Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accessible password strength assessment method for visually challenged users Kuppusamy, K. S.

22 6 p. 1731-1741
artikel
2 A cross-setting study of user unlocking behaviour in a graphical authentication scheme: a case study on android Pattern Unlock Ibrahim, Nasir

22 6 p. 1849-1863
artikel
3 Adaptive hyperparameter optimization for black-box adversarial attack Guan, Zhenyu

22 6 p. 1765-1779
artikel
4 Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques López, Christian

22 6 p. 1665-1685
artikel
5 A personalized learning theory-based cyber-security training exercise Chowdhury, Nabin

22 6 p. 1531-1546
artikel
6 A quantitative framework for security assurance evaluation and selection of cloud services: a case study Shukla, Ankur

22 6 p. 1621-1650
artikel
7 A survey of anomaly detection methods for power grids Madabhushi, Srinidhi

22 6 p. 1799-1832
artikel
8 A systematic review of privacy techniques in recommendation systems Ogunseyi, Taiwo Blessing

22 6 p. 1651-1664
artikel
9 A technical characterization of APTs by leveraging public resources González-Manzano, Lorena

22 6 p. 1567-1584
artikel
10 Attribute disclosure risk for k-anonymity: the case of numerical data Torra, Vicenç

22 6 p. 2015-2024
artikel
11 BAPRP: a machine learning approach to blackhole attacks prevention routing protocol in vehicular Ad Hoc networks Luong, Ngoc T.

22 6 p. 1547-1566
artikel
12 CADS-ML/DL: efficient cloud-based multi-attack detection system Farhat, Saida

22 6 p. 1989-2013
artikel
13 DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour Žiža, Kristijan

22 6 p. 1865-1880
artikel
14 Effective network intrusion detection using stacking-based ensemble approach Ali, Muhammad

22 6 p. 1781-1798
artikel
15 Evading malware classifiers using RL agent with action-mask Pandey, Saurabh

22 6 p. 1743-1763
artikel
16 Fast but approximate homomorphic k-means based on masking technique Rovida, Lorenzo

22 6 p. 1605-1619
artikel
17 Federated learning-based intrusion detection system for Internet of Things Hamdi, Najet

22 6 p. 1937-1948
artikel
18 Investigation of application layer DDoS attacks in legacy and software-defined networks: A comprehensive review Kaur, Sarabjeet

22 6 p. 1949-1988
artikel
19 Malware classification approaches utilizing binary and text encoding of permissions Zyout, Mo’ath

22 6 p. 1687-1712
artikel
20 On the detection of lateral movement through supervised machine learning and an open-source tool to create turnkey datasets from Sysmon logs Smiliotopoulos, Christos

22 6 p. 1893-1919
artikel
21 Privacy-preserving continuous authentication using behavioral biometrics Baig, Ahmed Fraz

22 6 p. 1833-1847
artikel
22 RADS: a real-time anomaly detection model for software-defined networks using machine learning Sneha, M.

22 6 p. 1881-1891
artikel
23 Trust modeling in a distributed collaborative environment: application to a collaborative healthcare system Barhoun, Rabie

22 6 p. 1585-1604
artikel
24 Two-model active learning approach for inappropriate information classification in social networks Levshun, Dmitry

22 6 p. 1921-1936
artikel
25 Yet another cybersecurity risk assessment framework Ekstedt, Mathias

22 6 p. 1713-1729
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland