Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             10 results found
no title author magazine year volume issue page(s) type
1 A framework for risk assessment in access control systems Khambhammettu, Hemanth
2013
39 PA p. 86-103
18 p.
article
2 Behavior-based tracking: Exploiting characteristic patterns in DNS traffic Herrmann, Dominik
2013
39 PA p. 17-33
17 p.
article
3 Botnet detection based on traffic behavior analysis and flow intervals Zhao, David
2013
39 PA p. 2-16
15 p.
article
4 Breaking and fixing the Android Launching Flow Armando, Alessandro
2013
39 PA p. 104-115
12 p.
article
5 Contents 2013
39 PA p. iii-
1 p.
article
6 Covert communications through network configuration messages Rios, Ruben
2013
39 PA p. 34-46
13 p.
article
7 Editorial 2013
39 PA p. 1-
1 p.
article
8 Editorial Board 2013
39 PA p. IFC-
1 p.
article
9 Enforcing dynamic write privileges in data outsourcing De Capitani di Vimercati, Sabrina
2013
39 PA p. 47-63
17 p.
article
10 Management of stateful firewall misconfiguration Garcia-Alfaro, Joaquin
2013
39 PA p. 64-85
22 p.
article
                             10 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands