nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A first look at references from the dark to the surface web world: a case study in Tor
|
Zabihimayvan, Mahdieh |
|
|
21 |
4 |
p. 739-755 |
artikel |
2 |
A multi-objective cost–benefit optimization algorithm for network hardening
|
Zenitani, Kengo |
|
|
21 |
4 |
p. 813-832 |
artikel |
3 |
A survey on analyzing encrypted network traffic of mobile devices
|
Agrawal, Ankit |
|
|
21 |
4 |
p. 873-915 |
artikel |
4 |
A systematic literature review on wearable health data publishing under differential privacy
|
Saifuzzaman, Munshi |
|
|
21 |
4 |
p. 847-872 |
artikel |
5 |
Challenges of post-quantum digital signing in real-world applications: a survey
|
Tan, Teik Guan |
|
|
21 |
4 |
p. 937-952 |
artikel |
6 |
Coin-based Secure Computations
|
Komano, Yuichi |
|
|
21 |
4 |
p. 833-846 |
artikel |
7 |
Developing non-interactive MPC with trusted hardware for enhanced security
|
Karl, Ryan |
|
|
21 |
4 |
p. 777-797 |
artikel |
8 |
IoT-oriented high-efficient anti-malware hardware focusing on time series metadata extractable from inside a processor core
|
Koike, Kazuki |
|
|
21 |
4 |
p. 1-19 |
artikel |
9 |
MAPAS: a practical deep learning-based android malware detection system
|
Kim, Jinsung |
|
|
21 |
4 |
p. 725-738 |
artikel |
10 |
Scalable, password-based and threshold authentication for smart homes
|
Huszti, Andrea |
|
|
21 |
4 |
p. 707-723 |
artikel |
11 |
Survey on image encryption techniques using chaotic maps in spatial, transform and spatiotemporal domains
|
Zia, Unsub |
|
|
21 |
4 |
p. 917-935 |
artikel |
12 |
ThunderSecure: deploying real-time intrusion detection for 100G research networks by leveraging stream-based features and one-class classification network
|
Gong, Qian |
|
|
21 |
4 |
p. 799-812 |
artikel |