nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abuse-freeness in contract signing: a blockchain-based proposal
|
Ferrer-Gomila, Josep-Lluís |
|
|
23 |
3 |
p. 1963-1974 |
artikel |
2 |
A comprehensive review on permissions-based Android malware detection
|
Sharma, Yash |
|
|
23 |
3 |
p. 1877-1912 |
artikel |
3 |
A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection
|
Patel, N. D. |
|
|
23 |
3 |
p. 2457-2487 |
artikel |
4 |
A context-aware on-board intrusion detection system for smart vehicles
|
Micale, Davide |
|
|
23 |
3 |
p. 2203-2223 |
artikel |
5 |
Activity-based payments: alternative (anonymous) online payment model
|
Leszczyna, Rafał |
|
|
23 |
3 |
p. 1741-1759 |
artikel |
6 |
Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network
|
Barik, Kousik |
|
|
23 |
3 |
p. 2353-2376 |
artikel |
7 |
A generic framework for blockchain-assisted on-chain auditing for off-chain storage
|
Banaeian Far, Saeed |
|
|
23 |
3 |
p. 2407-2435 |
artikel |
8 |
An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction
|
Kunang, Yesi Novaria |
|
|
23 |
3 |
p. 1619-1648 |
artikel |
9 |
A new approach for detecting process injection attacks using memory analysis
|
Nasereddin, Mohammed |
|
|
23 |
3 |
p. 2099-2121 |
artikel |
10 |
Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard
|
Almoqbil, Abdullah Hamad N. |
|
|
23 |
3 |
p. 2377-2394 |
artikel |
11 |
A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT)
|
Quincozes, Vagner E. |
|
|
23 |
3 |
p. 1975-2002 |
artikel |
12 |
Attribute inference privacy protection for pre-trained models
|
Abedi Khorasgani, Hossein |
|
|
23 |
3 |
p. 2269-2285 |
artikel |
13 |
Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review
|
Ebrahimpour, Elham |
|
|
23 |
3 |
p. 1583-1602 |
artikel |
14 |
AutoPKI: public key infrastructure for IoT with automated trust transfer
|
Höglund, Joel |
|
|
23 |
3 |
p. 1859-1875 |
artikel |
15 |
A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things
|
Saheed, Yakub Kayode |
|
|
23 |
3 |
p. 1557-1581 |
artikel |
16 |
BLISS: blockchain-based integrated security system for internet of things (IoT) applications
|
Vishwakarma, Lokendra |
|
|
23 |
3 |
p. 1649-1665 |
artikel |
17 |
Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm
|
Singh, Upendra |
|
|
23 |
3 |
p. 1667-1677 |
artikel |
18 |
Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs)
|
Rabie, Osama Bassam J. |
|
|
23 |
3 |
p. 2489 |
artikel |
19 |
Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards
|
Chillara, Anil Kumar |
|
|
23 |
3 |
p. 2043-2061 |
artikel |
20 |
Dynamic authentication for intelligent sensor clouds in the Internet of Things
|
Al-Aqrabi, Hussain |
|
|
23 |
3 |
p. 2003-2021 |
artikel |
21 |
Enhancing security in QCA-based circuits using optimal key gate placement
|
Amutha, M. |
|
|
23 |
3 |
p. 2395-2405 |
artikel |
22 |
Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network
|
Abdelkreem, Eslam |
|
|
23 |
3 |
p. 1939-1961 |
artikel |
23 |
From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity
|
Yousaf, Awais |
|
|
23 |
3 |
p. 1603-1618 |
artikel |
24 |
Generative AI for pentesting: the good, the bad, the ugly
|
Hilario, Eric |
|
|
23 |
3 |
p. 2075-2097 |
artikel |
25 |
Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things
|
Mughaid, Ala |
|
|
23 |
3 |
p. 2123-2137 |
artikel |
26 |
International journal of information security: a bibliometric study, 2007–2023
|
Dwivedi, Rahul |
|
|
23 |
3 |
p. 2159-2187 |
artikel |
27 |
Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices
|
Shah, Rajiv |
|
|
23 |
3 |
p. 1913-1926 |
artikel |
28 |
Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems
|
Haugli-Sandvik, Marie |
|
|
23 |
3 |
p. 1721-1739 |
artikel |
29 |
Mastering data privacy: leveraging K-anonymity for robust health data sharing
|
Karagiannis, Stylianos |
|
|
23 |
3 |
p. 2189-2201 |
artikel |
30 |
MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives
|
Kwarteng, Emmanuel |
|
|
23 |
3 |
p. 2225-2268 |
artikel |
31 |
MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs
|
Talukder, Md. Alamin |
|
|
23 |
3 |
p. 2139-2158 |
artikel |
32 |
Neighbor discovery protocol anomaly-based detection system using neural network algorithm
|
Saad, Redhwan M. A. |
|
|
23 |
3 |
p. 1787-1803 |
artikel |
33 |
Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack
|
Navajas-Adán, Joaquín |
|
|
23 |
3 |
p. 2315-2331 |
artikel |
34 |
Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN
|
Pise, Rohini G. |
|
|
23 |
3 |
p. 1805-1819 |
artikel |
35 |
RAMA: a risk assessment solution for healthcare organizations
|
Smyrlis, Michail |
|
|
23 |
3 |
p. 1821-1838 |
artikel |
36 |
Random forest evaluation using multi-key homomorphic encryption and lookup tables
|
Petrean, Diana-Elena |
|
|
23 |
3 |
p. 2023-2041 |
artikel |
37 |
Real-time system call-based ransomware detection
|
Chew, Christopher Jun Wen |
|
|
23 |
3 |
p. 1839-1858 |
artikel |
38 |
Robust password security: a genetic programming approach with imbalanced dataset handling
|
Andelić, Nikola |
|
|
23 |
3 |
p. 1761-1786 |
artikel |
39 |
Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns
|
Angafor, Giddeon Njamngang |
|
|
23 |
3 |
p. 1679-1693 |
artikel |
40 |
Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies
|
Wijesundara, W. M. A. B. |
|
|
23 |
3 |
p. 1927-1937 |
artikel |
41 |
Selfish mining attack in blockchain: a systematic literature review
|
Madhushanie, Nadisha |
|
|
23 |
3 |
p. 2333-2351 |
artikel |
42 |
Spatial de-correlation of generated keys from wireless channels using adversarial deep learning
|
Aliabadian, Amir |
|
|
23 |
3 |
p. 2063-2073 |
artikel |
43 |
Tracing the evolution of cyber resilience: a historical and conceptual review
|
Tzavara, Vasiliki |
|
|
23 |
3 |
p. 1695-1719 |
artikel |
44 |
Trustworthy machine learning in the context of security and privacy
|
Upreti, Ramesh |
|
|
23 |
3 |
p. 2287-2314 |
artikel |
45 |
Validation and extension of two domain-specific information privacy competency models
|
Soumelidou, Aikaterini |
|
|
23 |
3 |
p. 2437-2455 |
artikel |