nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A situation awareness model for information security risk management
|
Webb, Jeb |
|
2014 |
44 |
C |
p. 1-15 15 p. |
artikel |
2 |
Contents
|
|
|
2014 |
44 |
C |
p. iii- 1 p. |
artikel |
3 |
Control flow-based opcode behavior analysis for Malware detection
|
Ding, Yuxin |
|
2014 |
44 |
C |
p. 65-74 10 p. |
artikel |
4 |
Detecting SQL injection attacks using query result size
|
Jang, Young-Su |
|
2014 |
44 |
C |
p. 104-118 15 p. |
artikel |
5 |
Editorial Board
|
|
|
2014 |
44 |
C |
p. IFC- 1 p. |
artikel |
6 |
Hybrid k-Anonymity
|
Nergiz, Mehmet Ercan |
|
2014 |
44 |
C |
p. 51-63 13 p. |
artikel |
7 |
Implementing a database encryption solution, design and implementation issues
|
Shmueli, Erez |
|
2014 |
44 |
C |
p. 33-50 18 p. |
artikel |
8 |
Is Anti-virus Really Dead?
|
|
|
2014 |
44 |
C |
p. iv- 1 p. |
artikel |
9 |
Propagation model of smartphone worms based on semi-Markov process and social relationship graph
|
Peng, Sancheng |
|
2014 |
44 |
C |
p. 92-103 12 p. |
artikel |
10 |
Securing Cloud and Mobility
|
Kirchner, Martin |
|
2014 |
44 |
C |
p. 64- 1 p. |
artikel |
11 |
Survey of certificate usage in distributed access control
|
Kortesniemi, Yki |
|
2014 |
44 |
C |
p. 16-32 17 p. |
artikel |
12 |
Unintended disclosure of information: Inference attacks by third-party extensions to Social Network Systems
|
Ahmadinejad, Seyed Hossein |
|
2014 |
44 |
C |
p. 75-91 17 p. |
artikel |