nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Accuracy improving guidelines for network anomaly detection systems
|
Ashfaq, Ayesha Binte |
|
2009 |
|
1 |
p. 63-81 |
artikel |
2 |
Advanced fuzzing in the VoIP space
|
Abdelnur, Humberto |
|
2009 |
|
1 |
p. 57-64 |
artikel |
3 |
Advances in password cracking
|
Marechal, Simon |
|
2007 |
|
1 |
p. 73-81 |
artikel |
4 |
Analysis of a scanning model of worm propagation
|
Kirmani, Ezzat |
|
2008 |
|
1 |
p. 31-42 |
artikel |
5 |
Anti-disassembly using Cryptographic Hash Functions
|
Aycock, John |
|
2006 |
|
1 |
p. 79-85 |
artikel |
6 |
A Parallel “String Matching Engine” for use in High Speed Network Intrusion Detection Systems
|
Tripp, Gerald |
|
2006 |
|
1 |
p. 21-34 |
artikel |
7 |
Applied parallel coordinates for logs and network traffic attack analysis
|
Tricaud, Sebastien |
|
2009 |
|
1 |
p. 1-29 |
artikel |
8 |
Comparative analysis of various ransomware virii
|
Gazet, Alexandre |
|
2008 |
|
1 |
p. 77-90 |
artikel |
9 |
Detecting (and creating !) a HVM rootkit (aka BluePill-like)
|
Desnos, Anthony |
|
2009 |
|
1 |
p. 23-49 |
artikel |
10 |
Discovering and exploiting 802.11 wireless driver vulnerabilities
|
Butti, Laurent |
|
2007 |
|
1 |
p. 25-37 |
artikel |
11 |
Dynamic Analysis of Malicious Code
|
Bayer, Ulrich |
|
2006 |
|
1 |
p. 67-77 |
artikel |
12 |
Editors/translators Foreword
|
Bilar, Daniel |
|
2009 |
|
1 |
p. 1-3 |
artikel |
13 |
End-to-end security implementation for mobile devices using TLS protocol
|
Kayayurt, Baris |
|
2006 |
|
1 |
p. 87-97 |
artikel |
14 |
Enforcing kernel constraints by hardware-assisted virtualization
|
Lacombe, Éric |
|
2009 |
|
1 |
p. 1-21 |
artikel |
15 |
Evolution of cross site request forgery attacks
|
Feil, Renaud |
|
2007 |
|
1 |
p. 61-71 |
artikel |
16 |
Foreword
|
Kraus, Jürgen |
|
2009 |
|
1 |
p. 7-8 |
artikel |
17 |
Foreword
|
Biondi, Philippe |
|
2007 |
|
1 |
p. 1-3 |
artikel |
18 |
How to Assess the Effectiveness of your Anti-virus?
|
Josse, Sébastien |
|
2006 |
|
1 |
p. 51-65 |
artikel |
19 |
Linux 2.6 kernel exploits
|
Duverger, Stéphane |
|
2007 |
|
1 |
p. 39-60 |
artikel |
20 |
Malware Pattern Scanning Schemes Secure Against Black-box Analysis
|
Filiol, Eric |
|
2006 |
|
1 |
p. 35-50 |
artikel |
21 |
New data mining technique to enhance IDS alarms quality
|
Al-Mamory, Safaa O. |
|
2008 |
|
1 |
p. 43-55 |
artikel |
22 |
On self-reproducing computer programs
|
Bilar, D. |
|
2009 |
|
1 |
p. 9-87 |
artikel |
23 |
On the definition and classification of cybercrime
|
Gordon, Sarah |
|
2006 |
|
1 |
p. 13-20 |
artikel |
24 |
Removing web spam links from search engine results
|
Egele, Manuel |
|
2009 |
|
1 |
p. 51-62 |
artikel |
25 |
Simulating malware with MAlSim
|
Leszczyna, Rafał |
|
2008 |
|
1 |
p. 65-75 |
artikel |
26 |
Static analysis by abstract interpretation: application to the detection of heap overflows
|
Allamigeon, Xavier |
|
2007 |
|
1 |
p. 5-23 |
artikel |
27 |
Stealth malware analysis from kernel space with Kolumbo
|
Desfossez, Julien |
|
2009 |
|
1 |
p. 83-93 |
artikel |
28 |
Vorwort
|
Kraus, Jürgen |
|
2009 |
|
1 |
p. 5-6 |
artikel |
29 |
Winning the Battles, Losing the War? Rethinking Methodology for Forensic Computing Research
|
Broucek, Vlasti |
|
2006 |
|
1 |
p. 3-12 |
artikel |