Found: 12
Select item for more details and to access through your institution.
Intelligent and behavioral-based detection of malware in IoT spectrum sensors.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 541, doi. 10.1007/s10207-022-00602-w
- By:
- Publication type:
- Article
Dependency-based security risk assessment for cyber-physical systems.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 563, doi. 10.1007/s10207-022-00608-4
- By:
- Publication type:
- Article
Cyber–physical risk assessment for false data injection attacks considering moving target defences: Best practice application of respective cyber and physical reinforcement assets to defend against FDI attacks.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 579, doi. 10.1007/s10207-022-00621-7
- By:
- Publication type:
- Article
Octopus: privacy preserving peer-to-peer transactions system with InterPlanetary file system (IPFS).
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 591, doi. 10.1007/s10207-022-00650-2
- By:
- Publication type:
- Article
Random resampling algorithms for addressing the imbalanced dataset classes in insider threat detection.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 611, doi. 10.1007/s10207-022-00651-1
- By:
- Publication type:
- Article
Flexible adversary disclosure risk measure for identity and attribute disclosure attacks.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 631, doi. 10.1007/s10207-022-00654-y
- By:
- Publication type:
- Article
Privacy in targeted advertising on mobile devices: a survey.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 647, doi. 10.1007/s10207-022-00655-x
- By:
- Publication type:
- Article
Efficient and interpretable SRU combined with TabNet for network intrusion detection in the big data environment.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 679, doi. 10.1007/s10207-022-00656-w
- By:
- Publication type:
- Article
Systematic review of SIEM technology: SIEM-SC birth.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 691, doi. 10.1007/s10207-022-00657-9
- By:
- Publication type:
- Article
Multi-cloud applications: data and code fragmentation for improved security.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 713, doi. 10.1007/s10207-022-00658-8
- By:
- Publication type:
- Article
A novel frame switching model based on virtual MAC in SDN.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 723, doi. 10.1007/s10207-022-00659-7
- By:
- Publication type:
- Article
Cyber insurance: state of the art, trends and future directions.
- Published in:
- International Journal of Information Security, 2023, v. 22, n. 3, p. 737, doi. 10.1007/s10207-023-00660-8
- By:
- Publication type:
- Article