nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
AMAL: High-fidelity, behavior-based automated malware analysis and classification
|
Mohaisen, Aziz |
|
2015 |
52 |
C |
p. 251-266 16 p. |
artikel |
2 |
Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs
|
Tsohou, Aggeliki |
|
2015 |
52 |
C |
p. 128-141 14 p. |
artikel |
3 |
Comment on “Design and formal security evaluation of NeMHIP”
|
Wang, Ting |
|
2015 |
52 |
C |
p. 159-161 3 p. |
artikel |
4 |
Contents
|
|
|
2015 |
52 |
C |
p. iii-iv nvt p. |
artikel |
5 |
Decentralized detection of network attacks through P2P data clustering of SNMP data
|
Cerroni, Walter |
|
2015 |
52 |
C |
p. 1-16 16 p. |
artikel |
6 |
Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk
|
Kim, Eunhyun |
|
2015 |
52 |
C |
p. 267-275 9 p. |
artikel |
7 |
Design strategies for a privacy-friendly Austrian eID system in the public cloud
|
Zwattendorfer, Bernd |
|
2015 |
52 |
C |
p. 178-193 16 p. |
artikel |
8 |
Digital forensic readiness: Expert perspectives on a theoretical framework
|
Elyas, Mohamed |
|
2015 |
52 |
C |
p. 70-89 20 p. |
artikel |
9 |
Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs
|
Zhu, Erzhou |
|
2015 |
52 |
C |
p. 51-69 19 p. |
artikel |
10 |
Editorial Board
|
|
|
2015 |
52 |
C |
p. IFC- 1 p. |
artikel |
11 |
Editorial – 28th IFIP TC-11 International Information Security and Privacy Conference
|
|
|
2015 |
52 |
C |
p. 162-163 2 p. |
artikel |
12 |
Effect of network infrastructure factors on information system risk judgments
|
Cowley, Jennifer A. |
|
2015 |
52 |
C |
p. 142-158 17 p. |
artikel |
13 |
Enforcement of privacy requirements
|
Krishnan, Padmanabhan |
|
2015 |
52 |
C |
p. 164-177 14 p. |
artikel |
14 |
Gaithashing: A two-factor authentication scheme based on gait features
|
Ntantogian, Christoforos |
|
2015 |
52 |
C |
p. 17-32 16 p. |
artikel |
15 |
Hypervisor-based malware protection with AccessMiner
|
Fattori, Aristide |
|
2015 |
52 |
C |
p. 33-50 18 p. |
artikel |
16 |
Improving mobile device security with operating system-level virtualization
|
Wessel, Sascha |
|
2015 |
52 |
C |
p. 207-220 14 p. |
artikel |
17 |
Montgomery multiplication and squaring for Optimal Prime Fields
|
Seo, Hwajeong |
|
2015 |
52 |
C |
p. 276-291 16 p. |
artikel |
18 |
Preface – WISA 2014
|
Yi, Jeong Hyun |
|
2015 |
52 |
C |
p. 250- 1 p. |
artikel |
19 |
Screening smartphone applications using malware family signatures
|
Lee, Jehyun |
|
2015 |
52 |
C |
p. 234-249 16 p. |
artikel |
20 |
Security Busters: Web browser security vs. rogue sites
|
Virvilis, Nikos |
|
2015 |
52 |
C |
p. 90-105 16 p. |
artikel |
21 |
The design of phishing studies: Challenges for researchers
|
Parsons, Kathryn |
|
2015 |
52 |
C |
p. 194-206 13 p. |
artikel |
22 |
Toward protecting control flow confidentiality in cloud-based computation
|
Wang, Yongzhi |
|
2015 |
52 |
C |
p. 106-127 22 p. |
artikel |
23 |
Workload modelling for mix-based anonymity services
|
Fuchs, Karl-Peter |
|
2015 |
52 |
C |
p. 221-233 13 p. |
artikel |