nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AAIA: an efficient aggregation scheme against inverting attack for federated learning
|
Yang, Zhen |
|
|
22 |
4 |
p. 919-930 |
artikel |
2 |
Anonymity and everlasting privacy in electronic voting
|
Grontas, Panagiotis |
|
|
22 |
4 |
p. 819-832 |
artikel |
3 |
A novel two-level secure access control approach for blockchain platform in healthcare
|
Mittal, Shweta |
|
|
22 |
4 |
p. 799-817 |
artikel |
4 |
A typology of secure multicast communication over 5 G/6 G networks
|
Din, Nizamud |
|
|
22 |
4 |
p. 1055-1073 |
artikel |
5 |
Blockchain and smart contract architecture for notaries services under civil law: a Brazilian experience
|
Dias Menezes, Leonardo |
|
|
22 |
4 |
p. 869-880 |
artikel |
6 |
BLoCNet: a hybrid, dataset-independent intrusion detection system using deep learning
|
Bowen, Brandon |
|
|
22 |
4 |
p. 893-917 |
artikel |
7 |
Business-layer client-side racer: dynamic security testing of the web application against client-side race condition in the business layer
|
Alidoosti, Mitra |
|
|
22 |
4 |
p. 1029-1054 |
artikel |
8 |
Causal effect analysis-based intrusion detection system for IoT applications
|
Bhaskara, Srividya |
|
|
22 |
4 |
p. 931-946 |
artikel |
9 |
Cyber range design framework for cyber security education and training
|
Katsantonis, M. N. |
|
|
22 |
4 |
p. 1005-1027 |
artikel |
10 |
Efficient searchable symmetric encryption supporting range queries
|
Molla, Eirini |
|
|
22 |
4 |
p. 785-798 |
artikel |
11 |
From zero-shot machine learning to zero-day attack detection
|
Sarhan, Mohanad |
|
|
22 |
4 |
p. 947-959 |
artikel |
12 |
LDES: detector design for version number attack detection using linear temporal logic based on discrete event system
|
Seth, Abhay Deep |
|
|
22 |
4 |
p. 961-985 |
artikel |
13 |
P2ADF: a privacy-preserving attack detection framework in fog-IoT environment
|
Kaur, Jasleen |
|
|
22 |
4 |
p. 749-762 |
artikel |
14 |
Phish-Sight: a new approach for phishing detection using dominant colors on web pages and machine learning
|
Pandey, Pankaj |
|
|
22 |
4 |
p. 881-891 |
artikel |
15 |
Privacy and safety improvement of VANET data via a safety-related privacy scheme
|
Al-ani, Ruqayah |
|
|
22 |
4 |
p. 763-783 |
artikel |
16 |
Secure cloud-based mobile apps: attack taxonomy, requirements, mechanisms, tests and automation
|
Chimuco, Francisco T. |
|
|
22 |
4 |
p. 833-867 |
artikel |
17 |
Securing MQTT protocol for IoT environment using IDS based on ensemble learning
|
Zeghida, Hayette |
|
|
22 |
4 |
p. 1075-1086 |
artikel |
18 |
TENET: a new hybrid network architecture for adversarial defense
|
Tuna, Omer Faruk |
|
|
22 |
4 |
p. 987-1004 |
artikel |