nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
An anomaly analysis framework for database systems
|
Vavilis, Sokratis |
|
2015 |
53 |
C |
p. 156-173 18 p. |
artikel |
2 |
An expert-based investigation of the Common Vulnerability Scoring System
|
Holm, Hannes |
|
2015 |
53 |
C |
p. 18-30 13 p. |
artikel |
3 |
A taxonomy for privacy enhancing technologies
|
Heurix, Johannes |
|
2015 |
53 |
C |
p. 1-17 17 p. |
artikel |
4 |
BankSealer: A decision support system for online banking fraud analysis and investigation
|
Carminati, Michele |
|
2015 |
53 |
C |
p. 175-186 12 p. |
artikel |
5 |
Contents
|
|
|
2015 |
53 |
C |
p. iii-iv nvt p. |
artikel |
6 |
Continuous user authentication using multi-modal biometrics
|
Saevanee, Hataichanok |
|
2015 |
53 |
C |
p. 234-246 13 p. |
artikel |
7 |
Editorial Board
|
|
|
2015 |
53 |
C |
p. IFC- 1 p. |
artikel |
8 |
Editorial – SEC′14 special issue on ICT systems security and privacy protection
|
|
|
2015 |
53 |
C |
p. 174- 1 p. |
artikel |
9 |
Information Security Behaviour Profiling Framework (ISBPF) for student mobile phone users
|
Ngoqo, Bukelwa |
|
2015 |
53 |
C |
p. 132-142 11 p. |
artikel |
10 |
Information security conscious care behaviour formation in organizations
|
Safa, Nader Sohrabi |
|
2015 |
53 |
C |
p. 65-78 14 p. |
artikel |
11 |
Input extraction via motion-sensor behavior analysis on smartphones
|
Shen, Chao |
|
2015 |
53 |
C |
p. 143-155 13 p. |
artikel |
12 |
New models for efficient authenticated dictionaries
|
Atighehchi, Kevin |
|
2015 |
53 |
C |
p. 203-214 12 p. |
artikel |
13 |
On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL
|
Wang, Yongge |
|
2015 |
53 |
C |
p. 44-64 21 p. |
artikel |
14 |
Reconciling user privacy and implicit authentication for mobile devices
|
Shahandashti, Siamak F. |
|
2015 |
53 |
C |
p. 215-233 19 p. |
artikel |
15 |
Security of Software Defined Networks: A survey
|
Alsmadi, Izzat |
|
2015 |
53 |
C |
p. 79-108 30 p. |
artikel |
16 |
Statistical dynamic splay tree filters towards multilevel firewall packet filtering enhancement
|
Trabelsi, Zouheir |
|
2015 |
53 |
C |
p. 109-131 23 p. |
artikel |
17 |
Styx: Privacy risk communication for the Android smartphone platform based on apps' data-access behavior patterns
|
Bal, Gökhan |
|
2015 |
53 |
C |
p. 187-202 16 p. |
artikel |
18 |
When Mice devour the Elephants: A DDoS attack against size-based scheduling schemes in the internet
|
Serwadda, Abdul |
|
2015 |
53 |
C |
p. 31-43 13 p. |
artikel |