Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             15 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive analysis on software vulnerability detection datasets: trends, challenges, and road ahead Guo, Yuejun

23 5 p. 3311-3327
artikel
2 A few-shot learning based method for industrial internet intrusion detection Wang, Yahui

23 5 p. 3241-3252
artikel
3 A study on privacy and security aspects of personalised apps Gerasimou, Stylianos

23 5 p. 3217-3239
artikel
4 Automating shareable cyber threat intelligence production for closed source software vulnerabilities: a deep learning based detection system Arıkan, Süleyman Muhammed

23 5 p. 3135-3151
artikel
5 Collaborative intrusion detection using weighted ensemble averaging deep neural network for coordinated attack detection in heterogeneous network Wardana, Aulia Arif

23 5 p. 3329-3349
artikel
6 Early mitigation of CPU-optimized ransomware using monitoring encryption instructions Enomoto, Shuhei

23 5 p. 3393-3413
artikel
7 Information flow control for comparative privacy analyses Ahmad, Zubair

23 5 p. 3199-3216
artikel
8 Mitigation of privilege escalation attack using kernel data relocation mechanism Kuzuno, Hiroki

23 5 p. 3351-3367
artikel
9 Press play, install malware: a study of rhythm game-based malware dropping Vasilellis, Efstratios

23 5 p. 3369-3391
artikel
10 Privacy-preserving two-party computation of line segment intersection Sheidani, Sorour

23 5 p. 3415-3432
artikel
11 Survey-based analysis of cybersecurity awareness of Turkish seafarers Moen, Ivar

23 5 p. 3153-3178
artikel
12 The ACACD model for mutable activity control and chain of dependencies in smart and connected systems Mawla, Tanjila

23 5 p. 3283-3310
artikel
13 The awareness of operators: a goal-directed task analysis in SOCs for critical infrastructure Ofte, Håvard Jakobsen

23 5 p. 3253-3282
artikel
14 Trust attack prevention based on Spark-blockchain in social IoT: a survey Masmoudi, Mariam

23 5 p. 3179-3198
artikel
15 Using the ACE framework to enforce access and usage control with notifications of revoked access rights Rasori, Marco

23 5 p. 3109-3133
artikel
                             15 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland