nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An active learning based TCM-KNN algorithm for supervised network intrusion detection
|
Li, Yang |
|
2007 |
|
7-8 |
p. 459-467 9 p. |
artikel |
2 |
An assessment of website password practices
|
Furnell, Steven |
|
2007 |
|
7-8 |
p. 445-451 7 p. |
artikel |
3 |
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
|
Rodwell, P.M. |
|
2007 |
|
7-8 |
p. 468-478 11 p. |
artikel |
4 |
An ontology-based policy for deploying secure SIP-based VoIP services
|
Geneiatakis, Dimitris |
|
2008 |
|
7-8 |
p. 285-297 13 p. |
artikel |
5 |
An optimistic fair exchange protocol based on signature policies
|
Hernandez-Ardieta, Jorge L. |
|
2008 |
|
7-8 |
p. 309-322 14 p. |
artikel |
6 |
Automated containment of rootkits attacks
|
Baliga, Arati |
|
2008 |
|
7-8 |
p. 323-334 12 p. |
artikel |
7 |
Consensus ranking – An ICT security awareness case study
|
Kruger, H.A. |
|
2008 |
|
7-8 |
p. 254-259 6 p. |
artikel |
8 |
Criteria to evaluate Automated Personal Identification Mechanisms
|
Palmer, Anthony J. |
|
2008 |
|
7-8 |
p. 260-284 25 p. |
artikel |
9 |
Dynamic models for computer viruses
|
Piqueira, Jose R.C. |
|
2008 |
|
7-8 |
p. 355-359 5 p. |
artikel |
10 |
Editorial
|
Wolthusen, S.D. |
|
2008 |
|
7-8 |
p. 233-234 2 p. |
artikel |
11 |
Evaluation of a low-rate DoS attack against application servers
|
Maciá-Fernández, Gabriel |
|
2008 |
|
7-8 |
p. 335-354 20 p. |
artikel |
12 |
Guide for Authors.
|
|
|
2007 |
|
7-8 |
p. IV-V nvt p. |
artikel |
13 |
IFC - Editorial Board
|
|
|
2008 |
|
7-8 |
p. IFC- 1 p. |
artikel |
14 |
IFC - Editorial Board
|
|
|
2007 |
|
7-8 |
p. IFC- 1 p. |
artikel |
15 |
(iii) Contents
|
|
|
2008 |
|
7-8 |
p. iii- 1 p. |
artikel |
16 |
(iii) Contents
|
|
|
2007 |
|
7-8 |
p. iii- 1 p. |
artikel |
17 |
Information security awareness in higher education: An exploratory study
|
Rezgui, Yacine |
|
2008 |
|
7-8 |
p. 241-253 13 p. |
artikel |
18 |
Intrusion detection using text processing techniques with a kernel based similarity measure
|
Sharma, Alok |
|
2007 |
|
7-8 |
p. 488-495 8 p. |
artikel |
19 |
Key agreement for key hypergraph
|
Jeong, Ik Rae |
|
2007 |
|
7-8 |
p. 452-458 7 p. |
artikel |
20 |
Mining TCP/IP packets to detect stepping-stone intrusion
|
Yang, Jianhua |
|
2007 |
|
7-8 |
p. 479-484 6 p. |
artikel |
21 |
Run-time label propagation for forensic audit data
|
Buchholz, Florian |
|
2007 |
|
7-8 |
p. 496-513 18 p. |
artikel |
22 |
Secure log management for privacy assurance in electronic communications
|
Stathopoulos, Vassilios |
|
2008 |
|
7-8 |
p. 298-308 11 p. |
artikel |
23 |
Security beliefs and barriers for novice Internet users
|
Furnell, Steven |
|
2008 |
|
7-8 |
p. 235-240 6 p. |
artikel |
24 |
The security challenges inherent in VoIP
|
Bradbury, D. |
|
2007 |
|
7-8 |
p. 485-487 3 p. |
artikel |