nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A context-aware system to secure enterprise content: Incorporating reliability specifiers
|
Oluwatimi, Oyindamola |
|
|
77 |
C |
p. 162-178 |
artikel |
2 |
A dynamic per-context verification of kernel address integrity from external monitors
|
Lee, Hojoon |
|
|
77 |
C |
p. 824-837 |
artikel |
3 |
A multi-channel approach through fusion of audio for detecting video inter-frame forgery
|
Huang, Tianqiang |
|
|
77 |
C |
p. 412-426 |
artikel |
4 |
A new secure and privacy preserved protocol for IEEE802.11s networks
|
Abouhogail, Reham Abdellatif |
|
|
77 |
C |
p. 745-755 |
artikel |
5 |
An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks
|
Sundararaj, Vinu |
|
|
77 |
C |
p. 277-288 |
artikel |
6 |
A privacy-aware decentralized and personalized reputation system
|
Bag, Samiran |
|
|
77 |
C |
p. 514-530 |
artikel |
7 |
A review of standards with cybersecurity requirements for smart grid
|
Leszczyna, Rafał |
|
|
77 |
C |
p. 262-276 |
artikel |
8 |
A self-protecting agents based model for high-performance mobile-cloud computing
|
Angin, Pelin |
|
|
77 |
C |
p. 380-396 |
artikel |
9 |
A survey of similarities in banking malware behaviours
|
Black, Paul |
|
|
77 |
C |
p. 756-772 |
artikel |
10 |
A survey on electronic coupons
|
Ferrer-Gomila, Josep-Lluís |
|
|
77 |
C |
p. 106-127 |
artikel |
11 |
A taxonomy on misbehaving nodes in delay tolerant networks
|
Khalid, Waqar |
|
|
77 |
C |
p. 442-471 |
artikel |
12 |
Attack detection/prevention system against cyber attack in industrial control systems
|
Yılmaz, Ercan Nurcan |
|
|
77 |
C |
p. 94-105 |
artikel |
13 |
A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System
|
Baruah, Barnana |
|
|
77 |
C |
p. 21-35 |
artikel |
14 |
Authorship disambiguation in a collaborative editing environment
|
Paul, Padma Polash |
|
|
77 |
C |
p. 675-693 |
artikel |
15 |
Automated analysis of freeware installers promoted by download portals
|
Geniola, Alberto |
|
|
77 |
C |
p. 209-225 |
artikel |
16 |
A visualization cybersecurity method based on features' dissimilarity
|
AlShboul, Rabah |
|
|
77 |
C |
p. 289-303 |
artikel |
17 |
Building an automotive security assurance case using systematic security evaluations
|
Cheah, Madeline |
|
|
77 |
C |
p. 360-379 |
artikel |
18 |
Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid
|
Xia, Xiaofang |
|
|
77 |
C |
p. 547-564 |
artikel |
19 |
Collateral damage of Facebook third-party applications: a comprehensive study
|
Symeonidis, Iraklis |
|
|
77 |
C |
p. 179-208 |
artikel |
20 |
DomainChroma: Building actionable threat intelligence from malicious domain names
|
Chiba, Daiki |
|
|
77 |
C |
p. 138-161 |
artikel |
21 |
Dypermin: Dynamic permission mining framework for android platform
|
Lyvas, Christos |
|
|
77 |
C |
p. 472-487 |
artikel |
22 |
Early-stage malware prediction using recurrent neural networks
|
Rhode, Matilda |
|
|
77 |
C |
p. 578-594 |
artikel |
23 |
Editorial Board
|
|
|
|
77 |
C |
p. ii-iii |
artikel |
24 |
Efficient and secure pattern matching with wildcards using lightweight cryptography
|
Darivandpour, Javad |
|
|
77 |
C |
p. 666-674 |
artikel |
25 |
Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities
|
Garg, Urvashi |
|
|
77 |
C |
p. 349-359 |
artikel |
26 |
Engineering secure systems: Models, patterns and empirical validation
|
Hamid, Brahim |
|
|
77 |
C |
p. 315-348 |
artikel |
27 |
Evaluating the applicability of the double system lens model to the analysis of phishing email judgments
|
Molinaro, Kylie A. |
|
|
77 |
C |
p. 128-137 |
artikel |
28 |
Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior
|
Gerber, Nina |
|
|
77 |
C |
p. 226-261 |
artikel |
29 |
Gemini: Guest-transparent honey files via hypervisor-level access redirection
|
Gu, Zhongshu |
|
|
77 |
C |
p. 737-744 |
artikel |
30 |
Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things
|
Beltrán, Marta |
|
|
77 |
C |
p. 595-611 |
artikel |
31 |
Information security investments: An exploratory multiple case study on decision-making, evaluation and learning
|
Weishäupl, Eva |
|
|
77 |
C |
p. 807-823 |
artikel |
32 |
Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles
|
tabash, Kholood Al |
|
|
77 |
C |
p. 838-859 |
artikel |
33 |
Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection
|
Vijayanand, R. |
|
|
77 |
C |
p. 304-314 |
artikel |
34 |
ISCP: In-depth model for selecting critical security controls
|
Al-Safwani, Nadher |
|
|
77 |
C |
p. 565-577 |
artikel |
35 |
Malicious URL protection based on attackers' habitual behavioral analysis
|
Kim, Sungjin |
|
|
77 |
C |
p. 790-806 |
artikel |
36 |
Malware identification using visualization images and deep learning
|
Ni, Sang |
|
|
77 |
C |
p. 871-885 |
artikel |
37 |
Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64
|
Lencse, Gábor |
|
|
77 |
C |
p. 397-411 |
artikel |
38 |
Modelling privacy-aware trust negotiations
|
Rios, Ruben |
|
|
77 |
C |
p. 773-789 |
artikel |
39 |
Privacy-preserving power usage and supply control in smart grid
|
Chun, Hu |
|
|
77 |
C |
p. 709-719 |
artikel |
40 |
SADUS: Secure data deletion in user space for mobile devices
|
Yang, Li |
|
|
77 |
C |
p. 612-626 |
artikel |
41 |
Secure and efficient two-factor zero-knowledge authentication solution for access control systems
|
Malina, Lukas |
|
|
77 |
C |
p. 500-513 |
artikel |
42 |
Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment
|
Molin, Eric |
|
|
77 |
C |
p. 65-78 |
artikel |
43 |
Software systems at risk: An empirical study of cloned vulnerabilities in practice
|
Kim, Seulbae |
|
|
77 |
C |
p. 720-736 |
artikel |
44 |
Spatial counts under differential privacy mechanism on changing spatial scales
|
Jiang, Jun |
|
|
77 |
C |
p. 642-652 |
artikel |
45 |
Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks
|
Chakraborty, Bodhi |
|
|
77 |
C |
p. 36-48 |
artikel |
46 |
Studying the utility preservation in social network anonymization via persistent homology
|
Gao, Tianchong |
|
|
77 |
C |
p. 49-64 |
artikel |
47 |
Successive direct load altering attack in smart grid
|
Xun, Peng |
|
|
77 |
C |
p. 79-93 |
artikel |
48 |
Support vector classification with ℓ-diversity
|
Mancuhan, Koray |
|
|
77 |
C |
p. 653-665 |
artikel |
49 |
Systems and methods for SPIT detection in VoIP: Survey and future directions
|
Azad, Muhammad Ajmal |
|
|
77 |
C |
p. 1-20 |
artikel |
50 |
Toward secure name resolution on the internet
|
Grothoff, Christian |
|
|
77 |
C |
p. 694-708 |
artikel |
51 |
Trajectory privacy protection method based on the time interval divided
|
Hu, Zhaowei |
|
|
77 |
C |
p. 488-499 |
artikel |
52 |
UFace: Your universal password that no one can see
|
Lin, Dan |
|
|
77 |
C |
p. 627-641 |
artikel |
53 |
Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret
|
Verkijika, Silas Formunyuy |
|
|
77 |
C |
p. 860-870 |
artikel |
54 |
Virtualization of SCADA testbeds for cybersecurity research: A modular approach
|
Alves, Thiago |
|
|
77 |
C |
p. 531-546 |
artikel |
55 |
Your culture is in your password: An analysis of a demographically-diverse password dataset
|
AlSabah, Mashael |
|
|
77 |
C |
p. 427-441 |
artikel |