Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Adaptation of password strength estimators to a non-English environment—the Czech experience Doucek, Petr

95 C p.
artikel
2 A distributed location obfuscation method for online route planning Corcoran, Padraig

95 C p.
artikel
3 A graph-theoretic approach for the detection of phishing webpages Tan, Choon Lin

95 C p.
artikel
4 A maturity model for secure requirements engineering Niazi, Mahmood

95 C p.
artikel
5 Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment Menard, Philip

95 C p.
artikel
6 A survey on multi-factor authentication for online banking in the wild Sinigaglia, Federico

95 C p.
artikel
7 Building Auto-Encoder Intrusion Detection System based on random forest feature selection Li, XuKui

95 C p.
artikel
8 Building next generation Cyber Ranges with CRACK Russo, Enrico

95 C p.
artikel
9 Cloud data integrity verification scheme for associated tags Tian, Junfeng

95 C p.
artikel
10 Cooperative malicious network behavior recognition algorithm in E-commerce Zhou, Man

95 C p.
artikel
11 Editorial Board
95 C p.
artikel
12 HYDRA: A multimodal deep learning framework for malware classification Gibert, Daniel

95 C p.
artikel
13 LogoSENSE: A companion HOG based logo detection scheme for phishing web page and E-mail brand recognition Bozkir, Ahmet Selman

95 C p.
artikel
14 M-PIVAD - Virtual memory based approach against non-control data attacks Dileesh, E.D.

95 C p.
artikel
15 Privacy preserving search services against online attack Zhao, Yi

95 C p.
artikel
16 Proof of X-repute blockchain consensus protocol for IoT systems Wang, Eric Ke

95 C p.
artikel
17 Riskio: A Serious Game for Cyber Security Awareness and Education Hart, Stephen

95 C p.
artikel
18 Segmentation-validation based handwritten Arabic CAPTCHA generation Parvez, Mohammad Tanvir

95 C p.
artikel
19 SensorRE: Provenance support for software reverse engineers Henry, Wayne C.

95 C p.
artikel
20 Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks Qian, Yaguan

95 C p.
artikel
21 The effect of the privacy policy of Health Information Exchange (HIE) on patients’ information disclosure intention Esmaeilzadeh, Pouyan

95 C p.
artikel
22 TIMiner: Automatically extracting and analyzing categorized cyber threat intelligence from social data Zhao, Jun

95 C p.
artikel
23 Validation of a socio-technical management process for optimising cybersecurity practices Malatji, Masike

95 C p.
artikel
24 We need to talk about antiviruses: challenges & pitfalls of AV evaluations Botacin, Marcus

95 C p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland