Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cost analysis of machine learning using dynamic runtime opcodes for malware detection Carlin, Domhnall
2019
85 C p. 138-155
artikel
2 A fog computing based approach to DDoS mitigation in IIoT systems Zhou, Luying
2019
85 C p. 51-62
artikel
3 An empirical study of mnemonic password creation tips Ye, Bei
2019
85 C p. 41-50
artikel
4 A resource-preserving self-regulating Uncoupled MAC algorithm to be applied in incident detection Heigl, Michael
2019
85 C p. 270-287
artikel
5 A robust and secure image sharing scheme with personal identity information embedded Wang, Ping
2019
85 C p. 107-121
artikel
6 BEST: Blockchain-based secure energy trading in SDN-enabled intelligent transportation system Chaudhary, Rajat
2019
85 C p. 288-299
artikel
7 CENDroid—A cluster-ensemble classifier for detecting malicious Android applications Badhani, Shikha
2019
85 C p. 25-40
artikel
8 CertLedger: A new PKI model with Certificate Transparency based on blockchain Kubilay, Murat Yasin
2019
85 C p. 333-352
artikel
9 Cognitive checkpoint: Emerging technologies for biometric-enabled watchlist screening Yanushkevich, Svetlana N.
2019
85 C p. 372-385
artikel
10 Context aware intrusion detection for building automation systems Pan, Zhiwen
2019
85 C p. 181-201
artikel
11 Cyber-attacks on unmanned aerial system networks: Detection, countermeasure, and future research directions Riahi Manesh, Mohsen
2019
85 C p. 386-401
artikel
12 Decentralized blacklistable anonymous credentials with reputation Yang, Rupeng
2019
85 C p. 353-371
artikel
13 Designing an efficient security framework for detecting intrusions in virtual network of cloud computing Patil, Rajendra
2019
85 C p. 402-422
artikel
14 Detection method of domain names generated by DGAs based on semantic representation and deep neural network Xu, Congyuan
2019
85 C p. 77-88
artikel
15 Editorial Board 2019
85 C p. ii-iii
artikel
16 Effective, efficient, and robust packing detection and classification Biondi, Fabrizio
2019
85 C p. 436-451
artikel
17 Fishbone model and universal authentication framework for evaluation of multifactor authentication in mobile environment Korać, Dragan
2019
85 C p. 313-332
artikel
18 Formally verified software countermeasures for control-flow integrity of smart card C code Heydemann, Karine
2019
85 C p. 202-224
artikel
19 Information fusion architecture for secure cyber physical systems Chejerla, Brijesh Kashyap
2019
85 C p. 122-137
artikel
20 Malboard: A novel user keystroke impersonation attack and trusted detection framework based on side-channel analysis Farhi, Nitzan
2019
85 C p. 240-269
artikel
21 Optimal strategy selection approach to moving target defense based on Markov robust game Tan, Jing-lei
2019
85 C p. 63-76
artikel
22 Optiwords: A new password policy for creating memorable and strong passwords Guo, Yimin
2019
85 C p. 423-435
artikel
23 POBA-GA: Perturbation optimized black-box adversarial attacks via genetic algorithm Chen, Jinyin
2019
85 C p. 89-106
artikel
24 Recent advances in mobile touch screen security authentication methods: A systematic literature review Ibrahim, Tahir Musa
2019
85 C p. 1-24
artikel
25 Securing the testing process for industrial automation software Eckhart, Matthias
2019
85 C p. 156-180
artikel
26 Theorem proof based gate level information flow tracking for hardware security verification Qin, Maoyuan
2019
85 C p. 225-239
artikel
27 Uncovering the predictors of unsafe computing behaviors in online crowdsourcing contexts Alomar, Noura
2019
85 C p. 300-312
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland