nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A concise cost analysis of Internet malware
|
Kondakci, Suleyman |
|
2009 |
28 |
7 |
p. 648-659 12 p. |
artikel |
2 |
Adapting usage control as a deterrent to address the inadequacies of access controls
|
Padayachee, Keshnee |
|
2009 |
28 |
7 |
p. 536-544 9 p. |
artikel |
3 |
A new steganography algorithm based on color histograms for data embedding into raw video streams
|
Cetin, Ozdemir |
|
2009 |
28 |
7 |
p. 670-682 13 p. |
artikel |
4 |
A schema for protecting the integrity of databases
|
Kamel, Ibrahim |
|
2009 |
28 |
7 |
p. 698-709 12 p. |
artikel |
5 |
Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system
|
Geetha, S. |
|
2009 |
28 |
7 |
p. 683-697 15 p. |
artikel |
6 |
Call For Papers
|
|
|
2009 |
28 |
7 |
p. 728- 1 p. |
artikel |
7 |
Client-side cross-site scripting protection
|
Kirda, Engin |
|
2009 |
28 |
7 |
p. 592-604 13 p. |
artikel |
8 |
Confidence in smart token proximity: Relay attacks revisited
|
Hancke, G.P. |
|
2009 |
28 |
7 |
p. 615-627 13 p. |
artikel |
9 |
Contents
|
|
|
2009 |
28 |
7 |
p. iii- 1 p. |
artikel |
10 |
Defending passive worms in unstructured P2P networks based on healthy file dissemination
|
Wang, Fangwei |
|
2009 |
28 |
7 |
p. 628-636 9 p. |
artikel |
11 |
Design and implementation of highly reliable dual-computer systems
|
Samet, Refik |
|
2009 |
28 |
7 |
p. 710-722 13 p. |
artikel |
12 |
DFANS: A highly efficient strategy for automated trust negotiation
|
Lu, Hongwei |
|
2009 |
28 |
7 |
p. 557-565 9 p. |
artikel |
13 |
Editorial
|
Gritzalis, Dimitris |
|
2009 |
28 |
7 |
p. 491-492 2 p. |
artikel |
14 |
Human and organizational factors in computer and information security: Pathways to vulnerabilities
|
Kraemer, Sara |
|
2009 |
28 |
7 |
p. 509-520 12 p. |
artikel |
15 |
IFC - Editorial Board
|
|
|
2009 |
28 |
7 |
p. IFC- 1 p. |
artikel |
16 |
IFIP TC11 - Aims and Scope
|
|
|
2009 |
28 |
7 |
p. 723- 1 p. |
artikel |
17 |
IFIP Technical Committee
|
|
|
2009 |
28 |
7 |
p. 724-727 4 p. |
artikel |
18 |
Information security policy: An organizational-level process model
|
Knapp, Kenneth J. |
|
2009 |
28 |
7 |
p. 493-508 16 p. |
artikel |
19 |
Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach
|
Zhang, Zonghua |
|
2009 |
28 |
7 |
p. 605-614 10 p. |
artikel |
20 |
On the development of an internetwork-centric defense for scanning worms
|
Coull, Scott E. |
|
2009 |
28 |
7 |
p. 637-647 11 p. |
artikel |
21 |
Providing secure execution environments with a last line of defense against Trojan circuit attacks
|
Bloom, Gedare |
|
2009 |
28 |
7 |
p. 660-669 10 p. |
artikel |
22 |
Risk profiles and distributed risk assessment
|
Chivers, Howard |
|
2009 |
28 |
7 |
p. 521-535 15 p. |
artikel |
23 |
Security threats scenarios in trust and reputation models for distributed systems
|
Mármol, Félix Gómez |
|
2009 |
28 |
7 |
p. 545-556 12 p. |
artikel |
24 |
Utilizing bloom filters for detecting flooding attacks against SIP based services
|
Geneiatakis, Dimitris |
|
2009 |
28 |
7 |
p. 578-591 14 p. |
artikel |
25 |
What the heck is this application doing? – A security-by-contract architecture for pervasive services
|
Dragoni, N. |
|
2009 |
28 |
7 |
p. 566-577 12 p. |
artikel |