nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Constructing cascade bloom filters for efficient access enforcement
|
Mousavi, Nima |
|
2019 |
81 |
C |
p. 1-14 |
artikel |
2 |
DOPdefender: An approach to thwarting data-oriented programming attacks based on a data-aware automaton
|
Wang, Ye |
|
2019 |
81 |
C |
p. 94-106 |
artikel |
3 |
Editorial
|
Spafford, Eugene H. |
|
2019 |
81 |
C |
p. 182-183 |
artikel |
4 |
Editorial Board
|
|
|
2019 |
81 |
C |
p. ii-iii |
artikel |
5 |
Exploring the role of work identity and work locus of control in information security awareness
|
Hadlington, Lee |
|
2019 |
81 |
C |
p. 41-48 |
artikel |
6 |
Firefly algorithm based feature selection for network intrusion detection
|
B, Selvakumar |
|
2019 |
81 |
C |
p. 148-155 |
artikel |
7 |
How to trick the Borg: threat models against manual and automated techniques for detecting network attacks
|
Sabottke, Carl |
|
2019 |
81 |
C |
p. 25-40 |
artikel |
8 |
Localising social network users and profiling their movement
|
Pellet, Hector |
|
2019 |
81 |
C |
p. 49-57 |
artikel |
9 |
MTRA: Multi-Tier randomized remote attestation in IoT networks
|
Tan, Hailun |
|
2019 |
81 |
C |
p. 78-93 |
artikel |
10 |
Parallel score fusion of ECG and fingerprint for human authentication based on convolution neural network
|
Hammad, Mohamed |
|
2019 |
81 |
C |
p. 107-122 |
artikel |
11 |
Reducing the communication complexity of quantum private database queries by subtle classical post-processing with relaxed quantum ability
|
Yang, Yu-Guang |
|
2019 |
81 |
C |
p. 15-24 |
artikel |
12 |
Reviewer Acknowledgment
|
|
|
2019 |
81 |
C |
p. I-V |
artikel |
13 |
Securing peer-assisted indoor localization leveraging acoustic ranging
|
Du, Shaoyong |
|
2019 |
81 |
C |
p. 58-77 |
artikel |
14 |
Survey of machine learning techniques for malware analysis
|
Ucci, Daniele |
|
2019 |
81 |
C |
p. 123-147 |
artikel |
15 |
The role of the adversary model in applied security research
|
Do, Quang |
|
2019 |
81 |
C |
p. 156-181 |
artikel |