nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Abstract interpretation-based semantic framework for software birthmark
|
Zeng, Ying |
|
2012 |
31 |
4 |
p. 377-390 14 p. |
artikel |
2 |
Bypassing information leakage protection with trusted applications
|
Blasco, Jorge |
|
2012 |
31 |
4 |
p. 557-568 12 p. |
artikel |
3 |
Contents
|
|
|
2012 |
31 |
4 |
p. iii-iv nvt p. |
artikel |
4 |
CRiBAC: Community-centric role interaction based access control model
|
Jung, Youna |
|
2012 |
31 |
4 |
p. 497-523 27 p. |
artikel |
5 |
Cyber Warfare – Techniques, Tactics and Tools for Security Practitioners
|
(Bill) Caelli, William J. |
|
2012 |
31 |
4 |
p. 637- 1 p. |
artikel |
6 |
domRBAC: An access control model for modern collaborative systems
|
Gouglidis, Antonios |
|
2012 |
31 |
4 |
p. 540-556 17 p. |
artikel |
7 |
Dynamic risk-based decision methods for access control systems
|
Shaikh, Riaz Ahmed |
|
2012 |
31 |
4 |
p. 447-464 18 p. |
artikel |
8 |
Editorial
|
|
|
2012 |
31 |
4 |
p. 375-376 2 p. |
artikel |
9 |
Editorial Board
|
|
|
2012 |
31 |
4 |
p. IFC- 1 p. |
artikel |
10 |
Encryption-based multilevel model for DBMS
|
Sallam, Ahmed I. |
|
2012 |
31 |
4 |
p. 437-446 10 p. |
artikel |
11 |
Enterprise Security for the Executive
|
Weippl, Edgar |
|
2012 |
31 |
4 |
p. 636- 1 p. |
artikel |
12 |
Filler AD:IFIP
|
|
|
2012 |
31 |
4 |
p. I- 1 p. |
artikel |
13 |
FT-FW: A cluster-based fault-tolerant architecture for stateful firewalls
|
Ayuso, Pablo Neira |
|
2012 |
31 |
4 |
p. 524-539 16 p. |
artikel |
14 |
Leveraging behavioral science to mitigate cyber security risk
|
Pfleeger, Shari Lawrence |
|
2012 |
31 |
4 |
p. 597-611 15 p. |
artikel |
15 |
MSABMS-based approach of detecting LDoS attack
|
Zhi-jun, Wu |
|
2012 |
31 |
4 |
p. 402-417 16 p. |
artikel |
16 |
Noncespaces: Using randomization to defeat cross-site scripting attacks
|
Van Gundy, Matthew |
|
2012 |
31 |
4 |
p. 612-628 17 p. |
artikel |
17 |
Penetration Tester's Open Source Toolkit
|
Cuppens-Boulahia, Nora |
|
2012 |
31 |
4 |
p. 630-632 3 p. |
artikel |
18 |
Performance analysis of Bayesian networks and neural networks in classification of file system activities
|
Khan, Muhammad Naeem Ahmed |
|
2012 |
31 |
4 |
p. 391-401 11 p. |
artikel |
19 |
PIN selection policies: Are they really effective?
|
Kim, Hyoungshick |
|
2012 |
31 |
4 |
p. 484-496 13 p. |
artikel |
20 |
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
|
Hudic, Aleksandar |
|
2012 |
31 |
4 |
p. 629- 1 p. |
artikel |
21 |
QoP-ML: Quality of protection modelling language for cryptographic protocols
|
Ksiezopolski, Bogdan |
|
2012 |
31 |
4 |
p. 569-596 28 p. |
artikel |
22 |
SCADA security in the light of Cyber-Warfare
|
Nicholson, A. |
|
2012 |
31 |
4 |
p. 418-436 19 p. |
artikel |
23 |
Securing the Cloud: Cloud Computer Security Techniques and Tactics
|
Michael, Katina |
|
2012 |
31 |
4 |
p. 633- 1 p. |
artikel |
24 |
Systematically breaking and fixing OpenID security: Formal analysis, semi-automated empirical evaluation, and practical countermeasures
|
Sun, San-Tsai |
|
2012 |
31 |
4 |
p. 465-483 19 p. |
artikel |
25 |
The Basics of Information Security: Understanding the Fundamentals of InfoSec in Theory and Practice
|
Michael, Katina |
|
2012 |
31 |
4 |
p. 634-635 2 p. |
artikel |
26 |
Thor's Microsoft Security Bible
|
Leithner, Manuel |
|
2012 |
31 |
4 |
p. 638- 1 p. |
artikel |
27 |
XBOX 360 Forensics: A Digital Forensics Guide to Examining Artifacts
|
Leithner, Manuel |
|
2012 |
31 |
4 |
p. 639- 1 p. |
artikel |