nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES
|
Zhao, Xinjie |
|
2013 |
|
PB |
p. 173-189 17 p. |
artikel |
2 |
A fast malware detection algorithm based on objective-oriented association mining
|
Ding, Yuxin |
|
2013 |
|
PB |
p. 315-324 10 p. |
artikel |
3 |
A framework for continuous, transparent mobile device authentication
|
Crawford, Heather |
|
2013 |
|
PB |
p. 127-136 10 p. |
artikel |
4 |
AMTRAC: An administrative model for temporal role-based access control
|
Sharma, Manisha |
|
2013 |
|
PB |
p. 201-218 18 p. |
artikel |
5 |
An adaptive risk management and access control framework to mitigate insider threats
|
Baracaldo, Nathalie |
|
2013 |
|
PB |
p. 237-254 18 p. |
artikel |
6 |
Analysis of dictionary methods for PIN selection
|
Staneková, L'ubica |
|
2013 |
|
PB |
p. 289-298 10 p. |
artikel |
7 |
An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates
|
Belguechi, Rima |
|
2013 |
|
PB |
p. 325-339 15 p. |
artikel |
8 |
APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks
|
Seo, Dongwon |
|
2013 |
|
PB |
p. 366-385 20 p. |
artikel |
9 |
A privacy-aware continuous authentication scheme for proximity-based access control
|
Agudo, Isaac |
|
2013 |
|
PB |
p. 117-126 10 p. |
artikel |
10 |
Caller-REP: Detecting unwanted calls with caller social strength
|
Azad, Muhammad Ajmal |
|
2013 |
|
PB |
p. 219-236 18 p. |
artikel |
11 |
CISOs and organisational culture: Their own worst enemy?
|
Ashenden, Debi |
|
2013 |
|
PB |
p. 396-405 10 p. |
artikel |
12 |
Contents
|
|
|
2013 |
|
PB |
p. iii-iv nvt p. |
artikel |
13 |
Co-operative user identity verification using an Authentication Aura
|
Hocking, C.G. |
|
2013 |
|
PB |
p. 486-502 17 p. |
artikel |
14 |
Creditability-based weighted voting for reducing false positives and negatives in intrusion detection
|
Lin, Ying-Dar |
|
2013 |
|
PB |
p. 460-474 15 p. |
artikel |
15 |
Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior
|
Zonouz, Saman |
|
2013 |
|
PB |
p. 190-200 11 p. |
artikel |
16 |
Deriving common malware behavior through graph clustering
|
Park, Younghee |
|
2013 |
|
PB |
p. 419-430 12 p. |
artikel |
17 |
DNS amplification attack revisited
|
Anagnostopoulos, Marios |
|
2013 |
|
PB |
p. 475-485 11 p. |
artikel |
18 |
Don't make excuses! Discouraging neutralization to reduce IT policy violation
|
Barlow, Jordan B. |
|
2013 |
|
PB |
p. 145-159 15 p. |
artikel |
19 |
Dual-use open source security software in organizations – Dilemma: Help or hinder?
|
Silic, Mario |
|
2013 |
|
PB |
p. 386-395 10 p. |
artikel |
20 |
Dynamic traffic awareness statistical model for firewall performance enhancement
|
Trabelsi, Zouheir |
|
2013 |
|
PB |
p. 160-172 13 p. |
artikel |
21 |
Editorial Board
|
|
|
2013 |
|
PB |
p. IFC- 1 p. |
artikel |
22 |
Efficient intrusion detection using representative instances
|
Guo, Chun |
|
2013 |
|
PB |
p. 255-267 13 p. |
artikel |
23 |
Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI
|
Djamaludin, C.I. |
|
2013 |
|
PB |
p. 299-314 16 p. |
artikel |
24 |
Gait and activity recognition using commercial phones
|
Derawi, Mohammad |
|
2013 |
|
PB |
p. 137-144 8 p. |
artikel |
25 |
Identifying android malicious repackaged applications by thread-grained system call sequences
|
Lin, Ying-Dar |
|
2013 |
|
PB |
p. 340-350 11 p. |
artikel |
26 |
Inference attacks against trust-based onion routing: Trust degree to the rescue
|
Zhou, Peng |
|
2013 |
|
PB |
p. 431-446 16 p. |
artikel |
27 |
SHADuDT: Secure hypervisor-based anomaly detection using danger theory
|
Azmi, Reza |
|
2013 |
|
PB |
p. 268-288 21 p. |
artikel |
28 |
Trust management system design for the Internet of Things: A context-aware and multi-service approach
|
Ben Saied, Yosra |
|
2013 |
|
PB |
p. 351-365 15 p. |
artikel |
29 |
Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory
|
Cheng, Lijiao |
|
2013 |
|
PB |
p. 447-459 13 p. |
artikel |
30 |
Usage control in SIP-based multimedia delivery
|
Karopoulos, Georgios |
|
2013 |
|
PB |
p. 406-418 13 p. |
artikel |