nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter
|
Uwaezuoke, Emmanuel |
|
|
24 |
4 |
|
artikel |
2 |
A Webshell detection method based on feature fusion and federated learning
|
Qing-peng, Zeng |
|
|
24 |
4 |
|
artikel |
3 |
CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems
|
Barredo, Jorge |
|
|
24 |
4 |
|
artikel |
4 |
Construction of network pentest-defense adversarial environment based on NASim
|
Huo, Yuanzhi |
|
|
24 |
4 |
|
artikel |
5 |
Defending industrial internet of things against Modbus/TCP threats: A combined AI-based detection and SDN-based mitigation solution
|
Kotsiopoulos, Thanasis |
|
|
24 |
4 |
|
artikel |
6 |
Digital sovereignty in practice: analyzing the EU’s NIS2 directive
|
Kianpour, Mazaher |
|
|
24 |
4 |
|
artikel |
7 |
Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach
|
Kern, Manuel |
|
|
24 |
4 |
|
artikel |
8 |
Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation
|
Cantelli-Forti, Alessandro |
|
|
24 |
4 |
|
artikel |
9 |
MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection
|
Farhat, Saida |
|
|
24 |
4 |
|
artikel |
10 |
Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience
|
Kuku, Oyeyemi |
|
|
24 |
4 |
|
artikel |
11 |
Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management
|
Chandela, Tanuj |
|
|
24 |
4 |
|
artikel |
12 |
Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction
|
Liu, Keyang |
|
|
24 |
4 |
|
artikel |
13 |
Securing financial systems through data sovereignty: a systematic review of approaches and regulations
|
Patil, Ayush |
|
|
24 |
4 |
|
artikel |
14 |
ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0
|
Halawi Ghoson, Nourhan |
|
|
24 |
4 |
|
artikel |
15 |
Synthetic data: revisiting the privacy-utility trade-off
|
Sarmin, Fatima Jahan |
|
|
24 |
4 |
|
artikel |
16 |
Threat detection in smart homes: A sociotechnical multimodal conversational approach for improved cyber situational awareness
|
McDermott, Christopher D. |
|
|
24 |
4 |
|
artikel |
17 |
Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model
|
Chatziamanetoglou, Dimitrios |
|
|
24 |
4 |
|
artikel |
18 |
xT-STRIDE threat model for unmanned air vehicle security
|
Yerden, Aytac Ugur |
|
|
24 |
4 |
|
artikel |
19 |
Yellow training: a collaborative tCOFELET tabletop serious game for cybersecurity awareness and training
|
Katsantonis, Menelaos N. |
|
|
24 |
4 |
|
artikel |