nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptation of password strength estimators to a non-English environment—the Czech experience
|
Doucek, Petr |
|
|
95 |
C |
p. |
artikel |
2 |
A distributed location obfuscation method for online route planning
|
Corcoran, Padraig |
|
|
95 |
C |
p. |
artikel |
3 |
A graph-theoretic approach for the detection of phishing webpages
|
Tan, Choon Lin |
|
|
95 |
C |
p. |
artikel |
4 |
A maturity model for secure requirements engineering
|
Niazi, Mahmood |
|
|
95 |
C |
p. |
artikel |
5 |
Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment
|
Menard, Philip |
|
|
95 |
C |
p. |
artikel |
6 |
A survey on multi-factor authentication for online banking in the wild
|
Sinigaglia, Federico |
|
|
95 |
C |
p. |
artikel |
7 |
Building Auto-Encoder Intrusion Detection System based on random forest feature selection
|
Li, XuKui |
|
|
95 |
C |
p. |
artikel |
8 |
Building next generation Cyber Ranges with CRACK
|
Russo, Enrico |
|
|
95 |
C |
p. |
artikel |
9 |
Cloud data integrity verification scheme for associated tags
|
Tian, Junfeng |
|
|
95 |
C |
p. |
artikel |
10 |
Cooperative malicious network behavior recognition algorithm in E-commerce
|
Zhou, Man |
|
|
95 |
C |
p. |
artikel |
11 |
Editorial Board
|
|
|
|
95 |
C |
p. |
artikel |
12 |
HYDRA: A multimodal deep learning framework for malware classification
|
Gibert, Daniel |
|
|
95 |
C |
p. |
artikel |
13 |
LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition
|
Bozkir, Ahmet Selman |
|
|
95 |
C |
p. |
artikel |
14 |
M-PIVAD - Virtual memory based approach against non-control data attacks
|
Dileesh, E.D. |
|
|
95 |
C |
p. |
artikel |
15 |
Privacy preserving search services against online attack
|
Zhao, Yi |
|
|
95 |
C |
p. |
artikel |
16 |
Proof of X-repute blockchain consensus protocol for IoT systems
|
Wang, Eric Ke |
|
|
95 |
C |
p. |
artikel |
17 |
Riskio: A Serious Game for Cyber Security Awareness and Education
|
Hart, Stephen |
|
|
95 |
C |
p. |
artikel |
18 |
Segmentation-validation based handwritten Arabic CAPTCHA generation
|
Parvez, Mohammad Tanvir |
|
|
95 |
C |
p. |
artikel |
19 |
SensorRE: Provenance support for software reverse engineers
|
Henry, Wayne C. |
|
|
95 |
C |
p. |
artikel |
20 |
Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks
|
Qian, Yaguan |
|
|
95 |
C |
p. |
artikel |
21 |
The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention
|
Esmaeilzadeh, Pouyan |
|
|
95 |
C |
p. |
artikel |
22 |
TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data
|
Zhao, Jun |
|
|
95 |
C |
p. |
artikel |
23 |
Validation of a socio-technical management process for optimising cybersecurity practices
|
Malatji, Masike |
|
|
95 |
C |
p. |
artikel |
24 |
We need to talk about antiviruses: challenges & pitfalls of AV evaluations
|
Botacin, Marcus |
|
|
95 |
C |
p. |
artikel |