nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bayesian network approach for cybersecurity risk assessment implementing and extending the FAIR model
|
Wang, Jiali |
|
|
89 |
C |
p. |
artikel |
2 |
A dynamic games approach to proactive defense strategies against Advanced Persistent Threats in cyber-physical systems
|
Huang, Linan |
|
|
89 |
C |
p. |
artikel |
3 |
An improved two-hidden-layer extreme learning machine for malware hunting
|
Namavar Jahromi, Amir |
|
|
89 |
C |
p. |
artikel |
4 |
A novel method for malware detection on ML-based visualization technique
|
Liu, Xinbo |
|
|
89 |
C |
p. |
artikel |
5 |
A real-time alert correlation method based on code-books for intrusion detection systems
|
Mahdavi, Ehsan |
|
|
89 |
C |
p. |
artikel |
6 |
Computer & security special issue editorial
|
Rass, Stefan |
|
|
89 |
C |
p. |
artikel |
7 |
Cybersecurity for industrial control systems: A survey
|
Bhamare, Deval |
|
|
89 |
C |
p. |
artikel |
8 |
Deanonymizing Tor hidden service users through Bitcoin transactions analysis
|
Jawaheri, Husam Al |
|
|
89 |
C |
p. |
artikel |
9 |
DL-Droid: Deep learning based android malware detection using real devices
|
Alzaylaee, Mohammed K. |
|
|
89 |
C |
p. |
artikel |
10 |
Editorial Board
|
|
|
|
89 |
C |
p. |
artikel |
11 |
Formal knowledge model for online social network forensics
|
Arshad, Humaira |
|
|
89 |
C |
p. |
artikel |
12 |
Inner conflict: How smart device components can cause harm
|
Shwartz, Omer |
|
|
89 |
C |
p. |
artikel |
13 |
LocAuth: A fine-grained indoor location-based authentication system using wireless networks characteristics
|
Alawami, Mohsen A. |
|
|
89 |
C |
p. |
artikel |
14 |
Model of the intrusion detection system based on the integration of spatial-temporal features
|
Zhang, Jianwu |
|
|
89 |
C |
p. |
artikel |
15 |
PKI4IoT: Towards public key infrastructure for the Internet of Things
|
Höglund, Joel |
|
|
89 |
C |
p. |
artikel |
16 |
SCADA (Supervisory Control and Data Acquisition) systems: Vulnerability assessment and security recommendations
|
Upadhyay, Darshana |
|
|
89 |
C |
p. |
artikel |
17 |
Security of vehicular ad-hoc networks: A comprehensive survey
|
Malhi, Avleen Kaur |
|
|
89 |
C |
p. |
artikel |
18 |
Security-oriented view of app behaviour using textual descriptions and user-granted permission requests
|
Olukoya, Oluwafemi |
|
|
89 |
C |
p. |
artikel |
19 |
Shapeshifter: Intelligence-driven data plane randomization resilient to data-oriented programming attacks
|
Wang, Ye |
|
|
89 |
C |
p. |
artikel |
20 |
Solving security constraints for 5G slice embedding: A proof-of-concept
|
Boutigny, François |
|
|
89 |
C |
p. |
artikel |
21 |
Static detection of real-world buffer overflow induced by loop
|
Luo, Peng |
|
|
89 |
C |
p. |
artikel |
22 |
The impact of excluding common blocks for approximate matching
|
Moia, Vitor Hugo Galhardo |
|
|
89 |
C |
p. |
artikel |