nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain based approach for the definition of auditable Access Control systems
|
Di Francesco Maesa, Damiano |
|
2019 |
84 |
C |
p. 93-119 |
artikel |
2 |
Abnormal detection method of industrial control system based on behavior model
|
Zhanwei, Song |
|
2019 |
84 |
C |
p. 166-178 |
artikel |
3 |
A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding
|
Zhang, Jixin |
|
2019 |
84 |
C |
p. 376-392 |
artikel |
4 |
A flow-based approach for Trickbot banking trojan detection
|
Gezer, Ali |
|
2019 |
84 |
C |
p. 179-192 |
artikel |
5 |
AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes
|
Luh, Robert |
|
2019 |
84 |
C |
p. 120-147 |
artikel |
6 |
A keyword-based combination approach for detecting phishing webpages
|
Ding, Yan |
|
2019 |
84 |
C |
p. 256-275 |
artikel |
7 |
A lightweight privacy and integrity preserving range query scheme for mobile cloud computing
|
Xu, Zhou |
|
2019 |
84 |
C |
p. 318-333 |
artikel |
8 |
A model specification for the design of trust negotiations
|
Kolar, Martin |
|
2019 |
84 |
C |
p. 288-300 |
artikel |
9 |
An evaluation framework for network security visualizations
|
Sharafaldin, Iman |
|
2019 |
84 |
C |
p. 70-92 |
artikel |
10 |
A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration
|
Fadolalkarim, Daren |
|
2019 |
84 |
C |
p. 276-287 |
artikel |
11 |
A secure large-scale instant payment system based on blockchain
|
Zhong, Lin |
|
2019 |
84 |
C |
p. 349-364 |
artikel |
12 |
Cyber-attack detection in SCADA systems using temporal pattern recognition techniques
|
Kalech, Meir |
|
2019 |
84 |
C |
p. 225-238 |
artikel |
13 |
Data-flow bending: On the effectiveness of data-flow integrity
|
Lu, Tingting |
|
2019 |
84 |
C |
p. 365-375 |
artikel |
14 |
Editorial Board
|
|
|
2019 |
84 |
C |
p. ii-iii |
artikel |
15 |
Evaluation of password hashing schemes in open source web platforms
|
Ntantogian, Christoforos |
|
2019 |
84 |
C |
p. 206-224 |
artikel |
16 |
Kid on the phone! Toward automatic detection of children on mobile devices
|
Nguyen, Toan |
|
2019 |
84 |
C |
p. 334-348 |
artikel |
17 |
Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries
|
Nurain, Novia |
|
2019 |
84 |
C |
p. 35-52 |
artikel |
18 |
Privacy preserved wireless sensor location protocols based on mobile edge computing
|
Jiang, Han |
|
2019 |
84 |
C |
p. 393-401 |
artikel |
19 |
Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction
|
Li, Shaoxin |
|
2019 |
84 |
C |
p. 17-34 |
artikel |
20 |
Privacy-preserving history-based routing in Opportunistic Networks
|
Rashidibajgan, Samaneh |
|
2019 |
84 |
C |
p. 244-255 |
artikel |
21 |
Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey
|
Sultan, Sari |
|
2019 |
84 |
C |
p. 148-165 |
artikel |
22 |
Security design against stealthy attacks on power system state estimation: A formal approach
|
Rahman, Mohammad Ashiqur |
|
2019 |
84 |
C |
p. 301-317 |
artikel |
23 |
Survey of data remaining on second hand memory cards in the UK
|
Jones, A |
|
2019 |
84 |
C |
p. 239-243 |
artikel |
24 |
Threat modeling – A systematic literature review
|
Xiong, Wenjun |
|
2019 |
84 |
C |
p. 53-69 |
artikel |
25 |
Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services
|
Chakraborty, Nilesh |
|
2019 |
84 |
C |
p. 193-205 |
artikel |
26 |
Understanding and mitigating OpenID Connect threats
|
Navas, Jorge |
|
2019 |
84 |
C |
p. 1-16 |
artikel |