Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             33 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive model of information security factors for decision-makers Diesch, Rainer

92 C p.
artikel
2 A deep learning method with wrapper based feature extraction for wireless intrusion detection system Kasongo, Sydney Mambwe

92 C p.
artikel
3 A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence Amer, Eslam

92 C p.
artikel
4 All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks Hernández-Castro, Carlos Javier

92 C p.
artikel
5 An automated model to score the privacy of unstructured information—Social media case Aghasian, Erfan

92 C p.
artikel
6 An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices Lu, Xiuqing

92 C p.
artikel
7 APT datasets and attack modeling for automated detection methods: A review Stojanović, Branka

92 C p.
artikel
8 A Pufferfish privacy mechanism for monitoring web browsing behavior under temporal correlations Liang, Wenjuan

92 C p.
artikel
9 A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished Shin, Bongsik

92 C p.
artikel
10 A secure and scalable data integrity auditing scheme based on hyperledger fabric Lu, Ning

92 C p.
artikel
11 A vulnerability analysis and prediction framework Williams, Mark A.

92 C p.
artikel
12 Byte-level malware classification based on markov images and deep learning Yuan, Baoguo

92 C p.
artikel
13 Defining organisational information security culture—Perspectives from academia and industry da Veiga, Adéle

92 C p.
artikel
14 Dynamic facial presentation attack detection for automated border control systems Ortega, David

92 C p.
artikel
15 Editorial Board
92 C p.
artikel
16 Evaluating the strength of a multilingual passphrase policy Maoneke, Pardon Blessings

92 C p.
artikel
17 Expert system assessing threat level of attacks on a hybrid SSH honeynet Zuzčák, Matej

92 C p.
artikel
18 GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot Gill, Komal Singh

92 C p.
artikel
19 Holistic cyber hygiene education: Accounting for the human factors Neigel, Alexis R.

92 C p.
artikel
20 Image-Based malware classification using ensemble of CNN architectures (IMCEC) Vasan, Danish

92 C p.
artikel
21 Machine Learning Cyberattack and Defense Strategies Bland, John A.

92 C p.
artikel
22 Moving target defense in cloud computing: A systematic mapping study Torquato, Matheus

92 C p.
artikel
23 Multi attribute auction based incentivized solution against DDoS attacks Dahiya, Amrita

92 C p.
artikel
24 On the use of artificial malicious patterns for android malware detection Jerbi, Manel

92 C p.
artikel
25 PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints Xu, Lijuan

92 C p.
artikel
26 Prioritizing data flows and sinks for app security transformation Tian, Ke

92 C p.
artikel
27 Protocol Proxy: An FTE-based covert channel Oakley, Jonathan

92 C p.
artikel
28 Risk management practices in information security: Exploring the status quo in the DACH region Brunner, Michael

92 C p.
artikel
29 Secure and efficient sharing of authenticated energy usage data with privacy preservation Liu, Jianghua

92 C p.
artikel
30 Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences Suaboot, Jakapan

92 C p.
artikel
31 System log clustering approaches for cyber security applications: A survey Landauer, Max

92 C p.
artikel
32 The Ransomware-as-a-Service economy within the darknet Meland, Per Håkon

92 C p.
artikel
33 UMUDGA: A dataset for profiling DGA-based botnet Zago, Mattia

92 C p.
artikel
                             33 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland