nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Alert correlation in collaborative intelligent intrusion detection systems—A survey
|
Elshoush, Huwaida Tagelsir |
|
2011 |
11 |
7 |
p. 4349-4365 17 p. |
artikel |
2 |
Analysis of vulnerability assessment results based on CAOS
|
Corral, G. |
|
2011 |
11 |
7 |
p. 4321-4331 11 p. |
artikel |
3 |
An information systems security risk assessment model under uncertain environment
|
Feng, Nan |
|
2011 |
11 |
7 |
p. 4332-4340 9 p. |
artikel |
4 |
A soft computing approach for privacy requirements engineering: The PriS framework
|
Kalloniatis, Christos |
|
2011 |
11 |
7 |
p. 4341-4348 8 p. |
artikel |
5 |
Can a good offense be a good defense? Vulnerability testing of anomaly detectors through an artificial arms race
|
Kayacık, Hilmi Güneş |
|
2011 |
11 |
7 |
p. 4366-4383 18 p. |
artikel |
6 |
Crossing road monitoring system based on adaptive decision for illegal situation
|
Gao, Tao |
|
2011 |
11 |
7 |
p. 4399-4412 14 p. |
artikel |
7 |
Editorial Board
|
|
|
2011 |
11 |
7 |
p. CO2- 1 p. |
artikel |
8 |
Face recognition by generalized two-dimensional FLD method and multi-class support vector machines
|
Chowdhury, Shiladitya |
|
2011 |
11 |
7 |
p. 4282-4292 11 p. |
artikel |
9 |
High-performance SoC-based implementation of modular exponentiation using evolutionary addition chains for efficient cryptography
|
Nedjah, Nadia |
|
2011 |
11 |
7 |
p. 4302-4311 10 p. |
artikel |
10 |
Quantum-inspired design of resilient substitution boxes: From coding to hardware implementation
|
Nedjah, Nadia |
|
2011 |
11 |
7 |
p. 4312-4320 9 p. |
artikel |
11 |
Real-time CBR-agent with a mixture of experts in the reuse stage to classify and detect DoS attacks
|
Pinzón, Cristian I. |
|
2011 |
11 |
7 |
p. 4384-4398 15 p. |
artikel |
12 |
Simultaneous latent fingerprint recognition
|
Vatsa, Mayank |
|
2011 |
11 |
7 |
p. 4260-4266 7 p. |
artikel |
13 |
Special issue on soft computing for information system security
|
Lian, Shiguo |
|
2011 |
11 |
7 |
p. 4257-4259 3 p. |
artikel |
14 |
Stockwell transform based palm-print recognition
|
Badrinath, G.S. |
|
2011 |
11 |
7 |
p. 4267-4281 15 p. |
artikel |
15 |
Surveillance and human–computer interaction applications of self-growing models
|
García-Rodríguez, José |
|
2011 |
11 |
7 |
p. 4413-4431 19 p. |
artikel |
16 |
Traceable content protection based on chaos and neural networks
|
Lian, Shiguo |
|
2011 |
11 |
7 |
p. 4293-4301 9 p. |
artikel |