nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An unsupervised anomaly-based detection approach for integrity attacks on SCADA systems
|
Almalawi, Abdulmohsen |
|
2014 |
46 |
C |
p. 94-110 17 p. |
artikel |
2 |
Contents
|
|
|
2014 |
46 |
C |
p. iii- 1 p. |
artikel |
3 |
Cyber situational awareness – A systematic review of the literature
|
Franke, Ulrik |
|
2014 |
46 |
C |
p. 18-31 14 p. |
artikel |
4 |
Cylindrical Coordinates Security Visualization for multiple domain command and control botnet detection
|
Seo, Ilju |
|
2014 |
46 |
C |
p. 141-153 13 p. |
artikel |
5 |
Decision support for releasing anonymised data
|
Jändel, Magnus |
|
2014 |
46 |
C |
p. 48-61 14 p. |
artikel |
6 |
Editorial Board
|
|
|
2014 |
46 |
C |
p. IFC- 1 p. |
artikel |
7 |
Enhancing the detection of metamorphic malware using call graphs
|
Elhadi, Ammar Ahmed E. |
|
2014 |
46 |
C |
p. 62-78 17 p. |
artikel |
8 |
Introduction to Computer and Network Security: Navigating Shades of Gray
|
Stavrou, Vasilis |
|
2014 |
46 |
C |
p. 173- 1 p. |
artikel |
9 |
New X.509-based mechanisms for fair anonymity management
|
Diaz, Jesus |
|
2014 |
46 |
C |
p. 111-125 15 p. |
artikel |
10 |
RAPID: Traffic-agnostic intrusion detection for resource-constrained wireless mesh networks
|
Hassanzadeh, Amin |
|
2014 |
46 |
C |
p. 1-17 17 p. |
artikel |
11 |
Security analysis of temporal RBAC under an administrative model
|
Jha, Sadhana |
|
2014 |
46 |
C |
p. 154-172 19 p. |
artikel |
12 |
Stable web spam detection using features based on lexical items
|
Luckner, Marcin |
|
2014 |
46 |
C |
p. 79-93 15 p. |
artikel |
13 |
Stealing bandwidth from BitTorrent seeders
|
Adamsky, Florian |
|
2014 |
46 |
C |
p. 126-140 15 p. |
artikel |
14 |
Toward a secure and usable cloud-based password manager for web browsers
|
Zhao, Rui |
|
2014 |
46 |
C |
p. 32-47 16 p. |
artikel |