nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cyber network attack detection based on GM Median Nearest Neighbors LDA
|
Elkhadir, Zyad |
|
|
86 |
C |
p. 63-74 |
artikel |
2 |
A lightweight integrity protection scheme for low latency smart grid applications
|
Jolfaei, Alireza |
|
|
86 |
C |
p. 471-483 |
artikel |
3 |
An efficient privacy preserving protocol for dynamic continuous data collection
|
Sajjad, Haider |
|
|
86 |
C |
p. 358-371 |
artikel |
4 |
An integrated model for assessing cyber-safety behaviors: How cognitive, socioeconomic and digital determinants affect diverse safety practices
|
Dodel, Matias |
|
|
86 |
C |
p. 75-91 |
artikel |
5 |
Anonymous authentication scheme for smart home environment with provable security
|
Shuai, Mengxia |
|
|
86 |
C |
p. 132-146 |
artikel |
6 |
A novel approach to intrusion detection using SVM ensemble with feature augmentation
|
Gu, Jie |
|
|
86 |
C |
p. 53-62 |
artikel |
7 |
Assessing the security implication of Bitcoin exchange rates
|
Sai, Ashish Rajendra |
|
|
86 |
C |
p. 206-222 |
artikel |
8 |
A survey of network-based intrusion detection data sets
|
Ring, Markus |
|
|
86 |
C |
p. 147-167 |
artikel |
9 |
Autonomous and malware-proof blockchain-based firmware update platform with efficient batch verification for Internet of Things devices
|
Hu, Jen-Wei |
|
|
86 |
C |
p. 238-252 |
artikel |
10 |
Blockchain based permission delegation and access control in Internet of Things (BACI)
|
Ali, Gauhar |
|
|
86 |
C |
p. 318-334 |
artikel |
11 |
Bulwark: Securing implantable medical devices communication channels
|
Bu, Lake |
|
|
86 |
C |
p. 498-511 |
artikel |
12 |
Editorial Board
|
|
|
|
86 |
C |
p. ii-iii |
artikel |
13 |
FCMDT: A novel fuzzy cognitive maps dynamic trust model for cloud federated identity management
|
Bendiab, Gueltoum |
|
|
86 |
C |
p. 270-290 |
artikel |
14 |
Forensic analysis of communication records of messaging applications from physical memory
|
Barradas, Diogo |
|
|
86 |
C |
p. 484-497 |
artikel |
15 |
Formally and practically verifying flow properties in industrial systems
|
Dreier, Jannik |
|
|
86 |
C |
p. 453-470 |
artikel |
16 |
Freeze and Crypt: Linux kernel support for main memory encryption
|
Huber, Manuel |
|
|
86 |
C |
p. 420-436 |
artikel |
17 |
Guest editorial: Special Issue on Information Systems Security, Privacy, Security and Cryptography (ICISSP 2017 and SECRYPT 2017)
|
|
|
|
86 |
C |
p. 419 |
artikel |
18 |
Implementation of an effective dynamic concolic execution framework for analyzing binary programs
|
Zhu, Erzhou |
|
|
86 |
C |
p. 1-27 |
artikel |
19 |
Intelligent approach to build a Deep Neural Network based IDS for cloud environment using combination of machine learning algorithms
|
Chiba, Zouhair |
|
|
86 |
C |
p. 291-317 |
artikel |
20 |
Issues and challenges in DNS based botnet detection: A survey
|
Singh, Manmeet |
|
|
86 |
C |
p. 28-52 |
artikel |
21 |
LAAP: Lightweight anonymous authentication protocol for D2D-Aided fog computing paradigm
|
Gope, Prosanta |
|
|
86 |
C |
p. 223-237 |
artikel |
22 |
Managing attribute-based access control policies in a unified framework using data warehousing and in-memory database
|
Singh, Mahendra Pratap |
|
|
86 |
C |
p. 183-205 |
artikel |
23 |
MDC-Checker: A novel network risk assessment framework for multiple domain configurations
|
Bai, Wei |
|
|
86 |
C |
p. 388-401 |
artikel |
24 |
On the effectiveness of system API-related information for Android ransomware detection
|
Scalas, Michele |
|
|
86 |
C |
p. 168-182 |
artikel |
25 |
Outsourcing scheme of ABE encryption secure against malicious adversary
|
Ohtake, Go |
|
|
86 |
C |
p. 437-452 |
artikel |
26 |
Safeguarding a formalized Blockchain-enabled identity-authentication protocol by applying security risk-oriented patterns
|
Norta, Alex |
|
|
86 |
C |
p. 253-269 |
artikel |
27 |
Secure deep neural networks using adversarial image generation and training with Noise-GAN
|
Hashemi, Atiye Sadat |
|
|
86 |
C |
p. 372-387 |
artikel |
28 |
SNAPS: Towards building snapshot based provenance system for virtual machines in the cloud environment
|
Raju, BKSP Kumar |
|
|
86 |
C |
p. 92-111 |
artikel |
29 |
Strategically-motivated advanced persistent threat: Definition, process, tactics and a disinformation model of counterattack
|
Ahmad, Atif |
|
|
86 |
C |
p. 402-418 |
artikel |
30 |
The least secure places in the universe? A systematic literature review on information security management in higher education
|
Bongiovanni, Ivano |
|
|
86 |
C |
p. 350-357 |
artikel |
31 |
The return of software vulnerabilities in the Brazilian voting machine
|
Aranha, Diego F. |
|
|
86 |
C |
p. 335-349 |
artikel |
32 |
Z-Channel: Scalable and efficient scheme in Zerocash
|
Zhang, Yuncong |
|
|
86 |
C |
p. 112-131 |
artikel |