nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel malicious remote administration tool using stealth and self-defense techniques
|
Kazoleas, Ioannis |
|
|
21 |
2 |
p. 357-378 |
artikel |
2 |
An SSH predictive model using machine learning with web proxy session logs
|
Lee, Junwon |
|
|
21 |
2 |
p. 311-322 |
artikel |
3 |
Applying NLP techniques to malware detection in a practical environment
|
Mimura, Mamoru |
|
|
21 |
2 |
p. 279-291 |
artikel |
4 |
A semantic-aware log generation method for network activities
|
Yichiet, Aun |
|
|
21 |
2 |
p. 161-177 |
artikel |
5 |
Authenticated logarithmic-order supersingular isogeny group key exchange
|
Hougaard, Hector B. |
|
|
21 |
2 |
p. 207-221 |
artikel |
6 |
Automated benchmark network diversification for realistic attack simulation with application to moving target defense
|
Bajic, Alexander |
|
|
21 |
2 |
p. 253-278 |
artikel |
7 |
Browser-in-the-Middle (BitM) attack
|
Tommasi, Franco |
|
|
21 |
2 |
p. 179-189 |
artikel |
8 |
Extending access control in AWS IoT through event-driven functions: an experimental evaluation using a smart lock system
|
Ahmad, Tahir |
|
|
21 |
2 |
p. 379-408 |
artikel |
9 |
ISM-AC: an immune security model based on alert correlation and software-defined networking
|
Melo, Roberto Vasconcelos |
|
|
21 |
2 |
p. 191-205 |
artikel |
10 |
Machine learning approach to vulnerability detection in OAuth 2.0 authentication and authorization flow
|
Munonye, Kindson |
|
|
21 |
2 |
p. 223-237 |
artikel |
11 |
Mitigating insider threat by profiling users based on mouse usage pattern: ensemble learning and frequency domain analysis
|
Yildirim, Metehan |
|
|
21 |
2 |
p. 239-251 |
artikel |
12 |
Optimization of parallel firewalls filtering rules
|
Hadjadj, Taha Elamine |
|
|
21 |
2 |
p. 323-340 |
artikel |
13 |
Password guessers under a microscope: an in-depth analysis to inform deployments
|
Parish, Zach |
|
|
21 |
2 |
p. 409-425 |
artikel |
14 |
The Agent Web Model: modeling web hacking for reinforcement learning
|
Erdődi, László |
|
|
21 |
2 |
p. 293-309 |
artikel |
15 |
Topology-hiding garbled circuits without universal circuits
|
Zhang, Zheng |
|
|
21 |
2 |
p. 341-356 |
artikel |