nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A distributed and cooperative signature-based intrusion detection system framework for multi-channel man-in-the-middle attacks against protected Wi-Fi networks
|
Thankappan, Manesh |
|
|
23 |
6 |
p. 3527-3546 |
artikel |
2 |
Adversarial robustness of deep reinforcement learning-based intrusion detection
|
Merzouk, Mohamed Amine |
|
|
23 |
6 |
p. 3625-3651 |
artikel |
3 |
An enhanced and verifiable lightweight authentication protocol for securing the Internet of Medical Things (IoMT) based on CP-ABE encryption
|
Jebrane, Jihane |
|
|
23 |
6 |
p. 3691-3710 |
artikel |
4 |
“Animation” URL in NFT marketplaces considered harmful for privacy
|
Callejo, Patricia |
|
|
23 |
6 |
p. 3749-3763 |
artikel |
5 |
An overview of proposals towards the privacy-preserving publication of trajectory data
|
Miranda-Pascual, Àlex |
|
|
23 |
6 |
p. 3711-3747 |
artikel |
6 |
A TCP-based covert channel with integrity check and retransmission
|
Bistarelli, Stefano |
|
|
23 |
6 |
p. 3481-3512 |
artikel |
7 |
Bluetooth security analysis of general and intimate health IoT devices and apps: the case of FemTech
|
Cook, Stephen |
|
|
23 |
6 |
p. 3547-3567 |
artikel |
8 |
Defect-scanner: a comparative empirical study on language model and deep learning approach for software vulnerability detection
|
Pham, Van-Hau |
|
|
23 |
6 |
p. 3513-3526 |
artikel |
9 |
Enhancing DevSecOps practice with Large Language Models and Security Chaos Engineering
|
Bedoya, Martin |
|
|
23 |
6 |
p. 3765-3788 |
artikel |
10 |
Enhancing privacy protections in national identification systems: an examination of stakeholders’ knowledge, attitudes, and practices of privacy by design
|
Abomhara, Mohamed |
|
|
23 |
6 |
p. 3665-3689 |
artikel |
11 |
Guiding the implementation of data privacy with microservices
|
Antunes, Pedro |
|
|
23 |
6 |
p. 3591-3608 |
artikel |
12 |
RETRACTED ARTICLE: Deep learning based network intrusion detection system: a systematic literature review and future scopes
|
Yogesh, |
|
|
23 |
6 |
p. 3433-3463 |
artikel |
13 |
Secure multi-party computation with legally-enforceable fairness
|
Nakai, Takeshi |
|
|
23 |
6 |
p. 3609-3623 |
artikel |
14 |
Securing 5G virtual networks: a critical analysis of SDN, NFV, and network slicing security
|
Alnaim, Abdulrahman K. |
|
|
23 |
6 |
p. 3569-3589 |
artikel |
15 |
Securing the IoT ecosystem: ASIC-based hardware realization of Ascon lightweight cipher
|
Khan, Safiullah |
|
|
23 |
6 |
p. 3653-3664 |
artikel |
16 |
Unmasking SDN flow table saturation: fingerprinting, attacks and defenses
|
Yiğit, Beytüllah |
|
|
23 |
6 |
p. 3465-3479 |
artikel |