nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Analysis of update delays in signature-based network intrusion detection systems
|
Gascon, Hugo |
|
2011 |
30 |
8 |
p. 613-624 12 p. |
artikel |
2 |
An analysis of the statistical disclosure attack and receiver-bound cover
|
Mallesh, Nayantara |
|
2011 |
30 |
8 |
p. 597-612 16 p. |
artikel |
3 |
An interactive mobile SMS confirmation method using secret sharing technique
|
Lee, Jung-San |
|
2011 |
30 |
8 |
p. 830-839 10 p. |
artikel |
4 |
A taxonomy of self-modifying code for obfuscation
|
Mavrogiannopoulos, Nikos |
|
2011 |
30 |
8 |
p. 679-691 13 p. |
artikel |
5 |
Combining sketches and wavelet analysis for multi time-scale network anomaly detection
|
Callegari, C. |
|
2011 |
30 |
8 |
p. 692-704 13 p. |
artikel |
6 |
Constant round group key agreement protocols: A comparative study
|
Makri, Eleftheria |
|
2011 |
30 |
8 |
p. 643-678 36 p. |
artikel |
7 |
Contents
|
|
|
2011 |
30 |
8 |
p. iii-iv nvt p. |
artikel |
8 |
Countering unauthorized code execution on commodity kernels: A survey of common interfaces allowing kernel code modification
|
Jaeger, Trent |
|
2011 |
30 |
8 |
p. 571-579 9 p. |
artikel |
9 |
Cybercrime: Understanding and addressing the concerns of stakeholders
|
Martin, Nigel |
|
2011 |
30 |
8 |
p. 803-814 12 p. |
artikel |
10 |
Distributed Court System for intrusion detection in mobile ad hoc networks
|
Zhang, Da |
|
2011 |
30 |
8 |
p. 555-570 16 p. |
artikel |
11 |
Editorial for 30/8
|
Spafford, Eugene H. |
|
2011 |
30 |
8 |
p. 553-554 2 p. |
artikel |
12 |
Enable delegation for RBAC with Secure Authorization Certificate
|
Zhou, GuangXu |
|
2011 |
30 |
8 |
p. 780-790 11 p. |
artikel |
13 |
Enforcing privacy in e-commerce by balancing anonymity and trust
|
Bella, Giampaolo |
|
2011 |
30 |
8 |
p. 705-718 14 p. |
artikel |
14 |
Estimating botnet virulence within mathematical models of botnet propagation dynamics
|
Rrushi, Julian |
|
2011 |
30 |
8 |
p. 791-802 12 p. |
artikel |
15 |
E2VoIP2: Energy efficient voice over IP privacy
|
Charanek, Elias Abou |
|
2011 |
30 |
8 |
p. 815-829 15 p. |
artikel |
16 |
Fair digital signing: The structural reliability of signed documents
|
Arnellos, Argyris |
|
2011 |
30 |
8 |
p. 580-596 17 p. |
artikel |
17 |
IFC - Editorial Board
|
|
|
2011 |
30 |
8 |
p. IFC- 1 p. |
artikel |
18 |
Masquerade detection using profile hidden Markov models
|
Huang, Lin |
|
2011 |
30 |
8 |
p. 732-747 16 p. |
artikel |
19 |
Roles in information security – A survey and classification of the research area
|
Fuchs, L. |
|
2011 |
30 |
8 |
p. 748-769 22 p. |
artikel |
20 |
Swarm intelligence in intrusion detection: A survey
|
Kolias, C. |
|
2011 |
30 |
8 |
p. 625-642 18 p. |
artikel |
21 |
The cyber threat landscape: Challenges and future research directions
|
Choo, Kim-Kwang Raymond |
|
2011 |
30 |
8 |
p. 719-731 13 p. |
artikel |
22 |
Windows driver memory analysis: A reverse engineering methodology
|
Okolica, James S. |
|
2011 |
30 |
8 |
p. 770-779 10 p. |
artikel |