nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Application-based anomaly intrusion detection with dynamic information flow analysis
|
Masri, Wes |
|
2008 |
27 |
5-6 |
p. 176-187 12 p. |
artikel |
2 |
A SIP-oriented SPIT Management Framework
|
Gritzalis, Dimitris |
|
2008 |
27 |
5-6 |
p. 136-153 18 p. |
artikel |
3 |
Building network attack graph for alert causal correlation
|
Zhang, Shaojun |
|
2008 |
27 |
5-6 |
p. 188-196 9 p. |
artikel |
4 |
Critical study of neural networks in detecting intrusions
|
Beghdad, Rachid |
|
2008 |
27 |
5-6 |
p. 168-175 8 p. |
artikel |
5 |
Enforcing memory policy specifications in reconfigurable hardware
|
Huffmire, Ted |
|
2008 |
27 |
5-6 |
p. 197-215 19 p. |
artikel |
6 |
From the Editor-in-Chief
|
Wolthusen, S.D. |
|
2008 |
27 |
5-6 |
p. 123- 1 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2008 |
27 |
5-6 |
p. IFC- 1 p. |
artikel |
8 |
(iii) Contents
|
|
|
2008 |
27 |
5-6 |
p. iii- 1 p. |
artikel |
9 |
Information security management: An information security retrieval and awareness model for industry
|
Kritzinger, E. |
|
2008 |
27 |
5-6 |
p. 224-231 8 p. |
artikel |
10 |
Information security requirements – Interpreting the legal aspects
|
Gerber, Mariana |
|
2008 |
27 |
5-6 |
p. 124-135 12 p. |
artikel |
11 |
Practical anonymous user authentication scheme with security proof
|
Chien, Hung-Yu |
|
2008 |
27 |
5-6 |
p. 216-223 8 p. |
artikel |
12 |
SMSSec: An end-to-end protocol for secure SMS
|
Lo, Johnny Li-Chang |
|
2008 |
27 |
5-6 |
p. 154-167 14 p. |
artikel |