Found: 15
Select item for more details and to access through your institution.
User identification using deep learning and human activity mobile sensor data.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 289, doi. 10.1007/s10207-022-00640-4
- By:
- Publication type:
- Article
Cyber risk management for autonomous passenger ships using threat-informed defense-in-depth.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 249, doi. 10.1007/s10207-022-00638-y
- By:
- Publication type:
- Article
Deep SARSA-based reinforcement learning approach for anomaly network intrusion detection system.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 235, doi. 10.1007/s10207-022-00634-2
- By:
- Publication type:
- Article
A novel approach for detection of APT malware using multi-dimensional hybrid Bayesian belief network.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 119, doi. 10.1007/s10207-022-00631-5
- By:
- Publication type:
- Article
PatrIoT: practical and agile threat research for IoT.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 213, doi. 10.1007/s10207-022-00633-3
- By:
- Publication type:
- Article
Early web application attack detection using network traffic analysis.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 77, doi. 10.1007/s10207-022-00627-1
- By:
- Publication type:
- Article
Restricting data-leakage using fine-grained access control on OSN objects.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 93, doi. 10.1007/s10207-022-00629-z
- By:
- Publication type:
- Article
Correction to: A decentralized honeypot for IoT Protocols based on Android devices.
- Published in:
- 2023
- By:
- Publication type:
- Correction Notice
A review on fake news detection 3T's: typology, time of detection, taxonomies.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 177, doi. 10.1007/s10207-022-00625-3
- By:
- Publication type:
- Article
Malicious code detection in android: the role of sequence characteristics and disassembling methods.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 107, doi. 10.1007/s10207-022-00626-2
- By:
- Publication type:
- Article
Gridchain: an investigation of privacy for the future local distribution grid.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 29, doi. 10.1007/s10207-022-00622-6
- By:
- Publication type:
- Article
Mobile botnet detection: a comprehensive survey.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 137, doi. 10.1007/s10207-022-00624-4
- By:
- Publication type:
- Article
Modeling reporting delays in cyber incidents: an industry-level comparison.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 63, doi. 10.1007/s10207-022-00623-5
- By:
- Publication type:
- Article
Intrusion detection system over real-time data traffic using machine learning methods with feature selection approaches.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 1, doi. 10.1007/s10207-022-00616-4
- By:
- Publication type:
- Article
A deep learner model for multi-language webshell detection.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 1, p. 47, doi. 10.1007/s10207-022-00615-5
- By:
- Publication type:
- Article