nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
ANiTW: A Novel Intelligent Text Watermarking technique for forensic identification of spurious information on social media
|
Taleby Ahvanooey, Milad |
|
|
90 |
C |
p. |
artikel |
2 |
CHOP: Bypassing runtime bounds checking through convex hull Optimization
|
Chen, Yurong |
|
|
90 |
C |
p. |
artikel |
3 |
Distributed K-Means clustering guaranteeing local differential privacy
|
Xia, Chang |
|
|
90 |
C |
p. |
artikel |
4 |
Editorial Board
|
|
|
|
90 |
C |
p. |
artikel |
5 |
EspyDroid+: Precise reflection analysis of android apps
|
Gajrani, Jyoti |
|
|
90 |
C |
p. |
artikel |
6 |
Fair payments for verifiable cloud services using smart contracts
|
Dorsala, Mallikarjun Reddy |
|
|
90 |
C |
p. |
artikel |
7 |
Improving cyberbullying detection using Twitter users’ psychological features and machine learning
|
Balakrishnan, Vimala |
|
|
90 |
C |
p. |
artikel |
8 |
Information security assessment in public administration
|
Szczepaniuk, Edyta Karolina |
|
|
90 |
C |
p. |
artikel |
9 |
LiSRA: Lightweight Security Risk Assessment for decision support in information security
|
Schmitz, Christopher |
|
|
90 |
C |
p. |
artikel |
10 |
Model checking for malicious family detection and phylogenetic analysis in mobile environment
|
Cimino, Mario G.C.A. |
|
|
90 |
C |
p. |
artikel |
11 |
Non-Invertible cancellable fingerprint template for fingerprint biometric
|
Trivedi, Amit Kumar |
|
|
90 |
C |
p. |
artikel |
12 |
Privacy-preserving self-serviced medical diagnosis scheme based on secure multi-party computation
|
Li, Dong |
|
|
90 |
C |
p. |
artikel |
13 |
Query-efficient label-only attacks against black-box machine learning models
|
Ren, Yizhi |
|
|
90 |
C |
p. |
artikel |
14 |
Reversing the irreversible: A survey on inverse biometrics
|
Gomez-Barrero, Marta |
|
|
90 |
C |
p. |
artikel |
15 |
Risk as affect: The affect heuristic in cybersecurity
|
van Schaik, Paul |
|
|
90 |
C |
p. |
artikel |
16 |
Security and performance enhancement of fingerprint biometric template using symmetric hashing
|
S, Ajish |
|
|
90 |
C |
p. |
artikel |
17 |
The information content of Sarbanes-Oxley in predicting security breaches
|
Westland, J. Christopher |
|
|
90 |
C |
p. |
artikel |