nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cost analysis of machine learning using dynamic runtime opcodes for malware detection
|
Carlin, Domhnall |
|
2019 |
85 |
C |
p. 138-155 |
artikel |
2 |
A fog computing based approach to DDoS mitigation in IIoT systems
|
Zhou, Luying |
|
2019 |
85 |
C |
p. 51-62 |
artikel |
3 |
An empirical study of mnemonic password creation tips
|
Ye, Bei |
|
2019 |
85 |
C |
p. 41-50 |
artikel |
4 |
A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection
|
Heigl, Michael |
|
2019 |
85 |
C |
p. 270-287 |
artikel |
5 |
A robust and secure image sharing scheme with personal identity information embedded
|
Wang, Ping |
|
2019 |
85 |
C |
p. 107-121 |
artikel |
6 |
BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system
|
Chaudhary, Rajat |
|
2019 |
85 |
C |
p. 288-299 |
artikel |
7 |
CENDroid—A cluster-ensemble classifier for detecting malicious Android applications
|
Badhani, Shikha |
|
2019 |
85 |
C |
p. 25-40 |
artikel |
8 |
CertLedger: A new PKI model with Certificate Transparency based on blockchain
|
Kubilay, Murat Yasin |
|
2019 |
85 |
C |
p. 333-352 |
artikel |
9 |
Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening
|
Yanushkevich, Svetlana N. |
|
2019 |
85 |
C |
p. 372-385 |
artikel |
10 |
Context aware intrusion detection for building automation systems
|
Pan, Zhiwen |
|
2019 |
85 |
C |
p. 181-201 |
artikel |
11 |
Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions
|
Riahi Manesh, Mohsen |
|
2019 |
85 |
C |
p. 386-401 |
artikel |
12 |
Decentralized blacklistable anonymous credentials with reputation
|
Yang, Rupeng |
|
2019 |
85 |
C |
p. 353-371 |
artikel |
13 |
Designing an efficient security framework for detecting intrusions in virtual network of cloud computing
|
Patil, Rajendra |
|
2019 |
85 |
C |
p. 402-422 |
artikel |
14 |
Detection method of domain names generated by DGAs based on semantic representation and deep neural network
|
Xu, Congyuan |
|
2019 |
85 |
C |
p. 77-88 |
artikel |
15 |
Editorial Board
|
|
|
2019 |
85 |
C |
p. ii-iii |
artikel |
16 |
Effective, efficient, and robust packing detection and classification
|
Biondi, Fabrizio |
|
2019 |
85 |
C |
p. 436-451 |
artikel |
17 |
Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment
|
Korać, Dragan |
|
2019 |
85 |
C |
p. 313-332 |
artikel |
18 |
Formally verified software countermeasures for control-flow integrity of smart card C code
|
Heydemann, Karine |
|
2019 |
85 |
C |
p. 202-224 |
artikel |
19 |
Information fusion architecture for secure cyber physical systems
|
Chejerla, Brijesh Kashyap |
|
2019 |
85 |
C |
p. 122-137 |
artikel |
20 |
Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis
|
Farhi, Nitzan |
|
2019 |
85 |
C |
p. 240-269 |
artikel |
21 |
Optimal strategy selection approach to moving target defense based on Markov robust game
|
Tan, Jing-lei |
|
2019 |
85 |
C |
p. 63-76 |
artikel |
22 |
Optiwords: A new password policy for creating memorable and strong passwords
|
Guo, Yimin |
|
2019 |
85 |
C |
p. 423-435 |
artikel |
23 |
POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm
|
Chen, Jinyin |
|
2019 |
85 |
C |
p. 89-106 |
artikel |
24 |
Recent advances in mobile touch screen security authentication methods: A systematic literature review
|
Ibrahim, Tahir Musa |
|
2019 |
85 |
C |
p. 1-24 |
artikel |
25 |
Securing the testing process for industrial automation software
|
Eckhart, Matthias |
|
2019 |
85 |
C |
p. 156-180 |
artikel |
26 |
Theorem proof based gate level information flow tracking for hardware security verification
|
Qin, Maoyuan |
|
2019 |
85 |
C |
p. 225-239 |
artikel |
27 |
Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts
|
Alomar, Noura |
|
2019 |
85 |
C |
p. 300-312 |
artikel |