Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             56 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive analysis of cryptocurrency breaches at endpoint Noor, Mohd Azeem Faizi

24 3 artikel
2 A conflict-aware active BLE state machine learning and state coverage-guided gray-box fuzz testing method Yin, Long

24 3 artikel
3 A Data-centric approach for safe and secure large language models against threatening and toxic content Njeh, Chaima

24 3 artikel
4 Adoption of smartphones among older adults and the role of perceived threat of cyberattacks Pucer, Patrik

24 3 artikel
5 A dual-stage deep learning approach for robust detection and identification of hardware trojans using monte-carlo dropout Golabi, Arash

24 3 artikel
6 Advancements and challenges in privacy-preserving split learning: experimental findings and future directions Alhindi, Afnan

24 3 artikel
7 Analyzing shared keys in X.509 certificates with domain ownership Junaid, Kashif

24 3 artikel
8 An Android malware detection based on reconstructed API with TextCNN Jiang, Jingtian

24 3 artikel
9 An efficient hardware implementation of SHA-3 using 3D cellular automata for secure wireless sensor networks Guitouni, Zied

24 3 artikel
10 Anonymous provision of privacy-sensitive services using blockchain and decentralised storage Barański, Stanisław

24 3 artikel
11 A novel risk-based access control engine in zero trust architecture for IoT network Ma, Yi-Wei

24 3 artikel
12 A survey on malware attacks in industrial air-gap systems Hussain, Md Asdaque

24 3 artikel
13 A systematic review on cybersecurity of robotic systems: vulnerabilities trends, threats, attacks, challenges, and proposed framework Verma, Narinder

24 3 artikel
14 Automated cybersecurity impact propagation across business processes using process mining techniques Raptaki, Melina

24 3 artikel
15 Balancing usability, user experience, security and privacy in XR systems: a multidimensional approach Acheampong, Rebecca

24 3 artikel
16 Benchmarking the security protocol and data model (SPDM) for component authentication Alves, Renan C. A.

24 3 artikel
17 Beyond the code: analyzing OSS developers security awareness and practices Alqahtani, Sultan S.

24 3 artikel
18 Building a holistic cybersecurity framework for e-Government based on a systematic analysis of proposals Figueroa, Victor

24 3 artikel
19 Building a secure and efficient NFT marketplace: AI integration, lazy minting, and trustGuard Chebli, Abdelkader

24 3 artikel
20 Clonable key fobs: Analyzing and breaking RKE protocols Gesteira-Miñarro, Roberto

24 3 artikel
21 Comprehensive review on machine learning and deep learning techniques for malware detection in android and IoT devices Almobaideen, Wesam

24 3 artikel
22 Correction: An exploratory study on domain knowledge infusion in deep learning for automated threat defense Khanzadeh, Sourena

24 3 artikel
23 Cultivating skilled malware analysts: Clarification of practical malware dynamic analysis through interviews Yamagishi, Rei

24 3 artikel
24 Cyber defense in OCPP for EV charging security risks Hamdare, Safa

24 3 artikel
25 Darknet signatures: public ledgers and a threat of illegal betting platforms Kutyłowski, Mirosław

24 3 artikel
26 Detecting malicious nodes using game theory and reinforcement learning in software-defined networks Javadpour, Amir

24 3 artikel
27 Differentially private GANs for generating synthetic indoor location data Moghtadaiee, Vahideh

24 3 artikel
28 DOT-C: A smartphone unlock scheme based on dot-dot connection in IoT-enabled smart cities Li, Wenjuan

24 3 artikel
29 Educational escape rooms for raising information privacy competences: An empirical validation Papaioannou, Thanos

24 3 artikel
30 Efficient authentication scheme for heterogeneous signcryption with cryptographic reverse firewalls for VANETs Khalafalla, Wael

24 3 artikel
31 Enhancing network security through integration of game theory in software-defined networking framework Razvan, Florea

24 3 artikel
32 Ensemble learning-based adaptive and adversarial techniques for APT attack detection Tung, Nguyen Thanh

24 3 artikel
33 EVACTI: evaluating the actionability of cyber threat intelligence Dimitriadis, Athanasios

24 3 artikel
34 Evaluating the Impact of Adversarial Patch Attacks on YOLO Models and the Implications for Edge AI Security Gala, D. L.

24 3 artikel
35 Filter aggregation for DDoS prevention systems: hardware perspective Arabas, Piotr

24 3 artikel
36 GPNST: An Improved Graphical Password Authentication Scheme Leveraging Neural Style Transfer Technique on Smartphones Ray, Palash

24 3 artikel
37 Homomorphic encryption-based fault diagnosis in IoT-enabled industrial systems Kim, Hoki

24 3 artikel
38 HPPS - Harmonized privacy-preserving scheme for the internet of things and edge-collaborated smart city services Rajendran, Jaikumar

24 3 artikel
39 Human factors in cybersecurity: an interdisciplinary review and framework proposal Khadka, Kalam

24 3 artikel
40 Hybrid attention-enhanced explainable model for encrypted traffic detection and classification Sharma, Adit

24 3 artikel
41 Identifying factors influencing the duration of zero-day vulnerabilities Roumani, Yaman

24 3 artikel
42 Impact of temperature fluctuations on SRAM- based physically unclonable functions Kim, Moon-Seok

24 3 artikel
43 Leveraging digital twins for advanced threat modeling in cyber-physical systems cybersecurity Erceylan, Gizem

24 3 artikel
44 Optimizing gas efficiency and enhancing security in Ethereum smart contracts through integrated clustering and anomaly detection Almalki, Faris A.

24 3 artikel
45 Role of cybersecurity in microgrid adoption through the UTAUT for energy sustainability Liu, Xiaotong

24 3 artikel
46 SCAnME - scanner comparative analysis and metrics for evaluation Koman, Jakub

24 3 artikel
47 Secure in the dark? An in-depth analysis of dark web markets security Wang, Yichao

24 3 artikel
48 Securing IoT edge: a survey on lightweight cryptography, anonymous routing and communication protocol enhancements Gușiță, Bianca

24 3 artikel
49 SERDUX-MARCIM: Maritime Cyberattack simulation using Dynamic Modeling, Compartmental Models in Epidemiology and Agent-based Modeling Cabuya-Padilla, Diego

24 3 artikel
50 Telecom spam and scams in the 5G and artificial intelligence era: analyzing economic implications, technical challenges and global regulatory efforts Pietri, Marcello

24 3 artikel
51 The effect of hop-count modification attack on random walk-based SLP schemes developed for WSNs: a study Raja, Manjula

24 3 artikel
52 The sound of malware: an audio fingerprinting malware detection method Vasilellis, Efstratios

24 3 artikel
53 Using large language models for template detection from security event logs Vaarandi, Risto

24 3 artikel
54 Verifiability for privacy-preserving computing on distributed data — a survey Bontekoe, Tariq

24 3 artikel
55 Xai-driven black-box adversarial attacks on network intrusion detectors Okada, Satoshi

24 3 artikel
56 XMID-MQTT: explaining machine learning-based intrusion detection system for MQTT protocol in IoT environment Zeghida, Hayette

24 3 artikel
                             56 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland