nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive analysis of cryptocurrency breaches at endpoint
|
Noor, Mohd Azeem Faizi |
|
|
24 |
3 |
|
artikel |
2 |
A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method
|
Yin, Long |
|
|
24 |
3 |
|
artikel |
3 |
A Data-centric approach for safe and secure large language models against threatening and toxic content
|
Njeh, Chaima |
|
|
24 |
3 |
|
artikel |
4 |
Adoption of smartphones among older adults and the role of perceived threat of cyberattacks
|
Pucer, Patrik |
|
|
24 |
3 |
|
artikel |
5 |
A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout
|
Golabi, Arash |
|
|
24 |
3 |
|
artikel |
6 |
Advancements and challenges in privacy-preserving split learning: experimental findings and future directions
|
Alhindi, Afnan |
|
|
24 |
3 |
|
artikel |
7 |
Analyzing shared keys in X.509 certificates with domain ownership
|
Junaid, Kashif |
|
|
24 |
3 |
|
artikel |
8 |
An Android malware detection based on reconstructed API with TextCNN
|
Jiang, Jingtian |
|
|
24 |
3 |
|
artikel |
9 |
An efficient hardware implementation of SHA-3 using 3D cellular automata for secure wireless sensor networks
|
Guitouni, Zied |
|
|
24 |
3 |
|
artikel |
10 |
Anonymous provision of privacy-sensitive services using blockchain and decentralised storage
|
Barański, Stanisław |
|
|
24 |
3 |
|
artikel |
11 |
A novel risk-based access control engine in zero trust architecture for IoT network
|
Ma, Yi-Wei |
|
|
24 |
3 |
|
artikel |
12 |
A survey on malware attacks in industrial air-gap systems
|
Hussain, Md Asdaque |
|
|
24 |
3 |
|
artikel |
13 |
A systematic review on cybersecurity of robotic systems: vulnerabilities trends, threats, attacks, challenges, and proposed framework
|
Verma, Narinder |
|
|
24 |
3 |
|
artikel |
14 |
Automated cybersecurity impact propagation across business processes using process mining techniques
|
Raptaki, Melina |
|
|
24 |
3 |
|
artikel |
15 |
Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach
|
Acheampong, Rebecca |
|
|
24 |
3 |
|
artikel |
16 |
Benchmarking the security protocol and data model (SPDM) for component authentication
|
Alves, Renan C. A. |
|
|
24 |
3 |
|
artikel |
17 |
Beyond the code: analyzing OSS developers security awareness and practices
|
Alqahtani, Sultan S. |
|
|
24 |
3 |
|
artikel |
18 |
Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals
|
Figueroa, Victor |
|
|
24 |
3 |
|
artikel |
19 |
Building a secure and efficient NFT marketplace: AI integration, lazy minting, and trustGuard
|
Chebli, Abdelkader |
|
|
24 |
3 |
|
artikel |
20 |
Clonable key fobs: Analyzing and breaking RKE protocols
|
Gesteira-Miñarro, Roberto |
|
|
24 |
3 |
|
artikel |
21 |
Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices
|
Almobaideen, Wesam |
|
|
24 |
3 |
|
artikel |
22 |
Correction: An exploratory study on domain knowledge infusion in deep learning for automated threat defense
|
Khanzadeh, Sourena |
|
|
24 |
3 |
|
artikel |
23 |
Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews
|
Yamagishi, Rei |
|
|
24 |
3 |
|
artikel |
24 |
Cyber defense in OCPP for EV charging security risks
|
Hamdare, Safa |
|
|
24 |
3 |
|
artikel |
25 |
Darknet signatures: public ledgers and a threat of illegal betting platforms
|
Kutyłowski, Mirosław |
|
|
24 |
3 |
|
artikel |
26 |
Detecting malicious nodes using game theory and reinforcement learning in software-defined networks
|
Javadpour, Amir |
|
|
24 |
3 |
|
artikel |
27 |
Differentially private GANs for generating synthetic indoor location data
|
Moghtadaiee, Vahideh |
|
|
24 |
3 |
|
artikel |
28 |
DOT-C: A smartphone unlock scheme based on dot-dot connection in IoT-enabled smart cities
