Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             23 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A LINDDUN-Based framework for privacy threat analysis on identification and authentication processes Robles-González, Antonio

94 C p.
artikel
2 An algorithmic approach for optimising biometric systems using liveness and coercion detection Matthew, Peter

94 C p.
artikel
3 An incremental algorithm for the role mining problem Trnecka, Martin

94 C p.
artikel
4 A semantic-based classification approach for an enhanced spam detection Saidani, Nadjate

94 C p.
artikel
5 CAN-ADF: The controller area network attack detection framework Tariq, Shahroz

94 C p.
artikel
6 CIMA: Compiler-Enforced Resilience Against Memory Safety Attacks in Cyber-Physical Systems Chekole, Eyasu Getahun

94 C p.
artikel
7 Compile-time code virtualization for android applications Zhao, Yujie

94 C p.
artikel
8 Consistency analysis and flow secure enforcement of SELinux policies Radhika, B S

94 C p.
artikel
9 Corrigendum to “Breaking the binding: Attacks on the Merkle approach to prove liabilities and its applications” [Computers & Security, Volume 87, 2019, 101585] Hu, Kexin

94 C p.
artikel
10 Corrigendum to “LPSE: Lightweight password-strength estimation for password meters” [Computers & Security, Volume 73, 2018, Pages 507--518] Guo, Yimin

94 C p.
artikel
11 Corrigendum to “Optiwords: A new password policy for creating memorable and strong password” [Computers & Security, Volume 85, 2019, Pages 423-435] Guo, Yimin

94 C p.
artikel
12 Duplicitous social media and data surveillance: An evaluation of privacy risk Schyff, Karl van der

94 C p.
artikel
13 EaSTFLy: Efficient and secure ternary federated learning Dong, Ye

94 C p.
artikel
14 Editorial Board
94 C p.
artikel
15 IBV-CFI: Efficient fine-grained control-flow integrity preserving CFG precision Jang, Hyerean

94 C p.
artikel
16 Improving SIEM alert metadata aggregation with a novel kill-chain based classification model Bryant, Blake D.

94 C p.
artikel
17 IoT malicious traffic identification using wrapper-based feature selection mechanisms Shafiq, Muhammad

94 C p.
artikel
18 LiDL: Localization with early detection of sybil and wormhole attacks in IoT Networks Kaliyar, Pallavi

94 C p.
artikel
19 Nudging personalized password policies by understanding users’ personality Guo, Yimin

94 C p.
artikel
20 PHRiMA: A permission-based hybrid risk management framework for android apps Hu, Xinwen

94 C p.
artikel
21 Semantic diversity: Privacy considering distance between values of sensitive attribute Oishi, Keiichiro

94 C p.
artikel
22 Susceptibility to phishing on social network sites: A personality information processing model Frauenstein, Edwin Donald

94 C p.
artikel
23 What’s really ‘Happning’? A forensic analysis of Android and iOS Happn dating apps Knox, Shawn

94 C p.
artikel
                             23 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland