nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system
|
Gope, Prosanta |
|
2015 |
55 |
C |
p. 271-280 10 p. |
artikel |
2 |
A review on the public benchmark databases for static keystroke dynamics
|
Giot, Romain |
|
2015 |
55 |
C |
p. 46-61 16 p. |
artikel |
3 |
A three-stage analysis of IDS for critical infrastructures
|
Cazorla, Lorena |
|
2015 |
55 |
C |
p. 235-250 16 p. |
artikel |
4 |
Automatic generation of HTTP intrusion signatures by selective identification of anomalies
|
Garcia-Teodoro, P. |
|
2015 |
55 |
C |
p. 159-174 16 p. |
artikel |
5 |
BYOD security engineering: A framework and its analysis
|
Zahadat, Nima |
|
2015 |
55 |
C |
p. 81-99 19 p. |
artikel |
6 |
Contents
|
|
|
2015 |
55 |
C |
p. iii- 1 p. |
artikel |
7 |
Detecting seam carving based image resizing using local binary patterns
|
Yin, Ting |
|
2015 |
55 |
C |
p. 130-141 12 p. |
artikel |
8 |
Differentially private maximal frequent sequence mining
|
Cheng, Xiang |
|
2015 |
55 |
C |
p. 175-192 18 p. |
artikel |
9 |
IFC - Editorial Board
|
|
|
2015 |
55 |
C |
p. CO2- 1 p. |
artikel |
10 |
Man-in-the-browser-cache: Persisting HTTPS attacks via browser cache poisoning
|
Jia, Yaoqi |
|
2015 |
55 |
C |
p. 62-80 19 p. |
artikel |
11 |
Necessity for ethics in social engineering research
|
Mouton, Francois |
|
2015 |
55 |
C |
p. 114-127 14 p. |
artikel |
12 |
New data-hiding algorithm based on adaptive neural networks with modified particle swarm optimization
|
El-Emam, Nameer N. |
|
2015 |
55 |
C |
p. 21-45 25 p. |
artikel |
13 |
[No title]
|
Stavrou, Vasilis |
|
2015 |
55 |
C |
p. 128-129 2 p. |
artikel |
14 |
[No title]
|
Tsalis, Nikolaos |
|
2015 |
55 |
C |
p. 113- 1 p. |
artikel |
15 |
On the ground truth problem of malicious DNS traffic analysis
|
Stevanovic, Matija |
|
2015 |
55 |
C |
p. 142-158 17 p. |
artikel |
16 |
Relationship-based federated access control model for EPC Discovery Service
|
Liu, Bing |
|
2015 |
55 |
C |
p. 251-270 20 p. |
artikel |
17 |
Security solution frames and security patterns for authorization in distributed, collaborative systems
|
Uzunov, Anton V. |
|
2015 |
55 |
C |
p. 193-234 42 p. |
artikel |
18 |
The information systems' security level assessment model based on an ontology and evidential reasoning approach
|
Solic, Kresimir |
|
2015 |
55 |
C |
p. 100-112 13 p. |
artikel |
19 |
The sigmoidal growth of operating system security vulnerabilities: An empirical revisit
|
Ruohonen, Jukka |
|
2015 |
55 |
C |
p. 1-20 20 p. |
artikel |