Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             34 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A circuit for detecting IoT malware using signatures derived from processor information on LSI Matunaka, Yutaro

24 4 artikel
2 A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant. Kwarteng, Emmanuel

24 4 artikel
3 A formal technique for automatic resolution of OpenFlow anomalies Aryan, Ramtin

24 4 artikel
4 A One-class variational autoencoder for smart contract vulnerability detection Guan, Shaowei

24 4 artikel
5 A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter Uwaezuoke, Emmanuel

24 4 artikel
6 A Webshell detection method based on feature fusion and federated learning Qing-peng, Zeng

24 4 artikel
7 CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Barredo, Jorge

24 4 artikel
8 CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps Phien, Nguyen Ngoc

24 4 artikel
9 Construction of network pentest-defense adversarial environment based on NASim Huo, Yuanzhi

24 4 artikel
10 Correction: Maritime cybersecurity: protecting digital seas Martínez, Ferney

24 4 artikel
11 Cross-Silo Federated Learning in Security Operations Centers for effective malware detection Xenos, Georgios

24 4 artikel
12 Defending industrial internet of things against Modbus/TCP threats: A combined AI-based detection and SDN-based mitigation solution Kotsiopoulos, Thanasis

24 4 artikel
13 Digital sovereignty in practice: analyzing the EU’s NIS2 directive Kianpour, Mazaher

24 4 artikel
14 Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security Paya, Antonio

24 4 artikel
15 Formal security analysis and improvement based on the ZLL touchlink commissioning protocol Feng, Tao

24 4 artikel
16 Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach Kern, Manuel

24 4 artikel
17 Information security governance in the public sector: investigations, approaches, measures, and trends Magnusson, Lars

24 4 artikel
18 Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation Cantelli-Forti, Alessandro

24 4 artikel
19 Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies Nizamuddin, Mohammad

24 4 artikel
20 MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection Farhat, Saida

24 4 artikel
21 PayScan: Detection and Security Analysis of Payment Libraries in Android Apps Mohsen, Fadi

24 4 artikel
22 Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience Kuku, Oyeyemi

24 4 artikel
23 Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management Chandela, Tanuj

24 4 artikel
24 Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction Liu, Keyang

24 4 artikel
25 Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 27001 Saeed, Aamna

24 4 artikel
26 Securing financial systems through data sovereignty: a systematic review of approaches and regulations Patil, Ayush

24 4 artikel
27 ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0 Halawi Ghoson, Nourhan

24 4 artikel
28 StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding Reno, Saha

24 4 artikel
29 Synthetic data: revisiting the privacy-utility trade-off Sarmin, Fatima Jahan

24 4 artikel
30 The impact of cyber threat intelligence (CTI) on employee behavior and skills and the implications for organizational cyber resilience Avrahami, Zafrir

24 4 artikel
31 Threat detection in smart homes: A sociotechnical multimodal conversational approach for improved cyber situational awareness McDermott, Christopher D.

24 4 artikel
32 Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model Chatziamanetoglou, Dimitrios

24 4 artikel
33 xT-STRIDE threat model for unmanned air vehicle security Yerden, Aytac Ugur

24 4 artikel
34 Yellow training: a collaborative tCOFELET tabletop serious game for cybersecurity awareness and training Katsantonis, Menelaos N.

24 4 artikel
                             34 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland