Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             47 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking Gheisari, Mehdi

87 C p.
artikel
2 Active authentication using file system decoys and user behavior modeling: results of a large scale study Voris, Jonathan

87 C p.
artikel
3 A data minimization model for embedding privacy into software systems Senarath, Awanthika

87 C p.
artikel
4 An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network Wang, Ziyu

87 C p.
artikel
5 Android Fragmentation in Malware Detection Nguyen-Vu, Long

87 C p.
artikel
6 An efficient and scalable privacy preserving algorithm for big data and data streams Chamikara, M.A.P.

87 C p.
artikel
7 A secure and auditable logging infrastructure based on a permissioned blockchain Putz, Benedikt

87 C p.
artikel
8 A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification Cao, Yan

87 C p.
artikel
9 Attack trees in Isabelle extended with probabilities for quantum cryptography Kammüller, Florian

87 C p.
artikel
10 Blockchain-based photo forensics with permissible transformations Zou, Renpeng

87 C p.
artikel
11 Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications Hu, Kexin

87 C p.
artikel
12 Building secure protocols for extensible distributed coordination through secure extensions Junior, Edson Floriano S.

87 C p.
artikel
13 Current cyber-defense trends in industrial control systems Rubio, Juan Enrique

87 C p.
artikel
14 Cyber risk assessment in cloud provider environments: Current models and future needs Akinrolabu, Olusola

87 C p.
artikel
15 Cyber threat intelligence sharing: Survey and research directions Wagner, Thomas D.

87 C p.
artikel
16 Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure Masood, Zaheer

87 C p.
artikel
17 Detection and mitigation of attacks on transportation networks as a multi-stage security game Laszka, Aron

87 C p.
artikel
18 Discovering reliable evidence of data misuse by exploiting rule redundancy Genga, Laura

87 C p.
artikel
19 Do I really belong?: Impact of employment status on information security policy compliance Sharma, Shwadhin

87 C p.
artikel
20 Editorial Board
87 C p.
artikel
21 Evaluating the effectiveness of learner controlled information security training Abraham, Sherly

87 C p.
artikel
22 Factors affecting intention to disclose patients’ health information Park, Eun Hee

87 C p.
artikel
23 Hardening networks against strategic attackers using attack graph games Durkota, Karel

87 C p.
artikel
24 How perceived security risk affects intention to use smart home devices: A reasoned action explanation Klobas, Jane E.

87 C p.
artikel
25 Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world Hina, Sadaf

87 C p.
artikel
26 Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle Camacho, José

87 C p.
artikel
27 Neural malware analysis with attention mechanism Yakura, Hiromu

87 C p.
artikel
28 Online sequential attack detection for ADS-B data based on hierarchical temporal memory Li, Tengyao

87 C p.
artikel
29 Ontology-based knowledge representation for malware individuals and families Ding, Yuxin

87 C p.
artikel
30 Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games Horák, Karel

87 C p.
artikel
31 Password typographical error resilience in honey encryption Choi, Hoyul

87 C p.
artikel
32 Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes Mainardi, Nicholas

87 C p.
artikel
33 Post-incident audits on cyber insurance discounts Panda, Sakshyam

87 C p.
artikel
34 Proof-of-QoS: QoS based blockchain consensus protocol Yu, Bin

87 C p.
artikel
35 Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games Alshawish, Ali

87 C p.
artikel
36 Recognizing roles of online illegal gambling participants: An ensemble learning approach Han, Xiaohui

87 C p.
artikel
37 Selfholding: A combined attack model using selfish mining with block withholding attack Dong, Xuewen

87 C p.
artikel
38 ShellBreaker: Automatically detecting PHP-based malicious web shells Li, Yu

87 C p.
artikel
39 Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets Basuchoudhary, Atin

87 C p.
artikel
40 Special Issue on Security and Privacy in Smart Cyber-physical Systems Othmane, Lotfi Ben

87 C p.
artikel
41 The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures Y. Connolly, Lena

87 C p.
artikel
42 The significance of securing as a critical component of information security: An Australian narrative Burdon, Mark

87 C p.
artikel
43 Towards a global perspective on web tracking Samarasinghe, Nayanamana

87 C p.
artikel
44 Towards a reliable firewall for software-defined networks Hu, Hongxin

87 C p.
artikel
45 Using memory propagation tree to improve performance of protocol fuzzer when testing ICS Chen, Kai

87 C p.
artikel
46 Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud Nissim, Nir

87 C p.
artikel
47 Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models Movahedi, Yazdan

87 C p.
artikel
                             47 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland