Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             29 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Acnn: arbitrary trace attacks based on leakage area detection Xiao, Chong

23 4 p. 2991-3006
artikel
2 A compliance-based ranking of certificate authorities using probabilistic approaches Junaid, Kashif

23 4 p. 2881-2910
artikel
3 A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA) Elberri, Mustafa Ahmed

23 4 p. 2583-2606
artikel
4 Adaptive context-aware access control for IoT environments leveraging fog computing Kalaria, Rudri

23 4 p. 3089-3107
artikel
5 A dynamic C-V2X anonymous authentication and group key agreement protocol Cui, Beibei

23 4 p. 2977-2989
artikel
6 An improved and efficient coercion-resistant measure for electronic voting system Chen, Tzer-Long

23 4 p. 2637-2654
artikel
7 An online intrusion detection method for industrial control systems based on extended belief rule base Qian, Guangyu

23 4 p. 2491-2514
artikel
8 A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications Browne, Thomas Oakley

23 4 p. 2911-2938
artikel
9 BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology Madhushanie, Nadisha

23 4 p. 2783-2792
artikel
10 C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks Haider, Raja Zeeshan

23 4 p. 2531-2545
artikel
11 Decentralised identity federations using blockchain Shuhan, Mirza Kamrul Bashar

23 4 p. 2759-2782
artikel
12 Dynamic vulnerability severity calculator for industrial control systems Cheimonidis, Pavlos

23 4 p. 2655-2676
artikel
13 Email bombing attack detection and mitigation using machine learning Shukla, Sanjeev

23 4 p. 2939-2949
artikel
14 Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis Haverkamp, Indy

23 4 p. 2607-2635
artikel
15 Expediting the design and development of secure cloud-based mobile apps Chimuco, Francisco T.

23 4 p. 3043-3064
artikel
16 Gaming the system: tetromino-based covert channel and its impact on mobile security Vasilellis, Efstratios

23 4 p. 3007-3027
artikel
17 Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle Zacharis, Alexandros

23 4 p. 2691-2710
artikel
18 IoT cybersecurity in 5G and beyond: a systematic literature review Pirbhulal, Sandeep

23 4 p. 2827-2879
artikel
19 IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications Bhandari, Guru Prasad

23 4 p. 2677-2690
artikel
20 Model-Agnostic Utility-Preserving Biometric Information Anonymization Chen, Chun-Fu

23 4 p. 2809-2826
artikel
21 Multi-party codebook distribution strategy based on secret sharing She, Wei

23 4 p. 3029-3042
artikel
22 Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms Bajaj, Ashish

23 4 p. 2711-2737
artikel
23 Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things Otokwala, Uneneibotejit

23 4 p. 2559-2581
artikel
24 Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis Asfahani, Ahmed M.

23 4 p. 2515-2530
artikel
25 Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability Paya, Antonio

23 4 p. 2793-2808
artikel
26 Swarm-intelligence for the modern ICT ecosystems Hatzivasilis, George

23 4 p. 2951-2975
artikel
27 Trust management in the internet of vehicles: a systematic literature review of blockchain integration Abbasi, Shirin

23 4 p. 3065-3088
artikel
28 Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation Akbarzadeh, Aida

23 4 p. 2739-2758
artikel
29 Unmasking the common traits: an ensemble approach for effective malware detection Borah, Parthajit

23 4 p. 2547-2557
artikel
                             29 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland