nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A qualitative study of users' view on information security
|
Albrechtsen, Eirik |
|
2007 |
26 |
4 |
p. 276-289 14 p. |
artikel |
2 |
A resource-constrained group key agreement protocol for imbalanced wireless networks
|
Tseng, Yuh-Min |
|
2007 |
26 |
4 |
p. 331-337 7 p. |
artikel |
3 |
Dual-wrapped digital watermarking scheme for image copyright protection
|
Hu, Ming-Chiang |
|
2007 |
26 |
4 |
p. 319-330 12 p. |
artikel |
4 |
Functional similarities between computer worms and biological pathogens
|
Li, Jun |
|
2007 |
26 |
4 |
p. 338-347 10 p. |
artikel |
5 |
Guide for Authors.
|
|
|
2007 |
26 |
4 |
p. IV-V nvt p. |
artikel |
6 |
IFC - Editorial Board
|
|
|
2007 |
26 |
4 |
p. IFC- 1 p. |
artikel |
7 |
(iii) Contents
|
|
|
2007 |
26 |
4 |
p. iii- 1 p. |
artikel |
8 |
Masquerade detection by boosting decision stumps using UNIX commands
|
Jian, Zhou |
|
2007 |
26 |
4 |
p. 311-318 8 p. |
artikel |
9 |
Retraining a keystroke dynamics-based authenticator with impostor patterns
|
Lee, Hyoung-joo |
|
2007 |
26 |
4 |
p. 300-310 11 p. |
artikel |
10 |
Security Views - Malware
|
|
|
2007 |
26 |
4 |
p. 269-275 7 p. |
artikel |
11 |
Struggles in the academic side of infosec
|
Eugene Schultz, E. |
|
2007 |
26 |
4 |
p. 267-268 2 p. |
artikel |
12 |
Teaching information systems security courses: A hands-onĀ approach
|
Sharma, Sushil K. |
|
2007 |
26 |
4 |
p. 290-299 10 p. |
artikel |