nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems
|
Li, Wenjuan |
|
|
22 |
5 |
p. 1219-1230 |
artikel |
2 |
A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT
|
Mohammadi, Reza |
|
|
22 |
5 |
p. 1163-1175 |
artikel |
3 |
A defensive framework for deepfake detection under adversarial settings using temporal and spatial features
|
Asha, S. |
|
|
22 |
5 |
p. 1371-1382 |
artikel |
4 |
AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition
|
Zacharis, Alexandros |
|
|
22 |
5 |
p. 1333-1354 |
artikel |
5 |
AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph
|
Wang, Runzheng |
|
|
22 |
5 |
p. 1423-1443 |
artikel |
6 |
A method for insider threat assessment by modeling the internal employee interactions
|
Sepehrzadeh, Hamed |
|
|
22 |
5 |
p. 1385-1393 |
artikel |
7 |
Analysis of OSPU security effect and data assembly verification under semi-network OS architecture
|
Zhang, Yin Sheng |
|
|
22 |
5 |
p. 1497-1509 |
artikel |
8 |
Analyzing and comparing the security of self-sovereign identity management systems through threat modeling
|
GrĂ¼ner, Andreas |
|
|
22 |
5 |
p. 1231-1248 |
artikel |
9 |
An autoML network traffic analyzer for cyber threat detection
|
Papanikolaou, Alexandros |
|
|
22 |
5 |
p. 1511-1530 |
artikel |
10 |
An effective attack scenario construction model based on identification of attack steps and stages
|
Alhaj, Taqwa Ahmed |
|
|
22 |
5 |
p. 1481-1496 |
artikel |
11 |
An interpretability security framework for intelligent decision support systems based on saliency map
|
Zhang, Denghui |
|
|
22 |
5 |
p. 1249-1260 |
artikel |
12 |
A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling
|
Mohammadi, Shahriar |
|
|
22 |
5 |
p. 1177-1195 |
artikel |
13 |
A systematic literature review for network intrusion detection system (IDS)
|
Abdulganiyu, Oluwadamilare Harazeem |
|
|
22 |
5 |
p. 1125-1162 |
artikel |
14 |
A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes
|
Baradaran, Sara |
|
|
22 |
5 |
p. 1277-1290 |
artikel |
15 |
cFEM: a cluster based feature extraction method for network intrusion detection
|
Mazumder, Md. Mumtahin Habib Ullah |
|
|
22 |
5 |
p. 1355-1369 |
artikel |
16 |
Correction: Real-time detection of deception attacks in cyber-physical systems
|
Cai, Feiyang |
|
|
22 |
5 |
p. 1383 |
artikel |
17 |
Error reduction of SRAM-based physically unclonable function for chip authentication
|
Kim, Moon-Seok |
|
|
22 |
5 |
p. 1087-1098 |
artikel |
18 |
Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus
|
Gimenez-Aguilar, Mar |
|
|
22 |
5 |
p. 1445-1480 |
artikel |
19 |
Malicious website identification using design attribute learning
|
Naim, Or |
|
|
22 |
5 |
p. 1207-1217 |
artikel |
20 |
OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0
|
Alcaraz, Cristina |
|
|
22 |
5 |
p. 1395-1421 |
artikel |
21 |
Protection of centralized SDN control plane from high-rate Packet-In messages
|
Ahmad, Suhail |
|
|
22 |
5 |
p. 1197-1206 |
artikel |
22 |
Real-time detection of deception attacks in cyber-physical systems
|
Cai, Feiyang |
|
|
22 |
5 |
p. 1099-1114 |
artikel |
23 |
Recommendation of secure group communication schemes using multi-objective optimization
|
Prantl, Thomas |
|
|
22 |
5 |
p. 1291-1332 |
artikel |
24 |
Secure access privilege delegation using attribute-based encryption
|
Panda, Suryakanta |
|
|
22 |
5 |
p. 1261-1276 |
artikel |
25 |
SFCGDroid: android malware detection based on sensitive function call graph
|
Shi, Sibo |
|
|
22 |
5 |
p. 1115-1124 |
artikel |