nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A new smart smudge attack using CNN
|
Shin, Hansub |
|
|
21 |
1 |
p. 25-36 |
artikel |
2 |
Automatic analysis of attack graphs for risk mitigation and prioritization on large-scale and complex networks in Industry 4.0
|
Stergiopoulos, George |
|
|
21 |
1 |
p. 37-59 |
artikel |
3 |
DAPP: automatic detection and analysis of prototype pollution vulnerability in Node.js modules
|
Kim, Hee Yeon |
|
|
21 |
1 |
p. 1-23 |
artikel |
4 |
[m]allotROPism: a metamorphic engine for malicious software variation development
|
Lyvas, Christos |
|
|
21 |
1 |
p. 61-78 |
artikel |
5 |
Privacy preserving data sharing and analysis for edge-based architectures
|
Sheikhalishahi, Mina |
|
|
21 |
1 |
p. 79-101 |
artikel |
6 |
Public key versus symmetric key cryptography in client–server authentication protocols
|
Braeken, An |
|
|
21 |
1 |
p. 103-114 |
artikel |
7 |
Robotics cyber security: vulnerabilities, attacks, countermeasures, and recommendations
|
Yaacoub, Jean-Paul A. |
|
|
21 |
1 |
p. 115-158 |
artikel |
8 |
Track for surveys
|
|
|
|
21 |
1 |
p. 159 |
artikel |