Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             26 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain based approach for the definition of auditable Access Control systems Di Francesco Maesa, Damiano
2019
84 C p. 93-119
artikel
2 Abnormal detection method of industrial control system based on behavior model Zhanwei, Song
2019
84 C p. 166-178
artikel
3 A feature-hybrid malware variants detection using CNN based opcode embedding and BPNN based API embedding Zhang, Jixin
2019
84 C p. 376-392
artikel
4 A flow-based approach for Trickbot banking trojan detection Gezer, Ali
2019
84 C p. 179-192
artikel
5 AIDIS: Detecting and classifying anomalous behavior in ubiquitous kernel processes Luh, Robert
2019
84 C p. 120-147
artikel
6 A keyword-based combination approach for detecting phishing webpages Ding, Yan
2019
84 C p. 256-275
artikel
7 A lightweight privacy and integrity preserving range query scheme for mobile cloud computing Xu, Zhou
2019
84 C p. 318-333
artikel
8 A model specification for the design of trust negotiations Kolar, Martin
2019
84 C p. 288-300
artikel
9 An evaluation framework for network security visualizations Sharafaldin, Iman
2019
84 C p. 70-92
artikel
10 A-PANDDE: Advanced Provenance-based ANomaly Detection of Data Exfiltration Fadolalkarim, Daren
2019
84 C p. 276-287
artikel
11 A secure large-scale instant payment system based on blockchain Zhong, Lin
2019
84 C p. 349-364
artikel
12 Cyber-attack detection in SCADA systems using temporal pattern recognition techniques Kalech, Meir
2019
84 C p. 225-238
artikel
13 Data-flow bending: On the effectiveness of data-flow integrity Lu, Tingting
2019
84 C p. 365-375
artikel
14 Editorial Board 2019
84 C p. ii-iii
artikel
15 Evaluation of password hashing schemes in open source web platforms Ntantogian, Christoforos
2019
84 C p. 206-224
artikel
16 Kid on the phone! Toward automatic detection of children on mobile devices Nguyen, Toan
2019
84 C p. 334-348
artikel
17 Power attack: An imminent security threat in real-time system for detecting missing rail blocks in developing countries Nurain, Novia
2019
84 C p. 35-52
artikel
18 Privacy preserved wireless sensor location protocols based on mobile edge computing Jiang, Han
2019
84 C p. 393-401
artikel
19 Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction Li, Shaoxin
2019
84 C p. 17-34
artikel
20 Privacy-preserving history-based routing in Opportunistic Networks Rashidibajgan, Samaneh
2019
84 C p. 244-255
artikel
21 Privacy-preserving metering in smart grid for billing, operational metering, and incentive-based schemes: A survey Sultan, Sari
2019
84 C p. 148-165
artikel
22 Security design against stealthy attacks on power system state estimation: A formal approach Rahman, Mohammad Ashiqur
2019
84 C p. 301-317
artikel
23 Survey of data remaining on second hand memory cards in the UK Jones, A
2019
84 C p. 239-243
artikel
24 Threat modeling – A systematic literature review Xiong, Wenjun
2019
84 C p. 53-69
artikel
25 Towards identifying and preventing behavioral side channel attack on recording attack resilient unaided authentication services Chakraborty, Nilesh
2019
84 C p. 193-205
artikel
26 Understanding and mitigating OpenID Connect threats Navas, Jorge
2019
84 C p. 1-16
artikel
                             26 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland