Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             33 results found
no title author magazine year volume issue page(s) type
1 A circuit for detecting IoT malware using signatures derived from processor information on LSI Matunaka, Yutaro

24 4 article
2 A Comprehensive User Study on Medical Device Threat Modeling Methodologies and CyberLlama2 - MEDICALHARM Threat Modeling Assistant. Kwarteng, Emmanuel

24 4 article
3 A formal technique for automatic resolution of OpenFlow anomalies Aryan, Ramtin

24 4 article
4 A One-class variational autoencoder for smart contract vulnerability detection Guan, Shaowei

24 4 article
5 A vulnerability assessment and exploitation analysis of a powerline communication HomePlug AV network adapter Uwaezuoke, Emmanuel

24 4 article
6 A Webshell detection method based on feature fusion and federated learning Qing-peng, Zeng

24 4 article
7 CARNYX: A framework for vulnerability detection via power consumption analysis in embedded systems Barredo, Jorge

24 4 article
8 CI2P-MedHFDroid: a context-aware individual privacy preferences model for medical, health & fitness android apps Phien, Nguyen Ngoc

24 4 article
9 Construction of network pentest-defense adversarial environment based on NASim Huo, Yuanzhi

24 4 article
10 Correction: Maritime cybersecurity: protecting digital seas Martínez, Ferney

24 4 article
11 Cross-Silo Federated Learning in Security Operations Centers for effective malware detection Xenos, Georgios

24 4 article
12 Defending industrial internet of things against Modbus/TCP threats: A combined AI-based detection and SDN-based mitigation solution Kotsiopoulos, Thanasis

24 4 article
13 Digital sovereignty in practice: analyzing the EU’s NIS2 directive Kianpour, Mazaher

24 4 article
14 Enhancing software-defined perimeters with integrated identity solutions and threat detection for robust zero trust security Paya, Antonio

24 4 article
15 Formal security analysis and improvement based on the ZLL touchlink commissioning protocol Feng, Tao

24 4 article
16 Identifying Open-Source Threat Detection Resources on GitHub: A Scalable Machine Learning Approach Kern, Manuel

24 4 article
17 Information security governance in the public sector: investigations, approaches, measures, and trends Magnusson, Lars

24 4 article
18 Insights from field experience: digital forensics of event and voyage data recorders in transportation systems accident investigation Cantelli-Forti, Alessandro

24 4 article
19 Investigating the cybersecurity risks of remote work: a systematic literature review of organizational vulnerabilities and mitigation strategies Nizamuddin, Mohammad

24 4 article
20 MF2S-CID: A dynamic multi-model framework for scalable and interpretable intrusion detection Farhat, Saida

24 4 article
21 Preparing IoT-enabled organisations for digital forensics: model for readiness and resilience Kuku, Oyeyemi

24 4 article
22 Pseudonym shuffling-driven blockchain and Autoencoder-based secure E-healthcare data management Chandela, Tanuj

24 4 article
23 Revisiting Cuckoo Hash-based Unbalanced Private Set Union: Leakage Analysis and Better Construction Liu, Keyang

24 4 article
24 Securing air-gapped systems-review of covert techniques for data ex-filtration and a new clause proposal for ISO 27001 Saeed, Aamna

24 4 article
25 Securing financial systems through data sovereignty: a systematic review of approaches and regulations Patil, Ayush

24 4 article
26 ShieldFlow: a novel framework for OT cybersecurity in the context of industry 4.0 Halawi Ghoson, Nourhan

24 4 article
27 StorjChain: overcoming the blockchain trilemma via decentralized storage and erasure-coded sharding Reno, Saha

24 4 article
28 Synthetic data: revisiting the privacy-utility trade-off Sarmin, Fatima Jahan

24 4 article
29 The impact of cyber threat intelligence (CTI) on employee behavior and skills and the implications for organizational cyber resilience Avrahami, Zafrir

24 4 article
30 Threat detection in smart homes: A sociotechnical multimodal conversational approach for improved cyber situational awareness McDermott, Christopher D.

24 4 article
31 Weighted quality criteria for cyber threat intelligence: assessment and prioritisation in the MISP data model Chatziamanetoglou, Dimitrios

24 4 article
32 xT-STRIDE threat model for unmanned air vehicle security Yerden, Aytac Ugur

24 4 article
33 Yellow training: a collaborative tCOFELET tabletop serious game for cybersecurity awareness and training Katsantonis, Menelaos N.

24 4 article
                             33 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands