Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             55 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A context-aware system to secure enterprise content: Incorporating reliability specifiers Oluwatimi, Oyindamola

77 C p. 162-178
artikel
2 A dynamic per-context verification of kernel address integrity from external monitors Lee, Hojoon

77 C p. 824-837
artikel
3 A multi-channel approach through fusion of audio for detecting video inter-frame forgery Huang, Tianqiang

77 C p. 412-426
artikel
4 A new secure and privacy preserved protocol for IEEE802.11s networks Abouhogail, Reham Abdellatif

77 C p. 745-755
artikel
5 An optimal cluster formation based energy efficient dynamic scheduling hybrid MAC protocol for heavy traffic load in wireless sensor networks Sundararaj, Vinu

77 C p. 277-288
artikel
6 A privacy-aware decentralized and personalized reputation system Bag, Samiran

77 C p. 514-530
artikel
7 A review of standards with cybersecurity requirements for smart grid Leszczyna, Rafał

77 C p. 262-276
artikel
8 A self-protecting agents based model for high-performance mobile-cloud computing Angin, Pelin

77 C p. 380-396
artikel
9 A survey of similarities in banking malware behaviours Black, Paul

77 C p. 756-772
artikel
10 A survey on electronic coupons Ferrer-Gomila, Josep-Lluís

77 C p. 106-127
artikel
11 A taxonomy on misbehaving nodes in delay tolerant networks Khalid, Waqar

77 C p. 442-471
artikel
12 Attack detection/prevention system against cyber attack in industrial control systems Yılmaz, Ercan Nurcan

77 C p. 94-105
artikel
13 A two-factor authentication scheme against FDM attack in IFTTT based Smart Home System Baruah, Barnana

77 C p. 21-35
artikel
14 Authorship disambiguation in a collaborative editing environment Paul, Padma Polash

77 C p. 675-693
artikel
15 Automated analysis of freeware installers promoted by download portals Geniola, Alberto

77 C p. 209-225
artikel
16 A visualization cybersecurity method based on features' dissimilarity AlShboul, Rabah

77 C p. 289-303
artikel
17 Building an automotive security assurance case using systematic security evaluations Cheah, Madeline

77 C p. 360-379
artikel
18 Coded grouping-based inspection algorithms to detect malicious meters in neighborhood area smart grid Xia, Xiaofang

77 C p. 547-564
artikel
19 Collateral damage of Facebook third-party applications: a comprehensive study Symeonidis, Iraklis

77 C p. 179-208
artikel
20 DomainChroma: Building actionable threat intelligence from malicious domain names Chiba, Daiki

77 C p. 138-161
artikel
21 Dypermin: Dynamic permission mining framework for android platform Lyvas, Christos

77 C p. 472-487
artikel
22 Early-stage malware prediction using recurrent neural networks Rhode, Matilda

77 C p. 578-594
artikel
23 Editorial Board
77 C p. ii-iii
artikel
24 Efficient and secure pattern matching with wildcards using lightweight cryptography Darivandpour, Javad

77 C p. 666-674
artikel
25 Empirical analysis of attack graphs for mitigating critical paths and vulnerabilities Garg, Urvashi

77 C p. 349-359
artikel
26 Engineering secure systems: Models, patterns and empirical validation Hamid, Brahim

77 C p. 315-348
artikel
27 Evaluating the applicability of the double system lens model to the analysis of phishing email judgments Molinaro, Kylie A.

77 C p. 128-137
artikel
28 Explaining the privacy paradox: A systematic review of literature investigating privacy attitude and behavior Gerber, Nina

77 C p. 226-261
artikel
29 Gemini: Guest-transparent honey files via hypervisor-level access redirection Gu, Zhongshu

77 C p. 737-744
artikel
30 Identifying, authenticating and authorizing smart objects and end users to cloud services in Internet of Things Beltrán, Marta

77 C p. 595-611
artikel
31 Information security investments: An exploratory multiple case study on decision-making, evaluation and learning Weishäupl, Eva

77 C p. 807-823
artikel
32 Insider-threat detection using Gaussian Mixture Models and Sensitivity Profiles tabash, Kholood Al

77 C p. 838-859
artikel
33 Intrusion detection system for wireless mesh network using multiple support vector machine classifiers with genetic-algorithm-based feature selection Vijayanand, R.

77 C p. 304-314
artikel
34 ISCP: In-depth model for selecting critical security controls Al-Safwani, Nadher

77 C p. 565-577
artikel
35 Malicious URL protection based on attackers' habitual behavioral analysis Kim, Sungjin

77 C p. 790-806
artikel
36 Malware identification using visualization images and deep learning Ni, Sang

77 C p. 871-885
artikel
37 Methodology for the identification of potential security issues of different IPv6 transition technologies: Threat analysis of DNS64 and stateful NAT64 Lencse, Gábor

77 C p. 397-411
artikel
38 Modelling privacy-aware trust negotiations Rios, Ruben

77 C p. 773-789
artikel
39 Privacy-preserving power usage and supply control in smart grid Chun, Hu

77 C p. 709-719
artikel
40 SADUS: Secure data deletion in user space for mobile devices Yang, Li

77 C p. 612-626
artikel
41 Secure and efficient two-factor zero-knowledge authentication solution for access control systems Malina, Lukas

77 C p. 500-513
artikel
42 Secure or usable computers? Revealing employees’ perceptions and trade-offs by means of a discrete choice experiment Molin, Eric

77 C p. 65-78
artikel
43 Software systems at risk: An empirical study of cloned vulnerabilities in practice Kim, Seulbae

77 C p. 720-736
artikel
44 Spatial counts under differential privacy mechanism on changing spatial scales Jiang, Jun

77 C p. 642-652
artikel
45 Staircase based differential privacy with branching mechanism for location privacy preservation in wireless sensor networks Chakraborty, Bodhi

77 C p. 36-48
artikel
46 Studying the utility preservation in social network anonymization via persistent homology Gao, Tianchong

77 C p. 49-64
artikel
47 Successive direct load altering attack in smart grid Xun, Peng

77 C p. 79-93
artikel
48 Support vector classification with ℓ-diversity Mancuhan, Koray

77 C p. 653-665
artikel
49 Systems and methods for SPIT detection in VoIP: Survey and future directions Azad, Muhammad Ajmal

77 C p. 1-20
artikel
50 Toward secure name resolution on the internet Grothoff, Christian

77 C p. 694-708
artikel
51 Trajectory privacy protection method based on the time interval divided Hu, Zhaowei

77 C p. 488-499
artikel
52 UFace: Your universal password that no one can see Lin, Dan

77 C p. 627-641
artikel
53 Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret Verkijika, Silas Formunyuy

77 C p. 860-870
artikel
54 Virtualization of SCADA testbeds for cybersecurity research: A modular approach Alves, Thiago

77 C p. 531-546
artikel
55 Your culture is in your password: An analysis of a demographically-diverse password dataset AlSabah, Mashael

77 C p. 427-441
artikel
                             55 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland