nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive survey of phishing: mediums, intended targets, attack and defence techniques and a novel taxonomy
|
Goenka, Richa |
|
|
23 |
2 |
p. 819-848 |
artikel |
2 |
A deep learning approach based on multi-view consensus for SQL injection detection
|
Kakisim, Arzu Gorgulu |
|
|
23 |
2 |
p. 1541-1556 |
artikel |
3 |
A hybrid IDS for detection and mitigation of sinkhole attack in 6LoWPAN networks
|
Bhale, Pradeepkumar |
|
|
23 |
2 |
p. 915-934 |
artikel |
4 |
A modular cyber security training programme for the maritime domain
|
Oruc, Aybars |
|
|
23 |
2 |
p. 1477-1512 |
artikel |
5 |
An efficient user authentication and key agreement scheme for wireless sensor networks using physically unclonable function
|
Tyagi, Gaurav |
|
|
23 |
2 |
p. 935-962 |
artikel |
6 |
An ensemble approach-based intrusion detection system utilizing ISHO-HBA and SE-ResNet152
|
Saikam, Jalaiah |
|
|
23 |
2 |
p. 1037-1054 |
artikel |
7 |
A perspective–retrospective analysis of diversity in signature-based open-source network intrusion detection systems
|
Asad, H. |
|
|
23 |
2 |
p. 1331-1346 |
artikel |
8 |
A review on digital twins for power generation and distribution
|
Heluany, Jessica B. |
|
|
23 |
2 |
p. 1171-1195 |
artikel |
9 |
A survey and characterization of Close Access Cyberspace Operations
|
Villalón-Huerta, Antonio |
|
|
23 |
2 |
p. 963-980 |
artikel |
10 |
A survey on run-time packers and mitigation techniques
|
Alkhateeb, Ehab |
|
|
23 |
2 |
p. 887-913 |
artikel |
11 |
A systematic mapping study on security for systems of systems
|
Olivero, Miguel Angel |
|
|
23 |
2 |
p. 787-817 |
artikel |
12 |
Blockchain-based multi-organizational cyber risk management framework for collaborative environments
|
El Amin, Habib |
|
|
23 |
2 |
p. 1231-1249 |
artikel |
13 |
Cashing out crypto: state of practice in ransom payments
|
Patsakis, Constantinos |
|
|
23 |
2 |
p. 699-712 |
artikel |
14 |
Cyberattack defense mechanism using deep learning techniques in software-defined networks
|
Rao, Dimmiti Srinivasa |
|
|
23 |
2 |
p. 1279-1291 |
artikel |
15 |
Cybersecurity training and healthcare: the AERAS approach
|
Frati, Fulvio |
|
|
23 |
2 |
p. 1527-1539 |
artikel |
16 |
De Bello Homomorphico: Investigation of the extensibility of the OpenFHE library with basic mathematical functions by means of common approaches using the example of the CKKS cryptosystem
|
Prantl, Thomas |
|
|
23 |
2 |
p. 1149-1169 |
artikel |
17 |
Detection, characterization, and profiling DoH Malicious traffic using statistical pattern recognition
|
Niktabe, Sepideh |
|
|
23 |
2 |
p. 1293-1316 |
artikel |
18 |
Enhancing detection of malicious profiles and spam tweets with an automated honeypot framework powered by deep learning
|
El Mendili, Fatna |
|
|
23 |
2 |
p. 1359-1388 |
artikel |
19 |
Enhancing security in Fiat–Shamir transformation-based non-interactive zero-knowledge protocols for IoT authentication
|
Hamila, Firas |
|
|
23 |
2 |
p. 1131-1148 |
artikel |
20 |
Evaluating the impact of filter-based feature selection in intrusion detection systems
|
Zouhri, Houssam |
|
|
23 |
2 |
p. 759-785 |
artikel |
21 |
Exploring the potential of deep learning and machine learning techniques for randomness analysis to enhance security on IoT
|
Ince, Kenan |
|
|
23 |
2 |
p. 1117-1130 |
artikel |
22 |
Fairness as a Service (FaaS): verifiable and privacy-preserving fairness auditing of machine learning systems
|
Toreini, Ehsan |
|
|
23 |
2 |
p. 981-997 |
artikel |
23 |
Fostering information security policies compliance with ISA-95-based framework: an empirical study of oil and gas employees
|
Faizan Ali, Rao |
|
|
23 |
2 |
p. 1197-1213 |
artikel |
24 |
Generating adversarial examples with collaborative generative models
|
Xu, Lei |
|
|
23 |
2 |
p. 1077-1091 |
artikel |
25 |
Generating ICS vulnerability playbooks with open standards
|
Empl, Philip |
|
|
23 |
2 |
p. 1215-1230 |
artikel |
26 |
Information security and privacy challenges of cloud computing for government adoption: a systematic review
|
Ukeje, Ndukwe |
|
|
23 |
2 |
p. 1459-1475 |
artikel |
27 |
Integrating the edge computing paradigm into the development of IoT forensic methodologies
|
Castelo Gómez, Juan Manuel |
|
|
23 |
2 |
p. 1093-1116 |
artikel |
28 |
Intrusion detection for power grid: a review
|
Dasgupta, Rupshali |
|
|
23 |
2 |
p. 1317-1329 |
artikel |
29 |
Locating collaborative attack targets based on physical invariants toward cyber-physical systems
|
Xun, Peng |
|
|
23 |
2 |
p. 999-1017 |
artikel |
30 |
Maritime cybersecurity: protecting digital seas
|
Martínez, Ferney |
|
|
23 |
2 |
p. 1429-1457 |
artikel |
31 |
Network intrusion detection and mitigation in SDN using deep learning models
|
Maddu, Mamatha |
|
|
23 |
2 |
p. 849-862 |
artikel |
32 |
Olympus: a GDPR compliant blockchain system
|
Gonçalves, Ricardo Martins |
|
|
23 |
2 |
p. 1021-1036 |
artikel |
33 |
Publisher Correction: PPAM-mIoMT: a privacy-preserving authentication with device verification for securing healthcare systems in 5G networks
|
Patruni, Muralidhara Rao |
|
|
23 |
2 |
p. 1019 |
artikel |
34 |
Radio frequency fingerprinting techniques for device identification: a survey
|
Abbas, Sohail |
|
|
23 |
2 |
p. 1389-1427 |
artikel |
35 |
Security bug reports classification using fasttext
|
Alqahtani, Sultan S. |
|
|
23 |
2 |
p. 1347-1358 |
artikel |
36 |
SmartiPhish: a reinforcement learning-based intelligent anti-phishing solution to detect spoofed website attacks
|
Ariyadasa, Subhash |
|
|
23 |
2 |
p. 1055-1076 |
artikel |
37 |
The rise of “security and privacy”: bibliometric analysis of computer privacy research
|
Ali, Auwal Shehu |
|
|
23 |
2 |
p. 863-885 |
artikel |
38 |
TL-BILSTM IoT: transfer learning model for prediction of intrusion detection system in IoT environment
|
Nandanwar, Himanshu |
|
|
23 |
2 |
p. 1251-1277 |
artikel |
39 |
Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures
|
Hamdi, Ahlem |
|
|
23 |
2 |
p. 713-757 |
artikel |
40 |
Vulnerability discovery based on source code patch commit mining: a systematic literature review
|
Zuo, Fei |
|
|
23 |
2 |
p. 1513-1526 |
artikel |