Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             32 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A cyber network attack detection based on GM Median Nearest Neighbors LDA Elkhadir, Zyad

86 C p. 63-74
artikel
2 A lightweight integrity protection scheme for low latency smart grid applications Jolfaei, Alireza

86 C p. 471-483
artikel
3 An efficient privacy preserving protocol for dynamic continuous data collection Sajjad, Haider

86 C p. 358-371
artikel
4 An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices Dodel, Matias

86 C p. 75-91
artikel
5 Anonymous authentication scheme for smart home environment with provable security Shuai, Mengxia

86 C p. 132-146
artikel
6 A novel approach to intrusion detection using SVM ensemble with feature augmentation Gu, Jie

86 C p. 53-62
artikel
7 Assessing the security implication of Bitcoin exchange rates Sai, Ashish Rajendra

86 C p. 206-222
artikel
8 A survey of network-based intrusion detection data sets Ring, Markus

86 C p. 147-167
artikel
9 Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices Hu, Jen-Wei

86 C p. 238-252
artikel
10 Blockchain based permission delegation and access control in Internet of Things (BACI) Ali, Gauhar

86 C p. 318-334
artikel
11 Bulwark: Securing implantable medical devices communication channels Bu, Lake

86 C p. 498-511
artikel
12 Editorial Board
86 C p. ii-iii
artikel
13 FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management Bendiab, Gueltoum

86 C p. 270-290
artikel
14 Forensic analysis of communication records of messaging applications from physical memory Barradas, Diogo

86 C p. 484-497
artikel
15 Formally and practically verifying flow properties in industrial systems Dreier, Jannik

86 C p. 453-470
artikel
16 Freeze and Crypt: Linux kernel support for main memory encryption Huber, Manuel

86 C p. 420-436
artikel
17 Guest editorial: Special Issue on Information Systems Security, Privacy, Security and Cryptography (ICISSP 2017 and SECRYPT 2017)
86 C p. 419
artikel
18 Implementation of an effective dynamic concolic execution framework for analyzing binary programs Zhu, Erzhou

86 C p. 1-27
artikel
19 Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms Chiba, Zouhair

86 C p. 291-317
artikel
20 Issues and challenges in DNS based botnet detection: A survey Singh, Manmeet

86 C p. 28-52
artikel
21 LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm Gope, Prosanta

86 C p. 223-237
artikel
22 Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database Singh, Mahendra Pratap

86 C p. 183-205
artikel
23 MDC-Checker: A novel network risk assessment framework for multiple domain configurations Bai, Wei

86 C p. 388-401
artikel
24 On the effectiveness of system API-related information for Android ransomware detection Scalas, Michele

86 C p. 168-182
artikel
25 Outsourcing scheme of ABE encryption secure against malicious adversary Ohtake, Go

86 C p. 437-452
artikel
26 Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns Norta, Alex

86 C p. 253-269
artikel
27 Secure deep neural networks using adversarial image generation and training with Noise-GAN Hashemi, Atiye Sadat

86 C p. 372-387
artikel
28 SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment Raju, BKSP Kumar

86 C p. 92-111
artikel
29 Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack Ahmad, Atif

86 C p. 402-418
artikel
30 The least secure places in the universe? A systematic literature review on information security management in higher education Bongiovanni, Ivano

86 C p. 350-357
artikel
31 The return of software vulnerabilities in the Brazilian voting machine Aranha, Diego F.

86 C p. 335-349
artikel
32 Z-Channel: Scalable and efficient scheme in Zerocash Zhang, Yuncong

86 C p. 112-131
artikel
                             32 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland