Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model Wang, Jiali

89 C p.
artikel
2 A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems Huang, Linan

89 C p.
artikel
3 An improved two-hidden-layer extreme learning machine for malware hunting Namavar Jahromi, Amir

89 C p.
artikel
4 A novel method for malware detection on ML-based visualization technique Liu, Xinbo

89 C p.
artikel
5 A real-time alert correlation method based on code-books for intrusion detection systems Mahdavi, Ehsan

89 C p.
artikel
6 Computer & security special issue editorial Rass, Stefan

89 C p.
artikel
7 Cybersecurity for industrial control systems: A survey Bhamare, Deval

89 C p.
artikel
8 Deanonymizing Tor hidden service users through Bitcoin transactions analysis Jawaheri, Husam Al

89 C p.
artikel
9 DL-Droid: Deep learning based android malware detection using real devices Alzaylaee, Mohammed K.

89 C p.
artikel
10 Editorial Board
89 C p.
artikel
11 Formal knowledge model for online social network forensics Arshad, Humaira

89 C p.
artikel
12 Inner conflict: How smart device components can cause harm Shwartz, Omer

89 C p.
artikel
13 LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics Alawami, Mohsen A.

89 C p.
artikel
14 Model of the intrusion detection system based on the integration of spatial-temporal features Zhang, Jianwu

89 C p.
artikel
15 PKI4IoT: Towards public key infrastructure for the Internet of Things Höglund, Joel

89 C p.
artikel
16 SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations Upadhyay, Darshana

89 C p.
artikel
17 Security of vehicular ad-hoc networks: A comprehensive survey Malhi, Avleen Kaur

89 C p.
artikel
18 Security-oriented view of app behaviour using textual descriptions and user-granted permission requests Olukoya, Oluwafemi

89 C p.
artikel
19 Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks Wang, Ye

89 C p.
artikel
20 Solving security constraints for 5G slice embedding: A proof-of-concept Boutigny, François

89 C p.
artikel
21 Static detection of real-world buffer overflow induced by loop Luo, Peng

89 C p.
artikel
22 The impact of excluding common blocks for approximate matching Moia, Vitor Hugo Galhardo

89 C p.
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland