no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A framework for risk assessment in access control systems
|
Khambhammettu, Hemanth |
|
2013 |
39 |
PA |
p. 86-103 18 p. |
article |
2 |
Behavior-based tracking: Exploiting characteristic patterns in DNS traffic
|
Herrmann, Dominik |
|
2013 |
39 |
PA |
p. 17-33 17 p. |
article |
3 |
Botnet detection based on traffic behavior analysis and flow intervals
|
Zhao, David |
|
2013 |
39 |
PA |
p. 2-16 15 p. |
article |
4 |
Breaking and fixing the Android Launching Flow
|
Armando, Alessandro |
|
2013 |
39 |
PA |
p. 104-115 12 p. |
article |
5 |
Contents
|
|
|
2013 |
39 |
PA |
p. iii- 1 p. |
article |
6 |
Covert communications through network configuration messages
|
Rios, Ruben |
|
2013 |
39 |
PA |
p. 34-46 13 p. |
article |
7 |
Editorial
|
|
|
2013 |
39 |
PA |
p. 1- 1 p. |
article |
8 |
Editorial Board
|
|
|
2013 |
39 |
PA |
p. IFC- 1 p. |
article |
9 |
Enforcing dynamic write privileges in data outsourcing
|
De Capitani di Vimercati, Sabrina |
|
2013 |
39 |
PA |
p. 47-63 17 p. |
article |
10 |
Management of stateful firewall misconfiguration
|
Garcia-Alfaro, Joaquin |
|
2013 |
39 |
PA |
p. 64-85 22 p. |
article |