Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             26 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cybercrime incident architecture with adaptive response policy Tsakalidis, George
2019
83 C p. 22-37
artikel
2 Analysis of computer user behavior, security incidents and fraud using Self-Organizing Maps Urueña López, Alberto
2019
83 C p. 38-51
artikel
3 An effective security alert mechanism for real-time phishing tweet detection on Twitter Liew, Seow Wooi
2019
83 C p. 201-207
artikel
4 A novel word-independent gesture-typing continuous authentication scheme for mobile devices Smith-Creasey, Max
2019
83 C p. 140-150
artikel
5 Application model for privileged account access control system in enterprise networks Sindiren, Erhan
2019
83 C p. 52-67
artikel
6 Attention-based convolutional approach for misinformation identification from massive and noisy microblog posts Yu, Feng
2019
83 C p. 106-121
artikel
7 Autonomously detecting sensors in fully distributed botnets Böck, Leon
2019
83 C p. 1-13
artikel
8 A very fast and robust trust inference algorithm in weighted signed social networks using controversy, eclecticism, and reciprocity Akilal, Karim
2019
83 C p. 68-78
artikel
9 Communication-efficient private distance calculation based on oblivious transfer extensions Kaghazgaran, Parisa
2019
83 C p. 93-105
artikel
10 CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques Gottwalt, Florian
2019
83 C p. 234-245
artikel
11 Distributed, end-to-end verifiable, and privacy-preserving internet voting systems Chondros, Nikos
2019
83 C p. 268-299
artikel
12 Double serial adaptation mechanism for keystroke dynamics authentication based on a single password Mhenni, Abir
2019
83 C p. 151-166
artikel
13 DriverAuth: A risk-based multi-modal biometric-based driver authentication scheme for ride-sharing platforms Gupta, Sandeep
2019
83 C p. 122-139
artikel
14 Editorial Board 2019
83 C p. ii-iii
artikel
15 Effective analysis of malware detection in cloud computing Yadav, Ram Mahesh
2019
83 C p. 14-21
artikel
16 Efficient privacy preserving device authentication in WBANs for industrial e-health applications Odelu, Vanga
2019
83 C p. 300-312
artikel
17 ETGuard: Detecting D2D attacks using wireless Evil Twins Jain, Vineeta
2019
83 C p. 389-405
artikel
18 Hearing attacks in network data: An effectiveness study Axon, Louise
2019
83 C p. 367-388
artikel
19 Integrally private model selection for decision trees Senavirathne, Navoda
2019
83 C p. 167-181
artikel
20 Jail-Phish: An improved search engine based phishing detection system Rao, Routhu Srinivasa
2019
83 C p. 246-267
artikel
21 MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics Han, Weijie
2019
83 C p. 208-233
artikel
22 Rethinking anti-emulation techniques for large-scale software deployment Jang, Daehee
2019
83 C p. 182-200
artikel
23 Revealing the unrevealed: Mining smartphone users privacy perception on app markets Hatamian, Majid
2019
83 C p. 332-353
artikel
24 Securing a communication channel for the trusted execution environment Jang, Jinsoo
2019
83 C p. 79-92
artikel
25 Smart cities and cyber security: Are we there yet?A comparative study on the role of standards, third party risk management and security ownership Vitunskaite, Morta
2019
83 C p. 313-331
artikel
26 Virtuous human hacking: The ethics of social engineering in penetration-testing Hatfield, Joseph M.
2019
83 C p. 354-366
artikel
                             26 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland