Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             58 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A differential game method against attacks in heterogeneous honeynet Ren, Jianguo

97 C p.
artikel
2 A distributed sensing data anomaly detection scheme Yin, Chunyong

97 C p.
artikel
3 Aggregation-based location privacy: An information theoretic approach Zhang, Wenjing

97 C p.
artikel
4 Alerting about possible risks vs. blocking risky choices: A quantitative model and its empirical evaluation Meyer, Joachim

97 C p.
artikel
5 An anomaly detection framework for cyber-security data Evangelou, Marina

97 C p.
artikel
6 An application and empirical test of the Capability Opportunity Motivation-Behaviour model to data leakage prevention in financial organizations van der Kleij, Rick

97 C p.
artikel
7 An efficient and privacy-preserving truth discovery scheme in crowdsensing applications Zhang, Chuan

97 C p.
artikel
8 A nonproprietary language for the command and control of cyber defenses – OpenC2 Mavroeidis, Vasileios

97 C p.
artikel
9 A novel approach for detecting vulnerable IoT devices connected behind a home NAT Meidan, Yair

97 C p.
artikel
10 Applications of blockchain in ensuring the security and privacy of electronic health record systems: A survey Shi, Shuyun

97 C p.
artikel
11 A rewriting system for the assessment of XACML policies relationship Mejri, Mohamed

97 C p.
artikel
12 A secured TPM integration scheme towards smart embedded system based collaboration network Lu, Di

97 C p.
artikel
13 A semi-automated forensic investigation model for online social networks Arshad, Humaira

97 C p.
artikel
14 Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views Yang, Runkai

97 C p.
artikel
15 A systematic review of cyber-resilience assessment frameworks Sepúlveda Estay, Daniel A.

97 C p.
artikel
16 Attack plan recognition using hidden Markov and probabilistic inference Li, Tun

97 C p.
artikel
17 A two authorities electronic vote scheme Larriba, Antonio M.

97 C p.
artikel
18 Authorship identification on limited samplings Boran, Tudor

97 C p.
artikel
19 Building cyber security awareness in a developing country: Lessons from Myanmar Chang, Lennon Y.C.

97 C p.
artikel
20 Coarse-to-fine two-stage semantic video carving approach in digital forensics Fang, Junbin

97 C p.
artikel
21 Cost-effective moving target defense against DDoS attacks using trilateral game and multi-objective Markov decision processes Zhou, Yuyang

97 C p.
artikel
22 Covert timing channel detection method based on time interval and payload length analysis Han, Jiaxuan

97 C p.
artikel
23 Detecting stealthy false data injection attacks in the smart grid using ensemble-based machine learning Ashrafuzzaman, Mohammad

97 C p.
artikel
24 DO-RA: Data-oriented runtime attestation for IoT devices Kuang, Boyu

97 C p.
artikel
25 Dynamic countermeasures selection for multi-path attacks Li, Fenghua

97 C p.
artikel
26 Editorial Board
97 C p.
artikel
27 Effects of planning and action control on smartphone security behavior Mi, Tianyue

97 C p.
artikel
28 Efficient determination of equivalence for encrypted data Doctor, Jason N.

97 C p.
artikel
29 Efficient privacy-preserving authentication protocol using PUFs with blockchain smart contracts Patil, Akash Suresh

97 C p.
artikel
30 Enhanced certificate revocation scheme with justification facility in mobile ad-hoc networks Krishnan, R. Santhana

97 C p.
artikel
31 Exploring HTTPS security inconsistencies: A cross-regional perspective Alashwali, Eman Salem

97 C p.
artikel
32 False data injection attacks and the insider threat in smart systems Gönen, Serkan

97 C p.
artikel
33 From virtualization security issues to cloud protection opportunities: An in-depth analysis of system virtualization models Compastié, Maxime

97 C p.
artikel
34 Functionality-based mobile application recommendation system with security and privacy awareness Rocha, Thiago

97 C p.
artikel
35 Gaslight revisited: Efficient and powerful fuzzing of digital forensics tools Paruchuri, Shravya

97 C p.
artikel
36 How do they find us? A study of geolocation tracking techniques of malicious web sites Mansoori, Masood

97 C p.
artikel
37 Iris template protection using double bloom filter based feature transformation S, Ajish

97 C p.
artikel
38 Latent groups of cybersecurity preparedness in Europe: Sociodemographic factors and country-level contexts Lee, Claire Seungeun

97 C p.
artikel
39 Lightweight privacy-Preserving data classification Tran, Ngoc Hong

97 C p.
artikel
40 Mitigation measures of collusive interest flooding attacks in named data networking Wu, Zhijun

97 C p.
artikel
41 Modeling continuous security: A conceptual model for automated DevSecOps using open-source software over cloud (ADOC) Kumar, Rakesh

97 C p.
artikel
42 Multiclass malware classification via first- and second-order texture statistics Verma, Vinita

97 C p.
artikel
43 New biostatistics features for detecting web bot activity on web applications Rahman, Rizwan Ur

97 C p.
artikel
44 Passive- and not active-risk tendencies predict cyber security behavior Arend, Isabel

97 C p.
artikel
45 Privacy Preserving Face Recognition Utilizing Differential Privacy Chamikara, M.A.P.

97 C p.
artikel
46 Protecting sensitive place visits in privacy-preserving trajectory publishing Wang, Nana

97 C p.
artikel
47 RansomSpector: An introspection-based approach to detect crypto ransomware Tang, Fei

97 C p.
artikel
48 Scalable and robust unsupervised android malware fingerprinting using community-based network partitioning Karbab, ElMouatez Billah

97 C p.
artikel
49 Security-Driven hybrid collaborative recommendation method for cloud-based iot services Meng, Shunmei

97 C p.
artikel
50 Shall we follow? Impact of reputation concern on information security managers’ investment decisions Shao, Xiuyan

97 C p.
artikel
51 SoK: Machine vs. machine – A systematic classification of automated machine learning-based CAPTCHA solvers Dionysiou, Antreas

97 C p.
artikel
52 SwiftIDS: Real-time intrusion detection system based on LightGBM and parallel intrusion detection mechanism Jin, Dongzi

97 C p.
artikel
53 Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures Chowdhury, Noman H.

97 C p.
artikel
54 Towards a novel biometric system for forensic document examination Dhieb, Thameur

97 C p.
artikel
55 UCFL: User Categorization using Fuzzy Logic towards PUF based Two-Phase Authentication of Fog assisted IoT devices Das, Ayan Kumar

97 C p.
artikel
56 Understanding the security of app-in-the-middle IoT Liu, Hui

97 C p.
artikel
57 Unpacking the intention-behavior gap in privacy decision making for the internet of things (IoT) using aspect listing Sun, Qizhang

97 C p.
artikel
58 WITHDRAWN: Time pressure in human cybersecurity behavior: Theoretical framework and countermeasures Chowdhury, Noman H.

97 C p.
artikel
                             58 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland