nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Digest of recent IT security press coverage
|
McKenna, Brian |
|
2002 |
21 |
5 |
p. 433-436 4 p. |
artikel |
2 |
Enterprise in focus at NetSec 2002
|
McKenna, Brian |
|
2002 |
21 |
5 |
p. 421-423 3 p. |
artikel |
3 |
Events
|
|
|
2002 |
21 |
5 |
p. 437- 1 p. |
artikel |
4 |
Guide for Authors
|
|
|
2002 |
21 |
5 |
p. 438- 1 p. |
artikel |
5 |
IFIP Technical committee 11
|
|
|
2002 |
21 |
5 |
p. 473-475 3 p. |
artikel |
6 |
In brief
|
McKenna, Brian |
|
2002 |
21 |
5 |
p. 433-436 4 p. |
artikel |
7 |
Information security policy — what do international information security standards say?
|
Höne, Karin |
|
2002 |
21 |
5 |
p. 402-409 8 p. |
artikel |
8 |
International Board of Referees
|
|
|
2002 |
21 |
5 |
p. 438- 1 p. |
artikel |
9 |
Much Ado About Nothing: Win32.Perrun
|
Nikishin, Andy |
|
2002 |
21 |
5 |
p. 410-412 3 p. |
artikel |
10 |
Security crisis management — the basics
|
Hancock, Bill |
|
2002 |
21 |
5 |
p. 397-401 5 p. |
artikel |
11 |
Security Views
|
Schultz, Eugene |
|
2002 |
21 |
5 |
p. 385-396 12 p. |
artikel |
12 |
Steganographic Method for Secure Communications
|
Lou, Der-Chyuan |
|
2002 |
21 |
5 |
p. 449-460 12 p. |
artikel |
13 |
Taking a stand on hackers
|
Schultz, E.Eugene |
|
2002 |
21 |
5 |
p. 382-384 3 p. |
artikel |
14 |
The Open Source approach — opportunities and limitations with respect to security and privacy * * This paper was presented at ISSE 2001, September 26–28, London. This version is slightly revised.
|
Hansen, Marit |
|
2002 |
21 |
5 |
p. 461-471 11 p. |
artikel |
15 |
The perils of privacy
|
Hinde, Stephen |
|
2002 |
21 |
5 |
p. 424-432 9 p. |
artikel |
16 |
Trusted …or… trustworthy: the search for a new paradigm for computer and network security 1 1 Invited Paper to the IFIP/Sec2002 Conference on the occasion of the presentation of the ‘Kristian Beckman Award’, in Cairo, Egypt, May 2002.
|
Caelli, William J |
|
2002 |
21 |
5 |
p. 413-420 8 p. |
artikel |
17 |
Use of K-Nearest Neighbor classifier for intrusion detection 1 1 An earlier version of this paper is to appear in the Proceedings of the 11th USENIX Security Symposium, San Francisco, CA, August 2002
|
Liao, Yihua |
|
2002 |
21 |
5 |
p. 439-448 10 p. |
artikel |