nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A multi-layer Criticality Assessment methodology based on interdependencies
|
Theoharidou, Marianthi |
|
2010 |
29 |
6 |
p. 643-658 16 p. |
artikel |
2 |
A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm
|
Tjhai, Gina C. |
|
2010 |
29 |
6 |
p. 712-723 12 p. |
artikel |
3 |
A probabilistic relational model for security risk analysis
|
Sommestad, Teodor |
|
2010 |
29 |
6 |
p. 659-679 21 p. |
artikel |
4 |
Contents
|
|
|
2010 |
29 |
6 |
p. iii- 1 p. |
artikel |
5 |
Editorial
|
Spafford, Eugene H. |
|
2010 |
29 |
6 |
p. 641-642 2 p. |
artikel |
6 |
IFC - Editorial Board
|
|
|
2010 |
29 |
6 |
p. IFC- 1 p. |
artikel |
7 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2010 |
29 |
6 |
p. 724-728 5 p. |
artikel |
8 |
Implementing a passive network covert timing channel
|
Zi, Xiaochao |
|
2010 |
29 |
6 |
p. 686-696 11 p. |
artikel |
9 |
On the detection of pod slurping attacks
|
Kavallaris, Theodoros |
|
2010 |
29 |
6 |
p. 680-685 6 p. |
artikel |
10 |
PREON: An efficient cascade revocation mechanism for delegation paths
|
Hinarejos, M. Francisca |
|
2010 |
29 |
6 |
p. 697-711 15 p. |
artikel |