Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             25 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A concise cost analysis of Internet malware Kondakci, Suleyman
2009
28 7 p. 648-659
12 p.
artikel
2 Adapting usage control as a deterrent to address the inadequacies of access controls Padayachee, Keshnee
2009
28 7 p. 536-544
9 p.
artikel
3 A new steganography algorithm based on color histograms for data embedding into raw video streams Cetin, Ozdemir
2009
28 7 p. 670-682
13 p.
artikel
4 A schema for protecting the integrity of databases Kamel, Ibrahim
2009
28 7 p. 698-709
12 p.
artikel
5 Blind image steganalysis based on content independent statistical measures maximizing the specificity and sensitivity of the system Geetha, S.
2009
28 7 p. 683-697
15 p.
artikel
6 Call For Papers 2009
28 7 p. 728-
1 p.
artikel
7 Client-side cross-site scripting protection Kirda, Engin
2009
28 7 p. 592-604
13 p.
artikel
8 Confidence in smart token proximity: Relay attacks revisited Hancke, G.P.
2009
28 7 p. 615-627
13 p.
artikel
9 Contents 2009
28 7 p. iii-
1 p.
artikel
10 Defending passive worms in unstructured P2P networks based on healthy file dissemination Wang, Fangwei
2009
28 7 p. 628-636
9 p.
artikel
11 Design and implementation of highly reliable dual-computer systems Samet, Refik
2009
28 7 p. 710-722
13 p.
artikel
12 DFANS: A highly efficient strategy for automated trust negotiation Lu, Hongwei
2009
28 7 p. 557-565
9 p.
artikel
13 Editorial Gritzalis, Dimitris
2009
28 7 p. 491-492
2 p.
artikel
14 Human and organizational factors in computer and information security: Pathways to vulnerabilities Kraemer, Sara
2009
28 7 p. 509-520
12 p.
artikel
15 IFC - Editorial Board 2009
28 7 p. IFC-
1 p.
artikel
16 IFIP TC11 - Aims and Scope 2009
28 7 p. 723-
1 p.
artikel
17 IFIP Technical Committee 2009
28 7 p. 724-727
4 p.
artikel
18 Information security policy: An organizational-level process model Knapp, Kenneth J.
2009
28 7 p. 493-508
16 p.
artikel
19 Measuring IDS-estimated attack impacts for rational incident response: A decision theoretic approach Zhang, Zonghua
2009
28 7 p. 605-614
10 p.
artikel
20 On the development of an internetwork-centric defense for scanning worms Coull, Scott E.
2009
28 7 p. 637-647
11 p.
artikel
21 Providing secure execution environments with a last line of defense against Trojan circuit attacks Bloom, Gedare
2009
28 7 p. 660-669
10 p.
artikel
22 Risk profiles and distributed risk assessment Chivers, Howard
2009
28 7 p. 521-535
15 p.
artikel
23 Security threats scenarios in trust and reputation models for distributed systems Mármol, Félix Gómez
2009
28 7 p. 545-556
12 p.
artikel
24 Utilizing bloom filters for detecting flooding attacks against SIP based services Geneiatakis, Dimitris
2009
28 7 p. 578-591
14 p.
artikel
25 What the heck is this application doing? – A security-by-contract architecture for pervasive services Dragoni, N.
2009
28 7 p. 566-577
12 p.
artikel
                             25 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland