nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accurate code fragment clone detection and its application in identifying known CVE clones
|
Arutunian, Mariam |
|
|
24 |
1 |
|
artikel |
2 |
A cluster of patterns for trusted computing
|
Fernandez, Eduardo B. |
|
|
24 |
1 |
|
artikel |
3 |
A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication
|
Garg, Manika |
|
|
24 |
1 |
|
artikel |
4 |
Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions
|
Zhang, Zijing |
|
|
24 |
1 |
|
artikel |
5 |
Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT
|
Li, Jinguo |
|
|
24 |
1 |
|
artikel |
6 |
A location-updating based self-healing group key management scheme for VANETs
|
Liu, Weinan |
|
|
24 |
1 |
|
artikel |
7 |
Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review
|
Reyes-Acosta, Ricardo |
|
|
24 |
1 |
|
artikel |
8 |
A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions
|
Rezayati, Mohammad Hadi |
|
|
24 |
1 |
|
artikel |
9 |
An exploratory analysis of the DPRK cyber threat landscape using publicly available reports
|
Lyu, Jeonggak |
|
|
24 |
1 |
|
artikel |
10 |
An exploratory study on domain knowledge infusion in deep learning for automated threat defense
|
Khanzadeh, Sourena |
|
|
24 |
1 |
|
artikel |
11 |
An intrinsic evaluator for embedding methods in malicious URL detection
|
Chen, Qisheng |
|
|
24 |
1 |
|
artikel |
12 |
Architectural views for social robots in public spaces: business, system, and security strategies
|
Oruma, Samson |
|
|
24 |
1 |
|
artikel |
13 |
A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction
|
Landauer, Max |
|
|
24 |
1 |
|
artikel |
14 |
Artificial intelligence for system security assurance: A systematic literature review
|
Wen, Shao-Fang |
|
|
24 |
1 |
|
artikel |
15 |
A systematic review of graphical password methods resistant to shoulder-surfing attacks
|
Binbeshr, Farid |
|
|
24 |
1 |
|
artikel |
16 |
Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach
|
Holubenko, Vitalina |
|
|
24 |
1 |
|
artikel |
17 |
Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS
|
Kampourakis, Konstantinos E. |
|
|
24 |
1 |
|
artikel |
18 |
Brave-sdn: blockchain-reliant authentication for versatile east–west bound in distributed SDNs
|
Rahouti, Mohamed |
|
|
24 |
1 |
|
artikel |
19 |
Business process models and simulation to enable GDPR compliance
|
Varela-Vaca, Ángel Jesús |
|
|
24 |
1 |
|
artikel |
20 |
Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations
|
Gamiz, Idoia |
|
|
24 |
1 |
|
artikel |
21 |
Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study
|
Alam, Md Shafiul |
|
|
24 |
1 |
|
artikel |
22 |
Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems
|
Mishra, Dheerendra |
|
|
24 |
1 |
|
artikel |
23 |
Correction to: An intrinsic evaluator for embedding methods in malicious URL detection
|
Chen, Qisheng |
|
|
24 |
1 |
|
artikel |
24 |
Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation
|
Diakoumakos, Jason |
|
|
24 |
1 |
|
artikel |
25 |
Deep behavioral analysis of machine learning algorithms against data poisoning
|
Paracha, Anum |
|
|
24 |
1 |
|
artikel |
26 |
Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model
|
Gu, Wanyi |
|
|
24 |
1 |
|
artikel |
27 |
Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments
|
Kitsiou, Angeliki |
|
|
24 |
1 |
|
artikel |
28 |
DevSecOps practices and tools
|
Prates, Luís |
|
|
24 |
1 |
|
artikel |
29 |
Differentially private Choquet integral: extending mean, median, and order statistics
|
Torra, Vicenç |
|
|
24 |
1 |
|
artikel |
30 |
Digital twin communities: an approach for secure DT data sharing
|
Alcaraz, Cristina |
|
|
24 |
1 |
|
artikel |
31 |
Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter
|
Kihal, Marouane |
|
|
24 |
1 |
|
artikel |
32 |
Ehr management evolution through purpose-based access control and blockchain smart contracts
|
Ullah, Faheem |
|
|
24 |
1 |
|
artikel |
33 |
Enhancing phishing email detection with stylometric features and classifier stacking
|
Chanis, Ilias |
|
|
24 |
1 |
|
artikel |
34 |
Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks
|
Mohammadi, Nasibeh |
|
|
24 |
1 |
|
artikel |
35 |
Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization
|
Iturbe-Araya, Juan Ignacio |
|
|
24 |
1 |
|
artikel |
36 |
Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review
|
Constantinescu, Eduard-Matei |
|
|
24 |
1 |
|
artikel |
37 |
Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination
|
Ingemarsson, Jonas |
|
|
24 |
1 |
|
artikel |
38 |
From frontlines to online: examining target preferences in the Russia–Ukraine conflict
|
Tavakkoli, Nasim |
|
|
24 |
1 |
|
artikel |
39 |
HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers
|
Aggarwal, Sajal |
|
|
24 |
1 |
|
artikel |
40 |
How do gender and age similarities with a potential social engineer influence one’s trust and willingness to take security risks?
|
Abuelezz, Israa |
|
|
24 |
1 |
|
artikel |
41 |
How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms
|
Stanković, Miloš |
|
|
24 |
1 |
|
artikel |
42 |
Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case
|
Jlil, Manal |
|
|
24 |
1 |
|
artikel |
43 |
Industrial network intrusion detection in open-set scenarios
|
Yu, Wei |
|
|
24 |
1 |
|
artikel |
44 |
Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations
|
Bajaj, Ashish |
|
|
24 |
1 |
|
artikel |
45 |
Information-theoretic privacy-preserving user authentication
|
Kazempour, Narges |
|
|
24 |
1 |
|
artikel |
46 |
IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements
|
Kumar, Ashutosh |
|
|
24 |
1 |
|
artikel |
47 |
Large language models based vulnerability detection: How does it enhance performance?
|
Xuan, Cho Do |
|
|
24 |
1 |
|
artikel |
48 |
Low complexity decompression method for FPGA bitstreams
|
Ren, Lingrui |
|
|
24 |
1 |
|
artikel |
49 |
Low-impact, near real-time risk assessment for legacy IT infrastructures
|
Kail, Eszter |
|
|
24 |
1 |
|
artikel |
50 |
Making searchable symmetric encryption schemes smaller and faster
|
Chakraborty, Debrup |
|
|
24 |
1 |
|
artikel |
51 |
MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT)
|
Ksibi, Sondes |
|
|
24 |
1 |
|
artikel |
52 |
Multi-user covert communication in power internet of things networks
|
Yang, Chun |
|
|
24 |
1 |
|
artikel |
53 |
Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology
|
Patil, Shriniwas |
|
|
24 |
1 |
|
artikel |
54 |
On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances
|
Abdullahi, Sani M. |
|
|
24 |
1 |
|
artikel |
55 |
On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors
|
To, Trong-Nghia |
|
|
24 |
1 |
|
artikel |
56 |
pbins: private bins for top-k semantic search over encrypted data using transformers
|
Arockiasamy, John Prakash |
|
|
24 |
1 |
|
artikel |
57 |
Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles
|
Talaei Khoei, Tala |
|
|
24 |
1 |
|
artikel |
58 |
PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs
|
Al-Eiadeh, Mohammad Ryiad |
|
|
24 |
1 |
|
artikel |
59 |
Privacy information propagation in online social networks - a case study based on Weibo data
|
Luo, Yehong |
|
|
24 |
1 |
|
artikel |
60 |
PROGRESS: the sectoral approach to cyber resilience
|
Tabansky, Lior |
|
|
24 |
1 |
|
artikel |
61 |
Protecting privacy in the age of big data: exploring data linking methods for quasi-identifier selection
|
Borrero-Foncubierta, Antonio |
|
|
24 |
1 |
|
artikel |
62 |
Real-time open-file backup system with machine-learning detection model for ransomware
|
Higuchi, Kosuke |
|
|
24 |
1 |
|
artikel |
63 |
Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes
|
Yogesh, |
|
|
24 |
1 |
|
artikel |
64 |
Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device
|
Perez-Tirador, Pablo |
|
|
24 |
1 |
|
artikel |
65 |
Theoretical lower bounds for one-dimensional locally private estimations with missing data
|
Ono, Hajime |
|
|
24 |
1 |
|
artikel |
66 |
Transferable channels for fair micropurchases
|
Payeras-Capellà, M. Magdalena |
|
|
24 |
1 |
|
artikel |
67 |
Transformer or Autoencoder? Who is the ultimate adversary for attack detectors?
|
Laudanna, Sonia |
|
|
24 |
1 |
|
artikel |
68 |
Using machine learning to detect network intrusions in industrial control systems: a survey
|
Termanini, A. |
|
|
24 |
1 |
|
artikel |
69 |
Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs
|
Lee, Joohee |
|
|
24 |
1 |
|
artikel |
70 |
Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model
|
Duy, Phan The |
|
|
24 |
1 |
|
artikel |
71 |
When should we use top coding in locally private estimation?
|
Ono, Hajime |
|
|
24 |
1 |
|
artikel |
72 |
XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection
|
Bouke, Mohamed Aly |
|
|
24 |
1 |
|
artikel |