nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An empirical examination of the reverse engineering process for binary files
|
Sutherland, Iain |
|
2006 |
25 |
3 |
p. 221-228 8 p. |
artikel |
2 |
A novel approach for computer security education using Minix instructional operating system
|
Du, Wenliang |
|
2006 |
25 |
3 |
p. 190-200 11 p. |
artikel |
3 |
A novel remote user authentication scheme using bilinear pairings
|
Das, Manik Lal |
|
2006 |
25 |
3 |
p. 184-189 6 p. |
artikel |
4 |
A simple, configurable SMTP anti-spam filter: Greylists
|
González-Talaván, Guillermo |
|
2006 |
25 |
3 |
p. 229-236 8 p. |
artikel |
5 |
A traceable threshold signature scheme with multiple signing policies
|
Shao, Jun |
|
2006 |
25 |
3 |
p. 201-206 6 p. |
artikel |
6 |
Calendar of events - update
|
|
|
2006 |
25 |
3 |
p. EX1- 1 p. |
artikel |
7 |
Change trend of averaged Hurst parameter of traffic under DDOS flood attacks
|
Li, Ming |
|
2006 |
25 |
3 |
p. 213-220 8 p. |
artikel |
8 |
Information Security – The Fourth Wave
|
von Solms, Basie |
|
2006 |
25 |
3 |
p. 165-168 4 p. |
artikel |
9 |
Modeling network security
|
Bradbury, Danny |
|
2006 |
25 |
3 |
p. 163-164 2 p. |
artikel |
10 |
Real-time analysis of intrusion detection alerts via correlation
|
Lee, Soojin |
|
2006 |
25 |
3 |
p. 169-183 15 p. |
artikel |
11 |
Security implications in RFID and authentication processing framework
|
Ayoade, John |
|
2006 |
25 |
3 |
p. 207-212 6 p. |
artikel |
12 |
Security Views - Malware Update
|
|
|
2006 |
25 |
3 |
p. 156-162 7 p. |
artikel |
13 |
Special systems: Overlooked sources of security risk?
|
Schultz, E. Eugene |
|
2006 |
25 |
3 |
p. 155- 1 p. |
artikel |