nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cybercrime incident architecture with adaptive response policy
|
Tsakalidis, George |
|
2019 |
83 |
C |
p. 22-37 |
artikel |
2 |
Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps
|
Urueña López, Alberto |
|
2019 |
83 |
C |
p. 38-51 |
artikel |
3 |
An effective security alert mechanism for real-time phishing tweet detection on Twitter
|
Liew, Seow Wooi |
|
2019 |
83 |
C |
p. 201-207 |
artikel |
4 |
A novel word-independent gesture-typing continuous authentication scheme for mobile devices
|
Smith-Creasey, Max |
|
2019 |
83 |
C |
p. 140-150 |
artikel |
5 |
Application model for privileged account access control system in enterprise networks
|
Sindiren, Erhan |
|
2019 |
83 |
C |
p. 52-67 |
artikel |
6 |
Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts
|
Yu, Feng |
|
2019 |
83 |
C |
p. 106-121 |
artikel |
7 |
Autonomously detecting sensors in fully distributed botnets
|
Böck, Leon |
|
2019 |
83 |
C |
p. 1-13 |
artikel |
8 |
A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity
|
Akilal, Karim |
|
2019 |
83 |
C |
p. 68-78 |
artikel |
9 |
Communication-efficient private distance calculation based on oblivious transfer extensions
|
Kaghazgaran, Parisa |
|
2019 |
83 |
C |
p. 93-105 |
artikel |
10 |
CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques
|
Gottwalt, Florian |
|
2019 |
83 |
C |
p. 234-245 |
artikel |
11 |
Distributed, end-to-end verifiable, and privacy-preserving internet voting systems
|
Chondros, Nikos |
|
2019 |
83 |
C |
p. 268-299 |
artikel |
12 |
Double serial adaptation mechanism for keystroke dynamics authentication based on a single password
|
Mhenni, Abir |
|
2019 |
83 |
C |
p. 151-166 |
artikel |
13 |
DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms
|
Gupta, Sandeep |
|
2019 |
83 |
C |
p. 122-139 |
artikel |
14 |
Editorial Board
|
|
|
2019 |
83 |
C |
p. ii-iii |
artikel |
15 |
Effective analysis of malware detection in cloud computing
|
Yadav, Ram Mahesh |
|
2019 |
83 |
C |
p. 14-21 |
artikel |
16 |
Efficient privacy preserving device authentication in WBANs for industrial e-health applications
|
Odelu, Vanga |
|
2019 |
83 |
C |
p. 300-312 |
artikel |
17 |
ETGuard: Detecting D2D attacks using wireless Evil Twins
|
Jain, Vineeta |
|
2019 |
83 |
C |
p. 389-405 |
artikel |
18 |
Hearing attacks in network data: An effectiveness study
|
Axon, Louise |
|
2019 |
83 |
C |
p. 367-388 |
artikel |
19 |
Integrally private model selection for decision trees
|
Senavirathne, Navoda |
|
2019 |
83 |
C |
p. 167-181 |
artikel |
20 |
Jail-Phish: An improved search engine based phishing detection system
|
Rao, Routhu Srinivasa |
|
2019 |
83 |
C |
p. 246-267 |
artikel |
21 |
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics
|
Han, Weijie |
|
2019 |
83 |
C |
p. 208-233 |
artikel |
22 |
Rethinking anti-emulation techniques for large-scale software deployment
|
Jang, Daehee |
|
2019 |
83 |
C |
p. 182-200 |
artikel |
23 |
Revealing the unrevealed: Mining smartphone users privacy perception on app markets
|
Hatamian, Majid |
|
2019 |
83 |
C |
p. 332-353 |
artikel |
24 |
Securing a communication channel for the trusted execution environment
|
Jang, Jinsoo |
|
2019 |
83 |
C |
p. 79-92 |
artikel |
25 |
Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership
|
Vitunskaite, Morta |
|
2019 |
83 |
C |
p. 313-331 |
artikel |
26 |
Virtuous human hacking: The ethics of social engineering in penetration-testing
|
Hatfield, Joseph M. |
|
2019 |
83 |
C |
p. 354-366 |
artikel |