nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A comparative analysis of detection metrics for covert timing channels
|
Archibald, Rennie |
|
2014 |
45 |
C |
p. 284-292 9 p. |
artikel |
2 |
A multi-level approach to understanding the impact of cyber crime on the financial sector
|
Lagazio, Monica |
|
2014 |
45 |
C |
p. 58-74 17 p. |
artikel |
3 |
An approach for profiling phishing activities
|
Hamid, Isredza Rahmi A. |
|
2014 |
45 |
C |
p. 27-41 15 p. |
artikel |
4 |
An empirical comparison of botnet detection methods
|
García, S. |
|
2014 |
45 |
C |
p. 100-123 24 p. |
artikel |
5 |
A practical solution for sealed bid and multi-currency auctions
|
Montenegro, Jose A. |
|
2014 |
45 |
C |
p. 186-198 13 p. |
artikel |
6 |
Bluetooth Command and Control channel
|
Pieterse, Heloise |
|
2014 |
45 |
C |
p. 75-83 9 p. |
artikel |
7 |
Complexity is dead, long live complexity! How software can help service providers manage security and compliance
|
Thalmann, Stefan |
|
2014 |
45 |
C |
p. 172-185 14 p. |
artikel |
8 |
Contents
|
|
|
2014 |
45 |
C |
p. iii-iv nvt p. |
artikel |
9 |
Design guidelines for security protocols to prevent replay & parallel session attacks
|
Jurcut, Anca D. |
|
2014 |
45 |
C |
p. 255-273 19 p. |
artikel |
10 |
Editorial Board
|
|
|
2014 |
45 |
C |
p. IFC- 1 p. |
artikel |
11 |
HTTP attack detection using n-gram analysis
|
Oza, Aditya |
|
2014 |
45 |
C |
p. 242-254 13 p. |
artikel |
12 |
Information security incident management: Current practice as reported in the literature
|
Tøndel, Inger Anne |
|
2014 |
45 |
C |
p. 42-57 16 p. |
artikel |
13 |
Location leakage in distance bounding: Why location privacy does not work
|
Mitrokotsa, Aikaterini |
|
2014 |
45 |
C |
p. 199-209 11 p. |
artikel |
14 |
On the security of text-based 3D CAPTCHAs
|
Nguyen, Vu Duc |
|
2014 |
45 |
C |
p. 84-99 16 p. |
artikel |
15 |
Ontology for attack detection: An intelligent approach to web application security
|
Razzaq, Abdul |
|
2014 |
45 |
C |
p. 124-146 23 p. |
artikel |
16 |
Performance evaluation of anomaly-detection algorithms for mouse dynamics
|
Shen, Chao |
|
2014 |
45 |
C |
p. 156-171 16 p. |
artikel |
17 |
Securing cloud and mobility: A practitioner's guide
|
Tsalis, Nikolaos |
|
2014 |
45 |
C |
p. 305- 1 p. |
artikel |
18 |
Selection of Candidate Support Vectors in incremental SVM for network intrusion detection
|
Chitrakar, Roshan |
|
2014 |
45 |
C |
p. 231-241 11 p. |
artikel |
19 |
Shadow IT – A view from behind the curtain
|
Silic, Mario |
|
2014 |
45 |
C |
p. 274-283 10 p. |
artikel |
20 |
Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords
|
Syed Idrus, Syed Zulkarnain |
|
2014 |
45 |
C |
p. 147-155 9 p. |
artikel |
21 |
Taxonomy of intrusion risk assessment and response system
|
Shameli-Sendi, Alireza |
|
2014 |
45 |
C |
p. 1-16 16 p. |
artikel |
22 |
Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations
|
Cohen, Fred |
|
2014 |
45 |
C |
p. 293-304 12 p. |
artikel |
23 |
Towards optimal noise distribution for privacy preserving in data aggregation
|
Zhang, Hao |
|
2014 |
45 |
C |
p. 210-230 21 p. |
artikel |
24 |
Uniform DoS traceback
|
Alenezi, Mohammed N. |
|
2014 |
45 |
C |
p. 17-26 10 p. |
artikel |