no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
Android forensics
|
Leithner, Manuel |
|
2012 |
31 |
1 |
p. 3- 1 p. |
article |
2 |
A new robust adjustable logo watermarking scheme
|
Bhatnagar, Gaurav |
|
2012 |
31 |
1 |
p. 40-58 19 p. |
article |
3 |
A robust hashing algorithm based on SURF for video copy detection
|
Yang, Gaobo |
|
2012 |
31 |
1 |
p. 33-39 7 p. |
article |
4 |
A trust negotiation based security framework for service provisioning in load-balancing clusters
|
Maña, Antonio |
|
2012 |
31 |
1 |
p. 4-25 22 p. |
article |
5 |
Building safe PaaS clouds: A survey on security in multitenant software platforms
|
Rodero-Merino, Luis |
|
2012 |
31 |
1 |
p. 96-108 13 p. |
article |
6 |
Contents
|
|
|
2012 |
31 |
1 |
p. iii- 1 p. |
article |
7 |
Editorial
|
Spafford, Eugene H. |
|
2012 |
31 |
1 |
p. 1-2 2 p. |
article |
8 |
Feature extraction and classification algorithm for detecting complex covert timing channel
|
Mou, Sheng |
|
2012 |
31 |
1 |
p. 70-82 13 p. |
article |
9 |
IFC - Editorial Board
|
|
|
2012 |
31 |
1 |
p. IFC- 1 p. |
article |
10 |
Malware target recognition via static heuristics
|
Dube, T. |
|
2012 |
31 |
1 |
p. 137-147 11 p. |
article |
11 |
On scrambling the Burrows–Wheeler transform to provide privacy in lossless compression
|
Oğuzhan Külekci, M. |
|
2012 |
31 |
1 |
p. 26-32 7 p. |
article |
12 |
RIPsec – Using reputation-based multilayer security to protect MANETs
|
Lacey, T.H. |
|
2012 |
31 |
1 |
p. 122-136 15 p. |
article |
13 |
Robustness of keystroke-dynamics based biometrics against synthetic forgeries
|
Stefan, Deian |
|
2012 |
31 |
1 |
p. 109-121 13 p. |
article |
14 |
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast
|
Zhao, Xingwen |
|
2012 |
31 |
1 |
p. 59-69 11 p. |
article |
15 |
Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory
|
Ifinedo, Princely |
|
2012 |
31 |
1 |
p. 83-95 13 p. |
article |