Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             40 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy Goenka, Richa

23 2 p. 819-848
artikel
2 A deep learning approach based on multi-view consensus for SQL injection detection Kakisim, Arzu Gorgulu

23 2 p. 1541-1556
artikel
3 A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks Bhale, Pradeepkumar

23 2 p. 915-934
artikel
4 A modular cyber security training programme for the maritime domain Oruc, Aybars

23 2 p. 1477-1512
artikel
5 An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function Tyagi, Gaurav

23 2 p. 935-962
artikel
6 An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152 Saikam, Jalaiah

23 2 p. 1037-1054
artikel
7 A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems Asad, H.

23 2 p. 1331-1346
artikel
8 A review on digital twins for power generation and distribution Heluany, Jessica B.

23 2 p. 1171-1195
artikel
9 A survey and characterization of Close Access Cyberspace Operations Villalón-Huerta, Antonio

23 2 p. 963-980
artikel
10 A survey on run-time packers and mitigation techniques Alkhateeb, Ehab

23 2 p. 887-913
artikel
11 A systematic mapping study on security for systems of systems Olivero, Miguel Angel

23 2 p. 787-817
artikel
12 Blockchain-based multi-organizational cyber risk management framework for collaborative environments El Amin, Habib

23 2 p. 1231-1249
artikel
13 Cashing out crypto: state of practice in ransom payments Patsakis, Constantinos

23 2 p. 699-712
artikel
14 Cyberattack defense mechanism using deep learning techniques in software-defined networks Rao, Dimmiti Srinivasa

23 2 p. 1279-1291
artikel
15 Cybersecurity training and healthcare: the AERAS approach Frati, Fulvio

23 2 p. 1527-1539
artikel
16 De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem Prantl, Thomas

23 2 p. 1149-1169
artikel
17 Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition Niktabe, Sepideh

23 2 p. 1293-1316
artikel
18 Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning El Mendili, Fatna

23 2 p. 1359-1388
artikel
19 Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication Hamila, Firas

23 2 p. 1131-1148
artikel
20 Evaluating the impact of filter-based feature selection in intrusion detection systems Zouhri, Houssam

23 2 p. 759-785
artikel
21 Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT Ince, Kenan

23 2 p. 1117-1130
artikel
22 Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems Toreini, Ehsan

23 2 p. 981-997
artikel
23 Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees Faizan Ali, Rao

23 2 p. 1197-1213
artikel
24 Generating adversarial examples with collaborative generative models Xu, Lei

23 2 p. 1077-1091
artikel
25 Generating ICS vulnerability playbooks with open standards Empl, Philip

23 2 p. 1215-1230
artikel
26 Information security and privacy challenges of cloud computing for government adoption: a systematic review Ukeje, Ndukwe

23 2 p. 1459-1475
artikel
27 Integrating the edge computing paradigm into the development of IoT forensic methodologies Castelo Gómez, Juan Manuel

23 2 p. 1093-1116
artikel
28 Intrusion detection for power grid: a review Dasgupta, Rupshali

23 2 p. 1317-1329
artikel
29 Locating collaborative attack targets based on physical invariants toward cyber-physical systems Xun, Peng

23 2 p. 999-1017
artikel
30 Maritime cybersecurity: protecting digital seas Martínez, Ferney

23 2 p. 1429-1457
artikel
31 Network intrusion detection and mitigation in SDN using deep learning models Maddu, Mamatha

23 2 p. 849-862
artikel
32 Olympus: a GDPR compliant blockchain system Gonçalves, Ricardo Martins

23 2 p. 1021-1036
artikel
33 Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks Patruni, Muralidhara Rao

23 2 p. 1019
artikel
34 Radio frequency fingerprinting techniques for device identification: a survey Abbas, Sohail

23 2 p. 1389-1427
artikel
35 Security bug reports classification using fasttext Alqahtani, Sultan S.

23 2 p. 1347-1358
artikel
36 SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks Ariyadasa, Subhash

23 2 p. 1055-1076
artikel
37 The rise of “security and privacy”: bibliometric analysis of computer privacy research Ali, Auwal Shehu

23 2 p. 863-885
artikel
38 TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment Nandanwar, Himanshu

23 2 p. 1251-1277
artikel
39 Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures Hamdi, Ahlem

23 2 p. 713-757
artikel
40 Vulnerability discovery based on source code patch commit mining: a systematic literature review Zuo, Fei

23 2 p. 1513-1526
artikel
                             40 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland