nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accessible password strength assessment method for visually challenged users
|
Kuppusamy, K. S. |
|
|
|
6 |
p. 1731-1741 |
artikel |
2 |
Achieving evenhandedness in certified email system for contract signing
|
Imamoto, Kenji |
|
2008 |
|
6 |
p. 383-394 |
artikel |
3 |
A conceptual model of security context
|
Jovanovikj, Vladimir |
|
2014 |
|
6 |
p. 571-581 |
artikel |
4 |
A context-aware robust intrusion detection system: a reinforcement learning-based approach
|
Sethi, Kamalakanta |
|
|
|
6 |
p. 657-678 |
artikel |
5 |
A cross-layer SSO solution for federating access to kerberized services in the eduroam/DAMe network
|
Pérez-Méndez, Alejandro |
|
2012 |
|
6 |
p. 365-388 |
artikel |
6 |
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock
|
Ibrahim, Nasir |
|
|
|
6 |
p. 1849-1863 |
artikel |
7 |
Adaptive hyperparameter optimization for black-box adversarial attack
|
Guan, Zhenyu |
|
|
|
6 |
p. 1765-1779 |
artikel |
8 |
A decentralized honeypot for IoT Protocols based on Android devices
|
Lygerou, Irini |
|
|
|
6 |
p. 1211-1222 |
artikel |
9 |
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques
|
López, Christian |
|
|
|
6 |
p. 1665-1685 |
artikel |
10 |
A framework for estimating information security risk assessment method completeness
|
Wangen, Gaute |
|
2017 |
|
6 |
p. 681-699 |
artikel |
11 |
After you, please: browser extensions order attacks and countermeasures
|
Picazo-Sanchez, Pablo |
|
|
|
6 |
p. 623-638 |
artikel |
12 |
A generalization of Paillier’s public-key system with applications to electronic voting
|
Damgård, Ivan |
|
2010 |
|
6 |
p. 371-385 |
artikel |
13 |
Aggregate message authentication codes (AMACs) with on-the-fly verification
|
Chen, Yu-Shian |
|
2013 |
|
6 |
p. 495-504 |
artikel |
14 |
A language and a pattern system for temporal property specification: advanced metering infrastructure case study
|
Tavizi, Tina |
|
|
|
6 |
p. 695-710 |
artikel |
15 |
A method for identifying Web applications
|
Kozina, Mario |
|
2009 |
|
6 |
p. 455-467 |
artikel |
16 |
Analyzing proposals for improving authentication on the TLS-/SSL-protected Web
|
Brown, Christopher W. |
|
2016 |
|
6 |
p. 621-635 |
artikel |
17 |
An efficient homomorphic MAC-based scheme against data and tag pollution attacks in network coding-enabled wireless networks
|
Esfahani, Alireza |
|
2016 |
|
6 |
p. 627-639 |
artikel |
18 |
An efficient intrusion detection system for MQTT-IoT using enhanced chaotic salp swarm algorithm and LightGBM
|
Prajisha, C. |
|
|
|
6 |
p. 1263-1282 |
artikel |
19 |
Anonymity guarantees of the UMTS/LTE authentication and connection protocol
|
Lee, Ming-Feng |
|
2014 |
|
6 |
p. 513-527 |
artikel |
20 |
A note on the Ate pairing
|
Zhao, Chang-An |
|
2008 |
|
6 |
p. 379-382 |
artikel |
21 |
A personalized learning theory-based cyber-security training exercise
|
Chowdhury, Nabin |
|
|
|
6 |
p. 1531-1546 |
artikel |
22 |
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
|
Shukla, Ankur |
|
|
|
6 |
p. 1621-1650 |
artikel |
23 |
Are chrome extensions compliant with the spirit of least privilege?
|
Picazo-Sanchez, Pablo |
|
|
|
6 |
p. 1283-1297 |
artikel |
24 |
A security protocol for D2D communications in 5G networks using elliptic curve cryptography
|
Kishore, R. |
|
|
|
6 |
p. 1389-1408 |
artikel |
25 |
A study of machine learning-based models for detection, control, and mitigation of cyberbullying in online social media
|
Kumar, Raju |
|
|
|
6 |
p. 1409-1431 |
artikel |
26 |
A survey of anomaly detection methods for power grids
|
Madabhushi, Srinidhi |
|
|
|
6 |
p. 1799-1832 |
artikel |
27 |
A systematic overview on methods to protect sensitive data provided for various analyses
|
Templ, Matthias |
|
|
|
6 |
p. 1233-1246 |
artikel |
28 |
A systematic review of privacy techniques in recommendation systems
|
Ogunseyi, Taiwo Blessing |
|
|
|
6 |
p. 1651-1664 |
artikel |
29 |
A technical characterization of APTs by leveraging public resources
|
González-Manzano, Lorena |
|
|
|
6 |
p. 1567-1584 |
artikel |
30 |
Attention: there is an inconsistency between android permissions and application metadata!
|
Alecakir, Huseyin |
|
|
|
6 |
p. 797-815 |
artikel |
31 |
Attribute disclosure risk for k-anonymity: the case of numerical data
|
Torra, Vicenç |
|
|
|
6 |
p. 2015-2024 |
artikel |
32 |
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks
|
Luong, Ngoc T. |
|
|
|
6 |
p. 1547-1566 |
artikel |
33 |
Biometric keys: suitable use cases and achievable information content
|
Plaga, Rainer |
|
2009 |
|
6 |
p. 447-454 |
artikel |
34 |
Breaking four mix-related schemes based on Universal Re-encryption
|
Danezis, George |
|
2007 |
|
6 |
p. 393-402 |
artikel |
35 |
CADS-ML/DL: efficient cloud-based multi-attack detection system
|
Farhat, Saida |
|
|
|
6 |
p. 1989-2013 |
artikel |
36 |
Comparing apples with apples: performance analysis of lattice-based authenticated key exchange protocols
|
Bindel, Nina |
|
2017 |
|
6 |
p. 701-718 |
artikel |
37 |
Continuous improvement process (CIP)-based privacy-preserving framework for smart connected toys
|
Yankson, Benjamin |
|
|
|
6 |
p. 849-869 |
artikel |
38 |
COVERAGE: detecting and reacting to worm epidemics using cooperation and validation
|
Anagnostakis, Kostas G. |
|
2007 |
|
6 |
p. 361-378 |
artikel |
39 |
Cryptanalysis of an ad-hoc cryptosystem for mix-based e-voting robust against relation attacks
|
Miret, Josep M. |
|
2011 |
|
6 |
p. 387-389 |
artikel |
40 |
CT-GCN: a phishing identification model for blockchain cryptocurrency transactions
|
Fu, Bingxue |
|
|
|
6 |
p. 1223-1232 |
artikel |
41 |
Data minimisation in communication protocols: a formal analysis framework and application to identity management
|
Veeningen, Meilof |
|
2014 |
|
6 |
p. 529-569 |
artikel |
42 |
DDoS attack detection with feature engineering and machine learning: the framework and performance evaluation
|
Aamir, Muhammad |
|
2019 |
|
6 |
p. 761-785 |
artikel |
43 |
Design and implementation of a new lightweight chaos-based cryptosystem to secure IoT communications
|
Kifouche, Abdenour |
|
|
|
6 |
p. 1247-1262 |
artikel |
44 |
Development of dynamic protection against timing channels
|
Kananizadeh, Shahrzad |
|
2016 |
|
6 |
p. 641-651 |
artikel |
45 |
DFTMicroagg: a dual-level anonymization algorithm for smart grid data
|
Adewole, Kayode S. |
|
|
|
6 |
p. 1299-1321 |
artikel |
46 |
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour
|
Žiža, Kristijan |
|
|
|
6 |
p. 1865-1880 |
artikel |
47 |
DomainProfiler: toward accurate and early discovery of domain names abused in future
|
Chiba, Daiki |
|
2017 |
|
6 |
p. 661-680 |
artikel |
48 |
DOMtegrity: ensuring web page integrity against malicious browser extensions
|
Toreini, Ehsan |
|
2019 |
|
6 |
p. 801-814 |
artikel |
49 |
Effective network intrusion detection using stacking-based ensemble approach
|
Ali, Muhammad |
|
|
|
6 |
p. 1781-1798 |
artikel |
50 |
Efficient strong designated verifier signature schemes without random oracle or with non-delegatability
|
Huang, Qiong |
|
2011 |
|
6 |
p. 373-385 |
artikel |
51 |
Efficient trace and revoke schemes
|
Naor, Moni |
|
2010 |
|
6 |
p. 411-424 |
artikel |
52 |
Electronic retention: what does your mobile phone reveal about you?
|
Glisson, William Bradley |
|
2011 |
|
6 |
p. 337-349 |
artikel |
53 |
Enabling isolation and recovery in PLC redundancy framework of metro train systems
|
Josephlal, Edwin Franco Myloth |
|
|
|
6 |
p. 783-795 |
artikel |
54 |
Encouraging users to improve password security and memorability
|
Yıldırım, M. |
|
2019 |
|
6 |
p. 741-759 |
artikel |
55 |
Erratum to: Dynamic subtree tracing and its application in pay-TV systems
|
Roelse, Peter |
|
2011 |
|
6 |
p. 391 |
artikel |
56 |
Evading malware classifiers using RL agent with action-mask
|
Pandey, Saurabh |
|
|
|
6 |
p. 1743-1763 |
artikel |
57 |
Extending .NET security to unmanaged code
|
Klinkoff, Patrick |
|
2007 |
|
6 |
p. 417-428 |
artikel |
58 |
Fast but approximate homomorphic k-means based on masking technique
|
Rovida, Lorenzo |
|
|
|
6 |
p. 1605-1619 |
artikel |
59 |
FDCO: attribute-based fast data cloud-outsourcing scheme for mobile devices
|
Zhang, Yanting |
|
|
|
6 |
p. 639-656 |
artikel |
60 |
Federated learning-based intrusion detection system for Internet of Things
|
Hamdi, Najet |
|
|
|
6 |
p. 1937-1948 |
artikel |
61 |
File Guard: automatic format-based media file sanitization
|
Zhang, Tao |
|
2019 |
|
6 |
p. 701-713 |
artikel |
62 |
Flexible attribute-based encryption applicable to secure e-healthcare records
|
Qin, Bo |
|
2015 |
|
6 |
p. 499-511 |
artikel |
63 |
Flow-sensitive, context-sensitive, and object-sensitive information flow control based on program dependence graphs
|
Hammer, Christian |
|
2009 |
|
6 |
p. 399-422 |
artikel |
64 |
From scattered data to actionable knowledge: flexible cyber security reporting in the military domain
|
Skopik, Florian |
|
|
|
6 |
p. 1323-1347 |
artikel |
65 |
Gait authentication on mobile phone using biometric cryptosystem and fuzzy commitment scheme
|
Hoang, Thang |
|
2015 |
|
6 |
p. 549-560 |
artikel |
66 |
High-performance secure multi-party computation for data mining applications
|
Bogdanov, Dan |
|
2012 |
|
6 |
p. 403-418 |
artikel |
67 |
Hydras and IPFS: a decentralised playground for malware
|
Patsakis, Constantinos |
|
2019 |
|
6 |
p. 787-799 |
artikel |
68 |
Improving the ISO/IEC 11770 standard for key management techniques
|
Cremers, Cas |
|
2015 |
|
6 |
p. 659-673 |
artikel |
69 |
Intrusion detection for secure clustering and routing in Mobile Multi-hop Wireless Networks
|
Bononi, Luciano |
|
2007 |
|
6 |
p. 379-392 |
artikel |
70 |
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review
|
Kaur, Sarabjeet |
|
|
|
6 |
p. 1949-1988 |
artikel |
71 |
KAMU: providing advanced user privacy in Kerberos multi-domain scenarios
|
Pereñíguez-García, F. |
|
2013 |
|
6 |
p. 505-525 |
artikel |
72 |
LASSI: a lightweight authenticated key agreement protocol for fog-enabled IoT deployment
|
Abdussami, Mohammad |
|
|
|
6 |
p. 1373-1387 |
artikel |
73 |
Leveraging cyber threat intelligence for a dynamic risk framework
|
Riesco, R. |
|
2019 |
|
6 |
p. 715-739 |
artikel |
74 |
Lightweight multi-factor mutual authentication protocol for IoT devices
|
Melki, Reem |
|
|
|
6 |
p. 679-694 |
artikel |
75 |
Malware classification approaches utilizing binary and text encoding of permissions
|
Zyout, Mo’ath |
|
|
|
6 |
p. 1687-1712 |
artikel |
76 |
Measuring protocol strength with security goals
|
Rowe, Paul D. |
|
2016 |
|
6 |
p. 575-596 |
artikel |
77 |
Message from the guest editors
|
Chen, Liqun |
|
2016 |
|
6 |
p. 573-574 |
artikel |
78 |
New constructions of OSBE schemes and their applications in oblivious access control
|
Han, Jinguang |
|
2012 |
|
6 |
p. 389-401 |
artikel |
79 |
Off-line/on-line signatures revisited: a general unifying paradigm, efficient threshold variants and experimental results
|
Bresson, Emmanuel |
|
2013 |
|
6 |
p. 439-465 |
artikel |
80 |
OnionDNS: a seizure-resistant top-level domain
|
Scaife, Nolen |
|
2017 |
|
6 |
p. 645-660 |
artikel |
81 |
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs
|
Smiliotopoulos, Christos |
|
|
|
6 |
p. 1893-1919 |
artikel |
82 |
On the efficiency of user identification: a system-based approach
|
Malatras, Apostolos |
|
2016 |
|
6 |
p. 653-671 |
artikel |
83 |
Opacity generalised to transition systems
|
Bryans, Jeremy W. |
|
2008 |
|
6 |
p. 421-435 |
artikel |
84 |
Optimal noise functions for location privacy on continuous regions
|
ElSalamouny, Ehab |
|
2017 |
|
6 |
p. 613-630 |
artikel |
85 |
Optimization algorithm for k-anonymization of datasets with low information loss
|
Murakami, Keisuke |
|
2017 |
|
6 |
p. 631-644 |
artikel |
86 |
Outsourced cheating detection for secret sharing
|
Cianciullo, Louis |
|
|
|
6 |
p. 871-878 |
artikel |
87 |
Password-authenticated key exchange based on RSA
|
MacKenzie, Philip |
|
2010 |
|
6 |
p. 387-410 |
artikel |
88 |
Periodicity in software vulnerability discovery, patching and exploitation
|
Joh, HyunChul |
|
2016 |
|
6 |
p. 673-690 |
artikel |
89 |
Preface
|
Backes, Michael |
|
2007 |
|
6 |
p. 359-360 |
artikel |
90 |
Privacy-preserving authentication of trees and graphs
|
Kundu, Ashish |
|
2013 |
|
6 |
p. 467-494 |
artikel |
91 |
Privacy-preserving continuous authentication using behavioral biometrics
|
Baig, Ahmed Fraz |
|
|
|
6 |
p. 1833-1847 |
artikel |
92 |
Privacy-preserving personal health record using multi-authority attribute-based encryption with revocation
|
Qian, Huiling |
|
2014 |
|
6 |
p. 487-497 |
artikel |
93 |
Protecting data privacy through hard-to-reverse negative databases
|
Esponda, Fernando |
|
2007 |
|
6 |
p. 403-415 |
artikel |
94 |
PSO + FL = PAASO: particle swarm optimization + federated learning = privacy-aware agent swarm optimization
|
Torra, Vicenç |
|
|
|
6 |
p. 1349-1359 |
artikel |
95 |
Public data integrity auditing without homomorphic authenticators from indistinguishability obfuscation
|
Sun, Lixue |
|
|
|
6 |
p. 711-720 |
artikel |
96 |
RADS: a real-time anomaly detection model for software-defined networks using machine learning
|
Sneha, M. |
|
|
|
6 |
p. 1881-1891 |
artikel |
97 |
rPIR: ramp secret sharing-based communication-efficient private information retrieval
|
Li, Lichun |
|
2016 |
|
6 |
p. 603-625 |
artikel |
98 |
Secure and efficient anonymization of distributed confidential databases
|
Herranz, Javier |
|
2014 |
|
6 |
p. 497-512 |
artikel |
99 |
Secure and trusted partial grey-box verification
|
Cai, Yixian |
|
2019 |
|
6 |
p. 677-700 |
artikel |
100 |
Secure computation of hidden Markov models and secure floating-point arithmetic in the malicious model
|
Aliasgari, Mehrdad |
|
2016 |
|
6 |
p. 577-601 |
artikel |
101 |
Secure floating point arithmetic and private satellite collision analysis
|
Kamm, Liina |
|
2014 |
|
6 |
p. 531-548 |
artikel |
102 |
Secure modular password authentication for the web using channel bindings
|
Manulis, Mark |
|
2016 |
|
6 |
p. 597-620 |
artikel |
103 |
Secure steganography based on embedding capacity
|
Sajedi, Hedieh |
|
2009 |
|
6 |
p. 433-445 |
artikel |
104 |
Securing the controller area network with covert voltage channels
|
Murvay, Pal-Stefan |
|
|
|
6 |
p. 817-831 |
artikel |
105 |
Security analysis and improvement of a privacy-preserving authentication scheme in VANET
|
Yang, Xiaodong |
|
|
|
6 |
p. 1361-1371 |
artikel |
106 |
Security and privacy of electronic health information systems
|
Bertino, Elisa |
|
2015 |
|
6 |
p. 485-486 |
artikel |
107 |
Security and searchability in secret sharing-based data outsourcing
|
Hadavi, Mohammad Ali |
|
2015 |
|
6 |
p. 513-529 |
artikel |
108 |
Solving identity delegation problem in the e-government environment
|
Sánchez García, Sergio |
|
2011 |
|
6 |
p. 351-372 |
artikel |
109 |
Specifying and implementing privacy-preserving cryptographic protocols
|
Balopoulos, Theodoros |
|
2008 |
|
6 |
p. 395-420 |
artikel |
110 |
Talos: no more ransomware victims with formal methods
|
Cimitile, Aniello |
|
2017 |
|
6 |
p. 719-738 |
artikel |
111 |
The suffix-free-prefix-free hash function construction and its indifferentiability security analysis
|
Bagheri, Nasour |
|
2012 |
|
6 |
p. 419-434 |
artikel |
112 |
Thresholdizing HashEdDSA: MPC to the Rescue
|
Bonte, Charlotte |
|
|
|
6 |
p. 879-894 |
artikel |
113 |
Token-based graphical password authentication
|
Gyorffy, John Charles |
|
2011 |
|
6 |
p. 321-336 |
artikel |
114 |
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system
|
Barhoun, Rabie |
|
|
|
6 |
p. 1585-1604 |
artikel |
115 |
Two-model active learning approach for inappropriate information classification in social networks
|
Levshun, Dmitry |
|
|
|
6 |
p. 1921-1936 |
artikel |
116 |
Uncertain inference control in privacy protection
|
An, Xiangdong |
|
2009 |
|
6 |
p. 423-431 |
artikel |
117 |
Unpicking PLAID: a cryptographic analysis of an ISO-standards-track authentication protocol
|
Degabriele, Jean Paul |
|
2016 |
|
6 |
p. 637-657 |
artikel |
118 |
URL query string anomaly sensor designed with the bidimensional Haar wavelet transform
|
Kozakevicius, Alice |
|
2015 |
|
6 |
p. 561-581 |
artikel |
119 |
User interface design affects security: patterns in click-based graphical passwords
|
Chiasson, Sonia |
|
2009 |
|
6 |
p. 387-398 |
artikel |
120 |
User-mediated authentication protocols and unforgeability in key collision
|
Hale, Britta |
|
|
|
6 |
p. 609-621 |
artikel |
121 |
Using instance-weighted naive Bayes for adapting concept drift in masquerade detection
|
Sen, Sevil |
|
2014 |
|
6 |
p. 583-590 |
artikel |
122 |
Web access monitoring mechanism via Android WebView for threat analysis
|
Imamura, Yuta |
|
|
|
6 |
p. 833-847 |
artikel |
123 |
Yet another cybersecurity risk assessment framework
|
Ekstedt, Mathias |
|
|
|
6 |
p. 1713-1729 |
artikel |