nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An anomaly intrusion detection method by clustering normal user behavior
|
Hyun Oh, Sang |
|
2003 |
22 |
7 |
p. 596-612 17 p. |
artikel |
2 |
Applying information security governance
|
Moulton, Rolf |
|
2003 |
22 |
7 |
p. 580-584 5 p. |
artikel |
3 |
Cryptanalysis of an enhanced timestamp-based password authentication scheme
|
Wang, Bin |
|
2003 |
22 |
7 |
p. 643-645 3 p. |
artikel |
4 |
Data dependent rotations, a trustworthy approach for future encryption systems/ciphers: low cost and high performance
|
Sklavos, N |
|
2003 |
22 |
7 |
p. 585-588 4 p. |
artikel |
5 |
Detecting intrusion with rule-based integration of multiple models
|
Han, Sang-Jun |
|
2003 |
22 |
7 |
p. 613-623 11 p. |
artikel |
6 |
Events
|
|
|
2003 |
22 |
7 |
p. 589- 1 p. |
artikel |
7 |
Forensic evidence testimony — some thoughts
|
Wolfe, Hank |
|
2003 |
22 |
7 |
p. 577-579 3 p. |
artikel |
8 |
IFIP Technical Committee 11
|
|
|
2003 |
22 |
7 |
p. 647-649 3 p. |
artikel |
9 |
International Board of Referees
|
|
|
2003 |
22 |
7 |
p. 590- 1 p. |
artikel |
10 |
Nimbyism, dominoes and creaking infrastructure
|
Hinde, Stephen |
|
2003 |
22 |
7 |
p. 570-576 7 p. |
artikel |
11 |
Patching Pandemonium
|
Schultz, E.Eugene |
|
2003 |
22 |
7 |
p. 556-558 3 p. |
artikel |
12 |
Security enhancement for the timestamp-based password authentication scheme using smart cards
|
Shen, Jau-Ji |
|
2003 |
22 |
7 |
p. 591-595 5 p. |
artikel |
13 |
Security Views
|
|
|
2003 |
22 |
7 |
p. 559-569 11 p. |
artikel |
14 |
The reduced Enigma
|
Thimbleby, Harold |
|
2003 |
22 |
7 |
p. 624-642 19 p. |
artikel |