nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cyber security data triage operation retrieval system
|
Zhong, Chen |
|
2018 |
76 |
C |
p. 12-31 |
artikel |
2 |
An efficient intrusion detection in resource-constrained mobile ad-hoc networks
|
Bouhaddi, Myria |
|
2018 |
76 |
C |
p. 156-177 |
artikel |
3 |
A new methodology toward effectively assessing data center sustainability
|
Lykou, Georgia |
|
2018 |
76 |
C |
p. 327-340 |
artikel |
4 |
An integrative review of security and integrity strategies in an academic environment: Current understanding and emerging perspectives
|
Amigud, Alexander |
|
2018 |
76 |
C |
p. 50-70 |
artikel |
5 |
A survey of Android exploits in the wild
|
Meng, Huasong |
|
2018 |
76 |
C |
p. 71-91 |
artikel |
6 |
A systematic survey on multi-step attack detection
|
Navarro, Julio |
|
2018 |
76 |
C |
p. 214-249 |
artikel |
7 |
A training-resistant anomaly detection system
|
Muller, Steve |
|
2018 |
76 |
C |
p. 1-11 |
artikel |
8 |
Auto-detection of sophisticated malware using lazy-binding control flow graph and deep learning
|
Nguyen, Minh Hai |
|
2018 |
76 |
C |
p. 128-155 |
artikel |
9 |
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo
|
Wei, Zhuo |
|
2018 |
76 |
C |
p. 341-353 |
artikel |
10 |
Confirmation of wormhole attack in MANETs using honeypot
|
Tiruvakadu, Divya Sai Keerthi |
|
2018 |
76 |
C |
p. 32-49 |
artikel |
11 |
Deadline scheduling algorithm for sustainable computing in Hadoop environment
|
Varga, Mihai |
|
2018 |
76 |
C |
p. 354-366 |
artikel |
12 |
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
|
Heartfield, Ryan |
|
2018 |
76 |
C |
p. 101-127 |
artikel |
13 |
Editorial Board
|
|
|
2018 |
76 |
C |
p. ii |
artikel |
14 |
Editorial: Security and privacy protection vs sustainable development
|
Bertino, Elisa |
|
2018 |
76 |
C |
p. 250-251 |
artikel |
15 |
Experimental large-scale review of attractors for detection of potentially unwanted applications
|
Stavova, Vlasta |
|
2018 |
76 |
C |
p. 92-100 |
artikel |
16 |
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones
|
Meng, Weizhi |
|
2018 |
76 |
C |
p. 252-264 |
artikel |
17 |
Machine learning and semantic analysis of in-game chat for cyberbullying
|
Murnion, Shane |
|
2018 |
76 |
C |
p. 197-213 |
artikel |
18 |
Resource efficiency, privacy and security by design: A first experience on enterprise servers and data storage products triggered by a policy process
|
Polverini, D. |
|
2018 |
76 |
C |
p. 295-310 |
artikel |
19 |
Saving energy in aggressive intrusion detection through dynamic latency sensitivity recognition
|
Al-Haj Baddar, Sherenaz |
|
2018 |
76 |
C |
p. 311-326 |
artikel |
20 |
The influence of dataset characteristics on privacy preserving methods in the advanced metering infrastructure
|
Tudor, Valentin |
|
2018 |
76 |
C |
p. 178-196 |
artikel |
21 |
Twitter spam detection: Survey of new approaches and comparative study
|
Wu, Tingmin |
|
2018 |
76 |
C |
p. 265-284 |
artikel |
22 |
Visual Question Authentication Protocol (VQAP)
|
Toor, Andeep S. |
|
2018 |
76 |
C |
p. 285-294 |
artikel |