nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An active learning based TCM-KNN algorithm for supervised network intrusion detection
|
Li, Yang |
|
2007 |
26 |
7-8 |
p. 459-467 9 p. |
artikel |
2 |
An assessment of website password practices
|
Furnell, Steven |
|
2007 |
26 |
7-8 |
p. 445-451 7 p. |
artikel |
3 |
A non-intrusive biometric authentication mechanism utilising physiological characteristics of the human head
|
Rodwell, P.M. |
|
2007 |
26 |
7-8 |
p. 468-478 11 p. |
artikel |
4 |
Guide for Authors.
|
|
|
2007 |
26 |
7-8 |
p. IV-V nvt p. |
artikel |
5 |
IFC - Editorial Board
|
|
|
2007 |
26 |
7-8 |
p. IFC- 1 p. |
artikel |
6 |
(iii) Contents
|
|
|
2007 |
26 |
7-8 |
p. iii- 1 p. |
artikel |
7 |
Intrusion detection using text processing techniques with a kernel based similarity measure
|
Sharma, Alok |
|
2007 |
26 |
7-8 |
p. 488-495 8 p. |
artikel |
8 |
Key agreement for key hypergraph
|
Jeong, Ik Rae |
|
2007 |
26 |
7-8 |
p. 452-458 7 p. |
artikel |
9 |
Mining TCP/IP packets to detect stepping-stone intrusion
|
Yang, Jianhua |
|
2007 |
26 |
7-8 |
p. 479-484 6 p. |
artikel |
10 |
Run-time label propagation for forensic audit data
|
Buchholz, Florian |
|
2007 |
26 |
7-8 |
p. 496-513 18 p. |
artikel |
11 |
The security challenges inherent in VoIP
|
Bradbury, D. |
|
2007 |
26 |
7-8 |
p. 485-487 3 p. |
artikel |