nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A survey and trends on Internet worms
|
Qing, Sihan |
|
2005 |
24 |
4 |
p. 334-346 13 p. |
artikel |
2 |
Feature deduction and ensemble design of intrusion detection systems
|
Chebrolu, Srilatha |
|
2005 |
24 |
4 |
p. 295-307 13 p. |
artikel |
3 |
From information security to…business security?
|
von Solms, Basie |
|
2005 |
24 |
4 |
p. 271-273 3 p. |
artikel |
4 |
Infection dynamics on the Internet
|
Chang, David B. |
|
2005 |
24 |
4 |
p. 280-286 7 p. |
artikel |
5 |
Information Assurance for security protocols
|
Bella, Giampaolo |
|
2005 |
24 |
4 |
p. 322-333 12 p. |
artikel |
6 |
Personal information compromises: It is time for the U.S. Government to wake up
|
Schultz, Dr Eugene |
|
2005 |
24 |
4 |
p. 261-262 2 p. |
artikel |
7 |
Real-time intrusion detection for high-speed networks
|
Jiang, Wenbao |
|
2005 |
24 |
4 |
p. 287-294 8 p. |
artikel |
8 |
Secure information systems development – a survey and comparison
|
Villarroel, Rodolfo |
|
2005 |
24 |
4 |
p. 308-321 14 p. |
artikel |
9 |
Security views
|
|
|
2005 |
24 |
4 |
p. 263-270 8 p. |
artikel |
10 |
Why users cannot use security
|
Furnell, Steven |
|
2005 |
24 |
4 |
p. 274-279 6 p. |
artikel |