nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead
|
Guo, Yuejun |
|
|
23 |
5 |
p. 3311-3327 |
artikel |
2 |
A few-shot learning based method for industrial internet intrusion detection
|
Wang, Yahui |
|
|
23 |
5 |
p. 3241-3252 |
artikel |
3 |
A study on privacy and security aspects of personalised apps
|
Gerasimou, Stylianos |
|
|
23 |
5 |
p. 3217-3239 |
artikel |
4 |
Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system
|
Arıkan, Süleyman Muhammed |
|
|
23 |
5 |
p. 3135-3151 |
artikel |
5 |
Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network
|
Wardana, Aulia Arif |
|
|
23 |
5 |
p. 3329-3349 |
artikel |
6 |
Early mitigation of CPU-optimized ransomware using monitoring encryption instructions
|
Enomoto, Shuhei |
|
|
23 |
5 |
p. 3393-3413 |
artikel |
7 |
Information flow control for comparative privacy analyses
|
Ahmad, Zubair |
|
|
23 |
5 |
p. 3199-3216 |
artikel |
8 |
Mitigation of privilege escalation attack using kernel data relocation mechanism
|
Kuzuno, Hiroki |
|
|
23 |
5 |
p. 3351-3367 |
artikel |
9 |
Press play, install malware: a study of rhythm game-based malware dropping
|
Vasilellis, Efstratios |
|
|
23 |
5 |
p. 3369-3391 |
artikel |
10 |
Privacy-preserving two-party computation of line segment intersection
|
Sheidani, Sorour |
|
|
23 |
5 |
p. 3415-3432 |
artikel |
11 |
Survey-based analysis of cybersecurity awareness of Turkish seafarers
|
Moen, Ivar |
|
|
23 |
5 |
p. 3153-3178 |
artikel |
12 |
The ACACD model for mutable activity control and chain of dependencies in smart and connected systems
|
Mawla, Tanjila |
|
|
23 |
5 |
p. 3283-3310 |
artikel |
13 |
The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure
|
Ofte, Håvard Jakobsen |
|
|
23 |
5 |
p. 3253-3282 |
artikel |
14 |
Trust attack prevention based on Spark-blockchain in social IoT: a survey
|
Masmoudi, Mariam |
|
|
23 |
5 |
p. 3179-3198 |
artikel |
15 |
Using the ACE framework to enforce access and usage control with notifications of revoked access rights
|
Rasori, Marco |
|
|
23 |
5 |
p. 3109-3133 |
artikel |