nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A framework for security assurance of access control enforcement code
|
Pavlich-Mariscal, Jaime A. |
|
2010 |
29 |
7 |
p. 770-784 15 p. |
artikel |
2 |
Approach for selecting the most suitable Automated Personal Identification Mechanism (ASMSA)
|
Palmer, Anthony J. |
|
2010 |
29 |
7 |
p. 785-806 22 p. |
artikel |
3 |
Contents
|
|
|
2010 |
29 |
7 |
p. iii- 1 p. |
artikel |
4 |
Editorial
|
Spafford, Eugene H. |
|
2010 |
29 |
7 |
p. 729-730 2 p. |
artikel |
5 |
Efficient hardware support for pattern matching in network intrusion detection
|
Guinde, Nitesh B. |
|
2010 |
29 |
7 |
p. 756-769 14 p. |
artikel |
6 |
Ethical decision making: Improving the quality of acceptable use policies
|
Ruighaver, A.B. |
|
2010 |
29 |
7 |
p. 731-736 6 p. |
artikel |
7 |
IFC - Editorial Board
|
|
|
2010 |
29 |
7 |
p. IFC- 1 p. |
artikel |
8 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2010 |
29 |
7 |
p. 807-811 5 p. |
artikel |
9 |
Network anomaly detection through nonlinear analysis
|
Palmieri, Francesco |
|
2010 |
29 |
7 |
p. 737-755 19 p. |
artikel |