nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accessible password strength assessment method for visually challenged users
|
Kuppusamy, K. S. |
|
|
22 |
6 |
p. 1731-1741 |
artikel |
2 |
A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock
|
Ibrahim, Nasir |
|
|
22 |
6 |
p. 1849-1863 |
artikel |
3 |
Adaptive hyperparameter optimization for black-box adversarial attack
|
Guan, Zhenyu |
|
|
22 |
6 |
p. 1765-1779 |
artikel |
4 |
Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques
|
López, Christian |
|
|
22 |
6 |
p. 1665-1685 |
artikel |
5 |
A personalized learning theory-based cyber-security training exercise
|
Chowdhury, Nabin |
|
|
22 |
6 |
p. 1531-1546 |
artikel |
6 |
A quantitative framework for security assurance evaluation and selection of cloud services: a case study
|
Shukla, Ankur |
|
|
22 |
6 |
p. 1621-1650 |
artikel |
7 |
A survey of anomaly detection methods for power grids
|
Madabhushi, Srinidhi |
|
|
22 |
6 |
p. 1799-1832 |
artikel |
8 |
A systematic review of privacy techniques in recommendation systems
|
Ogunseyi, Taiwo Blessing |
|
|
22 |
6 |
p. 1651-1664 |
artikel |
9 |
A technical characterization of APTs by leveraging public resources
|
González-Manzano, Lorena |
|
|
22 |
6 |
p. 1567-1584 |
artikel |
10 |
Attribute disclosure risk for k-anonymity: the case of numerical data
|
Torra, Vicenç |
|
|
22 |
6 |
p. 2015-2024 |
artikel |
11 |
BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks
|
Luong, Ngoc T. |
|
|
22 |
6 |
p. 1547-1566 |
artikel |
12 |
CADS-ML/DL: efficient cloud-based multi-attack detection system
|
Farhat, Saida |
|
|
22 |
6 |
p. 1989-2013 |
artikel |
13 |
DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour
|
Žiža, Kristijan |
|
|
22 |
6 |
p. 1865-1880 |
artikel |
14 |
Effective network intrusion detection using stacking-based ensemble approach
|
Ali, Muhammad |
|
|
22 |
6 |
p. 1781-1798 |
artikel |
15 |
Evading malware classifiers using RL agent with action-mask
|
Pandey, Saurabh |
|
|
22 |
6 |
p. 1743-1763 |
artikel |
16 |
Fast but approximate homomorphic k-means based on masking technique
|
Rovida, Lorenzo |
|
|
22 |
6 |
p. 1605-1619 |
artikel |
17 |
Federated learning-based intrusion detection system for Internet of Things
|
Hamdi, Najet |
|
|
22 |
6 |
p. 1937-1948 |
artikel |
18 |
Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review
|
Kaur, Sarabjeet |
|
|
22 |
6 |
p. 1949-1988 |
artikel |
19 |
Malware classification approaches utilizing binary and text encoding of permissions
|
Zyout, Mo’ath |
|
|
22 |
6 |
p. 1687-1712 |
artikel |
20 |
On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs
|
Smiliotopoulos, Christos |
|
|
22 |
6 |
p. 1893-1919 |
artikel |
21 |
Privacy-preserving continuous authentication using behavioral biometrics
|
Baig, Ahmed Fraz |
|
|
22 |
6 |
p. 1833-1847 |
artikel |
22 |
RADS: a real-time anomaly detection model for software-defined networks using machine learning
|
Sneha, M. |
|
|
22 |
6 |
p. 1881-1891 |
artikel |
23 |
Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system
|
Barhoun, Rabie |
|
|
22 |
6 |
p. 1585-1604 |
artikel |
24 |
Two-model active learning approach for inappropriate information classification in social networks
|
Levshun, Dmitry |
|
|
22 |
6 |
p. 1921-1936 |
artikel |
25 |
Yet another cybersecurity risk assessment framework
|
Ekstedt, Mathias |
|
|
22 |
6 |
p. 1713-1729 |
artikel |