nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A hybrid honeypot framework for improving intrusion detection systems in protecting organizational networks
|
Artail, Hassan |
|
2006 |
25 |
4 |
p. 274-288 15 p. |
artikel |
2 |
An anonymous voting mechanism based on the key exchange protocol
|
Chang, Chin-Chen |
|
2006 |
25 |
4 |
p. 307-314 8 p. |
artikel |
3 |
A prototype for assessing information security awareness
|
Kruger, H.A. |
|
2006 |
25 |
4 |
p. 289-296 8 p. |
artikel |
4 |
Calendar of events
|
|
|
2006 |
25 |
4 |
p. EX1- 1 p. |
artikel |
5 |
Design of an enhancement for SSL/TLS protocols
|
Elgohary, Ashraf |
|
2006 |
25 |
4 |
p. 297-306 10 p. |
artikel |
6 |
Malware Update
|
|
|
2006 |
25 |
4 |
p. 238-246 9 p. |
artikel |
7 |
Predation and the cost of replication: New approaches to malware prevention?
|
Ford, Richard |
|
2006 |
25 |
4 |
p. 257-264 8 p. |
artikel |
8 |
Reflecting on 20 SEC conferences
|
Botha, Reinhardt A. |
|
2006 |
25 |
4 |
p. 247-256 10 p. |
artikel |
9 |
Representing information security fairly and accurately
|
Schultz, E. Eugene |
|
2006 |
25 |
4 |
p. 237- 1 p. |
artikel |
10 |
Scalable balanced batch rekeying for secure group communication
|
Desmond Ng, Wee Hock |
|
2006 |
25 |
4 |
p. 265-273 9 p. |
artikel |