nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A novel frame switching model based on virtual MAC in SDN
|
Song, Guangjia |
|
|
22 |
3 |
p. 723-736 |
artikel |
2 |
Cyber insurance: state of the art, trends and future directions
|
Tsohou, Aggeliki |
|
|
22 |
3 |
p. 737-748 |
artikel |
3 |
Cyber–physical risk assessment for false data injection attacks considering moving target defences
|
Higgins, Martin |
|
|
22 |
3 |
p. 579-589 |
artikel |
4 |
Dependency-based security risk assessment for cyber-physical systems
|
Akbarzadeh, Aida |
|
|
22 |
3 |
p. 563-578 |
artikel |
5 |
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment
|
Chen, Yingchun |
|
|
22 |
3 |
p. 679-689 |
artikel |
6 |
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks
|
Orooji, Marmar |
|
|
22 |
3 |
p. 631-645 |
artikel |
7 |
Intelligent and behavioral-based detection of malware in IoT spectrum sensors
|
Celdrán, Alberto Huertas |
|
|
22 |
3 |
p. 541-561 |
artikel |
8 |
Multi-cloud applications: data and code fragmentation for improved security
|
Lovrenčić, Rudolf |
|
|
22 |
3 |
p. 713-721 |
artikel |
9 |
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS)
|
Bandara, Eranga |
|
|
22 |
3 |
p. 591-609 |
artikel |
10 |
Privacy in targeted advertising on mobile devices: a survey
|
Ullah, Imdad |
|
|
22 |
3 |
p. 647-678 |
artikel |
11 |
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection
|
Al-Shehari, Taher |
|
|
22 |
3 |
p. 611-629 |
artikel |
12 |
Systematic review of SIEM technology: SIEM-SC birth
|
López Velásquez, Juan Miguel |
|
|
22 |
3 |
p. 691-711 |
artikel |