nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A Bug Hunter's Diary
|
Stergiopoulos, George |
|
2014 |
43 |
C |
p. 188- 1 p. |
artikel |
2 |
An exploratory investigation of message-person congruence in information security awareness campaigns
|
Kajzer, Mitchell |
|
2014 |
43 |
C |
p. 64-76 13 p. |
artikel |
3 |
Contents
|
|
|
2014 |
43 |
C |
p. iii- 1 p. |
artikel |
4 |
Editorial
|
Spafford, Eugene H. |
|
2014 |
43 |
C |
p. iv- 1 p. |
artikel |
5 |
Editorial Board
|
|
|
2014 |
43 |
C |
p. IFC- 1 p. |
artikel |
6 |
EFM: Enhancing the performance of signature-based network intrusion detection systems using enhanced filter mechanism
|
Meng, Weizhi |
|
2014 |
43 |
C |
p. 189-204 16 p. |
artikel |
7 |
Evaluation model for knowledge sharing in information security professional virtual community
|
Tamjidyamcholo, Alireza |
|
2014 |
43 |
C |
p. 19-34 16 p. |
artikel |
8 |
Information security knowledge sharing in organizations: Investigating the effect of behavioral information security governance and national culture
|
Rocha Flores, Waldo |
|
2014 |
43 |
C |
p. 90-110 21 p. |
artikel |
9 |
Mobile malware detection through analysis of deviations in application network behavior
|
Shabtai, A. |
|
2014 |
43 |
C |
p. 1-18 18 p. |
artikel |
10 |
Nothing ventured, nothing gained. Profiles of online activity, cyber-crime exposure, and security measures of end-users in European Union
|
Rughiniş, Cosima |
|
2014 |
43 |
C |
p. 111-125 15 p. |
artikel |
11 |
Obscuring users' identity in VoIP/IMS environments
|
Vrakas, Nikos |
|
2014 |
43 |
C |
p. 145-158 14 p. |
artikel |
12 |
On fingerprinting probing activities
|
Bou-Harb, Elias |
|
2014 |
43 |
C |
p. 35-48 14 p. |
artikel |
13 |
On the adoption of anomaly detection for packed executable filtering
|
Ugarte-Pedrero, Xabier |
|
2014 |
43 |
C |
p. 126-144 19 p. |
artikel |
14 |
Permission based Android security: Issues and countermeasures
|
Fang, Zheran |
|
2014 |
43 |
C |
p. 205-218 14 p. |
artikel |
15 |
SoNeUCON ABC , an expressive usage control model for Web-Based Social Networks
|
González-Manzano, Lorena |
|
2014 |
43 |
C |
p. 159-187 29 p. |
artikel |
16 |
Static analysis based invariant detection for commodity operating systems
|
Zhu, Feng |
|
2014 |
43 |
C |
p. 49-63 15 p. |
artikel |
17 |
User identification and authentication using multi-modal behavioral biometrics
|
Bailey, Kyle O. |
|
2014 |
43 |
C |
p. 77-89 13 p. |
artikel |