nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Acnn: arbitrary trace attacks based on leakage area detection
|
Xiao, Chong |
|
|
23 |
4 |
p. 2991-3006 |
artikel |
2 |
A compliance-based ranking of certificate authorities using probabilistic approaches
|
Junaid, Kashif |
|
|
23 |
4 |
p. 2881-2910 |
artikel |
3 |
A cyber defense system against phishing attacks with deep learning game theory and LSTM-CNN with African vulture optimization algorithm (AVOA)
|
Elberri, Mustafa Ahmed |
|
|
23 |
4 |
p. 2583-2606 |
artikel |
4 |
Adaptive context-aware access control for IoT environments leveraging fog computing
|
Kalaria, Rudri |
|
|
23 |
4 |
p. 3089-3107 |
artikel |
5 |
A dynamic C-V2X anonymous authentication and group key agreement protocol
|
Cui, Beibei |
|
|
23 |
4 |
p. 2977-2989 |
artikel |
6 |
An improved and efficient coercion-resistant measure for electronic voting system
|
Chen, Tzer-Long |
|
|
23 |
4 |
p. 2637-2654 |
artikel |
7 |
An online intrusion detection method for industrial control systems based on extended belief rule base
|
Qian, Guangyu |
|
|
23 |
4 |
p. 2491-2514 |
artikel |
8 |
A systematic review on research utilising artificial intelligence for open source intelligence (OSINT) applications
|
Browne, Thomas Oakley |
|
|
23 |
4 |
p. 2911-2938 |
artikel |
9 |
BA-flag: a self-prevention mechanism of selfish mining attacks in blockchain technology
|
Madhushanie, Nadisha |
|
|
23 |
4 |
p. 2783-2792 |
artikel |
10 |
C2-Eye: framework for detecting command and control (C2) connection of supply chain attacks
|
Haider, Raja Zeeshan |
|
|
23 |
4 |
p. 2531-2545 |
artikel |
11 |
Decentralised identity federations using blockchain
|
Shuhan, Mirza Kamrul Bashar |
|
|
23 |
4 |
p. 2759-2782 |
artikel |
12 |
Dynamic vulnerability severity calculator for industrial control systems
|
Cheimonidis, Pavlos |
|
|
23 |
4 |
p. 2655-2676 |
artikel |
13 |
Email bombing attack detection and mitigation using machine learning
|
Shukla, Sanjeev |
|
|
23 |
4 |
p. 2939-2949 |
artikel |
14 |
Evaluating the merits and constraints of cryptography-steganography fusion: a systematic analysis
|
Haverkamp, Indy |
|
|
23 |
4 |
p. 2607-2635 |
artikel |
15 |
Expediting the design and development of secure cloud-based mobile apps
|
Chimuco, Francisco T. |
|
|
23 |
4 |
p. 3043-3064 |
artikel |
16 |
Gaming the system: tetromino-based covert channel and its impact on mobile security
|
Vasilellis, Efstratios |
|
|
23 |
4 |
p. 3007-3027 |
artikel |
17 |
Integrating AI-driven threat intelligence and forecasting in the cyber security exercise content generation lifecycle
|
Zacharis, Alexandros |
|
|
23 |
4 |
p. 2691-2710 |
artikel |
18 |
IoT cybersecurity in 5G and beyond: a systematic literature review
|
Pirbhulal, Sandeep |
|
|
23 |
4 |
p. 2827-2879 |
artikel |
19 |
IoTvulCode: AI-enabled vulnerability detection in software products designed for IoT applications
|
Bhandari, Guru Prasad |
|
|
23 |
4 |
p. 2677-2690 |
artikel |
20 |
Model-Agnostic Utility-Preserving Biometric Information Anonymization
|
Chen, Chun-Fu |
|
|
23 |
4 |
p. 2809-2826 |
artikel |
21 |
Multi-party codebook distribution strategy based on secret sharing
|
She, Wei |
|
|
23 |
4 |
p. 3029-3042 |
artikel |
22 |
Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms
|
Bajaj, Ashish |
|
|
23 |
4 |
p. 2711-2737 |
artikel |
23 |
Optimized common features selection and deep-autoencoder (OCFSDA) for lightweight intrusion detection in Internet of things
|
Otokwala, Uneneibotejit |
|
|
23 |
4 |
p. 2559-2581 |
artikel |
24 |
Perceptions of organizational responsibility for cybersecurity in Saudi Arabia: a moderated mediation analysis
|
Asfahani, Ahmed M. |
|
|
23 |
4 |
p. 2515-2530 |
artikel |
25 |
Securesdp: a novel software-defined perimeter implementation for enhanced network security and scalability
|
Paya, Antonio |
|
|
23 |
4 |
p. 2793-2808 |
artikel |
26 |
Swarm-intelligence for the modern ICT ecosystems
|
Hatzivasilis, George |
|
|
23 |
4 |
p. 2951-2975 |
artikel |
27 |
Trust management in the internet of vehicles: a systematic literature review of blockchain integration
|
Abbasi, Shirin |
|
|
23 |
4 |
p. 3065-3088 |
artikel |
28 |
Two-stage advanced persistent threat (APT) attack on an IEC 61850 power grid substation
|
Akbarzadeh, Aida |
|
|
23 |
4 |
p. 2739-2758 |
artikel |
29 |
Unmasking the common traits: an ensemble approach for effective malware detection
|
Borah, Parthajit |
|
|
23 |
4 |
p. 2547-2557 |
artikel |