nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative evaluation of intrusion detection architectures for mobile ad hoc networks
|
Xenakis, Christos |
|
2011 |
30 |
1 |
p. 63-80 18 p. |
artikel |
2 |
An efficient and non-interactive hierarchical key agreement protocol
|
Guo, Hua |
|
2011 |
30 |
1 |
p. 28-34 7 p. |
artikel |
3 |
A study of self-propagating mal-packets in sensor networks: Attacks and defenses
|
Gu, Qijun |
|
2011 |
30 |
1 |
p. 13-27 15 p. |
artikel |
4 |
Call for membership
|
|
|
2011 |
30 |
1 |
p. 87- 1 p. |
artikel |
5 |
Contents
|
|
|
2011 |
30 |
1 |
p. iii- 1 p. |
artikel |
6 |
Designing a cluster-based covert channel to evade disk investigation and forensics
|
Khan, Hassan |
|
2011 |
30 |
1 |
p. 35-49 15 p. |
artikel |
7 |
Editorial
|
Spafford, Eugene H. |
|
2011 |
30 |
1 |
p. 1- 1 p. |
artikel |
8 |
IFC - Editorial Board
|
|
|
2011 |
30 |
1 |
p. IFC- 1 p. |
artikel |
9 |
IFIP TCII - Aims, Scope and Technical Committee
|
|
|
2011 |
30 |
1 |
p. 81-85 5 p. |
artikel |
10 |
IFIPTM 2011 – Call for Contributions
|
|
|
2011 |
30 |
1 |
p. 86- 1 p. |
artikel |
11 |
Modeling vulnerability discovery process in Apache and IIS HTTP servers
|
Woo, Sung-Whan |
|
2011 |
30 |
1 |
p. 50-62 13 p. |
artikel |
12 |
Security, technology, publishing, and ethics (part II)
|
Spafford, Eugene H. |
|
2011 |
30 |
1 |
p. 2-3 2 p. |
artikel |
13 |
WhiteScript: Using social network analysis parameters to balance between browser usability and malware exposure
|
Sadan, Zac |
|
2011 |
30 |
1 |
p. 4-12 9 p. |
artikel |
14 |
WISE 7 - Call for Papers
|
|
|
2011 |
30 |
1 |
p. 88- 1 p. |
artikel |