nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Active cyber defense with denial and deception: A cyber-wargame experiment
|
Heckman, Kristin E. |
|
2013 |
37 |
C |
p. 72-77 6 p. |
artikel |
2 |
A framework for prototyping and testing data-only rootkit attacks
|
Riley, Ryan |
|
2013 |
37 |
C |
p. 62-71 10 p. |
artikel |
3 |
Anonymous authentication for privacy-preserving IoT target-driven applications
|
Alcaide, Almudena |
|
2013 |
37 |
C |
p. 111-123 13 p. |
artikel |
4 |
A novel agent-based approach to detect sinkhole attacks in wireless sensor networks
|
Hamedheidari, Sina |
|
2013 |
37 |
C |
p. 1-14 14 p. |
artikel |
5 |
A whitelist-based countermeasure scheme using a Bloom filter against SIP flooding attacks
|
Roh, Byeong-hee |
|
2013 |
37 |
C |
p. 46-61 16 p. |
artikel |
6 |
Contents
|
|
|
2013 |
37 |
C |
p. iii- 1 p. |
artikel |
7 |
Defeating line-noise CAPTCHAs with multiple quadratic snakes
|
Nakaguro, Yoichi |
|
2013 |
37 |
C |
p. 91-110 20 p. |
artikel |
8 |
Editorial
|
|
|
2013 |
37 |
C |
p. iv-v nvt p. |
artikel |
9 |
Editorial Board
|
|
|
2013 |
37 |
C |
p. IFC- 1 p. |
artikel |
10 |
Efficient authentication for fast handover in wireless mesh networks
|
Li, Celia |
|
2013 |
37 |
C |
p. 124-142 19 p. |
artikel |
11 |
Enhancing IDS performance through comprehensive alert post-processing
|
Spathoulas, Georgios P. |
|
2013 |
37 |
C |
p. 176-196 21 p. |
artikel |
12 |
Monitoring information security risks within health care
|
van Deursen, Nicole |
|
2013 |
37 |
C |
p. 31-45 15 p. |
artikel |
13 |
Mutual-friend based attacks in social network systems
|
Jin, Lei |
|
2013 |
37 |
C |
p. 15-30 16 p. |
artikel |
14 |
Onion routing circuit construction via latency graphs
|
Castillo-Pérez, Sergio |
|
2013 |
37 |
C |
p. 197-214 18 p. |
artikel |
15 |
Privacy-preserving publishing of opinion polls
|
Abdalaal, Ahmed |
|
2013 |
37 |
C |
p. 143-154 12 p. |
artikel |
16 |
Quality of security metrics and measurements
|
Savola, Reijo M. |
|
2013 |
37 |
C |
p. 78-90 13 p. |
artikel |
17 |
Secloud: A cloud-based comprehensive and lightweight security solution for smartphones
|
Zonouz, Saman |
|
2013 |
37 |
C |
p. 215-227 13 p. |
artikel |
18 |
Security as a theoretical attribute construct
|
Bayuk, Jennifer L. |
|
2013 |
37 |
C |
p. 155-175 21 p. |
artikel |