no |
title |
author |
magazine |
year |
volume |
issue |
page(s) |
type |
1 |
A flexible e-voting scheme for debate tools
|
López García, D.A. |
|
2016 |
56 |
C |
p. 50-62 13 p. |
article |
2 |
An adversary model to evaluate DRM protection of video contents on iOS devices
|
D'Orazio, Christian |
|
2016 |
56 |
C |
p. 94-110 17 p. |
article |
3 |
Analysis of personal information security behavior and awareness
|
Öğütçü, Gizem |
|
2016 |
56 |
C |
p. 83-93 11 p. |
article |
4 |
A review of cyber security risk assessment methods for SCADA systems
|
Cherdantseva, Yulia |
|
2016 |
56 |
C |
p. 1-27 27 p. |
article |
5 |
A systematic review of IP traceback schemes for denial of service attacks
|
Singh, Karanpreet |
|
2016 |
56 |
C |
p. 111-139 29 p. |
article |
6 |
Contents
|
|
|
2016 |
56 |
C |
p. iii- 1 p. |
article |
7 |
Exploratory security analytics for anomaly detection
|
Pierazzi, Fabio |
|
2016 |
56 |
C |
p. 28-49 22 p. |
article |
8 |
IFC - Editorial Board
|
|
|
2016 |
56 |
C |
p. CO2- 1 p. |
article |
9 |
Information security policy compliance model in organizations
|
Sohrabi Safa, Nader |
|
2016 |
56 |
C |
p. 70-82 13 p. |
article |
10 |
Interpreting information security culture: An organizational transformation case study
|
Dhillon, Gurpreet |
|
2016 |
56 |
C |
p. 63-69 7 p. |
article |
11 |
Secure bimodal PIN-entry method using audio signals
|
Lee, Mun-Kyu |
|
2016 |
56 |
C |
p. 140-150 11 p. |
article |
12 |
The challenges surrounding the regulation of anonymous communication provision in the United Kingdom
|
Horsman, Graeme |
|
2016 |
56 |
C |
p. 151-162 12 p. |
article |