Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             22 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 Analysis of update delays in signature-based network intrusion detection systems Gascon, Hugo
2011
30 8 p. 613-624
12 p.
artikel
2 An analysis of the statistical disclosure attack and receiver-bound cover Mallesh, Nayantara
2011
30 8 p. 597-612
16 p.
artikel
3 An interactive mobile SMS confirmation method using secret sharing technique Lee, Jung-San
2011
30 8 p. 830-839
10 p.
artikel
4 A taxonomy of self-modifying code for obfuscation Mavrogiannopoulos, Nikos
2011
30 8 p. 679-691
13 p.
artikel
5 Combining sketches and wavelet analysis for multi time-scale network anomaly detection Callegari, C.
2011
30 8 p. 692-704
13 p.
artikel
6 Constant round group key agreement protocols: A comparative study Makri, Eleftheria
2011
30 8 p. 643-678
36 p.
artikel
7 Contents 2011
30 8 p. iii-iv
nvt p.
artikel
8 Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification Jaeger, Trent
2011
30 8 p. 571-579
9 p.
artikel
9 Cybercrime: Understanding and addressing the concerns of stakeholders Martin, Nigel
2011
30 8 p. 803-814
12 p.
artikel
10 Distributed Court System for intrusion detection in mobile ad hoc networks Zhang, Da
2011
30 8 p. 555-570
16 p.
artikel
11 Editorial for 30/8 Spafford, Eugene H.
2011
30 8 p. 553-554
2 p.
artikel
12 Enable delegation for RBAC with Secure Authorization Certificate Zhou, GuangXu
2011
30 8 p. 780-790
11 p.
artikel
13 Enforcing privacy in e-commerce by balancing anonymity and trust Bella, Giampaolo
2011
30 8 p. 705-718
14 p.
artikel
14 Estimating botnet virulence within mathematical models of botnet propagation dynamics Rrushi, Julian
2011
30 8 p. 791-802
12 p.
artikel
15 E2VoIP2: Energy efficient voice over IP privacy Charanek, Elias Abou
2011
30 8 p. 815-829
15 p.
artikel
16 Fair digital signing: The structural reliability of signed documents Arnellos, Argyris
2011
30 8 p. 580-596
17 p.
artikel
17 IFC - Editorial Board 2011
30 8 p. IFC-
1 p.
artikel
18 Masquerade detection using profile hidden Markov models Huang, Lin
2011
30 8 p. 732-747
16 p.
artikel
19 Roles in information security – A survey and classification of the research area Fuchs, L.
2011
30 8 p. 748-769
22 p.
artikel
20 Swarm intelligence in intrusion detection: A survey Kolias, C.
2011
30 8 p. 625-642
18 p.
artikel
21 The cyber threat landscape: Challenges and future research directions Choo, Kim-Kwang Raymond
2011
30 8 p. 719-731
13 p.
artikel
22 Windows driver memory analysis: A reverse engineering methodology Okolica, James S.
2011
30 8 p. 770-779
10 p.
artikel
                             22 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland