Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             44 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Achieving secure big data collection based on trust evaluation and true data discovery Lv, Denglong

96 C p.
artikel
2 A constraint and risk-aware approach to attribute-based access control for cyber-physical systems Baltaci Akhuseyinoglu, Nuray

96 C p.
artikel
3 A differentially private greedy decision forest classification algorithm with high utility Guan, Zhitao

96 C p.
artikel
4 Adversarial Detection of Flash Malware: Limitations and Open Issues Maiorca, Davide

96 C p.
artikel
5 A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks Yang, Bo

96 C p.
artikel
6 A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors Kuo, Kuang-Ming

96 C p.
artikel
7 A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis Sammoud, Amal

96 C p.
artikel
8 A new Foe in biometrics: A narrative review of side-channel attacks Galbally, Javier

96 C p.
artikel
9 Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI Amara Korba, Abdelaziz

96 C p.
artikel
10 Anomaly detection in Industrial Control Systems using Logical Analysis of Data Das, Tanmoy Kanti

96 C p.
artikel
11 A privacy preserve big data analysis system for wearable wireless sensor network Ge, Chunpeng

96 C p.
artikel
12 A survey of machine learning-based solutions to protect privacy in the Internet of Things Amiri-Zarandi, Mohammad

96 C p.
artikel
13 Asymmetric effect and dynamic relationships over the cryptocurrencies market Wajdi, Moussa

96 C p.
artikel
14 Attack signal estimation for intrusion detection in industrial control system Miao, Kelei

96 C p.
artikel
15 A Unified Analytical model for proof-of-X schemes Yu, Guangsheng

96 C p.
artikel
16 Automatic network restructuring and risk mitigation through business process asset dependency analysis Stergiopoulos, George

96 C p.
artikel
17 Continuous authentication by free-text keystroke based on CNN and RNN Lu, Xiaofeng

96 C p.
artikel
18 Cultivating cybersecurity learning: An integration of self-determination and flow Kam, Hwee-Joo

96 C p.
artikel
19 Detecting bi-level false data injection attack based on time series analysis method in smart grid Yang, Liqun

96 C p.
artikel
20 Detecting mobile advanced persistent threats based on large-scale DNS logs Xiang, Zongyuan

96 C p.
artikel
21 Editorial Board
96 C p.
artikel
22 Encrypted video traffic clustering demystified Dvir, Amit

96 C p.
artikel
23 FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems Haider, Waqas

96 C p.
artikel
24 Fine-grained assured data deletion scheme based on attribute association Tian, Junfeng

96 C p.
artikel
25 Forecasting the number of firefighter interventions per region with local-differential-privacy-based data Arcolezi, Héber H.

96 C p.
artikel
26 Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud Onwubiko, Cyril

96 C p.
artikel
27 Highly efficient federated learning with strong privacy preservation in cloud computing Fang, Chen

96 C p.
artikel
28 Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics Case, Andrew

96 C p.
artikel
29 HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics Xie, Jiang

96 C p.
artikel
30 Insider Threat Risk Prediction based on Bayesian Network Elmrabit, Nebrase

96 C p.
artikel
31 Model-based risk assessment for cyber physical systems security Tantawy, Ashraf

96 C p.
artikel
32 Passive- and not active-risk tendencies predict cyber security behavior Arend, Isabel

96 C p.
artikel
33 Passphrase and keystroke dynamics authentication: Usable security Bhana, Bhaveer

96 C p.
artikel
34 Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach Yao, Yuanfan

96 C p.
artikel
35 Privacy-preserving spatial query protocol based on the Moore curve for location-based service Lian, Huijuan

96 C p.
artikel
36 Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment van der Schyff, Karl

96 C p.
artikel
37 Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach Iannacone, Michael D.

96 C p.
artikel
38 Randpay: The technology for blockchain micropayments and transactions which require recipient's consent Konashevych, Oleksii

96 C p.
artikel
39 RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours Chen, Jinyin

96 C p.
artikel
40 Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning Karbab, ElMouatez Billah

96 C p.
artikel
41 TEEnder: SGX enclave migration using HSMs Guerreiro, João

96 C p.
artikel
42 The privacy paradox applies to IoT devices too: A Saudi Arabian study Aleisa, Noura

96 C p.
artikel
43 The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach Sun, Zhe

96 C p.
artikel
44 Towards multiple-mix-attack detection via consensus-based trust management in IoT networks Ma, Zuchao

96 C p.
artikel
                             44 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland