nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A survey of certified mail systems provided on the Internet
|
Tauber, Arne |
|
2011 |
|
6-7 |
p. 464-485 22 p. |
artikel |
2 |
Compliance by design – Bridging the chasm between auditors and IT architects
|
Julisch, Klaus |
|
2011 |
|
6-7 |
p. 410-426 17 p. |
artikel |
3 |
Contents
|
|
|
2011 |
|
6-7 |
p. iii- 1 p. |
artikel |
4 |
Correlating TCP/IP Packet contexts to detect stepping-stone intrusion
|
Yang, Jianhua |
|
2011 |
|
6-7 |
p. 538-546 9 p. |
artikel |
5 |
Data preprocessing for anomaly based network intrusion detection: A review
|
Davis, Jonathan J. |
|
2011 |
|
6-7 |
p. 353-375 23 p. |
artikel |
6 |
Editorial
|
Spafford, Eugene H. |
|
2011 |
|
6-7 |
p. 351-352 2 p. |
artikel |
7 |
Feature representation and selection in malicious code detection methods based on static system calls
|
Yuxin, Ding |
|
2011 |
|
6-7 |
p. 514-524 11 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2011 |
|
6-7 |
p. IFC- 1 p. |
artikel |
9 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2011 |
|
6-7 |
p. 547-551 5 p. |
artikel |
10 |
Logic-based approach for digital forensic investigation in communication Networks
|
Rekhis, Slim |
|
2011 |
|
6-7 |
p. 376-396 21 p. |
artikel |
11 |
Modeling behavioral considerations related to information security
|
Martinez-Moyano, Ignacio J. |
|
2011 |
|
6-7 |
p. 397-409 13 p. |
artikel |
12 |
PrivaKERB: A user privacy framework for Kerberos
|
Pereniguez, F. |
|
2011 |
|
6-7 |
p. 446-463 18 p. |
artikel |
13 |
Rights violation detection in multi-level digital rights management system
|
Sachan, Amit |
|
2011 |
|
6-7 |
p. 498-513 16 p. |
artikel |
14 |
Toward cost-sensitive self-optimizing anomaly detection and response in autonomic networks
|
Zhang, Zonghua |
|
2011 |
|
6-7 |
p. 525-537 13 p. |
artikel |
15 |
Unconstrained keystroke dynamics authentication with shared secret
|
Giot, Romain |
|
2011 |
|
6-7 |
p. 427-445 19 p. |
artikel |
16 |
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
|
Posey, Clay |
|
2011 |
|
6-7 |
p. 486-497 12 p. |
artikel |