nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Anonymity in traceable cloud data broadcast system with simultaneous individual messaging
|
Mandal, Mriganka |
|
|
20 |
3 |
p. 405-430 |
artikel |
2 |
A novel scalable intrusion detection system based on deep learning
|
Mighan, Soosan Naderi |
|
|
20 |
3 |
p. 387-403 |
artikel |
3 |
Anti-BlUFf: towards counterfeit mitigation in IC supply chains using blockchain and PUF
|
Aniello, Leonardo |
|
|
20 |
3 |
p. 445-460 |
artikel |
4 |
A wrinkle in time: a case study in DNS poisoning
|
Berger, Harel |
|
|
20 |
3 |
p. 313-329 |
artikel |
5 |
ChoKIFA+: an early detection and mitigation approach against interest flooding attacks in NDN
|
Benarfa, Abdelmadjid |
|
|
20 |
3 |
p. 269-285 |
artikel |
6 |
Cyber security in New Space
|
Manulis, M. |
|
|
20 |
3 |
p. 287-311 |
artikel |
7 |
Efficient attribute-based encryption with repeated attributes optimization
|
Khan, Fawad |
|
|
20 |
3 |
p. 431-444 |
artikel |
8 |
Evaluating visualization approaches to detect abnormal activities in network traffic data
|
Ji, Soo-Yeon |
|
|
20 |
3 |
p. 331-345 |
artikel |
9 |
MalFamAware: automatic family identification and malware classification through online clustering
|
Pitolli, Gregorio |
|
|
20 |
3 |
p. 371-386 |
artikel |
10 |
Using homomorphic encryption for privacy-preserving clustering of intrusion detection alerts
|
Spathoulas, Georgios |
|
|
20 |
3 |
p. 347-370 |
artikel |