Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             45 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abuse-freeness in contract signing: a blockchain-based proposal Ferrer-Gomila, Josep-Lluís

23 3 p. 1963-1974
artikel
2 A comprehensive review on permissions-based Android malware detection Sharma, Yash

23 3 p. 1877-1912
artikel
3 A computationally efficient dimensionality reduction and attack classification approach for network intrusion detection Patel, N. D.

23 3 p. 2457-2487
artikel
4 A context-aware on-board intrusion detection system for smart vehicles Micale, Davide

23 3 p. 2203-2223
artikel
5 Activity-based payments: alternative (anonymous) online payment model Leszczyna, Rafał

23 3 p. 1741-1759
artikel
6 Adversarial attack detection framework based on optimized weighted conditional stepwise adversarial network Barik, Kousik

23 3 p. 2353-2376
artikel
7 A generic framework for blockchain-assisted on-chain auditing for off-chain storage Banaeian Far, Saeed

23 3 p. 2407-2435
artikel
8 An end-to-end intrusion detection system with IoT dataset using deep learning with unsupervised feature extraction Kunang, Yesi Novaria

23 3 p. 1619-1648
artikel
9 A new approach for detecting process injection attacks using memory analysis Nasereddin, Mohammed

23 3 p. 2099-2121
artikel
10 Anomaly detection for early ransomware and spyware warning in nuclear power plant systems based on FusionGuard Almoqbil, Abdullah Hamad N.

23 3 p. 2377-2394
artikel
11 A survey on IoT application layer protocols, security challenges, and the role of explainable AI in IoT (XAIoT) Quincozes, Vagner E.

23 3 p. 1975-2002
artikel
12 Attribute inference privacy protection for pre-trained models Abedi Khorasgani, Hossein

23 3 p. 2269-2285
artikel
13 Authentication in Internet of Things, protocols, attacks, and open issues: a systematic literature review Ebrahimpour, Elham

23 3 p. 1583-1602
artikel
14 AutoPKI: public key infrastructure for IoT with automated trust transfer Höglund, Joel

23 3 p. 1859-1875
artikel
15 A voting gray wolf optimizer-based ensemble learning models for intrusion detection in the Internet of Things Saheed, Yakub Kayode

23 3 p. 1557-1581
artikel
16 BLISS: blockchain-based integrated security system for internet of things (IoT) applications Vishwakarma, Lokendra

23 3 p. 1649-1665
artikel
17 Blockchain-based BATMAN protocol using mobile ad hoc network (MANET) with an ensemble algorithm Singh, Upendra

23 3 p. 1667-1677
artikel
18 Correction: A full privacy-preserving distributed batch-based certificate-less aggregate signature authentication scheme for healthcare wearable wireless medical sensor networks (HWMSNs) Rabie, Osama Bassam J.

23 3 p. 2489
artikel
19 Deceiving supervised machine learning models via adversarial data poisoning attacks: a case study with USB keyboards Chillara, Anil Kumar

23 3 p. 2043-2061
artikel
20 Dynamic authentication for intelligent sensor clouds in the Internet of Things Al-Aqrabi, Hussain

23 3 p. 2003-2021
artikel
21 Enhancing security in QCA-based circuits using optimal key gate placement Amutha, M.

23 3 p. 2395-2405
artikel
22 Feature engineering impact on position falsification attacks detection in vehicular ad-hoc network Abdelkreem, Eslam

23 3 p. 1939-1961
artikel
23 From sinking to saving: MITRE ATT &CK and D3FEND frameworks for maritime cybersecurity Yousaf, Awais

23 3 p. 1603-1618
artikel
24 Generative AI for pentesting: the good, the bad, the ugly Hilario, Eric

23 3 p. 2075-2097
artikel
25 Intelligent cybersecurity approach for data protection in cloud computing based Internet of Things Mughaid, Ala

23 3 p. 2123-2137
artikel
26 International journal of information security: a bibliometric study, 2007–2023 Dwivedi, Rahul

23 3 p. 2159-2187
artikel
27 Is cyber hygiene a remedy to IPTV infringement? A study of online streaming behaviours and cyber security practices Shah, Rajiv

23 3 p. 1913-1926
artikel
28 Maritime decision-makers and cyber security: deck officers’ perception of cyber risks towards IT and OT systems Haugli-Sandvik, Marie

23 3 p. 1721-1739
artikel
29 Mastering data privacy: leveraging K-anonymity for robust health data sharing Karagiannis, Stylianos

23 3 p. 2189-2201
artikel
30 MEDICALHARM: A threat modeling designed for modern medical devices and a comprehensive study on effectiveness, user satisfaction, and security perspectives Kwarteng, Emmanuel

23 3 p. 2225-2268
artikel
31 MLSTL-WSN: machine learning-based intrusion detection using SMOTETomek in WSNs Talukder, Md. Alamin

23 3 p. 2139-2158
artikel
32 Neighbor discovery protocol anomaly-based detection system using neural network algorithm Saad, Redhwan M. A.

23 3 p. 1787-1803
artikel
33 Perceptions and dilemmas around cyber-security in a Spanish research center after a cyber-attack Navajas-Adán, Joaquín

23 3 p. 2315-2331
artikel
34 Pioneering automated vulnerability detection for smart contracts in blockchain using KEVM: Guardian ADRGAN Pise, Rohini G.

23 3 p. 1805-1819
artikel
35 RAMA: a risk assessment solution for healthcare organizations Smyrlis, Michail

23 3 p. 1821-1838
artikel
36 Random forest evaluation using multi-key homomorphic encryption and lookup tables Petrean, Diana-Elena

23 3 p. 2023-2041
artikel
37 Real-time system call-based ransomware detection Chew, Christopher Jun Wen

23 3 p. 1839-1858
artikel
38 Robust password security: a genetic programming approach with imbalanced dataset handling Andelić, Nikola

23 3 p. 1761-1786
artikel
39 Securing the remote office: reducing cyber risks to remote working through regular security awareness education campaigns Angafor, Giddeon Njamngang

23 3 p. 1679-1693
artikel
40 Security-enhanced firmware management scheme for smart home IoT devices using distributed ledger technologies Wijesundara, W. M. A. B.

23 3 p. 1927-1937
artikel
41 Selfish mining attack in blockchain: a systematic literature review Madhushanie, Nadisha

23 3 p. 2333-2351
artikel
42 Spatial de-correlation of generated keys from wireless channels using adversarial deep learning Aliabadian, Amir

23 3 p. 2063-2073
artikel
43 Tracing the evolution of cyber resilience: a historical and conceptual review Tzavara, Vasiliki

23 3 p. 1695-1719
artikel
44 Trustworthy machine learning in the context of security and privacy Upreti, Ramesh

23 3 p. 2287-2314
artikel
45 Validation and extension of two domain-specific information privacy competency models Soumelidou, Aikaterini

23 3 p. 2437-2455
artikel
                             45 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland