Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             26 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS Wagner, Markus
2017
67 C p. 1-15
15 p.
artikel
2 Analyzing research trends in personal information privacy using topic modeling Choi, Hyo Shin
2017
67 C p. 244-253
10 p.
artikel
3 A novel access control protocol using proxy signatures for cloud-based health information exchange Chandrasekhar, Santosh
2017
67 C p. 73-88
16 p.
artikel
4 A novel kill-chain framework for remote security log analysis with SIEM software Bryant, Blake D.
2017
67 C p. 198-210
13 p.
artikel
5 Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets Skračić, Kristian
2017
67 C p. 107-121
15 p.
artikel
6 Automatic detection and demonstrator generation for information flow leaks in object-oriented programs Do, Quoc Huy
2017
67 C p. 335-349
15 p.
artikel
7 Challenges in IT security preparedness exercises: A case study Bartnes, Maria
2017
67 C p. 280-290
11 p.
artikel
8 Contents 2017
67 C p. iii-iv
nvt p.
artikel
9 Data-driven analytics for cyber-threat intelligence and information sharing Qamar, Sara
2017
67 C p. 35-58
24 p.
artikel
10 Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015) Herrmann, Dominik
2017
67 C p. 266-
1 p.
artikel
11 Enhanced PKI authentication with trusted product at claimant Yamada, Asahiko
2017
67 C p. 324-334
11 p.
artikel
12 Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology Mohammed, Zareef A.
2017
67 C p. 254-265
12 p.
artikel
13 Exploring the protection of private browsing in desktop browsers Tsalis, Nikolaos
2017
67 C p. 181-197
17 p.
artikel
14 Fast revocation of attribute-based credentials for both users and verifiers Lueks, Wouter
2017
67 C p. 308-323
16 p.
artikel
15 IFC - Editorial Board 2017
67 C p. CO2-
1 p.
artikel
16 Invi-server: Reducing the attack surfaces by making protected server invisible on networks Park, Jaehyun
2017
67 C p. 89-106
18 p.
artikel
17 Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet Chen, Yizheng
2017
67 C p. 164-180
17 p.
artikel
18 Practice-based discourse analysis of information security policies Karlsson, Fredrik
2017
67 C p. 267-279
13 p.
artikel
19 Privacy policies verification in composite services using OWL Khurat, Assadarat
2017
67 C p. 122-141
20 p.
artikel
20 Protecting personal trajectories of social media users through differential privacy Wang, Shuo
2017
67 C p. 142-163
22 p.
artikel
21 Providing robust security measures to Bloom filter based biometric template protection schemes Sadhya, Debanjan
2017
67 C p. 59-72
14 p.
artikel
22 Socialized policy administration Guo, Zeqing
2017
67 C p. 232-243
12 p.
artikel
23 Towards a causality based analysis of anonymity protection in indeterministic mix systems Pham, Dang Vinh
2017
67 C p. 350-368
19 p.
artikel
24 Towards a system for complex analysis of security events in large-scale networks Sapegin, Andrey
2017
67 C p. 16-34
19 p.
artikel
25 Trustworthy exams without trusted parties Bella, Giampaolo
2017
67 C p. 291-307
17 p.
artikel
26 Unified authentication factors and fuzzy service access using interaction provenance Hasan, Ragib
2017
67 C p. 211-231
21 p.
artikel
                             26 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland