Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments Sohal, Amandeep Singh

74 C p. 340-354
artikel
2 ADLES: Specifying, deploying, and sharing hands-on cyber-exercises Conte de Leon, Daniel

74 C p. 12-40
artikel
3 A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual Pipyros, Kosmas

74 C p. 371-383
artikel
4 A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications Sucasas, Victor

74 C p. 258-274
artikel
5 Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective Callegati, Franco

74 C p. 277-295
artikel
6 Composition attack against social network data Medková, Jana

74 C p. 115-129
artikel
7 Detecting rogue attacks on commercial wireless Insteon home automation systems Talbot, Christopher M.

74 C p. 296-307
artikel
8 Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions Manès, Valentin J.M.

74 C p. 130-143
artikel
9 Editorial Board
74 C p. ii
artikel
10 Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling Kuang, Kaiyuan

74 C p. 202-220
artikel
11 Evil twins and WPA2 Enterprise: A coming security disaster? Bartoli, Alberto

74 C p. 1-11
artikel
12 From big data to knowledge: A spatio-temporal approach to malware detection Mao, Weixuan

74 C p. 167-183
artikel
13 Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients Nakhila, Omar

74 C p. 41-54
artikel
14 Improving risk assessment model of cyber security using fuzzy logic inference system Alali, Mansour

74 C p. 323-339
artikel
15 Internet- and cloud-of-things cybersecurity research challenges and advances Choo, Kim-Kwang Raymond

74 C p. 275-276
artikel
16 Multi-source fusion-based security detection method for heterogeneous networks Wu, Hao

74 C p. 55-70
artikel
17 On the protection of consumer genomic data in the Internet of Living Things Pizzolante, Raffaele

74 C p. 384-400
artikel
18 Packet integrity defense mechanism in OppNets Ahmad, Asma'a

74 C p. 71-93
artikel
19 Probabilistic analysis of dynamic malware traces Stiborek, Jan

74 C p. 221-239
artikel
20 Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability Singh, Bhupendra

74 C p. 94-114
artikel
21 Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions Al-rimy, Bander Ali Saleh

74 C p. 144-166
artikel
22 Reactive redundancy for data destruction protection (R2D2) Gutierrez, Christopher N.

74 C p. 184-201
artikel
23 Recognizing human behaviours in online social networks Amato, Flora

74 C p. 355-370
artikel
24 Security threats in Bluetooth technology Hassan, Shaikh Shahriar

74 C p. 308-322
artikel
25 Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis Guerrero, Daniel

74 C p. 240-257
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland