Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             44 results found
no title author magazine year volume issue page(s) type
1 Achieving secure big data collection based on trust evaluation and true data discovery Lv, Denglong

96 C p.
article
2 A constraint and risk-aware approach to attribute-based access control for cyber-physical systems Baltaci Akhuseyinoglu, Nuray

96 C p.
article
3 A differentially private greedy decision forest classification algorithm with high utility Guan, Zhitao

96 C p.
article
4 Adversarial Detection of Flash Malware: Limitations and Open Issues Maiorca, Davide

96 C p.
article
5 A highly-random hopping sequence for jamming-resilient channel rendezvous in distributed cognitive radio networks Yang, Bo

96 C p.
article
6 A meta-analysis of the deterrence theory in security-compliant and security-risk behaviors Kuo, Kuang-Ming

96 C p.
article
7 A new biometrics-based key establishment protocol in WBAN: energy efficiency and security robustness analysis Sammoud, Amal

96 C p.
article
8 A new Foe in biometrics: A narrative review of side-channel attacks Galbally, Javier

96 C p.
article
9 Anomaly-based framework for detecting power overloading cyberattacks in smart grid AMI Amara Korba, Abdelaziz

96 C p.
article
10 Anomaly detection in Industrial Control Systems using Logical Analysis of Data Das, Tanmoy Kanti

96 C p.
article
11 A privacy preserve big data analysis system for wearable wireless sensor network Ge, Chunpeng

96 C p.
article
12 A survey of machine learning-based solutions to protect privacy in the Internet of Things Amiri-Zarandi, Mohammad

96 C p.
article
13 Asymmetric effect and dynamic relationships over the cryptocurrencies market Wajdi, Moussa

96 C p.
article
14 Attack signal estimation for intrusion detection in industrial control system Miao, Kelei

96 C p.
article
15 A Unified Analytical model for proof-of-X schemes Yu, Guangsheng

96 C p.
article
16 Automatic network restructuring and risk mitigation through business process asset dependency analysis Stergiopoulos, George

96 C p.
article
17 Continuous authentication by free-text keystroke based on CNN and RNN Lu, Xiaofeng

96 C p.
article
18 Cultivating cybersecurity learning: An integration of self-determination and flow Kam, Hwee-Joo

96 C p.
article
19 Detecting bi-level false data injection attack based on time series analysis method in smart grid Yang, Liqun

96 C p.
article
20 Detecting mobile advanced persistent threats based on large-scale DNS logs Xiang, Zongyuan

96 C p.
article
21 Editorial Board
96 C p.
article
22 Encrypted video traffic clustering demystified Dvir, Amit

96 C p.
article
23 FGMC-HADS: Fuzzy Gaussian mixture-based correntropy models for detecting zero-day attacks from linux systems Haider, Waqas

96 C p.
article
24 Fine-grained assured data deletion scheme based on attribute association Tian, Junfeng

96 C p.
article
25 Forecasting the number of firefighter interventions per region with local-differential-privacy-based data Arcolezi, Héber H.

96 C p.
article
26 Fraud matrix: A morphological and analysis-based classification and taxonomy of fraud Onwubiko, Cyril

96 C p.
article
27 Highly efficient federated learning with strong privacy preservation in cloud computing Fang, Chen

96 C p.
article
28 Hooktracer: Automatic Detection and Analysis of Keystroke Loggers Using Memory Forensics Case, Andrew

96 C p.
article
29 HSTF-Model: An HTTP-based Trojan detection model via the Hierarchical Spatio-temporal Features of Traffics Xie, Jiang

96 C p.
article
30 Insider Threat Risk Prediction based on Bayesian Network Elmrabit, Nebrase

96 C p.
article
31 Model-based risk assessment for cyber physical systems security Tantawy, Ashraf

96 C p.
article
32 Passive- and not active-risk tendencies predict cyber security behavior Arend, Isabel

96 C p.
article
33 Passphrase and keystroke dynamics authentication: Usable security Bhana, Bhaveer

96 C p.
article
34 Privacy-preserving and energy efficient task offloading for collaborative mobile computing in IoT: An ADMM approach Yao, Yuanfan

96 C p.
article
35 Privacy-preserving spatial query protocol based on the Moore curve for location-based service Lian, Huijuan

96 C p.
article
36 Privacy risk and the use of Facebook Apps: A gender-focused vulnerability assessment van der Schyff, Karl

96 C p.
article
37 Quantifiable & comparable evaluations of cyber defensive capabilities: A survey & novel, unified approach Iannacone, Michael D.

96 C p.
article
38 Randpay: The technology for blockchain micropayments and transactions which require recipient's consent Konashevych, Oleksii

96 C p.
article
39 RCA-SOC: A novel adversarial defense by refocusing on critical areas and strengthening object contours Chen, Jinyin

96 C p.
article
40 Scalable and robust unsupervised Android malware fingerprinting using community-based network partitioning Karbab, ElMouatez Billah

96 C p.
article
41 TEEnder: SGX enclave migration using HSMs Guerreiro, João

96 C p.
article
42 The privacy paradox applies to IoT devices too: A Saudi Arabian study Aleisa, Noura

96 C p.
article
43 The QoS and privacy trade-off of adversarial deep learning: An evolutionary game approach Sun, Zhe

96 C p.
article
44 Towards multiple-mix-attack detection via consensus-based trust management in IoT networks Ma, Zuchao

96 C p.
article
                             44 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands