nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A knowledge-assisted visual malware analysis system: Design, validation, and reflection of KAMAS
|
Wagner, Markus |
|
2017 |
67 |
C |
p. 1-15 15 p. |
artikel |
2 |
Analyzing research trends in personal information privacy using topic modeling
|
Choi, Hyo Shin |
|
2017 |
67 |
C |
p. 244-253 10 p. |
artikel |
3 |
A novel access control protocol using proxy signatures for cloud-based health information exchange
|
Chandrasekhar, Santosh |
|
2017 |
67 |
C |
p. 73-88 16 p. |
artikel |
4 |
A novel kill-chain framework for remote security log analysis with SIEM software
|
Bryant, Blake D. |
|
2017 |
67 |
C |
p. 198-210 13 p. |
artikel |
5 |
Authentication approach using one-time challenge generation based on user behavior patterns captured in transactional data sets
|
Skračić, Kristian |
|
2017 |
67 |
C |
p. 107-121 15 p. |
artikel |
6 |
Automatic detection and demonstrator generation for information flow leaks in object-oriented programs
|
Do, Quoc Huy |
|
2017 |
67 |
C |
p. 335-349 15 p. |
artikel |
7 |
Challenges in IT security preparedness exercises: A case study
|
Bartnes, Maria |
|
2017 |
67 |
C |
p. 280-290 11 p. |
artikel |
8 |
Contents
|
|
|
2017 |
67 |
C |
p. iii-iv nvt p. |
artikel |
9 |
Data-driven analytics for cyber-threat intelligence and information sharing
|
Qamar, Sara |
|
2017 |
67 |
C |
p. 35-58 24 p. |
artikel |
10 |
Editorial: 30th IFIP International Information Security Conference (IFIP SEC 2015)
|
Herrmann, Dominik |
|
2017 |
67 |
C |
p. 266- 1 p. |
artikel |
11 |
Enhanced PKI authentication with trusted product at claimant
|
Yamada, Asahiko |
|
2017 |
67 |
C |
p. 324-334 11 p. |
artikel |
12 |
Examining privacy concerns and ecommerce adoption in developing countries: The impact of culture in shaping individuals' perceptions toward technology
|
Mohammed, Zareef A. |
|
2017 |
67 |
C |
p. 254-265 12 p. |
artikel |
13 |
Exploring the protection of private browsing in desktop browsers
|
Tsalis, Nikolaos |
|
2017 |
67 |
C |
p. 181-197 17 p. |
artikel |
14 |
Fast revocation of attribute-based credentials for both users and verifiers
|
Lueks, Wouter |
|
2017 |
67 |
C |
p. 308-323 16 p. |
artikel |
15 |
IFC - Editorial Board
|
|
|
2017 |
67 |
C |
p. CO2- 1 p. |
artikel |
16 |
Invi-server: Reducing the attack surfaces by making protected server invisible on networks
|
Park, Jaehyun |
|
2017 |
67 |
C |
p. 89-106 18 p. |
artikel |
17 |
Measuring lower bounds of the financial abuse to online advertisers: A four year case study of the TDSS/TDL4 Botnet
|
Chen, Yizheng |
|
2017 |
67 |
C |
p. 164-180 17 p. |
artikel |
18 |
Practice-based discourse analysis of information security policies
|
Karlsson, Fredrik |
|
2017 |
67 |
C |
p. 267-279 13 p. |
artikel |
19 |
Privacy policies verification in composite services using OWL
|
Khurat, Assadarat |
|
2017 |
67 |
C |
p. 122-141 20 p. |
artikel |
20 |
Protecting personal trajectories of social media users through differential privacy
|
Wang, Shuo |
|
2017 |
67 |
C |
p. 142-163 22 p. |
artikel |
21 |
Providing robust security measures to Bloom filter based biometric template protection schemes
|
Sadhya, Debanjan |
|
2017 |
67 |
C |
p. 59-72 14 p. |
artikel |
22 |
Socialized policy administration
|
Guo, Zeqing |
|
2017 |
67 |
C |
p. 232-243 12 p. |
artikel |
23 |
Towards a causality based analysis of anonymity protection in indeterministic mix systems
|
Pham, Dang Vinh |
|
2017 |
67 |
C |
p. 350-368 19 p. |
artikel |
24 |
Towards a system for complex analysis of security events in large-scale networks
|
Sapegin, Andrey |
|
2017 |
67 |
C |
p. 16-34 19 p. |
artikel |
25 |
Trustworthy exams without trusted parties
|
Bella, Giampaolo |
|
2017 |
67 |
C |
p. 291-307 17 p. |
artikel |
26 |
Unified authentication factors and fuzzy service access using interaction provenance
|
Hasan, Ragib |
|
2017 |
67 |
C |
p. 211-231 21 p. |
artikel |