nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A 2D-graph model-based heuristic approach to visual backtracking security vulnerabilities in physical protection systems
|
Yang, Jun |
|
|
38 |
C |
p. |
artikel |
2 |
A novel deep learning based security assessment framework for enhanced security in swarm network environment
|
Liu, Zhiqiang |
|
|
38 |
C |
p. |
artikel |
3 |
A taxonomy of IoT firmware security and principal firmware analysis techniques
|
Nadir, Ibrahim |
|
|
38 |
C |
p. |
artikel |
4 |
Corrigendum to ‘VetaDetect: Vehicle tampering detection with closed-loop model ensemble’ International Journal of Critical Infrastructure Protection, 37 (2022), 100525
|
Haller, Piroska |
|
|
38 |
C |
p. |
artikel |
5 |
Cyber-attacks detection in industrial systems using artificial intelligence-driven methods
|
Wang, Wu |
|
|
38 |
C |
p. |
artikel |
6 |
Editorial Board
|
|
|
|
38 |
C |
p. |
artikel |
7 |
Editorial for volume 38 IJCIP
|
|
|
|
38 |
C |
p. |
artikel |
8 |
Machine learning for cybersecurity in smart grids: A comprehensive review-based study on methods, solutions, and prospects
|
Berghout, Tarek |
|
|
38 |
C |
p. |
artikel |
9 |
Machine learning for intrusion detection in industrial control systems: Applications, challenges, and recommendations
|
Umer, Muhammad Azmi |
|
|
38 |
C |
p. |
artikel |
10 |
Physical layer protection for ADS-B against spoofing and jamming
|
Rudys, Saulius |
|
|
38 |
C |
p. |
artikel |
11 |
Security in Digital Aeronautical Communications A Comprehensive Gap Analysis
|
Mäurer, Nils |
|
|
38 |
C |
p. |
artikel |
12 |
The digital divide in state vulnerability to submarine communications cable failure
|
Franken, Jonas |
|
|
38 |
C |
p. |
artikel |
13 |
The drift of industrial control systems to pseudo security
|
Donnelly, Peter |
|
|
38 |
C |
p. |
artikel |
14 |
Vulnerability assessment of urban road traffic systems based on traffic flow
|
Wang, Shuliang |
|
|
38 |
C |
p. |
artikel |