nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A preliminary model of end user sophistication for insider threat prediction in IT systems
|
Magklaras, G.B. |
|
2005 |
24 |
5 |
p. 371-380 10 p. |
artikel |
2 |
Capital market reaction to defective IT products: The case of computer viruses
|
Hovav, Anat |
|
2005 |
24 |
5 |
p. 409-424 16 p. |
artikel |
3 |
CIDS: An agent-based intrusion detection system
|
Dasgupta, D. |
|
2005 |
24 |
5 |
p. 387-398 12 p. |
artikel |
4 |
Non-infosec professionals in infosec?
|
Schultz, Eugene |
|
2005 |
24 |
5 |
p. 347-348 2 p. |
artikel |
5 |
Recent attacks on alleged SecurID and their practical implications
|
Biryukov, Alex |
|
2005 |
24 |
5 |
p. 364-370 7 p. |
artikel |
6 |
Secure authentication scheme for session initiation protocol
|
Yang, Chou-Chen |
|
2005 |
24 |
5 |
p. 381-386 6 p. |
artikel |
7 |
Security views
|
Schultz, E. |
|
2005 |
24 |
5 |
p. 349-358 10 p. |
artikel |
8 |
Technology evolution drives need for greater information technology security
|
LeVine, Richard |
|
2005 |
24 |
5 |
p. 359-361 3 p. |
artikel |
9 |
The five Ps of patch management
|
Andrew, C. |
|
2005 |
24 |
5 |
p. 362-363 2 p. |
artikel |
10 |
Two-level controllers hierarchy for a scalable and distributed multicast security protocol
|
Aslan, Heba K. |
|
2005 |
24 |
5 |
p. 399-408 10 p. |
artikel |