Digitale Bibliotheek
Sluiten Bladeren door artikelen uit een tijdschrift
     Tijdschrift beschrijving
       Alle jaargangen van het bijbehorende tijdschrift
         Alle afleveringen van het bijbehorende jaargang
                                       Alle artikelen van de bijbehorende aflevering
 
                             23 gevonden resultaten
nr titel auteur tijdschrift jaar jaarg. afl. pagina('s) type
1 AMAL: High-fidelity, behavior-based automated malware analysis and classification Mohaisen, Aziz
2015
52 C p. 251-266
16 p.
artikel
2 Analyzing the role of cognitive and cultural biases in the internalization of information security policies: Recommendations for information security awareness programs Tsohou, Aggeliki
2015
52 C p. 128-141
14 p.
artikel
3 Comment on “Design and formal security evaluation of NeMHIP” Wang, Ting
2015
52 C p. 159-161
3 p.
artikel
4 Contents 2015
52 C p. iii-iv
nvt p.
artikel
5 Decentralized detection of network attacks through P2P data clustering of SNMP data Cerroni, Walter
2015
52 C p. 1-16
16 p.
artikel
6 Design and analysis of enumeration attacks on finding friends with phone numbers: A case study with KakaoTalk Kim, Eunhyun
2015
52 C p. 267-275
9 p.
artikel
7 Design strategies for a privacy-friendly Austrian eID system in the public cloud Zwattendorfer, Bernd
2015
52 C p. 178-193
16 p.
artikel
8 Digital forensic readiness: Expert perspectives on a theoretical framework Elyas, Mohamed
2015
52 C p. 70-89
20 p.
artikel
9 Dytaint: The implementation of a novel lightweight 3-state dynamic taint analysis framework for x86 binary programs Zhu, Erzhou
2015
52 C p. 51-69
19 p.
artikel
10 Editorial Board 2015
52 C p. IFC-
1 p.
artikel
11 Editorial – 28th IFIP TC-11 International Information Security and Privacy Conference 2015
52 C p. 162-163
2 p.
artikel
12 Effect of network infrastructure factors on information system risk judgments Cowley, Jennifer A.
2015
52 C p. 142-158
17 p.
artikel
13 Enforcement of privacy requirements Krishnan, Padmanabhan
2015
52 C p. 164-177
14 p.
artikel
14 Gaithashing: A two-factor authentication scheme based on gait features Ntantogian, Christoforos
2015
52 C p. 17-32
16 p.
artikel
15 Hypervisor-based malware protection with AccessMiner Fattori, Aristide
2015
52 C p. 33-50
18 p.
artikel
16 Improving mobile device security with operating system-level virtualization Wessel, Sascha
2015
52 C p. 207-220
14 p.
artikel
17 Montgomery multiplication and squaring for Optimal Prime Fields Seo, Hwajeong
2015
52 C p. 276-291
16 p.
artikel
18 Preface – WISA 2014 Yi, Jeong Hyun
2015
52 C p. 250-
1 p.
artikel
19 Screening smartphone applications using malware family signatures Lee, Jehyun
2015
52 C p. 234-249
16 p.
artikel
20 Security Busters: Web browser security vs. rogue sites Virvilis, Nikos
2015
52 C p. 90-105
16 p.
artikel
21 The design of phishing studies: Challenges for researchers Parsons, Kathryn
2015
52 C p. 194-206
13 p.
artikel
22 Toward protecting control flow confidentiality in cloud-based computation Wang, Yongzhi
2015
52 C p. 106-127
22 p.
artikel
23 Workload modelling for mix-based anonymity services Fuchs, Karl-Peter
2015
52 C p. 221-233
13 p.
artikel
                             23 gevonden resultaten
 
 Koninklijke Bibliotheek - Nationale Bibliotheek van Nederland