Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             72 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Accurate code fragment clone detection and its application in identifying known CVE clones Arutunian, Mariam

24 1 artikel
2 A cluster of patterns for trusted computing Fernandez, Eduardo B.

24 1 artikel
3 A comprehensive approach for mitigating impersonation in online assessment: integrity policy and random authentication Garg, Manika

24 1 artikel
4 Ai-enabled automated common vulnerability scoring from common vulnerabilities and exposures descriptions Zhang, Zijing

24 1 artikel
5 Aldp-fl: an adaptive local differential privacy-based federated learning mechanism for IoT Li, Jinguo

24 1 artikel
6 A location-updating based self-healing group key management scheme for VANETs Liu, Weinan

24 1 artikel
7 Analysis of machine learning-based approaches for securing the Internet of Things in the smart industry: a multivocal state of knowledge review Reyes-Acosta, Ricardo

24 1 artikel
8 A new method for securing binary deep neural networks against model replication attacks using magnetic tunnel junctions Rezayati, Mohammad Hadi

24 1 artikel
9 An exploratory analysis of the DPRK cyber threat landscape using publicly available reports Lyu, Jeonggak

24 1 artikel
10 An exploratory study on domain knowledge infusion in deep learning for automated threat defense Khanzadeh, Sourena

24 1 artikel
11 An intrinsic evaluator for embedding methods in malicious URL detection Chen, Qisheng

24 1 artikel
12 Architectural views for social robots in public spaces: business, system, and security strategies Oruma, Samson

24 1 artikel
13 A review of time-series analysis for cyber security analytics: from intrusion detection to attack prediction Landauer, Max

24 1 artikel
14 Artificial intelligence for system security assurance: A systematic literature review Wen, Shao-Fang

24 1 artikel
15 A systematic review of graphical password methods resistant to shoulder-surfing attacks Binbeshr, Farid

24 1 artikel
16 Autonomous intrusion detection for IoT: a decentralized and privacy preserving approach Holubenko, Vitalina

24 1 artikel
17 Balancing the act? Resampling versus imbalanced data for Wi-Fi IDS Kampourakis, Konstantinos E.

24 1 artikel
18 Brave-sdn: blockchain-reliant authentication for versatile east–west bound in distributed SDNs Rahouti, Mohamed

24 1 artikel
19 Business process models and simulation to enable GDPR compliance Varela-Vaca, Ángel Jesús

24 1 artikel
20 Challenges and future research directions in secure multi-party computation for resource-constrained devices and large-scale computations Gamiz, Idoia

24 1 artikel
21 Citizens’ engagement with cybersecurity measures in Bangladesh: a cross-sectional study Alam, Md Shafiul

24 1 artikel
22 Construction of post quantum secure authenticated key agreement protocol for dew-assisted IoT systems Mishra, Dheerendra

24 1 artikel
23 Correction to: An intrinsic evaluator for embedding methods in malicious URL detection Chen, Qisheng

24 1 artikel
24 Cyber-security gamification in federation of cyber ranges: design, implementation, and evaluation Diakoumakos, Jason

24 1 artikel
25 Deep behavioral analysis of machine learning algorithms against data poisoning Paracha, Anum

24 1 artikel
26 Detecting unknown vulnerabilities in smart contracts with the CNN-BiLSTM model Gu, Wanyi

24 1 artikel
27 Developers’ mindset on self-adaptive privacy and its requirements for cloud computing environments Kitsiou, Angeliki

24 1 artikel
28 DevSecOps practices and tools Prates, Luís

24 1 artikel
29 Differentially private Choquet integral: extending mean, median, and order statistics Torra, Vicenç

24 1 artikel
30 Digital twin communities: an approach for secure DT data sharing Alcaraz, Cristina

24 1 artikel
31 Efficient arabic and english social spam detection using a transformer and 2D convolutional neural network-based deep learning filter Kihal, Marouane

24 1 artikel
32 Ehr management evolution through purpose-based access control and blockchain smart contracts Ullah, Faheem

24 1 artikel
33 Enhancing phishing email detection with stylometric features and classifier stacking Chanis, Ilias

24 1 artikel
34 Enhancing time-series access control using deep recurrent neural networks and generative adversarial networks Mohammadi, Nasibeh

24 1 artikel
35 Enhancing unsupervised anomaly-based cyberattacks detection in smart homes through hyperparameter optimization Iturbe-Araya, Juan Ignacio

24 1 artikel
36 Exploring smooth number-based MAC algorithms for secure communication in IoT devices: a systematic literature review Constantinescu, Eduard-Matei

24 1 artikel
37 Factors influencing Swedish citizens’ willingness to provide their mobile phones to forensic examination Ingemarsson, Jonas

24 1 artikel
38 From frontlines to online: examining target preferences in the Russia–Ukraine conflict Tavakkoli, Nasim

24 1 artikel
39 HOMOGRAPH: a novel textual adversarial attack architecture to unmask the susceptibility of linguistic acceptability classifiers Aggarwal, Sajal

24 1 artikel
40 How do gender and age similarities with a potential social engineer influence one’s trust and willingness to take security risks? Abuelezz, Israa

24 1 artikel
41 How engaged are you? A forensic analysis of the Oura Ring Gen 3 application across iOS, Android, and Cloud platforms Stanković, Miloš

24 1 artikel
42 Improving traceability in e-governance file-sharing systems: the Moroccan justice system as a use case Jlil, Manal

24 1 artikel
43 Industrial network intrusion detection in open-set scenarios Yu, Wei

24 1 artikel
44 Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations Bajaj, Ashish

24 1 artikel
45 Information-theoretic privacy-preserving user authentication Kazempour, Narges

24 1 artikel
46 IoT device security audit tools: a comprehensive analysis and a layered architecture approach for addressing expanded security requirements Kumar, Ashutosh

24 1 artikel
47 Large language models based vulnerability detection: How does it enhance performance? Xuan, Cho Do

24 1 artikel
48 Low complexity decompression method for FPGA bitstreams Ren, Lingrui

24 1 artikel
49 Low-impact, near real-time risk assessment for legacy IT infrastructures Kail, Eszter

24 1 artikel
50 Making searchable symmetric encryption schemes smaller and faster Chakraborty, Debrup

24 1 artikel
51 MLRA-Sec: an adaptive and intelligent cyber-security-assessment model for internet of medical things (IoMT) Ksibi, Sondes

24 1 artikel
52 Multi-user covert communication in power internet of things networks Yang, Chun

24 1 artikel
53 Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology Patil, Shriniwas

24 1 artikel
54 On the adoption and deployment of secure and privacy-preserving IIoT in smart manufacturing: a comprehensive guide with recent advances Abdullahi, Sani M.

24 1 artikel
55 On the effectiveness of adversarial samples against ensemble learning-based windows PE malware detectors To, Trong-Nghia

24 1 artikel
56 pbins: private bins for top-k semantic search over encrypted data using transformers Arockiasamy, John Prakash

24 1 artikel
57 Performance analysis of capsule networks for detecting GPS spoofing attacks on unmanned aerial vehicles Talaei Khoei, Tala

24 1 artikel
58 PR-DRA: PageRank-based defense resource allocation methods for securing interdependent systems modeled by attack graphs Al-Eiadeh, Mohammad Ryiad

24 1 artikel
59 Privacy information propagation in online social networks - a case study based on Weibo data Luo, Yehong

24 1 artikel
60 PROGRESS: the sectoral approach to cyber resilience Tabansky, Lior

24 1 artikel
61 Protecting privacy in the age of big data: exploring data linking methods for quasi-identifier selection Borrero-Foncubierta, Antonio

24 1 artikel
62 Real-time open-file backup system with machine-learning detection model for ransomware Higuchi, Kosuke

24 1 artikel
63 Retraction Note: Deep learning based network intrusion detection system: a systematic literature review and future scopes Yogesh,

24 1 artikel
64 Side-channel attacks and countermeasures for heart rate retrieval from ECG characterization device Perez-Tirador, Pablo

24 1 artikel
65 Theoretical lower bounds for one-dimensional locally private estimations with missing data Ono, Hajime

24 1 artikel
66 Transferable channels for fair micropurchases Payeras-Capellà, M. Magdalena

24 1 artikel
67 Transformer or Autoencoder? Who is the ultimate adversary for attack detectors? Laudanna, Sonia

24 1 artikel
68 Using machine learning to detect network intrusions in industrial control systems: a survey Termanini, A.

24 1 artikel
69 Verifiable computation over encrypted data via MPC-in-the-head zero-knowledge proofs Lee, Joohee

24 1 artikel
70 Vulnsense: efficient vulnerability detection in ethereum smart contracts by multimodal learning with graph neural network and language model Duy, Phan The

24 1 artikel
71 When should we use top coding in locally private estimation? Ono, Hajime

24 1 artikel
72 XAIRF-WFP: a novel XAI-based random forest classifier for advanced email spam detection Bouke, Mohamed Aly

24 1 artikel
                             72 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland