nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Adaptable security mechanism for dynamic environments
|
Księżopolski, Bogdan |
|
2007 |
26 |
3 |
p. 246-255 10 p. |
artikel |
2 |
Evaluating information security tradeoffs: Restricting access can interfere with user tasks
|
Post, Gerald V. |
|
2007 |
26 |
3 |
p. 229-237 9 p. |
artikel |
3 |
Guide for Authors.
|
|
|
2007 |
26 |
3 |
p. IV-V nvt p. |
artikel |
4 |
Holistic security management framework applied in electronic commerce
|
Zuccato, Albin |
|
2007 |
26 |
3 |
p. 256-265 10 p. |
artikel |
5 |
IFC - Editorial Board
|
|
|
2007 |
26 |
3 |
p. IFC- 1 p. |
artikel |
6 |
(iii) Contents
|
|
|
2007 |
26 |
3 |
p. iii- 1 p. |
artikel |
7 |
Malware update
|
|
|
2007 |
26 |
3 |
p. 188-200 13 p. |
artikel |
8 |
M-CLIQUES: Modified CLIQUES key agreement for secure multicast
|
Chen, Xiaoyan |
|
2007 |
26 |
3 |
p. 238-245 8 p. |
artikel |
9 |
Measuring, analyzing and predicting security vulnerabilities in software systems
|
Alhazmi, O.H. |
|
2007 |
26 |
3 |
p. 219-228 10 p. |
artikel |
10 |
Mobile computing: The next Pandora's Box
|
Schultz, E. Eugene |
|
2007 |
26 |
3 |
p. 187- 1 p. |
artikel |
11 |
Modeling and analyzing the spread of active worms based on P2P systems
|
Li, Tao |
|
2007 |
26 |
3 |
p. 213-218 6 p. |
artikel |
12 |
SVision: A novel visual network-anomaly identification technique
|
Onut, Iosif-Viorel |
|
2007 |
26 |
3 |
p. 201-212 12 p. |
artikel |