nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A formal framework for real-time information flow analysis
|
Son, Joon |
|
2009 |
28 |
6 |
p. 421-432 12 p. |
artikel |
2 |
A personal mobile DRM manager for smartphones
|
Bhatt, Siddharth |
|
2009 |
28 |
6 |
p. 327-340 14 p. |
artikel |
3 |
A robust software watermarking for copyright protection
|
Kamel, Ibrahim |
|
2009 |
28 |
6 |
p. 395-409 15 p. |
artikel |
4 |
A survey of signature based methods for financial fraud detection
|
Edge, Michael Edward |
|
2009 |
28 |
6 |
p. 381-394 14 p. |
artikel |
5 |
Building lightweight intrusion detection system using wrapper-based feature selection mechanisms
|
Li, Yang |
|
2009 |
28 |
6 |
p. 466-475 10 p. |
artikel |
6 |
Contents
|
|
|
2009 |
28 |
6 |
p. iii- 1 p. |
artikel |
7 |
Editorial
|
Gritzalis, Dimitris |
|
2009 |
28 |
6 |
p. 325-326 2 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2009 |
28 |
6 |
p. IFC- 1 p. |
artikel |
9 |
IFIP TC11 - Aims and Scope
|
|
|
2009 |
28 |
6 |
p. I- 1 p. |
artikel |
10 |
IFIP Technical Committee
|
|
|
2009 |
28 |
6 |
p. II-V nvt p. |
artikel |
11 |
New aspect-oriented constructs for security hardening concerns
|
Mourad, Azzam |
|
2009 |
28 |
6 |
p. 341-358 18 p. |
artikel |
12 |
Probabilistic model checking for the quantification of DoS security threats
|
Basagiannis, Stylianos |
|
2009 |
28 |
6 |
p. 450-465 16 p. |
artikel |
13 |
Providing true end-to-end security in converged voice over IP infrastructures
|
Palmieri, Francesco |
|
2009 |
28 |
6 |
p. 433-449 17 p. |
artikel |
14 |
Reducing threats from flawed security APIs: The banking PIN case
|
Mannan, Mohammad |
|
2009 |
28 |
6 |
p. 410-420 11 p. |
artikel |
15 |
RIP – A robust IP access architecture
|
Sadok, Djamel H. |
|
2009 |
28 |
6 |
p. 359-380 22 p. |
artikel |
16 |
The information security digital divide between information security managers and users
|
Albrechtsen, Eirik |
|
2009 |
28 |
6 |
p. 476-490 15 p. |
artikel |