nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes
|
Robles-González, Antonio |
|
|
94 |
C |
p. |
artikel |
2 |
An algorithmic approach for optimising biometric systems using liveness and coercion detection
|
Matthew, Peter |
|
|
94 |
C |
p. |
artikel |
3 |
An incremental algorithm for the role mining problem
|
Trnecka, Martin |
|
|
94 |
C |
p. |
artikel |
4 |
A semantic-based classification approach for an enhanced spam detection
|
Saidani, Nadjate |
|
|
94 |
C |
p. |
artikel |
5 |
CAN-ADF: The controller area network attack detection framework
|
Tariq, Shahroz |
|
|
94 |
C |
p. |
artikel |
6 |
CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems
|
Chekole, Eyasu Getahun |
|
|
94 |
C |
p. |
artikel |
7 |
Compile-time code virtualization for android applications
|
Zhao, Yujie |
|
|
94 |
C |
p. |
artikel |
8 |
Consistency analysis and flow secure enforcement of SELinux policies
|
Radhika, B S |
|
|
94 |
C |
p. |
artikel |
9 |
Corrigendum to “Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications” [Computers & Security, Volume 87, 2019, 101585]
|
Hu, Kexin |
|
|
94 |
C |
p. |
artikel |
10 |
Corrigendum to “LPSE: Lightweight password-strength estimation for password meters” [Computers & Security, Volume 73, 2018, Pages 507--518]
|
Guo, Yimin |
|
|
94 |
C |
p. |
artikel |
11 |
Corrigendum to “Optiwords: A new password policy for creating memorable and strong password” [Computers & Security, Volume 85, 2019, Pages 423-435]
|
Guo, Yimin |
|
|
94 |
C |
p. |
artikel |
12 |
Duplicitous social media and data surveillance: An evaluation of privacy risk
|
Schyff, Karl van der |
|
|
94 |
C |
p. |
artikel |
13 |
EaSTFLy: Efficient and secure ternary federated learning
|
Dong, Ye |
|
|
94 |
C |
p. |
artikel |
14 |
Editorial Board
|
|
|
|
94 |
C |
p. |
artikel |
15 |
IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision
|
Jang, Hyerean |
|
|
94 |
C |
p. |
artikel |
16 |
Improving SIEM alert metadata aggregation with a novel kill-chain based classification model
|
Bryant, Blake D. |
|
|
94 |
C |
p. |
artikel |
17 |
IoT malicious traffic identification using wrapper-based feature selection mechanisms
|
Shafiq, Muhammad |
|
|
94 |
C |
p. |
artikel |
18 |
LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks
|
Kaliyar, Pallavi |
|
|
94 |
C |
p. |
artikel |
19 |
Nudging personalized password policies by understanding users’ personality
|
Guo, Yimin |
|
|
94 |
C |
p. |
artikel |
20 |
PHRiMA: A permission-based hybrid risk management framework for android apps
|
Hu, Xinwen |
|
|
94 |
C |
p. |
artikel |
21 |
Semantic diversity: Privacy considering distance between values of sensitive attribute
|
Oishi, Keiichiro |
|
|
94 |
C |
p. |
artikel |
22 |
Susceptibility to phishing on social network sites: A personality information processing model
|
Frauenstein, Edwin Donald |
|
|
94 |
C |
p. |
artikel |
23 |
What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps
|
Knox, Shawn |
|
|
94 |
C |
p. |
artikel |