|
Li, Wenjuan |
|
|
24 |
3 |
|
artikel |
29 |
Educational escape rooms for raising information privacy competences: An empirical validation
|
Papaioannou, Thanos |
|
|
24 |
3 |
|
artikel |
30 |
Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs
|
Khalafalla, Wael |
|
|
24 |
3 |
|
artikel |
31 |
Enhancing network security through integration of game theory in software-defined networking framework
|
Razvan, Florea |
|
|
24 |
3 |
|
artikel |
32 |
Ensemble learning-based adaptive and adversarial techniques for APT attack detection
|
Tung, Nguyen Thanh |
|
|
24 |
3 |
|
artikel |
33 |
EVACTI: evaluating the actionability of cyber threat intelligence
|
Dimitriadis, Athanasios |
|
|
24 |
3 |
|
artikel |
34 |
Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security
|
Gala, D. L. |
|
|
24 |
3 |
|
artikel |
35 |
Filter aggregation for DDoS prevention systems: hardware perspective
|
Arabas, Piotr |
|
|
24 |
3 |
|
artikel |
36 |
GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones
|
Ray, Palash |
|
|
24 |
3 |
|
artikel |
37 |
Homomorphic encryption-based fault diagnosis in IoT-enabled industrial systems
|
Kim, Hoki |
|
|
24 |
3 |
|
artikel |
38 |
HPPS - Harmonized privacy-preserving scheme for the internet of things and edge-collaborated smart city services
|
Rajendran, Jaikumar |
|
|
24 |
3 |
|
artikel |
39 |
Human factors in cybersecurity: an interdisciplinary review and framework proposal
|
Khadka, Kalam |
|
|
24 |
3 |
|
artikel |
40 |
Hybrid attention-enhanced explainable model for encrypted traffic detection and classification
|
Sharma, Adit |
|
|
24 |
3 |
|
artikel |
41 |
Identifying factors influencing the duration of zero-day vulnerabilities
|
Roumani, Yaman |
|
|
24 |
3 |
|
artikel |
42 |
Impact of temperature fluctuations on SRAM- based physically unclonable functions
|
Kim, Moon-Seok |
|
|
24 |
3 |
|
artikel |
43 |
Leveraging digital twins for advanced threat modeling in cyber-physical systems cybersecurity
|
Erceylan, Gizem |
|
|
24 |
3 |
|
artikel |
44 |
Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection
|
Almalki, Faris A. |
|
|
24 |
3 |
|
artikel |
45 |
Role of cybersecurity in microgrid adoption through the UTAUT for energy sustainability
|
Liu, Xiaotong |
|
|
24 |
3 |
|
artikel |
46 |
SCAnME - scanner comparative analysis and metrics for evaluation
|
Koman, Jakub |
|
|
24 |
3 |
|
artikel |
47 |
Secure in the dark? An in-depth analysis of dark web markets security
|
Wang, Yichao |
|
|
24 |
3 |
|
artikel |
48 |
Securing IoT edge: a survey on lightweight cryptography, anonymous routing and communication protocol enhancements
|
Gușiță, Bianca |
|
|
24 |
3 |
|
artikel |
49 |
SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling
|
Cabuya-Padilla, Diego |
|
|
24 |
3 |
|
artikel |
50 |
Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts
|
Pietri, Marcello |
|
|
24 |
3 |
|
artikel |
51 |
The effect of hop-count modification attack on random walk-based SLP schemes developed for WSNs: a study
|
Raja, Manjula |
|
|
24 |
3 |
|
artikel |
52 |
The sound of malware: an audio fingerprinting malware detection method
|
Vasilellis, Efstratios |
|
|
24 |
3 |
|
artikel |
53 |
Using large language models for template detection from security event logs
|
Vaarandi, Risto |
|
|
24 |
3 |
|
artikel |
54 |
Verifiability for privacy-preserving computing on distributed data — a survey
|
Bontekoe, Tariq |
|
|
24 |
3 |
|
artikel |
55 |
Xai-driven black-box adversarial attacks on network intrusion detectors
|
Okada, Satoshi |
|
|
24 |
3 |
|
artikel |
56 |
XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment
|
Zeghida, Hayette |
|
|
24 |
3 |
|
artikel |