Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems Li, Wenjuan

22 5 p. 1219-1230
artikel
2 A comprehensive Blockchain-oriented secure framework for SDN/Fog-based IoUT Mohammadi, Reza

22 5 p. 1163-1175
artikel
3 A defensive framework for deepfake detection under adversarial settings using temporal and spatial features Asha, S.

22 5 p. 1371-1382
artikel
4 AiCEF: an AI-assisted cyber exercise content generation framework using named entity recognition Zacharis, Alexandros

22 5 p. 1333-1354
artikel
5 AIHGAT: A novel method of malware detection and homology analysis using assembly instruction heterogeneous graph Wang, Runzheng

22 5 p. 1423-1443
artikel
6 A method for insider threat assessment by modeling the internal employee interactions Sepehrzadeh, Hamed

22 5 p. 1385-1393
artikel
7 Analysis of OSPU security effect and data assembly verification under semi-network OS architecture Zhang, Yin Sheng

22 5 p. 1497-1509
artikel
8 Analyzing and comparing the security of self-sovereign identity management systems through threat modeling GrĂ¼ner, Andreas

22 5 p. 1231-1248
artikel
9 An autoML network traffic analyzer for cyber threat detection Papanikolaou, Alexandros

22 5 p. 1511-1530
artikel
10 An effective attack scenario construction model based on identification of attack steps and stages Alhaj, Taqwa Ahmed

22 5 p. 1481-1496
artikel
11 An interpretability security framework for intelligent decision support systems based on saliency map Zhang, Denghui

22 5 p. 1249-1260
artikel
12 A novel hybrid hunger games algorithm for intrusion detection systems based on nonlinear regression modeling Mohammadi, Shahriar

22 5 p. 1177-1195
artikel
13 A systematic literature review for network intrusion detection system (IDS) Abdulganiyu, Oluwadamilare Harazeem

22 5 p. 1125-1162
artikel
14 A unit-based symbolic execution method for detecting memory corruption vulnerabilities in executable codes Baradaran, Sara

22 5 p. 1277-1290
artikel
15 cFEM: a cluster based feature extraction method for network intrusion detection Mazumder, Md. Mumtahin Habib Ullah

22 5 p. 1355-1369
artikel
16 Correction: Real-time detection of deception attacks in cyber-physical systems Cai, Feiyang

22 5 p. 1383
artikel
17 Error reduction of SRAM-based physically unclonable function for chip authentication Kim, Moon-Seok

22 5 p. 1087-1098
artikel
18 Malicious uses of blockchains by malware: from the analysis to Smart-Zephyrus Gimenez-Aguilar, Mar

22 5 p. 1445-1480
artikel
19 Malicious website identification using design attribute learning Naim, Or

22 5 p. 1207-1217
artikel
20 OCPP in the spotlight: threats and countermeasures for electric vehicle charging infrastructures 4.0 Alcaraz, Cristina

22 5 p. 1395-1421
artikel
21 Protection of centralized SDN control plane from high-rate Packet-In messages Ahmad, Suhail

22 5 p. 1197-1206
artikel
22 Real-time detection of deception attacks in cyber-physical systems Cai, Feiyang

22 5 p. 1099-1114
artikel
23 Recommendation of secure group communication schemes using multi-objective optimization Prantl, Thomas

22 5 p. 1291-1332
artikel
24 Secure access privilege delegation using attribute-based encryption Panda, Suryakanta

22 5 p. 1261-1276
artikel
25 SFCGDroid: android malware detection based on sensitive function call graph Shi, Sibo

22 5 p. 1115-1124
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland