nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive model of information security factors for decision-makers
|
Diesch, Rainer |
|
|
92 |
C |
p. |
artikel |
2 |
A deep learning method with wrapper based feature extraction for wireless intrusion detection system
|
Kasongo, Sydney Mambwe |
|
|
92 |
C |
p. |
artikel |
3 |
A dynamic Windows malware detection and prediction method based on contextual understanding of API call sequence
|
Amer, Eslam |
|
|
92 |
C |
p. |
artikel |
4 |
All about uncertainties and traps: Statistical oracle-based attacks on a new CAPTCHA protection against oracle attacks
|
Hernández-Castro, Carlos Javier |
|
|
92 |
C |
p. |
artikel |
5 |
An automated model to score the privacy of unstructured information—Social media case
|
Aghasian, Erfan |
|
|
92 |
C |
p. |
artikel |
6 |
An integrity verification scheme of cloud storage for internet-of-things mobile terminal devices
|
Lu, Xiuqing |
|
|
92 |
C |
p. |
artikel |
7 |
APT datasets and attack modeling for automated detection methods: A review
|
Stojanović, Branka |
|
|
92 |
C |
p. |
artikel |
8 |
A Pufferfish privacy mechanism for monitoring web browsing behavior under temporal correlations
|
Liang, Wenjuan |
|
|
92 |
C |
p. |
artikel |
9 |
A review and theoretical explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that needs to be fostered in information security practitioners and how this can be accomplished
|
Shin, Bongsik |
|
|
92 |
C |
p. |
artikel |
10 |
A secure and scalable data integrity auditing scheme based on hyperledger fabric
|
Lu, Ning |
|
|
92 |
C |
p. |
artikel |
11 |
A vulnerability analysis and prediction framework
|
Williams, Mark A. |
|
|
92 |
C |
p. |
artikel |
12 |
Byte-level malware classification based on markov images and deep learning
|
Yuan, Baoguo |
|
|
92 |
C |
p. |
artikel |
13 |
Defining organisational information security culture—Perspectives from academia and industry
|
da Veiga, Adéle |
|
|
92 |
C |
p. |
artikel |
14 |
Dynamic facial presentation attack detection for automated border control systems
|
Ortega, David |
|
|
92 |
C |
p. |
artikel |
15 |
Editorial Board
|
|
|
|
92 |
C |
p. |
artikel |
16 |
Evaluating the strength of a multilingual passphrase policy
|
Maoneke, Pardon Blessings |
|
|
92 |
C |
p. |
artikel |
17 |
Expert system assessing threat level of attacks on a hybrid SSH honeynet
|
Zuzčák, Matej |
|
|
92 |
C |
p. |
artikel |
18 |
GTM-CSec: Game theoretic model for cloud security based on IDS and honeypot
|
Gill, Komal Singh |
|
|
92 |
C |
p. |
artikel |
19 |
Holistic cyber hygiene education: Accounting for the human factors
|
Neigel, Alexis R. |
|
|
92 |
C |
p. |
artikel |
20 |
Image-Based malware classification using ensemble of CNN architectures (IMCEC)
|
Vasan, Danish |
|
|
92 |
C |
p. |
artikel |
21 |
Machine Learning Cyberattack and Defense Strategies
|
Bland, John A. |
|
|
92 |
C |
p. |
artikel |
22 |
Moving target defense in cloud computing: A systematic mapping study
|
Torquato, Matheus |
|
|
92 |
C |
p. |
artikel |
23 |
Multi attribute auction based incentivized solution against DDoS attacks
|
Dahiya, Amrita |
|
|
92 |
C |
p. |
artikel |
24 |
On the use of artificial malicious patterns for android malware detection
|
Jerbi, Manel |
|
|
92 |
C |
p. |
artikel |
25 |
PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints
|
Xu, Lijuan |
|
|
92 |
C |
p. |
artikel |
26 |
Prioritizing data flows and sinks for app security transformation
|
Tian, Ke |
|
|
92 |
C |
p. |
artikel |
27 |
Protocol Proxy: An FTE-based covert channel
|
Oakley, Jonathan |
|
|
92 |
C |
p. |
artikel |
28 |
Risk management practices in information security: Exploring the status quo in the DACH region
|
Brunner, Michael |
|
|
92 |
C |
p. |
artikel |
29 |
Secure and efficient sharing of authenticated energy usage data with privacy preservation
|
Liu, Jianghua |
|
|
92 |
C |
p. |
artikel |
30 |
Sub-curve HMM: A malware detection approach based on partial analysis of API call sequences
|
Suaboot, Jakapan |
|
|
92 |
C |
p. |
artikel |
31 |
System log clustering approaches for cyber security applications: A survey
|
Landauer, Max |
|
|
92 |
C |
p. |
artikel |
32 |
The Ransomware-as-a-Service economy within the darknet
|
Meland, Per Håkon |
|
|
92 |
C |
p. |
artikel |
33 |
UMUDGA: A dataset for profiling DGA-based botnet
|
Zago, Mattia |
|
|
92 |
C |
p. |
artikel |