Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             24 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 A comparative analysis of detection metrics for covert timing channels Archibald, Rennie
2014
45 C p. 284-292
9 p.
artikel
2 A multi-level approach to understanding the impact of cyber crime on the financial sector Lagazio, Monica
2014
45 C p. 58-74
17 p.
artikel
3 An approach for profiling phishing activities Hamid, Isredza Rahmi A.
2014
45 C p. 27-41
15 p.
artikel
4 An empirical comparison of botnet detection methods García, S.
2014
45 C p. 100-123
24 p.
artikel
5 A practical solution for sealed bid and multi-currency auctions Montenegro, Jose A.
2014
45 C p. 186-198
13 p.
artikel
6 Bluetooth Command and Control channel Pieterse, Heloise
2014
45 C p. 75-83
9 p.
artikel
7 Complexity is dead, long live complexity! How software can help service providers manage security and compliance Thalmann, Stefan
2014
45 C p. 172-185
14 p.
artikel
8 Contents 2014
45 C p. iii-iv
nvt p.
artikel
9 Design guidelines for security protocols to prevent replay & parallel session attacks Jurcut, Anca D.
2014
45 C p. 255-273
19 p.
artikel
10 Editorial Board 2014
45 C p. IFC-
1 p.
artikel
11 HTTP attack detection using n-gram analysis Oza, Aditya
2014
45 C p. 242-254
13 p.
artikel
12 Information security incident management: Current practice as reported in the literature Tøndel, Inger Anne
2014
45 C p. 42-57
16 p.
artikel
13 Location leakage in distance bounding: Why location privacy does not work Mitrokotsa, Aikaterini
2014
45 C p. 199-209
11 p.
artikel
14 On the security of text-based 3D CAPTCHAs Nguyen, Vu Duc
2014
45 C p. 84-99
16 p.
artikel
15 Ontology for attack detection: An intelligent approach to web application security Razzaq, Abdul
2014
45 C p. 124-146
23 p.
artikel
16 Performance evaluation of anomaly-detection algorithms for mouse dynamics Shen, Chao
2014
45 C p. 156-171
16 p.
artikel
17 Securing cloud and mobility: A practitioner's guide Tsalis, Nikolaos
2014
45 C p. 305-
1 p.
artikel
18 Selection of Candidate Support Vectors in incremental SVM for network intrusion detection Chitrakar, Roshan
2014
45 C p. 231-241
11 p.
artikel
19 Shadow IT – A view from behind the curtain Silic, Mario
2014
45 C p. 274-283
10 p.
artikel
20 Soft biometrics for keystroke dynamics: Profiling individuals while typing passwords Syed Idrus, Syed Zulkarnain
2014
45 C p. 147-155
9 p.
artikel
21 Taxonomy of intrusion risk assessment and response system Shameli-Sendi, Alireza
2014
45 C p. 1-16
16 p.
artikel
22 Time and space interval record schedule consistency analysis for atomic items without interactions in open spaces with stationary locations Cohen, Fred
2014
45 C p. 293-304
12 p.
artikel
23 Towards optimal noise distribution for privacy preserving in data aggregation Zhang, Hao
2014
45 C p. 210-230
21 p.
artikel
24 Uniform DoS traceback Alenezi, Mohammed N.
2014
45 C p. 17-26
10 p.
artikel
                             24 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland