nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A programmer's perspective
|
Bayuk, Jennifer L. |
|
2012 |
31 |
5 |
p. 736-737 2 p. |
artikel |
2 |
A second look at the performance of neural networks for keystroke dynamics using a publicly available dataset
|
Uzun, Yasin |
|
2012 |
31 |
5 |
p. 717-726 10 p. |
artikel |
3 |
Contents
|
|
|
2012 |
31 |
5 |
p. iii- 1 p. |
artikel |
4 |
Editorial
|
Spafford, Eugene H. |
|
2012 |
31 |
5 |
p. 641-642 2 p. |
artikel |
5 |
Editorial Board
|
|
|
2012 |
31 |
5 |
p. IFC- 1 p. |
artikel |
6 |
Incident response teams – Challenges in supporting the organisational security function
|
Ahmad, Atif |
|
2012 |
31 |
5 |
p. 643-652 10 p. |
artikel |
7 |
Low Tech Hacking
|
Leithner, Manuel |
|
2012 |
31 |
5 |
p. 738- 1 p. |
artikel |
8 |
Securing distributed systems using patterns: A survey
|
Uzunov, Anton V. |
|
2012 |
31 |
5 |
p. 681-703 23 p. |
artikel |
9 |
Semantic adaptive microaggregation of categorical microdata
|
Martínez, Sergio |
|
2012 |
31 |
5 |
p. 653-672 20 p. |
artikel |
10 |
Steganography for MP3 audio by exploiting the rule of window switching
|
Yan, Diqun |
|
2012 |
31 |
5 |
p. 704-716 13 p. |
artikel |
11 |
Taxonomy of compliant information security behavior
|
Padayachee, Keshnee |
|
2012 |
31 |
5 |
p. 673-680 8 p. |
artikel |
12 |
WAVE-CUSUM: Improving CUSUM performance in network anomaly detection by means of wavelet analysis
|
Callegari, C. |
|
2012 |
31 |
5 |
p. 727-735 9 p. |
artikel |