Digital Library
Close Browse articles from a journal
     Journal description
       All volumes of the corresponding journal
         All issues of the corresponding volume
                                       All articles of the corresponding issues
 
                             12 results found
no title author magazine year volume issue page(s) type
1 A flexible e-voting scheme for debate tools López García, D.A.
2016
56 C p. 50-62
13 p.
article
2 An adversary model to evaluate DRM protection of video contents on iOS devices D'Orazio, Christian
2016
56 C p. 94-110
17 p.
article
3 Analysis of personal information security behavior and awareness Öğütçü, Gizem
2016
56 C p. 83-93
11 p.
article
4 A review of cyber security risk assessment methods for SCADA systems Cherdantseva, Yulia
2016
56 C p. 1-27
27 p.
article
5 A systematic review of IP traceback schemes for denial of service attacks Singh, Karanpreet
2016
56 C p. 111-139
29 p.
article
6 Contents 2016
56 C p. iii-
1 p.
article
7 Exploratory security analytics for anomaly detection Pierazzi, Fabio
2016
56 C p. 28-49
22 p.
article
8 IFC - Editorial Board 2016
56 C p. CO2-
1 p.
article
9 Information security policy compliance model in organizations Sohrabi Safa, Nader
2016
56 C p. 70-82
13 p.
article
10 Interpreting information security culture: An organizational transformation case study Dhillon, Gurpreet
2016
56 C p. 63-69
7 p.
article
11 Secure bimodal PIN-entry method using audio signals Lee, Mun-Kyu
2016
56 C p. 140-150
11 p.
article
12 The challenges surrounding the regulation of anonymous communication provision in the United Kingdom Horsman, Graeme
2016
56 C p. 151-162
12 p.
article
                             12 results found
 
 Koninklijke Bibliotheek - National Library of the Netherlands