nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A differential game method against attacks in heterogeneous honeynet
|
Ren, Jianguo |
|
|
97 |
C |
p. |
artikel |
2 |
A distributed sensing data anomaly detection scheme
|
Yin, Chunyong |
|
|
97 |
C |
p. |
artikel |
3 |
Aggregation-based location privacy: An information theoretic approach
|
Zhang, Wenjing |
|
|
97 |
C |
p. |
artikel |
4 |
Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation
|
Meyer, Joachim |
|
|
97 |
C |
p. |
artikel |
5 |
An anomaly detection framework for cyber-security data
|
Evangelou, Marina |
|
|
97 |
C |
p. |
artikel |
6 |
An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations
|
van der Kleij, Rick |
|
|
97 |
C |
p. |
artikel |
7 |
An efficient and privacy-preserving truth discovery scheme in crowdsensing applications
|
Zhang, Chuan |
|
|
97 |
C |
p. |
artikel |
8 |
A nonproprietary language for the command and control of cyber defenses – OpenC2
|
Mavroeidis, Vasileios |
|
|
97 |
C |
p. |
artikel |
9 |
A novel approach for detecting vulnerable IoT devices connected behind a home NAT
|
Meidan, Yair |
|
|
97 |
C |
p. |
artikel |
10 |
Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey
|
Shi, Shuyun |
|
|
97 |
C |
p. |
artikel |
11 |
A rewriting system for the assessment of XACML policies relationship
|
Mejri, Mohamed |
|
|
97 |
C |
p. |
artikel |
12 |
A secured TPM integration scheme towards smart embedded system based collaboration network
|
Lu, Di |
|
|
97 |
C |
p. |
artikel |
13 |
A semi-automated forensic investigation model for online social networks
|
Arshad, Humaira |
|
|
97 |
C |
p. |
artikel |
14 |
Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views
|
Yang, Runkai |
|
|
97 |
C |
p. |
artikel |
15 |
A systematic review of cyber-resilience assessment frameworks
|
Sepúlveda Estay, Daniel A. |
|
|
97 |
C |
p. |
artikel |
16 |
Attack plan recognition using hidden Markov and probabilistic inference
|
Li, Tun |
|
|
97 |
C |
p. |
artikel |
17 |
A two authorities electronic vote scheme
|
Larriba, Antonio M. |
|
|
97 |
C |
p. |
artikel |
18 |
Authorship identification on limited samplings
|
Boran, Tudor |
|
|
97 |
C |
p. |
artikel |
19 |
Building cyber security awareness in a developing country: Lessons from Myanmar
|
Chang, Lennon Y.C. |
|
|
97 |
C |
p. |
artikel |
20 |
Coarse-to-fine two-stage semantic video carving approach in digital forensics
|
Fang, Junbin |
|
|
97 |
C |
p. |
artikel |
21 |
Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes
|
Zhou, Yuyang |
|
|
97 |
C |
p. |
artikel |
22 |
Covert timing channel detection method based on time interval and payload length analysis
|
Han, Jiaxuan |
|
|
97 |
C |
p. |
artikel |
23 |
Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning
|
Ashrafuzzaman, Mohammad |
|
|
97 |
C |
p. |
artikel |
24 |
DO-RA: Data-oriented runtime attestation for IoT devices
|
Kuang, Boyu |
|
|
97 |
C |
p. |
artikel |
25 |
Dynamic countermeasures selection for multi-path attacks
|
Li, Fenghua |
|
|
97 |
C |
p. |
artikel |
26 |
Editorial Board
|
|
|
|
97 |
C |
p. |
artikel |
27 |
Effects of planning and action control on smartphone security behavior
|
Mi, Tianyue |
|
|
97 |
C |
p. |
artikel |
28 |
Efficient determination of equivalence for encrypted data
|
Doctor, Jason N. |
|
|
97 |
C |
p. |
artikel |
29 |
Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts
|
Patil, Akash Suresh |
|
|
97 |
C |
p. |
artikel |
30 |
Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks
|
Krishnan, R. Santhana |
|
|
97 |
C |
p. |
artikel |
31 |
Exploring HTTPS security inconsistencies: A cross-regional perspective
|
Alashwali, Eman Salem |
|
|
97 |
C |
p. |
artikel |
32 |
False data injection attacks and the insider threat in smart systems
|
Gönen, Serkan |
|
|
97 |
C |
p. |
artikel |
33 |
From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models
|
Compastié, Maxime |
|
|
97 |
C |
p. |
artikel |
34 |
Functionality-based mobile application recommendation system with security and privacy awareness
|
Rocha, Thiago |
|
|
97 |
C |
p. |
artikel |
35 |
Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools
|
Paruchuri, Shravya |
|
|
97 |
C |
p. |
artikel |
36 |
How do they find us? A study of geolocation tracking techniques of malicious web sites
|
Mansoori, Masood |
|
|
97 |
C |
p. |
artikel |
37 |
Iris template protection using double bloom filter based feature transformation
|
S, Ajish |
|
|
97 |
C |
p. |
artikel |
38 |
Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts
|
Lee, Claire Seungeun |
|
|
97 |
C |
p. |
artikel |
39 |
Lightweight privacy-Preserving data classification
|
Tran, Ngoc Hong |
|
|
97 |
C |
p. |
artikel |
40 |
Mitigation measures of collusive interest flooding attacks in named data networking
|
Wu, Zhijun |
|
|
97 |
C |
p. |
artikel |
41 |
Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC)
|
Kumar, Rakesh |
|
|
97 |
C |
p. |
artikel |
42 |
Multiclass malware classification via first- and second-order texture statistics
|
Verma, Vinita |
|
|
97 |
C |
p. |
artikel |
43 |
New biostatistics features for detecting web bot activity on web applications
|
Rahman, Rizwan Ur |
|
|
97 |
C |
p. |
artikel |
44 |
Passive- and not active-risk tendencies predict cyber security behavior
|
Arend, Isabel |
|
|
97 |
C |
p. |
artikel |
45 |
Privacy Preserving Face Recognition Utilizing Differential Privacy
|
Chamikara, M.A.P. |
|
|
97 |
C |
p. |
artikel |
46 |
Protecting sensitive place visits in privacy-preserving trajectory publishing
|
Wang, Nana |
|
|
97 |
C |
p. |
artikel |
47 |
RansomSpector: An introspection-based approach to detect crypto ransomware
|
Tang, Fei |
|
|
97 |
C |
p. |
artikel |
48 |
Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning
|
Karbab, ElMouatez Billah |
|
|
97 |
C |
p. |
artikel |
49 |
Security-Driven hybrid collaborative recommendation method for cloud-based iot services
|
Meng, Shunmei |
|
|
97 |
C |
p. |
artikel |
50 |
Shall we follow? Impact of reputation concern on information security managers’ investment decisions
|
Shao, Xiuyan |
|
|
97 |
C |
p. |
artikel |
51 |
SoK: Machine vs. machine – A systematic classification of automated machine learning-based CAPTCHA solvers
|
Dionysiou, Antreas |
|
|
97 |
C |
p. |
artikel |
52 |
SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism
|
Jin, Dongzi |
|
|
97 |
C |
p. |
artikel |
53 |
Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
|
Chowdhury, Noman H. |
|
|
97 |
C |
p. |
artikel |
54 |
Towards a novel biometric system for forensic document examination
|
Dhieb, Thameur |
|
|
97 |
C |
p. |
artikel |
55 |
UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices
|
Das, Ayan Kumar |
|
|
97 |
C |
p. |
artikel |
56 |
Understanding the security of app-in-the-middle IoT
|
Liu, Hui |
|
|
97 |
C |
p. |
artikel |
57 |
Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing
|
Sun, Qizhang |
|
|
97 |
C |
p. |
artikel |
58 |
WITHDRAWN: Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures
|
Chowdhury, Noman H. |
|
|
97 |
C |
p. |
artikel |