nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Achieving secure big data collection based on trust evaluation and true data discovery
|
Lv, Denglong |
|
|
96 |
C |
p. |
artikel |
2 |
A constraint and risk-aware approach to attribute-based access control for cyber-physical systems
|
Baltaci Akhuseyinoglu, Nuray |
|
|
96 |
C |
p. |
artikel |
3 |
A differentially private greedy decision forest classification algorithm with high utility
|
Guan, Zhitao |
|
|
96 |
C |
p. |
artikel |
4 |
Adversarial Detection of Flash Malware: Limitations and Open Issues
|
Maiorca, Davide |
|
|
96 |
C |
p. |
artikel |
5 |
A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks
|
Yang, Bo |
|
|
96 |
C |
p. |
artikel |
6 |
A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors
|
Kuo, Kuang-Ming |
|
|
96 |
C |
p. |
artikel |
7 |
A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis
|
Sammoud, Amal |
|
|
96 |
C |
p. |
artikel |
8 |
A new Foe in biometrics: A narrative review of side-channel attacks
|
Galbally, Javier |
|
|
96 |
C |
p. |
artikel |
9 |
Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI
|
Amara Korba, Abdelaziz |
|
|
96 |
C |
p. |
artikel |
10 |
Anomaly detection in Industrial Control Systems using Logical Analysis of Data
|
Das, Tanmoy Kanti |
|
|
96 |
C |
p. |
artikel |
11 |
A privacy preserve big data analysis system for wearable wireless sensor network
|
Ge, Chunpeng |
|
|
96 |
C |
p. |
artikel |
12 |
A survey of machine learning-based solutions to protect privacy in the Internet of Things
|
Amiri-Zarandi, Mohammad |
|
|
96 |
C |
p. |
artikel |
13 |
Asymmetric effect and dynamic relationships over the cryptocurrencies market
|
Wajdi, Moussa |
|
|
96 |
C |
p. |
artikel |
14 |
Attack signal estimation for intrusion detection in industrial control system
|
Miao, Kelei |
|
|
96 |
C |
p. |
artikel |
15 |
A Unified Analytical model for proof-of-X schemes
|
Yu, Guangsheng |
|
|
96 |
C |
p. |
artikel |
16 |
Automatic network restructuring and risk mitigation through business process asset dependency analysis
|
Stergiopoulos, George |
|
|
96 |
C |
p. |
artikel |
17 |
Continuous authentication by free-text keystroke based on CNN and RNN
|
Lu, Xiaofeng |
|
|
96 |
C |
p. |
artikel |
18 |
Cultivating cybersecurity learning: An integration of self-determination and flow
|
Kam, Hwee-Joo |
|
|
96 |
C |
p. |
artikel |
19 |
Detecting bi-level false data injection attack based on time series analysis method in smart grid
|
Yang, Liqun |
|
|
96 |
C |
p. |
artikel |
20 |
Detecting mobile advanced persistent threats based on large-scale DNS logs
|
Xiang, Zongyuan |
|
|
96 |
C |
p. |
artikel |
21 |
Editorial Board
|
|
|
|
96 |
C |
p. |
artikel |
22 |
Encrypted video traffic clustering demystified
|
Dvir, Amit |
|
|
96 |
C |
p. |
artikel |
23 |
FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems
|
Haider, Waqas |
|
|
96 |
C |
p. |
artikel |
24 |
Fine-grained assured data deletion scheme based on attribute association
|
Tian, Junfeng |
|
|
96 |
C |
p. |
artikel |
25 |
Forecasting the number of firefighter interventions per region with local-differential-privacy-based data
|
Arcolezi, Héber H. |
|
|
96 |
C |
p. |
artikel |
26 |
Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud
|
Onwubiko, Cyril |
|
|
96 |
C |
p. |
artikel |
27 |
Highly efficient federated learning with strong privacy preservation in cloud computing
|
Fang, Chen |
|
|
96 |
C |
p. |
artikel |
28 |
Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics
|
Case, Andrew |
|
|
96 |
C |
p. |
artikel |
29 |
HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics
|
Xie, Jiang |
|
|
96 |
C |
p. |
artikel |
30 |
Insider Threat Risk Prediction based on Bayesian Network
|
Elmrabit, Nebrase |
|
|
96 |
C |
p. |
artikel |
31 |
Model-based risk assessment for cyber physical systems security
|
Tantawy, Ashraf |
|
|
96 |
C |
p. |
artikel |
32 |
Passive- and not active-risk tendencies predict cyber security behavior
|
Arend, Isabel |
|
|
96 |
C |
p. |
artikel |
33 |
Passphrase and keystroke dynamics authentication: Usable security
|
Bhana, Bhaveer |
|
|
96 |
C |
p. |
artikel |
34 |
Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach
|
Yao, Yuanfan |
|
|
96 |
C |
p. |
artikel |
35 |
Privacy-preserving spatial query protocol based on the Moore curve for location-based service
|
Lian, Huijuan |
|
|
96 |
C |
p. |
artikel |
36 |
Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment
|
van der Schyff, Karl |
|
|
96 |
C |
p. |
artikel |
37 |
Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach
|
Iannacone, Michael D. |
|
|
96 |
C |
p. |
artikel |
38 |
Randpay: The technology for blockchain micropayments and transactions which require recipient's consent
|
Konashevych, Oleksii |
|
|
96 |
C |
p. |
artikel |
39 |
RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours
|
Chen, Jinyin |
|
|
96 |
C |
p. |
artikel |
40 |
Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning
|
Karbab, ElMouatez Billah |
|
|
96 |
C |
p. |
artikel |
41 |
TEEnder: SGX enclave migration using HSMs
|
Guerreiro, João |
|
|
96 |
C |
p. |
artikel |
42 |
The privacy paradox applies to IoT devices too: A Saudi Arabian study
|
Aleisa, Noura |
|
|
96 |
C |
p. |
artikel |
43 |
The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach
|
Sun, Zhe |
|
|
96 |
C |
p. |
artikel |
44 |
Towards multiple-mix-attack detection via consensus-based trust management in IoT networks
|
Ma, Zuchao |
|
|
96 |
C |
p. |
artikel |