nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A context-aware privacy-preserving method for IoT-based smart city using Software Defined Networking
|
Gheisari, Mehdi |
|
|
87 |
C |
p. |
artikel |
2 |
Active authentication using file system decoys and user behavior modeling: results of a large scale study
|
Voris, Jonathan |
|
|
87 |
C |
p. |
artikel |
3 |
A data minimization model for embedding privacy into software systems
|
Senarath, Awanthika |
|
|
87 |
C |
p. |
artikel |
4 |
An analytic evaluation for the impact of uncle blocks by selfish and stubborn mining in an imperfect Ethereum network
|
Wang, Ziyu |
|
|
87 |
C |
p. |
artikel |
5 |
Android Fragmentation in Malware Detection
|
Nguyen-Vu, Long |
|
|
87 |
C |
p. |
artikel |
6 |
An efficient and scalable privacy preserving algorithm for big data and data streams
|
Chamikara, M.A.P. |
|
|
87 |
C |
p. |
artikel |
7 |
A secure and auditable logging infrastructure based on a permissioned blockchain
|
Putz, Benedikt |
|
|
87 |
C |
p. |
artikel |
8 |
A topology-aware access control model for collaborative cyber-physical spaces: Specification and verification
|
Cao, Yan |
|
|
87 |
C |
p. |
artikel |
9 |
Attack trees in Isabelle extended with probabilities for quantum cryptography
|
Kammüller, Florian |
|
|
87 |
C |
p. |
artikel |
10 |
Blockchain-based photo forensics with permissible transformations
|
Zou, Renpeng |
|
|
87 |
C |
p. |
artikel |
11 |
Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications
|
Hu, Kexin |
|
|
87 |
C |
p. |
artikel |
12 |
Building secure protocols for extensible distributed coordination through secure extensions
|
Junior, Edson Floriano S. |
|
|
87 |
C |
p. |
artikel |
13 |
Current cyber-defense trends in industrial control systems
|
Rubio, Juan Enrique |
|
|
87 |
C |
p. |
artikel |
14 |
Cyber risk assessment in cloud provider environments: Current models and future needs
|
Akinrolabu, Olusola |
|
|
87 |
C |
p. |
artikel |
15 |
Cyber threat intelligence sharing: Survey and research directions
|
Wagner, Thomas D. |
|
|
87 |
C |
p. |
artikel |
16 |
Design of a mathematical model for the Stuxnet virus in a network of critical control infrastructure
|
Masood, Zaheer |
|
|
87 |
C |
p. |
artikel |
17 |
Detection and mitigation of attacks on transportation networks as a multi-stage security game
|
Laszka, Aron |
|
|
87 |
C |
p. |
artikel |
18 |
Discovering reliable evidence of data misuse by exploiting rule redundancy
|
Genga, Laura |
|
|
87 |
C |
p. |
artikel |
19 |
Do I really belong?: Impact of employment status on information security policy compliance
|
Sharma, Shwadhin |
|
|
87 |
C |
p. |
artikel |
20 |
Editorial Board
|
|
|
|
87 |
C |
p. |
artikel |
21 |
Evaluating the effectiveness of learner controlled information security training
|
Abraham, Sherly |
|
|
87 |
C |
p. |
artikel |
22 |
Factors affecting intention to disclose patients’ health information
|
Park, Eun Hee |
|
|
87 |
C |
p. |
artikel |
23 |
Hardening networks against strategic attackers using attack graph games
|
Durkota, Karel |
|
|
87 |
C |
p. |
artikel |
24 |
How perceived security risk affects intention to use smart home devices: A reasoned action explanation
|
Klobas, Jane E. |
|
|
87 |
C |
p. |
artikel |
25 |
Institutional governance and protection motivation: Theoretical insights into shaping employees’ security compliance behavior in higher education institutions in the developing world
|
Hina, Sadaf |
|
|
87 |
C |
p. |
artikel |
26 |
Multivariate Big Data Analysis for intrusion detection: 5 steps from the haystack to the needle
|
Camacho, José |
|
|
87 |
C |
p. |
artikel |
27 |
Neural malware analysis with attention mechanism
|
Yakura, Hiromu |
|
|
87 |
C |
p. |
artikel |
28 |
Online sequential attack detection for ADS-B data based on hierarchical temporal memory
|
Li, Tengyao |
|
|
87 |
C |
p. |
artikel |
29 |
Ontology-based knowledge representation for malware individuals and families
|
Ding, Yuxin |
|
|
87 |
C |
p. |
artikel |
30 |
Optimizing honeypot strategies against dynamic lateral movement using partially observable stochastic games
|
Horák, Karel |
|
|
87 |
C |
p. |
artikel |
31 |
Password typographical error resilience in honey encryption
|
Choi, Hoyul |
|
|
87 |
C |
p. |
artikel |
32 |
Plaintext recovery attacks against linearly decryptable fully homomorphic encryption schemes
|
Mainardi, Nicholas |
|
|
87 |
C |
p. |
artikel |
33 |
Post-incident audits on cyber insurance discounts
|
Panda, Sakshyam |
|
|
87 |
C |
p. |
artikel |
34 |
Proof-of-QoS: QoS based blockchain consensus protocol
|
Yu, Bin |
|
|
87 |
C |
p. |
artikel |
35 |
Quasi-purification of mixed game strategies: Sub-optimality of equilibria in security games
|
Alshawish, Ali |
|
|
87 |
C |
p. |
artikel |
36 |
Recognizing roles of online illegal gambling participants: An ensemble learning approach
|
Han, Xiaohui |
|
|
87 |
C |
p. |
artikel |
37 |
Selfholding: A combined attack model using selfish mining with block withholding attack
|
Dong, Xuewen |
|
|
87 |
C |
p. |
artikel |
38 |
ShellBreaker: Automatically detecting PHP-based malicious web shells
|
Li, Yu |
|
|
87 |
C |
p. |
artikel |
39 |
Snatched secrets: Cybercrime and trade secrets modelling a firm's decision to report a theft of trade secrets
|
Basuchoudhary, Atin |
|
|
87 |
C |
p. |
artikel |
40 |
Special Issue on Security and Privacy in Smart Cyber-physical Systems
|
Othmane, Lotfi Ben |
|
|
87 |
C |
p. |
artikel |
41 |
The rise of crypto-ransomware in a changing cybercrime landscape: Taxonomising countermeasures
|
Y. Connolly, Lena |
|
|
87 |
C |
p. |
artikel |
42 |
The significance of securing as a critical component of information security: An Australian narrative
|
Burdon, Mark |
|
|
87 |
C |
p. |
artikel |
43 |
Towards a global perspective on web tracking
|
Samarasinghe, Nayanamana |
|
|
87 |
C |
p. |
artikel |
44 |
Towards a reliable firewall for software-defined networks
|
Hu, Hongxin |
|
|
87 |
C |
p. |
artikel |
45 |
Using memory propagation tree to improve performance of protocol fuzzer when testing ICS
|
Chen, Kai |
|
|
87 |
C |
p. |
artikel |
46 |
Volatile memory analysis using the MinHash method for efficient and secured detection of malware in private cloud
|
Nissim, Nir |
|
|
87 |
C |
p. |
artikel |
47 |
Vulnerability prediction capability: A comparison between vulnerability discovery models and neural network models
|
Movahedi, Yazdan |
|
|
87 |
C |
p. |
artikel |