Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             30 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comprehensive study of multiple deductions-based algebraic trace driven cache attacks on AES Zhao, Xinjie
2013
PB p. 173-189
17 p.
artikel
2 A fast malware detection algorithm based on objective-oriented association mining Ding, Yuxin
2013
PB p. 315-324
10 p.
artikel
3 A framework for continuous, transparent mobile device authentication Crawford, Heather
2013
PB p. 127-136
10 p.
artikel
4 AMTRAC: An administrative model for temporal role-based access control Sharma, Manisha
2013
PB p. 201-218
18 p.
artikel
5 An adaptive risk management and access control framework to mitigate insider threats Baracaldo, Nathalie
2013
PB p. 237-254
18 p.
artikel
6 Analysis of dictionary methods for PIN selection Staneková, L'ubica
2013
PB p. 289-298
10 p.
artikel
7 An integrated framework combining Bio-Hashed minutiae template and PKCS15 compliant card for a better secure management of fingerprint cancelable templates Belguechi, Rima
2013
PB p. 325-339
15 p.
artikel
8 APFS: Adaptive Probabilistic Filter Scheduling against distributed denial-of-service attacks Seo, Dongwon
2013
PB p. 366-385
20 p.
artikel
9 A privacy-aware continuous authentication scheme for proximity-based access control Agudo, Isaac
2013
PB p. 117-126
10 p.
artikel
10 Caller-REP: Detecting unwanted calls with caller social strength Azad, Muhammad Ajmal
2013
PB p. 219-236
18 p.
artikel
11 CISOs and organisational culture: Their own worst enemy? Ashenden, Debi
2013
PB p. 396-405
10 p.
artikel
12 Contents 2013
PB p. iii-iv
nvt p.
artikel
13 Co-operative user identity verification using an Authentication Aura Hocking, C.G.
2013
PB p. 486-502
17 p.
artikel
14 Creditability-based weighted voting for reducing false positives and negatives in intrusion detection Lin, Ying-Dar
2013
PB p. 460-474
15 p.
artikel
15 Cyber-physical security metric inference in smart grid critical infrastructures based on system administrators' responsive behavior Zonouz, Saman
2013
PB p. 190-200
11 p.
artikel
16 Deriving common malware behavior through graph clustering Park, Younghee
2013
PB p. 419-430
12 p.
artikel
17 DNS amplification attack revisited Anagnostopoulos, Marios
2013
PB p. 475-485
11 p.
artikel
18 Don't make excuses! Discouraging neutralization to reduce IT policy violation Barlow, Jordan B.
2013
PB p. 145-159
15 p.
artikel
19 Dual-use open source security software in organizations – Dilemma: Help or hinder? Silic, Mario
2013
PB p. 386-395
10 p.
artikel
20 Dynamic traffic awareness statistical model for firewall performance enhancement Trabelsi, Zouheir
2013
PB p. 160-172
13 p.
artikel
21 Editorial Board 2013
PB p. IFC-
1 p.
artikel
22 Efficient intrusion detection using representative instances Guo, Chun
2013
PB p. 255-267
13 p.
artikel
23 Establishing initial trust in autonomous Delay Tolerant Networks without centralised PKI Djamaludin, C.I.
2013
PB p. 299-314
16 p.
artikel
24 Gait and activity recognition using commercial phones Derawi, Mohammad
2013
PB p. 137-144
8 p.
artikel
25 Identifying android malicious repackaged applications by thread-grained system call sequences Lin, Ying-Dar
2013
PB p. 340-350
11 p.
artikel
26 Inference attacks against trust-based onion routing: Trust degree to the rescue Zhou, Peng
2013
PB p. 431-446
16 p.
artikel
27 SHADuDT: Secure hypervisor-based anomaly detection using danger theory Azmi, Reza
2013
PB p. 268-288
21 p.
artikel
28 Trust management system design for the Internet of Things: A context-aware and multi-service approach Ben Saied, Yosra
2013
PB p. 351-365
15 p.
artikel
29 Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory Cheng, Lijiao
2013
PB p. 447-459
13 p.
artikel
30 Usage control in SIP-based multimedia delivery Karopoulos, Georgios
2013
PB p. 406-418
13 p.
artikel
                             30 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland