Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             31 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Anomaly detection for industrial control systems using process mining Myers, David
2018
78 C p. 103-125
artikel
2 A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems Viegas, Eduardo
2018
78 C p. 16-32
artikel
3 A taxonomy of cyber-physical threats and impact in the smart home Heartfield, Ryan
2018
78 C p. 398-428
artikel
4 Bubbles of Trust: A decentralized blockchain-based authentication system for IoT Hammi, Mohamed Tahar
2018
78 C p. 126-142
artikel
5 CDroid: practically implementation a formal-analyzed CIFC model on Android Wu, Zezhi
2018
78 C p. 231-244
artikel
6 ClearChart: Ensuring integrity of consumer ratings in online marketplaces Moreno-Sanchez, Pedro
2018
78 C p. 90-102
artikel
7 Computers & Security Editorial Board 2018
78 C p. ii-iii
artikel
8 Cyber-security: Identity deception detection on social media platforms van der Walt, Estee
2018
78 C p. 76-89
artikel
9 EclipseIoT: A secure and adaptive hub for the Internet of Things Anthi, Eirini
2018
78 C p. 477-490
artikel
10 Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier Kwon, Hyun
2018
78 C p. 380-397
artikel
11 Influence of privacy priming and security framing on mobile app selection Chong, Isis
2018
78 C p. 143-154
artikel
12 Integrated framework for hands-on cybersecurity training: CyTrONE Beuran, Razvan
2018
78 C p. 43-59
artikel
13 Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT Guerar, Meriem
2018
78 C p. 255-266
artikel
14 Is the responsibilization of the cyber security risk reasonable and judicious? Renaud, Karen
2018
78 C p. 198-211
artikel
15 k-Trustee: Location injection attack-resilient anonymization for location privacy Jin, Lei
2018
78 C p. 212-230
artikel
16 Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems Navarro, Luiz C.
2018
78 C p. 429-453
artikel
17 Malware lineage in the wild Ul Haq, Irfan
2018
78 C p. 347-363
artikel
18 OpenPLC: An IEC 61,131–3 compliant open source industrial controller for cyber security research Alves, Thiago
2018
78 C p. 364-379
artikel
19 Optimal visual cryptographic scheme with multiple share creation for multimedia applications Geetha, P.
2018
78 C p. 301-320
artikel
20 Physical characteristics of wireless communication channels for secret key establishment: A survey of the research Bottarelli, Mirko
2018
78 C p. 454-476
artikel
21 Privacy-preserving mechanisms for k-modes clustering Nguyen, Huu Hiep
2018
78 C p. 60-75
artikel
22 Risk based Security Enforcement in Software Defined Network Tripathy, Bata Krishna
2018
78 C p. 321-335
artikel
23 Symbolic execution based test-patterns generation algorithm for hardware Trojan detection Shen, Lixiang
2018
78 C p. 267-280
artikel
24 Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context Hu, Qiao
2018
78 C p. 281-300
artikel
25 Tap-based user authentication for smartwatches Nguyen, Toan
2018
78 C p. 174-186
artikel
26 The Kano model analysis of features for mobile security applications Yao, Mei-Ling
2018
78 C p. 336-346
artikel
27 Triple-Similarity Mechanism for alarm management in the cloud Dalmazo, Bruno L.
2018
78 C p. 33-42
artikel
28 Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks Shams, Erfan A.
2018
78 C p. 245-254
artikel
29 Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks Nyang, DaeHun
2018
78 C p. 1-15
artikel
30 Unsupervised intrusion detection through skip-gram models of network behavior Carrasco, Rafael San Miguel
2018
78 C p. 187-197
artikel
31 Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages Habler, Edan
2018
78 C p. 155-173
artikel
                             31 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland