Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             163 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures Seo, Jae Hong
2017
2 p. 193-220
artikel
2 A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy Goenka, Richa

2 p. 819-848
artikel
3 Adding support to XACML for multi-domain user to user dynamic delegation of authority Chadwick, David W.
2008
2 p. 137-152
artikel
4 A deep learning approach based on multi-view consensus for SQL injection detection Kakisim, Arzu Gorgulu

2 p. 1541-1556
artikel
5 A distributed digital rights management model for secure information-distribution systems Abie, Habtamu
2004
2 p. 113-128
artikel
6 Adversarial security mitigations of mmWave beamforming prediction models using defensive distillation and adversarial retraining Kuzlu, Murat

2 p. 319-332
artikel
7 A framework for establishing trust in Cloud provenance Abbadi, Imad M.
2012
2 p. 111-128
artikel
8 A framework for secure execution of software Maña, Antonio
2004
2 p. 99-112
artikel
9 A game-theoretic approach for integrity assurance in resource-bounded systems Laszka, Aron
2017
2 p. 221-242
artikel
10 A graph-theoretical model of computer security Burgess, Mark
2004
2 p. 70-85
artikel
11 A hybrid approach to vector-based homomorphic tallying remote voting Mateu, Víctor
2015
2 p. 211-221
artikel
12 A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks Bhale, Pradeepkumar

2 p. 915-934
artikel
13 All sail, no anchor II: Acceptable high-end PKI Blakley, B.
2003
2 p. 66-77
artikel
14 A method for identifying compromised clients based on DNS traffic analysis Stevanovic, Matija
2016
2 p. 115-132
artikel
15 A methodology for ensuring fair allocation of CSOC effort for alert investigation Shah, Ankit
2018
2 p. 199-218
artikel
16 A methodology to measure and monitor level of operational effectiveness of a CSOC Shah, Ankit
2017
2 p. 121-134
artikel
17 A modular cyber security training programme for the maritime domain Oruc, Aybars

2 p. 1477-1512
artikel
18 An adaptive threat model for security ceremonies Martina, Jean Everson
2014
2 p. 103-121
artikel
19 An analysis of accuracy experiments carried out over of a multi-faceted model of trust Quinn, Karl
2009
2 p. 103-119
artikel
20 An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function Tyagi, Gaurav

2 p. 935-962
artikel
21 An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152 Saikam, Jalaiah

2 p. 1037-1054
artikel
22 An intrusion detection approach based on incremental long short-term memory Zhou, Hanxun

2 p. 433-446
artikel
23 A novel malicious remote administration tool using stealth and self-defense techniques Kazoleas, Ioannis

2 p. 357-378
artikel
24 An SDN approach to detect targeted attacks in P2P fully connected overlays Medina-López, Cristóbal

2 p. 245-255
artikel
25 An SSH predictive model using machine learning with web proxy session logs Lee, Junwon

2 p. 311-322
artikel
26 A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems Asad, H.

2 p. 1331-1346
artikel
27 Applying NLP techniques to malware detection in a practical environment Mimura, Mamoru

2 p. 279-291
artikel
28 A review on digital twins for power generation and distribution Heluany, Jessica B.

2 p. 1171-1195
artikel
29 A secure architecture for TCP/UDP-based cloud communications Faisal, Abu

2 p. 161-179
artikel
30 A semantic-aware log generation method for network activities Yichiet, Aun

2 p. 161-177
artikel
31 ASICS: authenticated key exchange security incorporating certification systems Boyd, Colin
2016
2 p. 151-171
artikel
32 A simple and secure user authentication scheme using Map Street View with usability analysis based on ISO/IEC 25022 Mishra, Kailash Chandra

2 p. 403-415
artikel
33 A survey and characterization of Close Access Cyberspace Operations Villalón-Huerta, Antonio

2 p. 963-980
artikel
34 A survey on run-time packers and mitigation techniques Alkhateeb, Ehab

2 p. 887-913
artikel
35 A systematic mapping study on security for systems of systems Olivero, Miguel Angel

2 p. 787-817
artikel
36 Attacks on smart grid: power supply interruption and malicious power generation Adepu, Sridhar

2 p. 189-211
artikel
37 A uniform approach for access control and business models with explicit rule realization Karimi, Vahid R.
2015
2 p. 145-171
artikel
38 Authenticated logarithmic-order supersingular isogeny group key exchange Hougaard, Hector B.

2 p. 207-221
artikel
39 Authentication-enabled attribute-based access control for smart homes Burakgazi Bilgen, Melike

2 p. 479-495
artikel
40 Authentication in mobile devices through hand gesture recognition Guerra-Casanova, J.
2012
2 p. 65-83
artikel
41 Automated benchmark network diversification for realistic attack simulation with application to moving target defense Bajic, Alexander

2 p. 253-278
artikel
42 Behavior-based approach to detect spam over IP telephony attacks Jabeur Ben Chikha, Randa
2015
2 p. 131-143
artikel
43 BlindIdM: A privacy-preserving approach for identity management as a service Nuñez, David
2014
2 p. 199-215
artikel
44 Blockchain-based multi-organizational cyber risk management framework for collaborative environments El Amin, Habib

2 p. 1231-1249
artikel
45 Browser-in-the-Middle (BitM) attack Tommasi, Franco

2 p. 179-189
artikel
46 Bu-Dash: a universal and dynamic graphical password scheme (extended version) Andriotis, Panagiotis

2 p. 381-401
artikel
47 Cashing out crypto: state of practice in ransom payments Patsakis, Constantinos

2 p. 699-712
artikel
48 Certificate revocation system implementation based on the Merkle hash tree Muñoz, Jose L.
2003
2 p. 110-124
artikel
49 Combining behavioral biometrics and session context analytics to enhance risk-based static authentication in web applications Solano, Jesus

2 p. 181-197
artikel
50 Complete analysis of configuration rules to guarantee reliable network security policies Alfaro, J. G.
2007
2 p. 103-122
artikel
51 Conditional reactive simulatability Backes, Michael
2007
2 p. 155-169
artikel
52 Correction to: Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies Ben Attia, Hasiba

2 p. 241
artikel
53 Counting equations in algebraic attacks on block ciphers Knudsen, Lars R.
2009
2 p. 127-135
artikel
54 Cryptanalysis of the convex hull click human identification protocol Asghar, Hassan Jameel
2012
2 p. 83-96
artikel
55 Cryptanalytic time–memory trade-off for password hashing schemes Chang, Donghoon
2018
2 p. 163-180
artikel
56 Cryptographically sound security proofs for basic and public-key Kerberos Backes, Michael
2011
2 p. 107-134
artikel
57 Cyberattack defense mechanism using deep learning techniques in software-defined networks Rao, Dimmiti Srinivasa

2 p. 1279-1291
artikel
58 Cybersecurity training and healthcare: the AERAS approach Frati, Fulvio

2 p. 1527-1539
artikel
59 De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem Prantl, Thomas

2 p. 1149-1169
artikel
60 Defense against membership inference attack in graph neural networks through graph perturbation Wang, Kai

2 p. 497-509
artikel
61 Delegation in role-based access control Crampton, Jason
2007
2 p. 123-136
artikel
62 Denial of service attacks and defenses in decentralized trust management Li, Jiangtao
2008
2 p. 89-101
artikel
63 Design and analysis of DDoS mitigating network architecture Swati,

2 p. 333-345
artikel
64 Designing in-VM-assisted lightweight agent-based malware detection framework for securing virtual machines in cloud computing Patil, Rajendra

2 p. 147-162
artikel
65 Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition Niktabe, Sepideh

2 p. 1293-1316
artikel
66 Discretionary capability confinement Fong, Philip W. L.
2007
2 p. 137-154
artikel
67 Distributed access control for information-centric networking architectures using verifiable credentials Alzahrani, Bander

2 p. 467-478
artikel
68 Dynamic reversed accumulator Kuo, Tsung-Min
2017
2 p. 183-191
artikel
69 Editorial Gollmann, Dieter
2007
2 p. 101
artikel
70 Enhanced GeoProof: improved geographic assurance for data in the cloud Albeshri, Aiiad
2013
2 p. 191-198
artikel
71 Enhanced Tacit Secrets: System-assigned passwords you can’t write down, but don’t need to Joudaki, Zeinab
2018
2 p. 239-255
artikel
72 Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning El Mendili, Fatna

2 p. 1359-1388
artikel
73 Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication Hamila, Firas

2 p. 1131-1148
artikel
74 Evaluating the impact of filter-based feature selection in intrusion detection systems Zouhri, Houssam

2 p. 759-785
artikel
75 Evaluation in the absence of absolute ground truth: toward reliable evaluation methodology for scan detectors Alsaleh, Mansour
2012
2 p. 97-110
artikel
76 Evaluation of neural networks defenses and attacks using NDCG and reciprocal rank metrics Brama, Haya

2 p. 525-540
artikel
77 Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT Ince, Kenan

2 p. 1117-1130
artikel
78 Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system Ahmad, Tahir

2 p. 379-408
artikel
79 Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems Toreini, Ehsan

2 p. 981-997
artikel
80 Formal analysis for robust anti-SPIT protection using model checking Gritzalis, Dimitris
2012
2 p. 121-135
artikel
81 Formal modeling and automatic enforcement of Bring Your Own Device policies Armando, Alessandro
2014
2 p. 123-140
artikel
82 Formal validation of automated policy refinement in the management of network security systems Albuquerque, João Porto de
2010
2 p. 99-125
artikel
83 Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees Faizan Ali, Rao

2 p. 1197-1213
artikel
84 Generating adversarial examples with collaborative generative models Xu, Lei

2 p. 1077-1091
artikel
85 Generating ICS vulnerability playbooks with open standards Empl, Philip

2 p. 1215-1230
artikel
86 Generating visible RSA public keys for PKI Laih, C.S.
2004
2 p. 103-109
artikel
87 Hiding information against structural re-identification Gulyás , Gábor György
2018
2 p. 125-139
artikel
88 HoneyCirculator: distributing credential honeytoken for introspection of web-based attack cycle Akiyama, Mitsuaki
2017
2 p. 135-151
artikel
89 How education level influences internet security knowledge, behaviour, and attitude: a comparison among undergraduates, postgraduates and working graduates An, Qin

2 p. 305-317
artikel
90 HTTPScout: A Machine Learning based Countermeasure for HTTP Flood Attacks in SDN Mohammadi, Reza

2 p. 367-379
artikel
91 Identifier discrimination: realizing selective-ID HIBE with authorized delegation and dedicated encryption privacy Zheng, Jian-Wu
2018
2 p. 141-162
artikel
92 Information security and privacy challenges of cloud computing for government adoption: a systematic review Ukeje, Ndukwe

2 p. 1459-1475
artikel
93 Integrating the edge computing paradigm into the development of IoT forensic methodologies Castelo Gómez, Juan Manuel

2 p. 1093-1116
artikel
94 Intrusion detection for power grid: a review Dasgupta, Rupshali

2 p. 1317-1329
artikel
95 ISM-AC: an immune security model based on alert correlation and software-defined networking Melo, Roberto Vasconcelos

2 p. 191-205
artikel
96 Lightweight energy consumption-based intrusion detection system for wireless sensor networks Riecker, Michael
2014
2 p. 155-167
artikel
97 Link-time smart card code hardening Keulenaer, Ronald De
2015
2 p. 111-130
artikel
98 Locating collaborative attack targets based on physical invariants toward cyber-physical systems Xun, Peng

2 p. 999-1017
artikel
99 Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow Munonye, Kindson

2 p. 223-237
artikel
100 Maritime cybersecurity: protecting digital seas Martínez, Ferney

2 p. 1429-1457
artikel
101 Message from the Guest Editors Yang, Guomin
2016
2 p. 223-224
artikel
102 Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis Yildirim, Metehan

2 p. 239-251
artikel
103 Mobile-Sandbox: combining static and dynamic analysis with machine-learning techniques Spreitzenbarth, Michael
2014
2 p. 141-153
artikel
104 Mobile Web services authentication using SAML and 3GPP generic bootstrapping architecture Elmufti, Kalid
2008
2 p. 77-87
artikel
105 Multi-device anonymous authentication Kluczniak, Kamil
2018
2 p. 181-197
artikel
106 Multi-operator wireless mesh networks secured by an all-encompassing security architecture Egners, André
2014
2 p. 169-186
artikel
107 Network intrusion detection and mitigation in SDN using deep learning models Maddu, Mamatha

2 p. 849-862
artikel
108 Olympus: a GDPR compliant blockchain system Gonçalves, Ricardo Martins

2 p. 1021-1036
artikel
109 On detecting co-resident cloud instances using network flow watermarking techniques Bates, Adam
2013
2 p. 171-189
artikel
110 On hash functions using checksums Gauravaram, Praveen
2009
2 p. 137-151
artikel
111 On improving resistance to Denial of Service and key provisioning scalability of the DTLS handshake Tiloca, Marco
2016
2 p. 173-193
artikel
112 On security arguments of the second round SHA-3 candidates Andreeva, Elena
2012
2 p. 103-120
artikel
113 On the measurement of privacy as an attacker’s estimation error Rebollo-Monedero, David
2012
2 p. 129-149
artikel
114 On the security of AUTH, a provably secure authentication protocol based on the subspace LPN problem Rizomiliotis, Panagiotis
2012
2 p. 151-154
artikel
115 Optimization of parallel firewalls filtering rules Hadjadj, Taha Elamine

2 p. 323-340
artikel
116 Password guessers under a microscope: an in-depth analysis to inform deployments Parish, Zach

2 p. 409-425
artikel
117 PiSHi: click the images and I tell if you are a human Mehrnezhad, Maryam
2016
2 p. 133-149
artikel
118 PKI design based on the use of on-line certification authorities Lopez, Javier
2003
2 p. 91-102
artikel
119 Preface 2011
2 p. 61
artikel
120 Preface to the special issue on PKI Dawson, E.
2003
2 p. 65
artikel
121 Preventing sensitive relationships disclosure for better social media preservation Raad, Elie
2015
2 p. 173-194
artikel
122 Principles of remote attestation Coker, George
2011
2 p. 63-81
artikel
123 Privacy-enhanced architecture for smart metering Gómez Mármol, Félix
2012
2 p. 67-82
artikel
124 Probabilistic timing covert channels: to close or not to close? Di Pierro, Alessandra
2010
2 p. 83-106
artikel
125 Protocols useful on the Internet from distributed signature schemes Daza, Vanesa
2004
2 p. 61-69
artikel
126 Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Patruni, Muralidhara Rao

2 p. 1019
artikel
127 Radio frequency fingerprinting techniques for device identification: a survey Abbas, Sohail

2 p. 1389-1427
artikel
128 Resolving privacy-preserving relationships over outsourced encrypted data storages Huertas Celdrán, Alberto
2015
2 p. 195-209
artikel
129 Restricted usage of anonymous credentials in vehicular ad hoc networks for misbehavior detection Singh, Ankit
2016
2 p. 195-211
artikel
130 Revisiting QUIC attacks: a comprehensive review on QUIC security and a hands-on study Chatzoglou, Efstratios

2 p. 347-365
artikel
131 Scalable non-deterministic clustering-based k-anonymization for rich networks Ros-Martín, Miguel
2018
2 p. 219-238
artikel
132 SealFSv2: combining storage-based and ratcheting for tamper-evident logging Guardiola-Múzquiz, Gorka

2 p. 447-466
artikel
133 Secure and efficient wildcard search over encrypted data Chatterjee, Sanjit

2 p. 199-244
artikel
134 Security bug reports classification using fasttext Alqahtani, Sultan S.

2 p. 1347-1358
artikel
135 Security in cloud computing 2014
2 p. 95-96
artikel
136 Security issues in cloud environments: a survey Fernandes, Diogo A. B.
2013
2 p. 113-170
artikel
137 Security policy verification for multi-domains in cloud systems Gouglidis, Antonios
2013
2 p. 97-111
artikel
138 SEDS: secure and efficient server-aided data deduplication scheme for cloud storage Nayak, Sanjeet Kumar

2 p. 229-240
artikel
139 Short collusion-secure fingerprint codes against three pirates Nuida, Koji
2012
2 p. 85-102
artikel
140 SilentKnock: practical, provably undetectable authentication Vasserman, Eugene Y.
2008
2 p. 121-135
artikel
141 SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks Ariyadasa, Subhash

2 p. 1055-1076
artikel
142 SonarSnoop: active acoustic side-channel attacks Cheng, Peng

2 p. 213-228
artikel
143 Special issue on “SCADA and control system security” 2011
2 p. 135-136
artikel
144 Special issue on the Security Track at the ACM Symposium on Applied Computing 2013 Bella, Giampaolo
2015
2 p. 101-102
artikel
145 Strong leakage-resilient encryption: enhancing data confidentiality by hiding partial ciphertext Xu, Jia

2 p. 141-159
artikel
146 Structural analysis and detection of android botnets using machine learning techniques Kirubavathi, G.
2017
2 p. 153-167
artikel
147 Studying lattice reduction algorithms improved by quick reordering technique Wang, Yuntao

2 p. 257-268
artikel
148 The Agent Web Model: modeling web hacking for reinforcement learning Erdődi, László

2 p. 293-309
artikel
149 The efficiency of solving multiple discrete logarithm problems and the implications for the security of fixed elliptic curves Hitchcock, Yvonne
2004
2 p. 86-98
artikel
150 Theory and benefits of recursive certificate structures Russell, Selwyn
2004
2 p. 78-90
artikel
151 The principle of guarantee availability for security protocol analysis Bella, Giampaolo
2009
2 p. 83-97
artikel
152 The rise of “security and privacy”: bibliometric analysis of computer privacy research Ali, Auwal Shehu

2 p. 863-885
artikel
153 TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment Nandanwar, Himanshu

2 p. 1251-1277
artikel
154 Topology-hiding garbled circuits without universal circuits Zhang, Zheng

2 p. 341-356
artikel
155 Toward a blockchain-based framework for challenge-based collaborative intrusion detection Li, Wenjuan

2 p. 127-139
artikel
156 Toward a unified and secure approach for extraction of forensic digital evidence from an IoT device Gandhi, Kapilan Kulayan Arumugam

2 p. 417-431
artikel
157 Trends in publishing blockchain surveys: a bibliometric perspective Ahmad, Hira

2 p. 511-523
artikel
158 Two-factor authentication for the Bitcoin protocol Mann, Christopher
2016
2 p. 213-226
artikel
159 Using Hierarchical Timed Coloured Petri Nets in the formal study of TRBAC security policies Ben Attia, Hasiba

2 p. 163-187
artikel
160 Using targeted Bayesian network learning for suspect identification in communication networks Gruber, A.
2017
2 p. 169-181
artikel
161 Verifying multicast-based security protocols using the inductive method Martina, Jean Everson
2014
2 p. 187-204
artikel
162 Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures Hamdi, Ahlem

2 p. 713-757
artikel
163 Vulnerability discovery based on source code patch commit mining: a systematic literature review Zuo, Fei

2 p. 1513-1526
artikel
                             163 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland