nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud
|
Zhang, Xuyun |
|
2014 |
80 |
5 |
p. 1008-1020 13 p. |
artikel |
2 |
A security framework in G-Hadoop for big data computing across distributed Cloud data centres
|
Zhao, Jiaqi |
|
2014 |
80 |
5 |
p. 994-1007 14 p. |
artikel |
3 |
A survey of emerging threats in cybersecurity
|
Jang-Jaccard, Julian |
|
2014 |
80 |
5 |
p. 973-993 21 p. |
artikel |
4 |
Contents
|
|
|
2014 |
80 |
5 |
p. OBC- 1 p. |
artikel |
5 |
Editorial Board
|
|
|
2014 |
80 |
5 |
p. IFC- 1 p. |
artikel |
6 |
Internet traffic clustering with side information
|
Wang, Yu |
|
2014 |
80 |
5 |
p. 1021-1036 16 p. |
artikel |
7 |
Message matching-based greedy behavior detection in delay tolerant networks
|
Xie, Yongming |
|
2014 |
80 |
5 |
p. 903-915 13 p. |
artikel |
8 |
Publisher's note
|
Capone, Rebecca |
|
2014 |
80 |
5 |
p. 901- 1 p. |
artikel |
9 |
Self-adaptive federated authorization infrastructures
|
Bailey, Christopher |
|
2014 |
80 |
5 |
p. 935-952 18 p. |
artikel |
10 |
Software control flow error detection and correlation with system performance deviation
|
Shalan, Atef |
|
2014 |
80 |
5 |
p. 953-972 20 p. |
artikel |
11 |
Special Issue: Dependable and Secure Computing
|
Chen, Jinjun |
|
2014 |
80 |
5 |
p. 902- 1 p. |
artikel |
12 |
Trust enhanced distributed authorisation for web services
|
Nagarajan, Aarthi |
|
2014 |
80 |
5 |
p. 916-934 19 p. |
artikel |