nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Aligning disaster recovery and security incident response
|
Schultz, E. Eugene |
|
2005 |
24 |
7 |
p. 505-506 2 p. |
artikel |
2 |
Authentication of users on mobile telephones – A survey of attitudes and practices
|
Clarke, N.L. |
|
2005 |
24 |
7 |
p. 519-527 9 p. |
artikel |
3 |
Beyond Sarbanes–Oxley compliance
|
Foote, P. |
|
2005 |
24 |
7 |
p. 516-518 3 p. |
artikel |
4 |
Defending against spoofed DDoS attacks with path fingerprint
|
Lee, Fu-Yuan |
|
2005 |
24 |
7 |
p. 571-586 16 p. |
artikel |
5 |
Events calendar, please update, see marked copy
|
|
|
2005 |
24 |
7 |
p. EX1- 1 p. |
artikel |
6 |
PAID: A Probabilistic Agent-Based Intrusion Detection system
|
Gowadia, Vaibhav |
|
2005 |
24 |
7 |
p. 529-545 17 p. |
artikel |
7 |
Query-directed passwords
|
O'Gorman, Lawrence |
|
2005 |
24 |
7 |
p. 546-560 15 p. |
artikel |
8 |
Security views - Malware update
|
|
|
2005 |
24 |
7 |
p. 507-515 9 p. |
artikel |
9 |
Sinkhole intrusion in mobile ad hoc networks: The problem and some detection indicators
|
Tseng, H. Chris |
|
2005 |
24 |
7 |
p. 561-570 10 p. |
artikel |