Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cyber security data triage operation retrieval system Zhong, Chen
2018
76 C p. 12-31
artikel
2 An efficient intrusion detection in resource-constrained mobile ad-hoc networks Bouhaddi, Myria
2018
76 C p. 156-177
artikel
3 A new methodology toward effectively assessing data center sustainability Lykou, Georgia
2018
76 C p. 327-340
artikel
4 An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives Amigud, Alexander
2018
76 C p. 50-70
artikel
5 A survey of Android exploits in the wild Meng, Huasong
2018
76 C p. 71-91
artikel
6 A systematic survey on multi-step attack detection Navarro, Julio
2018
76 C p. 214-249
artikel
7 A training-resistant anomaly detection system Muller, Steve
2018
76 C p. 1-11
artikel
8 Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning Nguyen, Minh Hai
2018
76 C p. 128-155
artikel
9 AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo Wei, Zhuo
2018
76 C p. 341-353
artikel
10 Confirmation of wormhole attack in MANETs using honeypot Tiruvakadu, Divya Sai Keerthi
2018
76 C p. 32-49
artikel
11 Deadline scheduling algorithm for sustainable computing in Hadoop environment Varga, Mihai
2018
76 C p. 354-366
artikel
12 Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework Heartfield, Ryan
2018
76 C p. 101-127
artikel
13 Editorial Board 2018
76 C p. ii
artikel
14 Editorial: Security and privacy protection vs sustainable development Bertino, Elisa
2018
76 C p. 250-251
artikel
15 Experimental large-scale review of attractors for detection of potentially unwanted applications Stavova, Vlasta
2018
76 C p. 92-100
artikel
16 JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones Meng, Weizhi
2018
76 C p. 252-264
artikel
17 Machine learning and semantic analysis of in-game chat for cyberbullying Murnion, Shane
2018
76 C p. 197-213
artikel
18 Resource efficiency, privacy and security by design: A first experience on enterprise servers and data storage products triggered by a policy process Polverini, D.
2018
76 C p. 295-310
artikel
19 Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition Al-Haj Baddar, Sherenaz
2018
76 C p. 311-326
artikel
20 The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure Tudor, Valentin
2018
76 C p. 178-196
artikel
21 Twitter spam detection: Survey of new approaches and comparative study Wu, Tingmin
2018
76 C p. 265-284
artikel
22 Visual Question Authentication Protocol (VQAP) Toor, Andeep S.
2018
76 C p. 285-294
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland