nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An empirical investigation of network attacks on computer systems
|
Moitra, Soumyo D. |
|
2004 |
23 |
1 |
p. 43-51 9 p. |
artikel |
2 |
Applying application security standards—a case study
|
King, Stuart |
|
2004 |
23 |
1 |
p. 17-21 5 p. |
artikel |
3 |
Biometric random number generators
|
Szczepanski, J. |
|
2004 |
23 |
1 |
p. 77-84 8 p. |
artikel |
4 |
Erratum to “Attacks on the (enhanced) Yang-Shieh authentication” [Comput Secur 22(8) (2003) 725–727]
|
McKenna, Brian |
|
2004 |
23 |
1 |
p. 85- 1 p. |
artikel |
5 |
Events calender
|
|
|
2004 |
23 |
1 |
p. 29- 1 p. |
artikel |
6 |
Holistic security requirement engineering for electronic commerce
|
Zuccato, Albin |
|
2004 |
23 |
1 |
p. 63-76 14 p. |
artikel |
7 |
Mitigation of network tampering using dynamic dispatch of mobile agents
|
DeMara, Ronald F |
|
2004 |
23 |
1 |
p. 31-42 12 p. |
artikel |
8 |
Restraining and repairing file system damage through file integrity control
|
da Silveira Serafim, Vinı́cius |
|
2004 |
23 |
1 |
p. 52-62 11 p. |
artikel |
9 |
Security training and awareness—fitting a square peg in a round hole
|
Schultz, Eugene |
|
2004 |
23 |
1 |
p. 1-2 2 p. |
artikel |
10 |
Security views
|
|
|
2004 |
23 |
1 |
p. 3-11 9 p. |
artikel |
11 |
TBSE—an engineering approach to the design of accurate and reliable security systems
|
Leach, John |
|
2004 |
23 |
1 |
p. 22-28 7 p. |
artikel |
12 |
The future of computer forensics: a needs analysis survey
|
Rogers, Marcus K |
|
2004 |
23 |
1 |
p. 12-16 5 p. |
artikel |