nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accountable privacy preserving attribute-based access control for cloud services enforced using blockchain
|
Ghorbel, Amal |
|
|
21 |
3 |
p. 489-508 |
artikel |
2 |
A content-based deep intrusion detection system
|
Soltani, Mahdi |
|
|
21 |
3 |
p. 547-562 |
artikel |
3 |
Anomalous behavior detection-based approach for authenticating smart home system users
|
Amraoui, Noureddine |
|
|
21 |
3 |
p. 611-636 |
artikel |
4 |
A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces
|
Zhang, Lu |
|
|
21 |
3 |
p. 509-525 |
artikel |
5 |
Data space randomization for securing cyber-physical systems
|
Potteiger, Bradley |
|
|
21 |
3 |
p. 597-610 |
artikel |
6 |
Defeating traffic analysis via differential privacy: a case study on streaming traffic
|
Zhang, Xiaokuan |
|
|
21 |
3 |
p. 689-706 |
artikel |
7 |
Establishing and validating secured keys for IoT devices: using P3 connection model on a cloud-based architecture
|
Bhattacharjya, Sairath |
|
|
21 |
3 |
p. 427-436 |
artikel |
8 |
Evaluating differentially private decision tree model over model inversion attack
|
Park, Cheolhee |
|
|
21 |
3 |
p. 1-14 |
artikel |
9 |
Gossamer: weaknesses and performance
|
D’Arco, P. |
|
|
21 |
3 |
p. 669-687 |
artikel |
10 |
Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technology
|
Singh, Jaya |
|
|
21 |
3 |
p. 527-546 |
artikel |
11 |
Maintaining the level of operational effectiveness of a CSOC under adverse conditions
|
Shah, Ankit |
|
|
21 |
3 |
p. 637-651 |
artikel |
12 |
Narrow privacy and desynchronization in Vaudenay’s RFID model
|
Ţiplea, Ferucio Laurenţiu |
|
|
21 |
3 |
p. 563-575 |
artikel |
13 |
Novel trust-aware intrusion detection and prevention system for 5G MANET–Cloud
|
Alghamdi, Saleh A. |
|
|
21 |
3 |
p. 469-488 |
artikel |
14 |
Pragmatic authenticated key agreement for IEEE Std 802.15.6
|
Khan, Haibat |
|
|
21 |
3 |
p. 577-595 |
artikel |
15 |
Security beyond cybersecurity: side-channel attacks against non-cyber systems and their countermeasures
|
Spence, Aaron |
|
|
21 |
3 |
p. 437-453 |
artikel |
16 |
Tracking adoption of revocation and cryptographic features in X.509 certificates
|
Zulfiqar, Maryam |
|
|
21 |
3 |
p. 653-668 |
artikel |