nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A cybersecurity risk assessment methodology for industrial automation control systems
|
Brancati, Francesco |
|
|
24 |
2 |
|
artikel |
2 |
Fuzzing frameworks for server-side web applications: a survey
|
Dharmaadi, I Putu Arya |
|
|
24 |
2 |
|
artikel |
3 |
Large language models for software vulnerability detection: a guide for researchers on models, methods, techniques, datasets, and metrics
|
Taghavi Far, Seyed Mohammad |
|
|
24 |
2 |
|
artikel |
4 |
Security analysis of the Wi-Fi Easy Connect
|
Chatzisofroniou, George |
|
|
24 |
2 |
|
artikel |
5 |
Semi-supervised approach for detecting malicious domains in TLDs in their first query
|
Silveira, Marcos Rogério |
|
|
24 |
2 |
|
artikel |
6 |
Software vulnerability detection under poisoning attacks using CNN-based image processing
|
González-Manzano, Lorena |
|
|
24 |
2 |
|
artikel |
7 |
Speeding-up fuzzing through directional seeds
|
Koffi, Koffi Anderson |
|
|
24 |
2 |
|
artikel |
8 |
USB-GATE: USB-based GAN-augmented transformer reinforced defense framework for adversarial keystroke injection attacks
|
Chillara, Anil Kumar |
|
|
24 |
2 |
|
artikel |
9 |
WEFT: a consistent and tamper-proof methodology for acquisition of automatically verifiable forensic web evidence
|
Cantelli-Forti, Alessandro |
|
|
24 |
2 |
|
artikel |