nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cybersecurity framework to identify malicious edge device in fog computing and cloud-of-things environments
|
Sohal, Amandeep Singh |
|
|
74 |
C |
p. 340-354 |
artikel |
2 |
ADLES: Specifying, deploying, and sharing hands-on cyber-exercises
|
Conte de Leon, Daniel |
|
|
74 |
C |
p. 12-40 |
artikel |
3 |
A new strategy for improving cyber-attacks evaluation in the context of Tallinn Manual
|
Pipyros, Kosmas |
|
|
74 |
C |
p. 371-383 |
artikel |
4 |
A privacy-enhanced OAuth 2.0 based protocol for Smart City mobile applications
|
Sucasas, Victor |
|
|
74 |
C |
p. 258-274 |
artikel |
5 |
Cloud-of-Things meets Mobility-as-a-Service: An insider threat perspective
|
Callegati, Franco |
|
|
74 |
C |
p. 277-295 |
artikel |
6 |
Composition attack against social network data
|
Medková, Jana |
|
|
74 |
C |
p. 115-129 |
artikel |
7 |
Detecting rogue attacks on commercial wireless Insteon home automation systems
|
Talbot, Christopher M. |
|
|
74 |
C |
p. 296-307 |
artikel |
8 |
Domain Isolated Kernel: A lightweight sandbox for untrusted kernel extensions
|
Manès, Valentin J.M. |
|
|
74 |
C |
p. 130-143 |
artikel |
9 |
Editorial Board
|
|
|
|
74 |
C |
p. ii |
artikel |
10 |
Enhance virtual-machine-based code obfuscation security through dynamic bytecode scheduling
|
Kuang, Kaiyuan |
|
|
74 |
C |
p. 202-220 |
artikel |
11 |
Evil twins and WPA2 Enterprise: A coming security disaster?
|
Bartoli, Alberto |
|
|
74 |
C |
p. 1-11 |
artikel |
12 |
From big data to knowledge: A spatio-temporal approach to malware detection
|
Mao, Weixuan |
|
|
74 |
C |
p. 167-183 |
artikel |
13 |
Gateway independent user-side wi-fi Evil Twin Attack detection using virtual wireless clients
|
Nakhila, Omar |
|
|
74 |
C |
p. 41-54 |
artikel |
14 |
Improving risk assessment model of cyber security using fuzzy logic inference system
|
Alali, Mansour |
|
|
74 |
C |
p. 323-339 |
artikel |
15 |
Internet- and cloud-of-things cybersecurity research challenges and advances
|
Choo, Kim-Kwang Raymond |
|
|
74 |
C |
p. 275-276 |
artikel |
16 |
Multi-source fusion-based security detection method for heterogeneous networks
|
Wu, Hao |
|
|
74 |
C |
p. 55-70 |
artikel |
17 |
On the protection of consumer genomic data in the Internet of Living Things
|
Pizzolante, Raffaele |
|
|
74 |
C |
p. 384-400 |
artikel |
18 |
Packet integrity defense mechanism in OppNets
|
Ahmad, Asma'a |
|
|
74 |
C |
p. 71-93 |
artikel |
19 |
Probabilistic analysis of dynamic malware traces
|
Stiborek, Jan |
|
|
74 |
C |
p. 221-239 |
artikel |
20 |
Program execution analysis in Windows: A study of data sources, their format and comparison of forensic capability
|
Singh, Bhupendra |
|
|
74 |
C |
p. 94-114 |
artikel |
21 |
Ransomware threat success factors, taxonomy, and countermeasures: A survey and research directions
|
Al-rimy, Bander Ali Saleh |
|
|
74 |
C |
p. 144-166 |
artikel |
22 |
Reactive redundancy for data destruction protection (R2D2)
|
Gutierrez, Christopher N. |
|
|
74 |
C |
p. 184-201 |
artikel |
23 |
Recognizing human behaviours in online social networks
|
Amato, Flora |
|
|
74 |
C |
p. 355-370 |
artikel |
24 |
Security threats in Bluetooth technology
|
Hassan, Shaikh Shahriar |
|
|
74 |
C |
p. 308-322 |
artikel |
25 |
Solving Stackelberg security Markov games employing the bargaining Nash approach: Convergence analysis
|
Guerrero, Daniel |
|
|
74 |
C |
p. 240-257 |
artikel |