mechanisms: State of art and open research challenges
|
Goel, Diksha |
|
|
73 |
C |
p. 519-544 |
artikel |
22 |
Network intrusion detection system based on recursive feature addition and bigram technique
|
Hamed, Tarfa |
|
|
73 |
C |
p. 137-155 |
artikel |
23 |
Privacy preserving fine-grained location-based access control for mobile cloud
|
Baseri, Yaser |
|
|
73 |
C |
p. 249-265 |
artikel |
24 |
Process mining and hierarchical clustering to help intrusion alert visualization
|
de Alvarenga, Sean Carlisto |
|
|
73 |
C |
p. 474-491 |
artikel |
25 |
R-Locker: Thwarting ransomware action through a honeyfile-based approach
|
Gómez-Hernández, J.A. |
|
|
73 |
C |
p. 389-398 |
artikel |
26 |
ROPSentry: Runtime defense against ROP attacks using hardware performance counters
|
Das, Sanjeev |
|
|
73 |
C |
p. 374-388 |
artikel |
27 |
Secure provenance using an authenticated data structure approach
|
Jamil, Fuzel |
|
|
73 |
C |
p. 34-56 |
artikel |
28 |
Social engineering in cybersecurity: The evolution of a concept
|
Hatfield, Joseph M. |
|
|
73 |
C |
p. 102-113 |
artikel |
29 |
Sociometrics and observational assessment of teaming and leadership in a cyber security defense competition
|
Buchler, Norbou |
|
|
73 |
C |
p. 114-136 |
artikel |
30 |
Taxonomy of mobile users' security awareness
|
Bitton, Ron |
|
|
73 |
C |
p. 266-293 |
artikel |
31 |
The market's response toward privacy and mass surveillance: The Snowden aftermath
|
Patsakis, Constantinos |
|
|
73 |
C |
p. 194-206 |
artikel |
32 |
The performance cost of software obfuscation for Android applications
|
Zhuang, Yan |
|
|
73 |
C |
p. 57-72 |
artikel |
33 |
Toward a more dependable hybrid analysis of android malware using aspect-oriented programming
|
Ali-Gombe, Aisha I. |
|
|
73 |
C |
p. 235-248 |
artikel |
34 |
UGR‘16: A new dataset for the evaluation of cyclostationarity-based network IDSs
|
Maciá-Fernández, Gabriel |
|
|
73 |
C |
p. 411-424 |
artikel |