nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anomaly detection for industrial control systems using process mining
|
Myers, David |
|
2018 |
78 |
C |
p. 103-125 |
artikel |
2 |
A reliable and energy-efficient classifier combination scheme for intrusion detection in embedded systems
|
Viegas, Eduardo |
|
2018 |
78 |
C |
p. 16-32 |
artikel |
3 |
A taxonomy of cyber-physical threats and impact in the smart home
|
Heartfield, Ryan |
|
2018 |
78 |
C |
p. 398-428 |
artikel |
4 |
Bubbles of Trust: A decentralized blockchain-based authentication system for IoT
|
Hammi, Mohamed Tahar |
|
2018 |
78 |
C |
p. 126-142 |
artikel |
5 |
CDroid: practically implementation a formal-analyzed CIFC model on Android
|
Wu, Zezhi |
|
2018 |
78 |
C |
p. 231-244 |
artikel |
6 |
ClearChart: Ensuring integrity of consumer ratings in online marketplaces
|
Moreno-Sanchez, Pedro |
|
2018 |
78 |
C |
p. 90-102 |
artikel |
7 |
Computers & Security Editorial Board
|
|
|
2018 |
78 |
C |
p. ii-iii |
artikel |
8 |
Cyber-security: Identity deception detection on social media platforms
|
van der Walt, Estee |
|
2018 |
78 |
C |
p. 76-89 |
artikel |
9 |
EclipseIoT: A secure and adaptive hub for the Internet of Things
|
Anthi, Eirini |
|
2018 |
78 |
C |
p. 477-490 |
artikel |
10 |
Friend-safe evasion attack: An adversarial example that is correctly recognized by a friendly classifier
|
Kwon, Hyun |
|
2018 |
78 |
C |
p. 380-397 |
artikel |
11 |
Influence of privacy priming and security framing on mobile app selection
|
Chong, Isis |
|
2018 |
78 |
C |
p. 143-154 |
artikel |
12 |
Integrated framework for hands-on cybersecurity training: CyTrONE
|
Beuran, Razvan |
|
2018 |
78 |
C |
p. 43-59 |
artikel |
13 |
Invisible CAPPCHA: A usable mechanism to distinguish between malware and humans on the mobile IoT
|
Guerar, Meriem |
|
2018 |
78 |
C |
p. 255-266 |
artikel |
14 |
Is the responsibilization of the cyber security risk reasonable and judicious?
|
Renaud, Karen |
|
2018 |
78 |
C |
p. 198-211 |
artikel |
15 |
k-Trustee: Location injection attack-resilient anonymization for location privacy
|
Jin, Lei |
|
2018 |
78 |
C |
p. 212-230 |
artikel |
16 |
Leveraging ontologies and machine-learning techniques for malware analysis into Android permissions ecosystems
|
Navarro, Luiz C. |
|
2018 |
78 |
C |
p. 429-453 |
artikel |
17 |
Malware lineage in the wild
|
Ul Haq, Irfan |
|
2018 |
78 |
C |
p. 347-363 |
artikel |
18 |
OpenPLC: An IEC 61,131–3 compliant open source industrial controller for cyber security research
|
Alves, Thiago |
|
2018 |
78 |
C |
p. 364-379 |
artikel |
19 |
Optimal visual cryptographic scheme with multiple share creation for multimedia applications
|
Geetha, P. |
|
2018 |
78 |
C |
p. 301-320 |
artikel |
20 |
Physical characteristics of wireless communication channels for secret key establishment: A survey of the research
|
Bottarelli, Mirko |
|
2018 |
78 |
C |
p. 454-476 |
artikel |
21 |
Privacy-preserving mechanisms for k-modes clustering
|
Nguyen, Huu Hiep |
|
2018 |
78 |
C |
p. 60-75 |
artikel |
22 |
Risk based Security Enforcement in Software Defined Network
|
Tripathy, Bata Krishna |
|
2018 |
78 |
C |
p. 321-335 |
artikel |
23 |
Symbolic execution based test-patterns generation algorithm for hardware Trojan detection
|
Shen, Lixiang |
|
2018 |
78 |
C |
p. 267-280 |
artikel |
24 |
Tangible security: Survey of methods supporting secure ad-hoc connects of edge devices with physical context
|
Hu, Qiao |
|
2018 |
78 |
C |
p. 281-300 |
artikel |
25 |
Tap-based user authentication for smartwatches
|
Nguyen, Toan |
|
2018 |
78 |
C |
p. 174-186 |
artikel |
26 |
The Kano model analysis of features for mobile security applications
|
Yao, Mei-Ling |
|
2018 |
78 |
C |
p. 336-346 |
artikel |
27 |
Triple-Similarity Mechanism for alarm management in the cloud
|
Dalmazo, Bruno L. |
|
2018 |
78 |
C |
p. 33-42 |
artikel |
28 |
Trust aware support vector machine intrusion detection and prevention system in vehicular ad hoc networks
|
Shams, Erfan A. |
|
2018 |
78 |
C |
p. 245-254 |
artikel |
29 |
Two-Thumbs-Up: Physical protection for PIN entry secure against recording attacks
|
Nyang, DaeHun |
|
2018 |
78 |
C |
p. 1-15 |
artikel |
30 |
Unsupervised intrusion detection through skip-gram models of network behavior
|
Carrasco, Rafael San Miguel |
|
2018 |
78 |
C |
p. 187-197 |
artikel |
31 |
Using LSTM encoder-decoder algorithm for detecting anomalous ADS-B messages
|
Habler, Edan |
|
2018 |
78 |
C |
p. 155-173 |
artikel |