Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             27 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Abstract interpretation-based semantic framework for software birthmark Zeng, Ying
2012
31 4 p. 377-390
14 p.
artikel
2 Bypassing information leakage protection with trusted applications Blasco, Jorge
2012
31 4 p. 557-568
12 p.
artikel
3 Contents 2012
31 4 p. iii-iv
nvt p.
artikel
4 CRiBAC: Community-centric role interaction based access control model Jung, Youna
2012
31 4 p. 497-523
27 p.
artikel
5 Cyber Warfare – Techniques, Tactics and Tools for Security Practitioners (Bill) Caelli, William J.
2012
31 4 p. 637-
1 p.
artikel
6 domRBAC: An access control model for modern collaborative systems Gouglidis, Antonios
2012
31 4 p. 540-556
17 p.
artikel
7 Dynamic risk-based decision methods for access control systems Shaikh, Riaz Ahmed
2012
31 4 p. 447-464
18 p.
artikel
8 Editorial 2012
31 4 p. 375-376
2 p.
artikel
9 Editorial Board 2012
31 4 p. IFC-
1 p.
artikel
10 Encryption-based multilevel model for DBMS Sallam, Ahmed I.
2012
31 4 p. 437-446
10 p.
artikel
11 Enterprise Security for the Executive Weippl, Edgar
2012
31 4 p. 636-
1 p.
artikel
12 Filler AD:IFIP 2012
31 4 p. I-
1 p.
artikel
13 FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls Ayuso, Pablo Neira
2012
31 4 p. 524-539
16 p.
artikel
14 Leveraging behavioral science to mitigate cyber security risk Pfleeger, Shari Lawrence
2012
31 4 p. 597-611
15 p.
artikel
15 MSABMS-based approach of detecting LDoS attack Zhi-jun, Wu
2012
31 4 p. 402-417
16 p.
artikel
16 Noncespaces: Using randomization to defeat cross-site scripting attacks Van Gundy, Matthew
2012
31 4 p. 612-628
17 p.
artikel
17 Penetration Tester's Open Source Toolkit Cuppens-Boulahia, Nora
2012
31 4 p. 630-632
3 p.
artikel
18 Performance analysis of Bayesian networks and neural networks in classification of file system activities Khan, Muhammad Naeem Ahmed
2012
31 4 p. 391-401
11 p.
artikel
19 PIN selection policies: Are they really effective? Kim, Hyoungshick
2012
31 4 p. 484-496
13 p.
artikel
20 Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure Hudic, Aleksandar
2012
31 4 p. 629-
1 p.
artikel
21 QoP-ML: Quality of protection modelling language for cryptographic protocols Ksiezopolski, Bogdan
2012
31 4 p. 569-596
28 p.
artikel
22 SCADA security in the light of Cyber-Warfare Nicholson, A.
2012
31 4 p. 418-436
19 p.
artikel
23 Securing the Cloud: Cloud Computer Security Techniques and Tactics Michael, Katina
2012
31 4 p. 633-
1 p.
artikel
24 Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures Sun, San-Tsai
2012
31 4 p. 465-483
19 p.
artikel
25 The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice Michael, Katina
2012
31 4 p. 634-635
2 p.
artikel
26 Thor's Microsoft Security Bible Leithner, Manuel
2012
31 4 p. 638-
1 p.
artikel
27 XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts Leithner, Manuel
2012
31 4 p. 639-
1 p.
artikel
                             27 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland